Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious behavior blocking method and device

A behavioral and malicious technology, applied in the computer field, can solve the problems of ineffective blocking of malicious behavior, low efficiency and accuracy

Active Publication Date: 2016-01-06
ADVANCED NEW TECH CO LTD
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present application provides a method and device for blocking malicious behaviors, which are used to solve the problem in the prior art that the efficiency and accuracy of extracting malicious behavior features are low, and malicious behaviors cannot be effectively blocked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious behavior blocking method and device
  • Malicious behavior blocking method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Because the existing technology needs to analyze a large amount of historical data to extract the characteristics of malicious behaviors, this method is too passive and needs to filter out malicious behaviors and extract features from a large number of normal behaviors, so it is not only inefficient, but also accurate. Also very low. However, in the embodiment of the present application, malicious behaviors are monitored by registering an unused test account on the service provider device (for example, a website server, an application server, etc.), and once it is found that someone has sent an operation request through the test account, the It is determined that the operation must be a malicious behavior, so as to directly record the sending characteristics of the operation request as malicious characteristics, which can effectively improve the efficiency of obtaining the characteristics of malicious behaviors, and the accuracy is also high, and the follow-up can be bas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious behavior blocking method and a device and solves problems that characteristic extraction efficiency and accuracy of malicious behaviors are low and the malicious behaviors can not be effectively blocked. The method comprises steps that, a test account number is pre-generated by monitoring equipment and is further registered on the monitoring equipment and service providing equipment, when an operation request sent by the test account number is received by the monitoring equipment, present sending characteristics are recorded as malicious characteristics, for to-be-determined behaviors, whether the to-be-determined behaviors are malicious behaviors is determined according to the recorded malicious characteristics, if yes, the to-be-determined behaviors are blocked, if not, the to-be-determined behaviors are released. Through the method, characteristics of the malicious behaviors can be acquired without no need to analyze large-scale historical data, so characteristic extraction efficiency of the malicious behaviors is improved, characteristic extraction accuracy is relatively high, the malicious behaviors can be effectively blocked, and determination miss and error determination can be avoided.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method and device for blocking malicious behavior. Background technique [0002] With the continuous development of computer and network technology, users can already obtain various services provided by the website by registering an account on the website. But what follows is that criminals steal and use other people's accounts to carry out malicious acts. [0003] For example, a user registers an account on an e-commerce website and recharges the balance of the account to purchase goods with the balance of the account. However, if criminals steal the user's account, they can The balance in the account is used to illegally seek profits, that is, for criminals to purchase goods through stolen accounts, this act is a malicious act. [0004] Especially at present, many users use the same account number and password on different websites. Like this, once the account n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 吕鲲
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products