CN109150875A - Anti-crawler method, anti-crawler device, electronic equipment and computer readable storage medium - Google Patents
Anti-crawler method, anti-crawler device, electronic equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN109150875A CN109150875A CN201810948703.5A CN201810948703A CN109150875A CN 109150875 A CN109150875 A CN 109150875A CN 201810948703 A CN201810948703 A CN 201810948703A CN 109150875 A CN109150875 A CN 109150875A
- Authority
- CN
- China
- Prior art keywords
- user terminal
- access
- different
- behavior
- crawler
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 230000006399 behavior Effects 0.000 claims description 77
- 238000004891 communication Methods 0.000 claims description 15
- 230000004044 response Effects 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 8
- 230000002159 abnormal effect Effects 0.000 claims description 7
- 230000003247 decreasing effect Effects 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 206010033799 Paralysis Diseases 0.000 description 2
- 208000033748 Device issues Diseases 0.000 description 1
- 235000010254 Jasminum officinale Nutrition 0.000 description 1
- 240000005385 Jasminum sambac Species 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 230000007306 turnover Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses an anti-crawler method, an anti-crawler device, electronic equipment and a computer readable storage medium, wherein MAC position, IP position, access time, stay time, click position, click item, geographical position of a user end and user end preference of the user end are obtained, initial records are compared according to subsequent log-in records, and a server sends out early warning information when any comparison is different, so that crawled times are avoided or reduced.
Description
Technical field
The present invention relates to Internet surveillance field, in particular to a kind of anti-crawler method, apparatus, electronic equipment and computer
Readable storage medium storing program for executing.
Background technique
Internet (English: Internet), is the huge network being concatenated between network and network, these networks are with one
The network TCP/IP protocol suite of group standard is connected, and connects tens, whole world equipment, forms the single huge world in logic
Network.It is by millions of in from place to global range private, academia, enterprise and government network institute structures
At through electronics, wirelessly together with a series of extensive technical relations of fiber optic network technology etc..It is this by computer network
The method being linked together mutually can be referred to as " network interconnection ", and covering global global internet is developed on the basis of this
Network claims internet, is the network interconnected together.Internet is not equal to world wide web (www), and WWW is a base
The global system made of hypertext interlinks, and be one of the service that internet can be provided.Internet has
Information resources and services in extensive range, such as the hypertext document of correlation, there are also the applications of WWW, support electronics postal
The infrastructure of part, point to point network, file-sharing and IP phone service.
Crawler can have faster retrieval rate and deeper level compared to people, so, they may make a website
Paralysis.A plurality of request will be executed in individual crawler one second by not needing one, download big file, a server also can be very
The request of hardly possible response multithreading crawler.Just as paying attention to Koster, the use of crawler is all very useful to many tasks
, but to general community, it is also desirable to it pays a price.Include: using the cost of crawler
Internet resources: in a very long time, crawler is worked using sizable bandwidth highly-parallel.
Server overload: when especially excessively high to the access of given server.
The crawler of quality bad luck, may cause server, perhaps router paralyses or can attempt to download oneself and can not locate
The page of reason.
Personal crawler may cause network or server blocks if excessive people uses.
So many problem, the technology of anxious anti-crawler out to be developed, is excessively disappeared to avoid cloud site resource by network crawler
Consumption.
Summary of the invention
The technical problem to be solved in the present invention is that in view of the above drawbacks of the prior art, provide a kind of anti-crawler method,
Device, electronic equipment and computer readable storage medium carry out data analysis, instruction by collecting the user behaviors log of user terminal
Practice and construct user terminal access website behavior model after to filter improper access.
The technical solution adopted by the present invention to solve the technical problems is: a kind of anti-crawler side based on user terminal behavior
Method comprising following steps:
System acquires access information to be measured by server and/or the user terminal in response to the access behavior of user terminal;
System judges whether the access information to be measured is consistent with the personal behavior model pre-established, if not being consistent, then by institute
The access behavior of user terminal is stated as abnormal access behavior, and carries out early warning;
The personal behavior model specifically, system in response to user terminal Lawful access behavior, by server and/or described
User terminal acquires Lawful access information;According to personal behavior model described in the Lawful access information architecture.
Further, the access information to be measured comprises at least one of the following: MAC Address, access time, stops at IP address
Stay time, click location, click event, user terminal geographical location and user terminal hobby.
