Check patentability & draft patents in minutes with Patsnap Eureka AI!

A hijacking traffic identification method, device and electronic equipment

A flow identification and flow technology, applied in the computer field, can solve the problems of network content producers’ loss and deception of network content producers, and achieve the effect of eliminating negative effects

Active Publication Date: 2022-05-06
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, for economic benefit, some traffic owners will use fraudulent methods such as traffic hijacking to forge traffic, thereby deceiving network content producers to obtain more income, such as hackers or developers controlling broiler device clicks through viruses and malware, accessing advertisements and setting Take advertising costs, which will cause great losses to network content producers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A hijacking traffic identification method, device and electronic equipment
  • A hijacking traffic identification method, device and electronic equipment
  • A hijacking traffic identification method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0041] In order to accurately identify whether the traffic for accessing related network content is hijacked, the embodiments of this specification provide a hijacked traffic identification method and device, and the method and device can be executed by an electronic device, such as a server device. In other words, the method can be implemented by sof...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of this specification discloses a hijacking traffic identification method, device, and electronic equipment, wherein, after receiving the traffic to be identified, the method can obtain multiple first access subjects related to the traffic to be identified in the first historical period The access data within the first access subject and make statistics to determine the time series of the values ​​of at least one statistical indicator under the plurality of first access subjects in the preset period in chronological order, and obtain multiple time series; based on the multiple The time series constructs the feature matrix of the traffic to be identified and inputs it into the preset convolutional neural network to obtain the evaluation parameters of whether the traffic to be identified belongs to hijacking traffic. The preset convolutional neural network is trained based on the feature matrix of the sample traffic. The construction method of the characteristic matrix of the traffic is consistent with the construction method of the characteristic matrix of the traffic to be identified; finally, based on the evaluation parameters, it can be identified whether the traffic to be identified belongs to hijacking traffic.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a hijacking traffic identification method, device and electronic equipment. Background technique [0002] With the development of network technology and terminal technology, more and more users obtain information by accessing traffic hosts, making some traffic hosts master a large amount of traffic, which attracts a large number of network content hosts to deliver relevant network content to users through these traffic hosts (For example, advertisers place advertisements to users through traffic hosts) to get the expected conversion, and traffic hosts can also obtain corresponding benefits. [0003] However, for economic benefit, some traffic owners will use fraudulent methods such as traffic hijacking to forge traffic, thereby deceiving network content producers to obtain more income, such as hackers or developers controlling broiler device clicks through viruses and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/60G06N3/08G06N3/04
CPCH04L63/1425H04L63/1408G06N3/084H04L67/60G06N3/045
Inventor 陆逊
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More