Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious text detection method and device, electronic equipment and storage medium

A detection method and technology of electronic equipment, applied in the computer field, can solve the problems of low accuracy of the detection method and achieve the effect of improving the accuracy

Pending Publication Date: 2020-05-15
BEIJING DAJIA INTERNET INFORMATION TECH CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present disclosure provides a malicious text detection method, device, electronic equipment and storage medium to at least solve the problem of low accuracy of the malicious text detection method in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious text detection method and device, electronic equipment and storage medium
  • Malicious text detection method and device, electronic equipment and storage medium
  • Malicious text detection method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] Figure 1a is a flow chart of a malicious text detection method shown according to an exemplary embodiment, such as Figure 1a As shown, this method can improve the accuracy of malicious text detection.

[0065] The subject of execution of the method includes but is not limited to servers, personal computers, notebook computers, tablet computers, smart phones and other intelligent electronic devices that can execute predetermined processing procedures such as logic calculations by running predetermined programs or instructions. Wherein, the server may be a single server or multiple server groups.

[0066] Optionally, the server may further include at least one database for storing text recognition models, malicious text data, malicious users, and so on. When the servers are a server group, identified malicious text data, malicious websites, malicious users, etc. can be shared among each server in the server group. The method for malicious text detection may include the...

Embodiment 2

[0125] In step S1022, when calculating the first similarity between the normalized text to be detected and each malicious text, and calculating the second similarity between the converted text and each malicious text, the calculation can be performed according to the text vector of the text, The text vector of the text can be generated by the pre-trained model.

[0126] Combine the following figure 2 A method for generating a text vector is introduced. It should be noted that the method for generating a text vector is only an exemplary description, and does not impose any limitation on the method provided by the embodiments of the present disclosure.

[0127] Optionally, considering the process of building a text classification model based on the neural network of the encoder-decoder framework, the input source sentence can obtain a word vector with a fixed dimension and complete semantic features through the encoder of the neural network. Features, the present disclosure ca...

Embodiment 3

[0143] image 3 It is a block diagram of an apparatus for detecting malicious text according to an exemplary embodiment. refer to image 3 , the device 300 includes a word vector determination module 301 , a similarity determination module 302 , and a malicious text determination module 303 .

[0144] The normalization processing module 301 is configured to perform normalization processing on the text to be detected to obtain the normalized text to be detected;

[0145] The similarity determining module 302 is configured to determine the highest similarity between the malicious text in the malicious text library and the text to be detected based on at least the normalized text to be detected, wherein the highest similarity is at least the normalized The highest similarity among the similarities between the text to be detected and each malicious text in the malicious text library;

[0146]The malicious text determining module 303 is configured to determine that the text to b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious text detection method and device, electronic equipment and a storage medium, and the method comprises the steps: normalizing a to-be-detected text, and obtaining a normalized to-be-detected text; determining the highest similarity between a malicious text in a malicious text library and the to-be-detected text at least according to the normalized to-be-detected text, the highest similarity being at least the highest similarity between the normalized to-be-detected text and each malicious text in the malicious text library; and if the highest similarity is greater than a preset similarity threshold, determining that the to-be-detected text is a malicious text. Compared with the prior art that keyword library matching is carried out only based on the to-be-detected text, the malicious text detection accuracy is improved.

Description

technical field [0001] The present disclosure relates to the field of computer technology, and in particular to a malicious text detection method, device, electronic equipment and storage medium. Background technique [0002] In related technologies, in order to prevent the spread of bad information on the Internet as much as possible, the malicious text may be detected by a keyword matching method. Specifically, certain words in the malicious text will be selected as keywords through user reporting and manual discovery, and then added to the keyword library. The keyword to be searched is searched in the keyword library, and if the keyword to be searched is hit in the keyword library, it can be determined that the text to be detected is malicious text. [0003] However, the publisher of the malicious text only needs to fine-tune the words in the malicious text to avoid being the same or similar to the keywords in the keyword database, resulting in the inability to detect th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/33G06F16/35G06F40/30G06K9/62
CPCG06F16/3344G06F16/35G06F18/214
Inventor 揭文君吴迪李泽
Owner BEIJING DAJIA INTERNET INFORMATION TECH CO LTD