Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network risk detection method, device, equipment and medium based on object characteristics

A technology of object characteristics and risk detection, applied in the computer field, can solve problems such as difficulty in ensuring the accuracy of risk objects, labor and time consumption, etc.

Active Publication Date: 2020-08-28
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method only analyzes the object information manually, it is difficult to guarantee the accuracy of the detection of risk objects, and it consumes manpower and time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network risk detection method, device, equipment and medium based on object characteristics
  • Network risk detection method, device, equipment and medium based on object characteristics
  • Network risk detection method, device, equipment and medium based on object characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the following will further describe the embodiments of the present application in detail in conjunction with the accompanying drawings.

[0097] It can be understood that the terms "first", "second" and the like used in this application may be used to describe various concepts herein, but unless otherwise specified, these concepts are not limited by these terms. These terms are only used to distinguish one concept from another. For example, without departing from the scope of the present application, a first sample feature vector may be referred to as a second sample feature vector, and similarly, a second sample feature vector may be referred to as a first sample feature vector .

[0098] Wherein, at least one piece refers to one or more pieces of object information. For example, at least one piece of object information may be any integer piece of ob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application discloses a network risk detection method, device, equipment and medium based on object characteristics, belonging to the field of computer technology. The method includes: receiving an access request carrying object information, performing feature extraction on the object information to obtain a feature vector, detecting the feature vector through a detection model to obtain a detection result, and determining the object as Risk objects realize the automatic detection of network risks without manual analysis, which can save manpower and time, and improve the accuracy and efficiency of network risk detection. Moreover, through the interpretation model corresponding to the detection model, the eigenvector is processed to obtain an interpretation vector. According to the interpretation vector, it can be known which eigenvalues ​​in the eigenvector cause the object corresponding to the eigenvector to be detected as a risk object, so that the detection result It is easy to understand, and the interpretability of the detection model is realized through the interpretation model corresponding to the detection model.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technology, and in particular to a network risk detection method, device, device and medium based on object characteristics. Background technique [0002] With the rapid development of computer technology, network security issues have become increasingly prominent. There are risk objects such as suspicious devices or suspicious IP (Internet Protocol, Internet Protocol) addresses in the network. These risk objects often perform malicious behaviors, such as risk objects. Website attacks, malicious brushing of tickets, malicious grabbing of tickets, malicious visits, fraudulent acts on the website, etc. Therefore, it is necessary to detect risky objects on the network in order to protect network security. [0003] In related technologies, when an access request is received, object information corresponding to the object initiating the access request is obtained, and the object inf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L63/1416
Inventor 周菲
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products