[go: up one dir, main page]

CN109150875A - Anti-crawler method, anti-crawler device, electronic equipment and computer readable storage medium - Google Patents

Anti-crawler method, anti-crawler device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN109150875A
CN109150875A CN201810948703.5A CN201810948703A CN109150875A CN 109150875 A CN109150875 A CN 109150875A CN 201810948703 A CN201810948703 A CN 201810948703A CN 109150875 A CN109150875 A CN 109150875A
Authority
CN
China
Prior art keywords
user terminal
access
different
behavior
crawler
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810948703.5A
Other languages
Chinese (zh)
Inventor
邱文渊
刘畅
章磊
李志赢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Uniteddata Holding Group Co ltd
Original Assignee
Guangdong Uniteddata Holding Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Uniteddata Holding Group Co ltd filed Critical Guangdong Uniteddata Holding Group Co ltd
Priority to CN201810948703.5A priority Critical patent/CN109150875A/en
Publication of CN109150875A publication Critical patent/CN109150875A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an anti-crawler method, an anti-crawler device, electronic equipment and a computer readable storage medium, wherein MAC position, IP position, access time, stay time, click position, click item, geographical position of a user end and user end preference of the user end are obtained, initial records are compared according to subsequent log-in records, and a server sends out early warning information when any comparison is different, so that crawled times are avoided or reduced.

Description

Anti- crawler method, apparatus, electronic equipment and computer readable storage medium
Technical field
The present invention relates to Internet surveillance field, in particular to a kind of anti-crawler method, apparatus, electronic equipment and computer Readable storage medium storing program for executing.
Background technique
Internet (English: Internet), is the huge network being concatenated between network and network, these networks are with one The network TCP/IP protocol suite of group standard is connected, and connects tens, whole world equipment, forms the single huge world in logic Network.It is by millions of in from place to global range private, academia, enterprise and government network institute structures At through electronics, wirelessly together with a series of extensive technical relations of fiber optic network technology etc..It is this by computer network The method being linked together mutually can be referred to as " network interconnection ", and covering global global internet is developed on the basis of this Network claims internet, is the network interconnected together.Internet is not equal to world wide web (www), and WWW is a base The global system made of hypertext interlinks, and be one of the service that internet can be provided.Internet has Information resources and services in extensive range, such as the hypertext document of correlation, there are also the applications of WWW, support electronics postal The infrastructure of part, point to point network, file-sharing and IP phone service.
Crawler can have faster retrieval rate and deeper level compared to people, so, they may make a website Paralysis.A plurality of request will be executed in individual crawler one second by not needing one, download big file, a server also can be very The request of hardly possible response multithreading crawler.Just as paying attention to Koster, the use of crawler is all very useful to many tasks , but to general community, it is also desirable to it pays a price.Include: using the cost of crawler
Internet resources: in a very long time, crawler is worked using sizable bandwidth highly-parallel.
Server overload: when especially excessively high to the access of given server.
The crawler of quality bad luck, may cause server, perhaps router paralyses or can attempt to download oneself and can not locate The page of reason.
Personal crawler may cause network or server blocks if excessive people uses.
So many problem, the technology of anxious anti-crawler out to be developed, is excessively disappeared to avoid cloud site resource by network crawler Consumption.
Summary of the invention
The technical problem to be solved in the present invention is that in view of the above drawbacks of the prior art, provide a kind of anti-crawler method, Device, electronic equipment and computer readable storage medium carry out data analysis, instruction by collecting the user behaviors log of user terminal Practice and construct user terminal access website behavior model after to filter improper access.
The technical solution adopted by the present invention to solve the technical problems is: a kind of anti-crawler side based on user terminal behavior Method comprising following steps:
System acquires access information to be measured by server and/or the user terminal in response to the access behavior of user terminal;
System judges whether the access information to be measured is consistent with the personal behavior model pre-established, if not being consistent, then by institute The access behavior of user terminal is stated as abnormal access behavior, and carries out early warning;
The personal behavior model specifically, system in response to user terminal Lawful access behavior, by server and/or described User terminal acquires Lawful access information;According to personal behavior model described in the Lawful access information architecture.
