Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access request detection method and device, electronic equipment and readable storage medium

A technology of access request and detection method, which is applied in the field of data processing and can solve problems such as inability to effectively detect abnormal data

Active Publication Date: 2020-08-07
BEIJING SANKUAI ONLINE TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the anomaly detection method based on time series can only judge whether there is an anomaly, and cannot effectively detect specific abnormal data.
[0007] Therefore, the method for detecting abnormal access requests in the prior art needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access request detection method and device, electronic equipment and readable storage medium
  • Access request detection method and device, electronic equipment and readable storage medium
  • Access request detection method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0080] refer to figure 1 , figure 1 It is a flowchart of an access request detection method proposed by an embodiment of the present application. like figure 1 As shown, the method includes the following steps:

[0081] Step S11: According to the parameters contained in each access request in adjacent time periods, determine the respective increments of multiple parameters.

[0082] In this embodiment, adjacent time periods refer to two adjacent time ranges, for exampl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an access request detection method and device, electronic equipment and a readable storage medium. The method comprises the following steps: 1, according to the parameters contained in each access request in the adjacent time periods, determining respective increments of the parameters; adding parameters with increments greater than a preset increment threshold value in the parameters into an abnormal parameter set; obtaining the abnormal parameter set according to the bidirectional information gain of each abnormal parameter in the abnormal parameter set, wherein the bidirectional information gain of each abnormal parameter is the difference value of the information gains of the parameter in the adjacent time periods; and determining whether an access request to be detected is an abnormal access request or not according to the matching degree of the parameter contained in the access request to be detected and the abnormal parameter combination.By adopting the method provided by the embodiment of the invention, the abnormal access request can be dynamically, continuously and stably detected.

Description

technical field [0001] The embodiments of the present application relate to the technical field of data processing, and in particular to an access request detection method, device, electronic device, and readable storage medium. Background technique [0002] With the development of Internet technology, users are initiating access requests to the network all the time. These access requests include both normal access requests and abnormal access requests, that is, abnormal access requests. In most cases, abnormal Access requests will simulate the characteristics of normal access requests and cannot be distinguished very well. Most current methods use the parameters carried by access requests or the behavior of access requests to construct features to identify abnormal access requests. The detection of such abnormal access requests mainly includes the following Several methods: [0003] The abnormal access request detection method based on statistics calculates the probability...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26H04L29/06
CPCH04L43/08H04L63/1425
Inventor 陈俊刁士涵武金
Owner BEIJING SANKUAI ONLINE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products