Unlock instant, AI-driven research and patent intelligence for your innovation.

Behavior recognition method and device, storage medium and electronic equipment

An identification method and behavior technology, applied in the field of server security, can solve problems such as inaccurate identification of abnormal network behaviors

Active Publication Date: 2021-05-11
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a behavior recognition method and device, a storage medium, and electronic equipment to at least solve the technical problem of inaccurate network abnormal behavior recognition

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavior recognition method and device, storage medium and electronic equipment
  • Behavior recognition method and device, storage medium and electronic equipment
  • Behavior recognition method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0030] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a behavior recognition method and device, a storage medium and electronic equipment based on cloud server protection. Wherein, the method includes: obtaining the access behavior data of the request to access the target address; in the case that the attack behavior data is detected from the access behavior data, extracting the object access track in the access behavior data, and converting the object access track into the corresponding object Access trajectory sequence: input the object access trajectory sequence into the behavior recognition model in order to obtain the behavior recognition similarity matching the object access trajectory, and identify the object access behavior indicated by the object access trajectory sequence whose behavior recognition similarity is less than the target threshold For abnormal access behavior. The invention solves the technical problem of inaccurate identification of network abnormal behaviors.

Description

technical field [0001] The present invention relates to the field of server security, in particular to a behavior recognition method and device, a storage medium and electronic equipment. Background technique [0002] In the prior art, hackers can send a large amount of abnormal traffic to the target server, and the server is busy processing the abnormal traffic, unable to process normal user requests, or even the system crashes, resulting in denial of service. In the existing method for identifying whether the request is abnormal, the method of speed limit and reverse challenge algorithm can be used to identify abnormal access. However, the above method has the problems of serious manslaughter and inaccurate identification of abnormal behaviors. [0003] For the above problems, no effective solution has been proposed yet. Contents of the invention [0004] Embodiments of the present invention provide a behavior recognition method and device, a storage medium, and electr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/31
CPCG06F21/31G06F21/55
Inventor 彭晨晨陈国盛红利陈江洪
Owner TENCENT TECH (SHENZHEN) CO LTD