Further, the access information to be measured comprises at least one of the following: MAC Address, access time, stops at IP address Stay time, click location, click event, user terminal geographical location and user terminal hobby.
Further, the Lawful access information comprises at least one of the following: MAC Address, access time, stops at IP address Stay time, click location, click event, user terminal geographical location and user terminal hobby.
Further, it is described when it is corresponding compare any different when, be the MAC Address be different MAC Address.
Further, it is described when it is corresponding compare any different when, be the IP address be different IP addresses.
Further, described when corresponding comparison is any different, it is that the difference that the access time is the different access time is big In a threshold value.
Further, described when corresponding comparison is any different, it is that the difference that the residence time is the different residence times is big In a threshold value.
Further, it is described when it is corresponding compare any different when, be the click location be different click locations.
Further, described when corresponding comparison is any different, it is that the user terminal geographical location is geographical for different user end Position.
Further, described when corresponding comparison is any different, it is that the user terminal hobby is liked for different user end.
Further, when corresponding comparison access data information and access data information have any difference, the server is sent out An early warning message out, further includes: further decreasing user terminal allows visitation frequency.
The technical solution adopted by the present invention to solve the technical problems is: a kind of anti-crawler dress based on user terminal behavior It sets, comprising:
Acquisition module acquires access to be measured by server and/or the user terminal and believes for responding the access behavior of user terminal Breath;
Judgment module, for judging whether the access information to be measured is consistent with the personal behavior model pre-established, when described When whether access information to be measured is not consistent with the personal behavior model pre-established, using the access behavior of the user terminal as different Behavior is asked in frequentation, and carries out early warning;
The personal behavior model passes through server and/or the user specifically, Lawful access behavior in response to user terminal End acquisition Lawful access information;According to personal behavior model described in the Lawful access information architecture.
The technical solution adopted by the present invention to solve the technical problems is: a kind of electronic device, including processor, communication connect Mouth, memory and communication bus, wherein processor, communication interface, memory complete mutual communication by communication bus;
The memory, for storing computer program;
The processor when for executing the program stored on memory, realizes any implementation of the anti-crawler method Example.
The technical solution adopted by the present invention to solve the technical problems is: a kind of computer readable storage medium, the meter Computer program is stored in calculation machine readable storage medium storing program for executing, it is counter described in realization when the computer program is executed by processor to climb Any embodiment of worm method.
A kind of anti-crawler method, apparatus of the present invention, electronic equipment and computer readable storage medium have below beneficial to effect Fruit:
Through the access information to be measured for recording the user terminal;It is described when the user terminal is again introduced into the website Carry out detecting the access information to be measured of the user terminal in server;Corresponding record is compared whereby, when any different, Warning information is issued by server, to notify the administrative staff of server that it is made to learn the user terminal for logining server at present User terminal behavior is crawler behavior, or even further decreases the permission visitation frequency of user terminal, is climbed so that website is reduced or avoided The frequency of worm.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is that the present invention is based on the flow charts of method in anti-crawler method one embodiment of user terminal behavior;
Fig. 2 is that the present invention is based on the flow charts of method in anti-another embodiment of crawler method of user terminal behavior.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In the anti-crawler embodiment of the method the present invention is based on user terminal behavior, the anti-crawler side based on user terminal behavior The flow chart of method is as shown in Figure 1.In Fig. 1, the anti-crawler method based on user terminal behavior of being somebody's turn to do includes the following steps:
Step S01: system acquires access to be measured by server and/or the user terminal in response to the access behavior of user terminal Information;
Step S02: system judges whether the access information to be measured is consistent with the personal behavior model pre-established;
Step S03: using the access behavior of the user terminal as abnormal access behavior, and early warning is carried out;
Step S04: Lawful access information is acquired by server and/or the user terminal;
Step S05: according to personal behavior model described in the Lawful access information architecture.
