Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for detecting data access exception

A technology for data anomaly and data detection, applied in the Internet field, can solve problems such as deviation or misjudgment accuracy

Inactive Publication Date: 2017-06-09
ALIBABA GRP HLDG LTD
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a method and device for detecting data access anomalies, so as to at least solve the technical problem of low accuracy caused by deviations or misjudgments in the existing data access anomaly detection methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting data access exception
  • Method and device for detecting data access exception
  • Method and device for detecting data access exception

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] According to an embodiment of the present invention, a method embodiment of a method for detecting data access anomalies is also provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0024] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structural block diagram of a computer terminal for a method for detecting abnormal data access in an embodiment of the present invention. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in th...

Embodiment 2

[0071] According to the embodiment of the present application, an embodiment of a device for implementing the above method embodiment is also provided, and the device provided in the above embodiment of the present application can run on a computer terminal.

[0072] Figure 6 is a schematic structural diagram of an apparatus for detecting abnormal data access according to an embodiment of the present application.

[0073] Such as Figure 6 As shown, the apparatus for detecting abnormal data access may include a first acquiring unit 602 , an extracting unit 604 , a first determining unit 606 and a detecting unit 608 .

[0074] Wherein, the first acquiring unit 602 is configured to acquire the historical access data at the time point to be detected, wherein the historical access data includes the data amount of the access parameter and the time point corresponding to the data amount; the extracting unit 604 is configured to A pre-divided time period, determining a first time ...

Embodiment 3

[0091] The embodiment of the present application also provides a storage medium. Optionally, in this embodiment, the foregoing storage medium may be used to store program codes executed by the method for detecting data access exceptions provided in Embodiment 1 above.

[0092] Optionally, in this embodiment, the above-mentioned storage medium may be located in any computer terminal in the group of computer terminals in the computer network, or in any mobile terminal in the group of mobile terminals.

[0093] Optionally, in this embodiment, the storage medium is configured to store program codes for executing the following steps: acquiring historical access data at the time point to be detected, wherein the historical access data includes the data amount of the access parameters and the the time point corresponding to the amount of data; according to the pre-divided time period, determine the first time period to which the time point to be detected belongs, and extract the first ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for detecting data access exception. The method comprises the following steps: obtaining historical access data of a time point under detection, which comprises data volume of access parameter and a time point corresponding to the data volume; determining a first time period of the time point under detection according to predetermined time periods, and extracting first access data within the first time period from the historical access data; determining a first predicted data volume corresponding to the time point under detection according to the data volume within the first time period and the time point corresponding to the data volume within the first time period; determining exception of practical data volume if the practical data volume corresponding to the time point under detection is greater than the first predicted data volume. The method solves the technical problem that the existing method for detecting data access exception is easy to produce a deviation or misjudgment to cause low accuracy.

Description

technical field [0001] The invention relates to the field of the Internet, in particular to a method and device for detecting abnormal data access. Background technique [0002] With the rapid development of the Internet in recent years, more and more users use the Internet to learn about current events, purchase goods or browse the web. Therefore, the detection of abnormal data access emerges as the times require. For example, if a third-party software invokes the data of an application, the operator needs to know whether the daily volume of the third-party software calling the application is within a reasonable range in order to determine whether the third-party software is maliciously pulling data. Get the data of the application and give an early warning. [0003] For the anomaly detection of the overall trend of data, most of them detect the current time by comparing the newly generated data at the current time point with the average value of historical data, or by com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30H04L12/26
Inventor 韦红绕
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products