Check patentability & draft patents in minutes with Patsnap Eureka AI!

Target object recognition method and device, computer equipment and storage medium

A technology of target object and identification method, which is applied in the direction of network data query, special data processing application, website content management, etc. problem to improve the accuracy

Active Publication Date: 2020-02-14
TENCENT TECH (SHENZHEN) CO LTD
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the recognition accuracy of machine learning models in related technologies depends on the scale of training data, and the number of malicious users or devices in the network is rare, so it is difficult to collect a sufficient amount of training data, resulting in low accuracy of trained machine learning models. Low, poor identification of malicious users or devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Target object recognition method and device, computer equipment and storage medium
  • Target object recognition method and device, computer equipment and storage medium
  • Target object recognition method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0058] It should be understood that "several" mentioned herein refers to one or more, and "multiple" refers to two or more. "And / or" describes the association relationship of associated objects, indicating that there may be three types of relationships, for example, A and / or B may indicate: A exists alone, A and B exist simultaneously, and B exists independently. The character " / " gener...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a target object recognition method and device, computer equipment and a storage medium, and relates to the technical field of network security. The method comprises the following steps: initializing a PageRank value of each node in a network relation graph; iteratively calculating according to a random walk algorithm to obtain a similarity value between each node in the network relation graph and the seed node set; according to the similarity value between each node and the seed node set, identifying a target node with the same node type as at least one seed node fromeach node; and determining the network object corresponding to the target node as the target object. According to the scheme, the target nodes of the same type as the seed nodes can be screened out through iterative computation only by specifying a small number of seed nodes of a specific type in advance in the network relation graph, the network objects corresponding to the target nodes are recognized as the target objects, and the accuracy of network object recognition is improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a target object identification method, device, computer equipment and storage medium. Background technique [0002] With the continuous development of network technology, network security technology is getting more and more attention. Among them, how to identify possible malicious users (or devices used by malicious users) in the network is an important research direction in network security technology. [0003] In related art, machine learning models are usually trained to identify malicious users or devices in a network. For example, developers pre-collect characteristic information of marked malicious users, such as user attributes of malicious users, network community attributes, etc., and then train machine learning models based on the characteristic information of malicious users; The feature information is input into the trained machine learning model,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F16/901G06F16/953G06F16/958
CPCG06F16/9024G06F16/953G06F16/958H04L63/1416
Inventor 石志林郑巧玲应秋芳胡彬梁浩强张杰张纪红刘洪
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More