Illegal request identification method and device and electronic equipment

An identification method and illegal technology, applied in the computer field, can solve the problem of low identification accuracy of illegal requests, and achieve the effect of improving the accuracy.

Active Publication Date: 2019-05-10
MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
View PDF14 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides an illegal request identification method to solve the problem of low accuracy of illegal request identification in the prior art
[0006] The embodiment of the present application also provides an illegal request identification device to solve the problem of low accuracy of illegal request identification in the prior art
[0007] The embodiment of the present application also provides an electronic device to solve the problem of low identification accuracy of illegal requests in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal request identification method and device and electronic equipment
  • Illegal request identification method and device and electronic equipment
  • Illegal request identification method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0069] Determine the target similarity that satisfies the third preset condition among the similarities among the illegal URLs; use the illegal URL corresponding to the target similarity as the target illegal URL. Since the target similarity is calculated from two illegal URLs, the illegal URLs corresponding to the target similarity are the two illegal URLs from which the target similarity is calculated.

[0070] The third preset condition includes at least one of the following:

[0071] The similarity is greater than the set similarity threshold, which can be set according to manual experience, for example, it can be 90%;

[0072] The order of the similarity in the similarity sorting is higher than the second preset order, and the similarity sorting is a sorting in descending order of the similarity.

[0073] The similarities between illegal URLs can be calculated in pairs to obtain multiple similarities, and then sort the obtained similarities. For example, if the second pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an illegal request identification method, which is used for solving the problem of low illegal request identification accuracy in the prior art. The method comprises: after a data access request is received, determining a target uniform resource locator URL of the request; Determining the similarity between the target URL and a predetermined target illegal URL, the target illegal URL being a part or all of illegal URLs, and the illegal URLs being URLs requested by illegal users to access; And if the similarity meets a first preset condition, determining the data accessrequest as an illegal request. The invention further discloses an illegal request recognition device, electronic equipment and a computer readable storage medium.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to an illegal request identification method, device, electronic equipment and computer-readable storage medium. Background technique [0002] In computer technology, Internet sites can provide users with rich information, which greatly promotes the dissemination of information. However, for various reasons, some illegal users will use machines to simulate normal users to send webpage access requests to the website. The amount of such requests is often large and frequent, which will have a negative impact on the website server. Therefore, it is necessary to identify and block Illegal request. [0003] In the prior art, when identifying illegal requests, the number of visits of each Internet Protocol (Internet Protocol, IP) address in the past period of time will be counted. For an IP with too high number of visits, the user using the IP will be considered For illega...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 王嘉伟
Owner MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products