In the present embodiment, step S01 is bury a little in user terminal or server according to the execution of plug-in card program, to take It is acquired access information to be measured in business device or user terminal, to judge the access behavior of user terminal.
Wherein system be acquisition access data information, comprise at least one of the following: MAC Address, IP address, access time, Residence time, click location, click event, user terminal geographical location and user terminal are liked and are recorded, such as: record the user The access data information for the first time at end, comprises at least one of the following: when one the oneth position MAC, one the oneth position IP, one first access Between, one first residence time, one first click location, one first click item, one first user terminal geographical location and one first Data information is accessed after user terminal hobby, and the access for the first time of the acquisition user terminal, any access can be considered secondary Access behavior, and be to acquire secondary access data information, comprises at least one of the following: one the 2nd position MAC, one the 2nd IP It sets, one second access time, one second residence time, one second click location, one second click item, a second user end Manage position and second user end hobby.
Wherein, in step S02, system will be handled access data information is collected above, that is, be directed to and be collected into Data information existing for various abnormal conditions, such as shortage of data, data value extremely be purged processing, to avoid subsequent Processing failure can not continue to run.
In the judgment process, system judges that the access information to be measured is not consistent with the personal behavior model pre-established When, step S03 is executed, if the personal behavior model is specifically, system is then held in response to the Lawful access behavior of user terminal Row step S04.
In step S04, system is to acquire Lawful access information by server and/or the user terminal, that is, adopt Collect MAC Address, IP address, access time, the residence time, click location, click event, user terminal geographical location and user terminal happiness Good at least one of them.
In step S05, user terminal characteristic is obtained using kmean, SVM algorithm training sample and establishes label body System, and different behaviors is corresponded to according to different labels and carries out data acquisition.
Such as user terminal A possesses following access behavioural characteristic and is recorded as access data information.
1) most normal debarkation point Beijing, Nanjing;
2) most normal scope period (10:00-12:00);
3) every page mean residence time 1 minute;
4) identifying code is averaged input time 10 seconds;
5) average at most to turn over page 10;And
6) Arts theme is most often browsed.
Whereby, user terminal is logined to the process of website or server and result every time and is acquired one by one and in step S04, According to initially collected record and subsequent acquisition to data compare one by one, or progress is effectively recorded according to the first stroke It compares.
Multiple refering in step S02, server obtains the user behavior of subsequent user A, such as user A occurs suddenly with downlink Are as follows:
1) it is asked in morning frequent model
2) each page stops 1 second
3) at most page turning reaches page 1000
4) browse themes increase by 20 major class
Server logins time and page turning number of pages, residence time and theme number by detecting user behavior, that is, the One logins the time, and with second to login the difference of time excessive, and when the first user preferences are different from second user and like, system is sentenced Disconnected system judges that the access information to be measured is not consistent with the personal behavior model pre-established, therefore system is judged to execute step Rapid S03 by user terminal exception and issues warning information, does not stop user's access at this time.
In addition to this, it is different from the 2nd position MAC in the MAC Address, that is, is the MAC Address for difference When MAC Address, or in the first position IP different from the 2nd position IP, that is, the IP address is different IP addresses When, or difference in first residence time and second residence time be greater than a threshold value (such as: the residence time is more than 1 minute), or when first click location is different from second click location, in first user terminal geographical location When different from the second user end geographical location, that is, when any difference, connects and execute step S03, the plug-in unit of server Program all judges user's exception, and all supervention goes out warning information to server after the meeting.In step S04, when system judges the user When behavior model is specially Lawful access behavior of the system in response to user terminal, acquired by server and/or the user terminal Lawful access information, that is, acquisition acquisition Lawful access information, that is, acquire MAC Address, IP address, access time, stop Stay at least one of them of time, click location, click event, user terminal geographical location and user terminal hobby.
