Abnormal user detection method, device, system and computer storage medium

A user and abnormal technology, applied in the Internet field, can solve the problems of inaccurate detection of abnormal users, low detection efficiency, etc., achieve detailed and comprehensive detection, improve accuracy, and improve detection efficiency

Active Publication Date: 2021-10-15
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, different operations need to set their own statistical logic, resulting in low detection efficiency. In many cases, abnormal users cannot be accurately detected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal user detection method, device, system and computer storage medium
  • Abnormal user detection method, device, system and computer storage medium
  • Abnormal user detection method, device, system and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0033] The abnormal user detection involved in the embodiment of the present invention is mainly to detect a user whose operation behavior on a certain application is obviously inconsistent with that of other users. For example, check out some users who operate the target application through script files. After a period of accumulation, the operations of users who repeatedly perform certain actions will be quite different from those of other normal users. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application discloses an abnormal user detection method, device, system, and computer storage medium, wherein the method includes: acquiring an initial operation data set about multiple target users, and the initial operation data set includes the terminal equipment of each target user The initial operation data reported, the initial operation data is used to indicate the operation performed by the user indicated by the target user ID on the client installed in the terminal device; The initial operation data is combined and processed, and the operation track text data corresponding to each target user ID is generated respectively; the operation track text data corresponding to each target user ID is analyzed and processed, and the target track text data is determined from it; the target track text data is The user indicated by the corresponding target user identifier is determined to be an abnormal user. By adopting the embodiment of the present application, the accuracy of abnormal user detection can be improved.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to an abnormal user detection method, device, system and computer storage medium. Background technique [0002] Abnormal user detection is an essential means to maintain the ecology of software products and protect the rights and interests of normal users. Especially for instant messaging (IM) client products, abnormal users use script simulation operations to send group messages and add friends in groups (such as plug-ins or button wizards) emerge in endlessly, which will cause great harassment to other users. [0003] At present, the commonly used attack method is to detect abnormal users by counting the number and frequency of specified operations in the background. However, different operations need to set their own statistical logic, resulting in low detection efficiency, and in many cases, abnormal users cannot be accurately detected. Contents of the invention ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/58H04L12/26
CPCH04L43/08H04L51/043H04L63/1425
Inventor 殷腾飞
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products