Malicious account identification method and device

An identification method and account technology, applied in the Internet field, can solve problems such as low efficiency, achieve the effect of improving identification efficiency and reducing the amount of identification data

Active Publication Date: 2016-10-05
ADVANCED NEW TECH CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This way is less efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious account identification method and device
  • Malicious account identification method and device
  • Malicious account identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0031] In an optional implementation manner, an implementation manner of obtaining the conditional entropy of the account to be identified according to the characters in the prefix appearing in the account to be identified includes:

[0032] Determine the regular characters that appear in the prefix of the account to be identified;

[0033] Count the generation probability of each regular character in the prefix of the account to be identified, and count the transition probability of each regular character to other regular characters;

[0034] According to the generation probability of each regular character in the prefix of the account to be identified and the transition probability of each regular character to other regular characters, the conditional entropy of the account to be identified is obtained.

[0035] At present, the characters used in the prefix of most accounts include "a"~"z", "0"~"9" and "." (dot), "-" (hyphen), "_" (underscore) and other characters , Occasio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a malicious account identification method and device. The method comprises a step of obtaining the conditional entropy of an account to be identified according to the character which appears in the prefix of the account to be identified, a step of carrying out clustering processing on the account to be identified according to the conditional entropy of the account to be identified, and a step of carrying out malicious account identification according to the clustering result so as to determine the malicious account in the account to be identified. Based on the clustering result of the account to be identified, the malicious account identification is carried out rather than the individual identification of each account, and the improvement of the identification efficiency of the malicious account is facilitated.

Description

【Technical field】 [0001] The present application relates to the field of Internet technologies, and in particular to a method and device for identifying a malicious account. 【Background technique】 [0002] With the development of Internet technology, there are more and more various application systems, such as e-commerce systems. As a user of the application system, the user generally needs to register an account, such as an electronic mailbox (email), the account can be used as the user's virtual identity information, and the user can log in to the application system through the account to use the resources provided by the application system or carry out related activities, etc. . [0003] In practical applications, some malicious users will register a large number of accounts in order to steal resources provided by the application system. Taking the e-commerce system as an example, malicious users can log in to the e-commerce system through a large number of registered e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 顾思源
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products