Further, the Lawful access information comprises at least one of the following: MAC Address, access time, stops at IP address
Stay time, click location, click event, user terminal geographical location and user terminal hobby.
Further, it is described when it is corresponding compare any different when, be the MAC Address be different MAC Address.
Further, it is described when it is corresponding compare any different when, be the IP address be different IP addresses.
Further, described when corresponding comparison is any different, it is that the difference that the access time is the different access time is big
In a threshold value.
Further, described when corresponding comparison is any different, it is that the difference that the residence time is the different residence times is big
In a threshold value.
Further, it is described when it is corresponding compare any different when, be the click location be different click locations.
Further, described when corresponding comparison is any different, it is that the user terminal geographical location is geographical for different user end
Position.
Further, described when corresponding comparison is any different, it is that the user terminal hobby is liked for different user end.
Further, when corresponding comparison access data information and access data information have any difference, the server is sent out
An early warning message out, further includes: further decreasing user terminal allows visitation frequency.
The technical solution adopted by the present invention to solve the technical problems is: a kind of anti-crawler dress based on user terminal behavior
It sets, comprising:
Acquisition module acquires access to be measured by server and/or the user terminal and believes for responding the access behavior of user terminal
Breath;
Judgment module, for judging whether the access information to be measured is consistent with the personal behavior model pre-established, when described
When whether access information to be measured is not consistent with the personal behavior model pre-established, using the access behavior of the user terminal as different
Behavior is asked in frequentation, and carries out early warning;
The personal behavior model passes through server and/or the user specifically, Lawful access behavior in response to user terminal
End acquisition Lawful access information;According to personal behavior model described in the Lawful access information architecture.
The technical solution adopted by the present invention to solve the technical problems is: a kind of electronic device, including processor, communication connect
Mouth, memory and communication bus, wherein processor, communication interface, memory complete mutual communication by communication bus;
The memory, for storing computer program;
The processor when for executing the program stored on memory, realizes any implementation of the anti-crawler method
Example.
The technical solution adopted by the present invention to solve the technical problems is: a kind of computer readable storage medium, the meter
Computer program is stored in calculation machine readable storage medium storing program for executing, it is counter described in realization when the computer program is executed by processor to climb
Any embodiment of worm method.
A kind of anti-crawler method, apparatus of the present invention, electronic equipment and computer readable storage medium have below beneficial to effect
Fruit:
Through the access information to be measured for recording the user terminal;It is described when the user terminal is again introduced into the website
Carry out detecting the access information to be measured of the user terminal in server;Corresponding record is compared whereby, when any different,
Warning information is issued by server, to notify the administrative staff of server that it is made to learn the user terminal for logining server at present
User terminal behavior is crawler behavior, or even further decreases the permission visitation frequency of user terminal, is climbed so that website is reduced or avoided
The frequency of worm.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is that the present invention is based on the flow charts of method in anti-crawler method one embodiment of user terminal behavior;
Fig. 2 is that the present invention is based on the flow charts of method in anti-another embodiment of crawler method of user terminal behavior.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
In the anti-crawler embodiment of the method the present invention is based on user terminal behavior, the anti-crawler side based on user terminal behavior
The flow chart of method is as shown in Figure 1.In Fig. 1, the anti-crawler method based on user terminal behavior of being somebody's turn to do includes the following steps:
Step S01: system acquires access to be measured by server and/or the user terminal in response to the access behavior of user terminal
Information;
Step S02: system judges whether the access information to be measured is consistent with the personal behavior model pre-established;
Step S03: using the access behavior of the user terminal as abnormal access behavior, and early warning is carried out;
Step S04: Lawful access information is acquired by server and/or the user terminal;
Step S05: according to personal behavior model described in the Lawful access information architecture.
In the present embodiment, step S01 is bury a little in user terminal or server according to the execution of plug-in card program, to take
It is acquired access information to be measured in business device or user terminal, to judge the access behavior of user terminal.