The present invention is not only in that sending warning information, can more be further transmitted through the setting of server, and permitting client Perhaps visitation frequency reduces, i.e., when corresponding comparison accesses data information for the first time and secondary access data information has any difference, institute It states server and issues an early warning message, further includes: further decreasing user terminal allows visitation frequency, and the embodiment of following figure 2 is Reducing user terminal allows visitation frequency.
In the anti-crawler embodiment of the method the present invention is based on user terminal behavior, the anti-crawler side based on user terminal behavior The flow chart of method is as shown in Figure 2.In Fig. 2, the anti-crawler method based on user terminal behavior of being somebody's turn to do includes the following steps:
Step S11: system acquires access to be measured by server and/or the user terminal in response to the access behavior of user terminal Information;
Step S12: system judges whether the access information to be measured is consistent with the personal behavior model pre-established;
Step S13: using the access behavior of the user terminal as abnormal access behavior, and early warning is carried out;
Step S14: when corresponding comparison accesses data information for the first time and secondary access data information has any difference, the service Device issues an early warning message.
Step S15: Lawful access information is acquired by server and/or the user terminal;
Step S16: according to personal behavior model described in the Lawful access information architecture.
In the present embodiment, step S11 to step S13 and step S15 to step S16 are identical to above-mentioned steps S01 to step S05, therefore repeat no more, step S14 is described into emphasis below:
Wherein, anti-crawler method of the invention is learnt in addition to issuing warning information in advance for the administrative staff of server, useful Family end carry out crawler behavior, furthermore, the present invention be even more reduce user terminal permission visitation frequency, wherein server with User terminal is all embedded with plug-in card program, bury a little, during executing plug-in card program, learns and compares the MAC Address, institute State IP address, the access time, the residence time, the click location, the click event, user terminal geography position Set and when the comparison result of user terminal hobby has any difference, in addition to issuing warning information, server be even more be directed to it is described Comparison result, which has any different user terminal to reduce, allows visitation frequency.
Whereby, to avoid or reduce website or number that server is crawled.
Above embodiments are applied to an anti-crawler device, and the anti-crawler device includes acquisition module and judgment module, Wherein acquisition module acquires access to be measured by server and/or the user terminal and believes for responding the access behavior of user terminal Breath;And judgment module works as institute for judging whether the access information to be measured is consistent with the personal behavior model pre-established When stating access information to be measured and whether not being consistent with the personal behavior model pre-established, using the access behavior of the user terminal as Abnormal access behavior, and carry out early warning;And the personal behavior model is specifically, Lawful access behavior in response to user terminal, Lawful access information is acquired by server and/or the user terminal;According to user's row described in the Lawful access information architecture For model.
Or the above implementation jasmine can be applied to a kind of electronic device, the electronic device include processor, communication interface, Memory and communication bus, wherein processor, communication interface, memory complete mutual communication by communication bus;It is described Memory, for storing computer program;The processor, when for executing the program stored on memory, described in realization Anti- crawler method any embodiment.
Further, the present invention more can be a kind of computer readable storage medium, the computer readable storage medium memory Computer program is contained, any embodiment of the anti-crawler method is realized when the computer program is executed by processor, It data information should be accessed in acquisition, and in abnormal cases, provides alert, even reduction access times, or is visiting In the case where asking that data information is legal, information model is established.
