Machine behavior recognition method and device

An identification method and identification device technology, applied in the field of network information security, can solve the problems of omission of black products and accidental injury to users in the risk control scheme, and achieve the effect of easy expansion and improved resolution

Active Publication Date: 2018-12-07
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF14 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, black industry has gradually shifted from disorder and brutality to "groupization, specialization, fragmentation, and crowdsourcing". The existing risk control schemes either omit black industry machine behavior or accidentally injure users, which cannot meet the new requirements. Challenging situation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Machine behavior recognition method and device
  • Machine behavior recognition method and device
  • Machine behavior recognition method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details being omitted, or other methods, components, devices, steps, etc. may be adopted. In other instances, well-known technical solution...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a machine behavior recognition method and device. The machine behavior recognition method comprises the following steps: obtaining at least one piece of request data in a firsttime period, and storing the request data into a first data area; calculating the probability that a field value of at least one field of the request data in the first data area occurs in a second time period, wherein the second time period is longer than the first time period; and comparing the occurrence probability with a preset value and judging whether the request data corresponds to a machine behavior according to the comparison result. The machine behavior recognition method can improve recognition accuracy for malicious panic buying machine behaviors of a dark industry in electronic commerce.

Description

technical field [0001] The present disclosure relates to the technical field of network information security, in particular, to a machine behavior recognition method and device for distinguishing malicious snap-buying behavior in e-commerce. Background technique [0002] With the development of e-commerce, online black production gradually breeds. According to the statistics of major e-commerce companies, 60% of network traffic during holiday promotions comes from network automation attacks instead of normal access traffic. According to the latest data released by the China Internet Network Information Center, the income of illegal industries has reached the level of hundreds of billions in the past two years, and the low-price snap-ups and promotional activities in the e-commerce industry are even more coveted by the criminals, and they are aimed at cracking down on the Internet’s illegal industries. It must be done. [0003] The most serious way of online illegal product...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1425H04L63/1441H04L67/535
Inventor 李川罗尚勇
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products