Abnormal access behavior identification method and device, computer equipment and storage medium

An identification method and technology of a computer program, applied in the direction of using information identifiers to retrieve web data, special data processing applications, website content management, etc. The effect of improving intelligence

Pending Publication Date: 2020-10-23
CHINA PING AN PROPERTY INSURANCE CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of this application is to provide a method, device, computer equipment, and storage medium for identifying abnormal access behaviors, aiming to solve the problem that the existing identification methods for identifying whether there are abnormal access behaviors in log data cannot detect some simulated manual operations Abnormal access behavior, technical problems with low intelligence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal access behavior identification method and device, computer equipment and storage medium
  • Abnormal access behavior identification method and device, computer equipment and storage medium
  • Abnormal access behavior identification method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application.

[0049] It should be noted that all directional indications (such as up, down, left, right, front, back...) in the embodiments of the present application are only used to explain the relationship between the components in a certain posture (as shown in the drawings). If the specific posture changes, the relative positional relationship, movement conditions, etc., the directional indication will also change accordingly, and the connection may be a direct connection or an indirect connection.

[0050] refer to figure 1 , the abnormal access behavior identification method of an embodiment of the present application, including:

[0051] S1: Obtain log data;

[0052] S2: According to the log data, calculate all the time intervals corresponding to two adjacent visits by the specified user to the same specified URL, whe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an abnormal access behavior identification method and device, computer equipment and a storage medium. The method comprises the steps of obtaining log data; according to the log data, calculating all time intervals corresponding to the situation that the designated user accesses the same designated URL for two adjacent times, wherein the designated URL is any one of all URLs contained in the log data; according to the time interval, calling a preset calculation formula to calculate a variable coefficient related to the time interval; and determining whether the behaviorof accessing the specified URL by the specified user is an abnormal access behavior or not according to the variable coefficient and a preset variation threshold. According to the invention, the timeinterval data is calculated from the obtained log data; the time interval data is subjected to discrete analysis to obtain the variable coefficient, and finally whether the behavior of accessing thespecified URL by the specified user is the abnormal access behavior or not is intelligently and accurately determined according to the variable coefficient and the preset variation threshold, so thatthe intelligence of identifying the abnormal access behavior of regularly accessing the URL is effectively improved.

Description

technical field [0001] The present application relates to the technical field of mobile communication, and in particular to a method, device, computer equipment and storage medium for identifying abnormal access behaviors. Background technique [0002] With the continuous development of Internet technology and application, WEB application has gradually become an indispensable aspect of modern people's production and life, and it has also become the main attack target on the Internet. WEB logs are audit information about WEB access behaviors recorded by WEB servers. From the WEB log data, we can know the access behavior of the website access users. However, there will also be some abnormal access behaviors suspected of attack in the WEB log data. At present, the detection of some common abnormal access behaviors such as plug-ins and crawlers is usually based on the frequency statistics of a single IP, User Agent,..., etc., and then set the threshold, block and other identifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F16/958G06F16/955
CPCH04L63/1425G06F16/958G06F16/955
Inventor 罗振珊唐炳武
Owner CHINA PING AN PROPERTY INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products