In short, above-mentioned plug-in card program be embedded into website or its server, and be embedded into user terminal bury a little, with Collect the process after user terminal is logined every time with as a result, and be presented in server one by one and save, analyzed for subsequent comparison, with And after the crawler behavior of confirmation user terminal, warning information is issued to alert the user terminal for carrying out crawler behavior, and ought repeatedly compare The permission visitation frequency of user terminal is then reduced when being still exception to result after judgement.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Within mind and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (14)

1. a kind of anti-crawler method based on user terminal behavior characterized by comprising
System acquires access information to be measured by server and/or the user terminal in response to the access behavior of user terminal;
System judges whether the access information to be measured is consistent with the personal behavior model pre-established, if not being consistent, then by institute The access behavior of user terminal is stated as abnormal access behavior, and carries out early warning;
The personal behavior model specifically, system in response to user terminal Lawful access behavior, by server and/or described User terminal acquires Lawful access information;And the personal behavior model according to the Lawful access information architecture.
2. anti-crawler method according to claim 1, which is characterized in that the access information to be measured includes following at least one Kind: MAC Address, access time, the residence time, click location, clicks event, user terminal geographical location and user terminal at IP address Hobby.
3. anti-crawler method according to claim 1, which is characterized in that the Lawful access information includes following at least one Kind: MAC Address, access time, the residence time, click location, clicks event, user terminal geographical location and user at one IP address End hobby.
4. anti-crawler method according to claim 2 or 3, which is characterized in that it is described when corresponding comparison is any different, be The MAC Address is different MAC Address.
5. anti-crawler method according to claim 2 or 3, which is characterized in that it is described when corresponding comparison is any different, be The IP address is different IP addresses.
6. anti-crawler method according to claim 2 or 3, which is characterized in that it is described when corresponding comparison is any different, be The access time is that the difference of different access time is greater than a threshold value.
7. anti-crawler method according to claim 2 or 3, which is characterized in that it is described when corresponding comparison is any different, be The residence time is that the difference of different residence times is greater than a threshold value.
8. anti-crawler method according to claim 2 or 3, which is characterized in that it is described when corresponding comparison is any different, be The click location is different click locations.
9. anti-crawler method according to claim 2 or 3, which is characterized in that it is described when corresponding comparison is any different, be The user terminal geographical location is different user end geographical location.
10. anti-crawler method according to claim 2 or 3, which is characterized in that it is described when corresponding comparison is any different, It is that the user terminal hobby is liked for different user end.
11. anti-crawler method according to claim 2 or 3, which is characterized in that when corresponding comparison accesses data information for the first time When having any difference with secondary access data information, the server issues an early warning message, further includes:
Further decreasing user terminal allows visitation frequency.
12. a kind of anti-crawler device based on user terminal behavior characterized by comprising
Acquisition module acquires access to be measured by server and/or the user terminal and believes for responding the access behavior of user terminal Breath;
Judgment module, for judging whether the access information to be measured is consistent with the personal behavior model pre-established, when described When whether access information to be measured is not consistent with the personal behavior model pre-established, using the access behavior of the user terminal as different Behavior is asked in frequentation, and carries out early warning;
The personal behavior model passes through server and/or the user specifically, Lawful access behavior in response to user terminal End acquisition Lawful access information;According to personal behavior model described in the Lawful access information architecture.
13. a kind of electronic equipment, which is characterized in that including processor, communication interface, memory and communication bus, wherein processing Device, communication interface, memory complete mutual communication by communication bus;
The memory, for storing computer program;
The processor when for executing the program stored on memory, realizes the described in any item sides of claim 1-11 Method step.
14. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium Program realizes claim 1-11 described in any item method and steps when the computer program is executed by processor.
CN201810948703.5A 2018-08-20 2018-08-20 Anti-crawler method, anti-crawler device, electronic equipment and computer readable storage medium Pending CN109150875A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810948703.5A CN109150875A (en) 2018-08-20 2018-08-20 Anti-crawler method, anti-crawler device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810948703.5A CN109150875A (en) 2018-08-20 2018-08-20 Anti-crawler method, anti-crawler device, electronic equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109150875A true CN109150875A (en) 2019-01-04

Family

ID=64790515

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810948703.5A Pending CN109150875A (en) 2018-08-20 2018-08-20 Anti-crawler method, anti-crawler device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109150875A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110401639A (en) * 2019-06-28 2019-11-01 平安科技(深圳)有限公司 Abnormality determination method, device, server and its storage medium of network access
CN110708309A (en) * 2019-09-29 2020-01-17 武汉极意网络科技有限公司 Anti-crawler system and method
CN113453227A (en) * 2021-09-01 2021-09-28 清华大学 Chain establishment rejection method and device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106296422A (en) * 2016-07-29 2017-01-04 重庆邮电大学 A kind of social networks junk user detection method merging many algorithms
CN106534062A (en) * 2016-09-23 2017-03-22 南京途牛科技有限公司 Crawler prevention method
CN106790292A (en) * 2017-03-13 2017-05-31 摩贝(上海)生物科技有限公司 The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis
CN107517193A (en) * 2016-06-17 2017-12-26 百度在线网络技术(北京)有限公司 Malicious websites recognition methods and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107517193A (en) * 2016-06-17 2017-12-26 百度在线网络技术(北京)有限公司 Malicious websites recognition methods and device
CN106296422A (en) * 2016-07-29 2017-01-04 重庆邮电大学 A kind of social networks junk user detection method merging many algorithms
CN106534062A (en) * 2016-09-23 2017-03-22 南京途牛科技有限公司 Crawler prevention method
CN106790292A (en) * 2017-03-13 2017-05-31 摩贝(上海)生物科技有限公司 The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110401639A (en) * 2019-06-28 2019-11-01 平安科技(深圳)有限公司 Abnormality determination method, device, server and its storage medium of network access
CN110401639B (en) * 2019-06-28 2021-12-24 平安科技(深圳)有限公司 Method and device for judging abnormality of network access, server and storage medium thereof
CN110708309A (en) * 2019-09-29 2020-01-17 武汉极意网络科技有限公司 Anti-crawler system and method
CN113453227A (en) * 2021-09-01 2021-09-28 清华大学 Chain establishment rejection method and device and electronic equipment
CN113453227B (en) * 2021-09-01 2021-11-12 清华大学 A method, device and electronic device for rejecting chain establishment

Similar Documents

Publication Publication Date Title
US11238366B2 (en) Adaptive object modeling and differential data ingestion for machine learning
US10938845B2 (en) Detection of user behavior deviation from defined user groups
US10104095B2 (en) Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications
CN101326503B (en) Method and device for monitoring page access
JP6608948B2 (en) Network flow log for multi-tenant environments
CN103888490B (en) A kind of man-machine knowledge method for distinguishing of full automatic WEB client side
CN104615852B (en) The method for order and the raising source service efficiency of registering for guarantee online booking
CN102741839B (en) Based on the url filtering of user browser history
US20120265824A1 (en) Method and system for configuration-controlled instrumentation of application programs
Cohen et al. Capturing, indexing, clustering, and retrieving system history
US8255514B2 (en) Internet use monitoring system and method
CN111404937B (en) Method and device for detecting server vulnerability
CN102065147A (en) Method and device for obtaining user login information based on enterprise application system
US20030163731A1 (en) Method, system and software product for restricting access to network accessible digital information
CN109150875A (en) Anti-crawler method, anti-crawler device, electronic equipment and computer readable storage medium
CN112291264B (en) Security control method, device, server and storage medium
CN107944293A (en) Fictitious assets guard method, system, equipment and storage medium
US20030233447A1 (en) Apparatus and methods for monitoring content requested by a client device
CN118802266A (en) API security protection method, device, electronic device and storage medium
US9723017B1 (en) Method, apparatus and computer program product for detecting risky communications
Linger et al. Foundations for survivable system development: service traces, intrusion traces, and evaluation models
JP2024041055A (en) Personal information connection record management method and device
CN116418777A (en) Intelligent online chat room pushing system based on data analysis
Joshi et al. Guardian Eye: Hoslitic Parental Control Solution
CN112134947A (en) Internet service business data platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190104