Wherein system be acquisition access data information, comprise at least one of the following: MAC Address, IP address, access time,
Residence time, click location, click event, user terminal geographical location and user terminal are liked and are recorded, such as: record the user
The access data information for the first time at end, comprises at least one of the following: when one the oneth position MAC, one the oneth position IP, one first access
Between, one first residence time, one first click location, one first click item, one first user terminal geographical location and one first
Data information is accessed after user terminal hobby, and the access for the first time of the acquisition user terminal, any access can be considered secondary
Access behavior, and be to acquire secondary access data information, comprises at least one of the following: one the 2nd position MAC, one the 2nd IP
It sets, one second access time, one second residence time, one second click location, one second click item, a second user end
Manage position and second user end hobby.
Wherein, in step S02, system will be handled access data information is collected above, that is, be directed to and be collected into
Data information existing for various abnormal conditions, such as shortage of data, data value extremely be purged processing, to avoid subsequent
Processing failure can not continue to run.
In the judgment process, system judges that the access information to be measured is not consistent with the personal behavior model pre-established
When, step S03 is executed, if the personal behavior model is specifically, system is then held in response to the Lawful access behavior of user terminal
Row step S04.
In step S04, system is to acquire Lawful access information by server and/or the user terminal, that is, adopt
Collect MAC Address, IP address, access time, the residence time, click location, click event, user terminal geographical location and user terminal happiness
Good at least one of them.
In step S05, user terminal characteristic is obtained using kmean, SVM algorithm training sample and establishes label body
System, and different behaviors is corresponded to according to different labels and carries out data acquisition.
Such as user terminal A possesses following access behavioural characteristic and is recorded as access data information.
1) most normal debarkation point Beijing, Nanjing;
2) most normal scope period (10:00-12:00);
3) every page mean residence time 1 minute;
4) identifying code is averaged input time 10 seconds;
5) average at most to turn over page 10;And
6) Arts theme is most often browsed.
Whereby, user terminal is logined to the process of website or server and result every time and is acquired one by one and in step S04,
According to initially collected record and subsequent acquisition to data compare one by one, or progress is effectively recorded according to the first stroke
It compares.
Multiple refering in step S02, server obtains the user behavior of subsequent user A, such as user A occurs suddenly with downlink
Are as follows:
1) it is asked in morning frequent model
2) each page stops 1 second
3) at most page turning reaches page 1000
4) browse themes increase by 20 major class
Server logins time and page turning number of pages, residence time and theme number by detecting user behavior, that is, the
One logins the time, and with second to login the difference of time excessive, and when the first user preferences are different from second user and like, system is sentenced
Disconnected system judges that the access information to be measured is not consistent with the personal behavior model pre-established, therefore system is judged to execute step
Rapid S03 by user terminal exception and issues warning information, does not stop user's access at this time.
In addition to this, it is different from the 2nd position MAC in the MAC Address, that is, is the MAC Address for difference
When MAC Address, or in the first position IP different from the 2nd position IP, that is, the IP address is different IP addresses
When, or difference in first residence time and second residence time be greater than a threshold value (such as: the residence time is more than
1 minute), or when first click location is different from second click location, in first user terminal geographical location
When different from the second user end geographical location, that is, when any difference, connects and execute step S03, the plug-in unit of server
Program all judges user's exception, and all supervention goes out warning information to server after the meeting.In step S04, when system judges the user
When behavior model is specially Lawful access behavior of the system in response to user terminal, acquired by server and/or the user terminal
Lawful access information, that is, acquisition acquisition Lawful access information, that is, acquire MAC Address, IP address, access time, stop
Stay at least one of them of time, click location, click event, user terminal geographical location and user terminal hobby.
The present invention is not only in that sending warning information, can more be further transmitted through the setting of server, and permitting client
Perhaps visitation frequency reduces, i.e., when corresponding comparison accesses data information for the first time and secondary access data information has any difference, institute
It states server and issues an early warning message, further includes: further decreasing user terminal allows visitation frequency, and the embodiment of following figure 2 is
Reducing user terminal allows visitation frequency.
In the anti-crawler embodiment of the method the present invention is based on user terminal behavior, the anti-crawler side based on user terminal behavior
The flow chart of method is as shown in Figure 2.In Fig. 2, the anti-crawler method based on user terminal behavior of being somebody's turn to do includes the following steps:
Step S11: system acquires access to be measured by server and/or the user terminal in response to the access behavior of user terminal
Information;
Step S12: system judges whether the access information to be measured is consistent with the personal behavior model pre-established;
Step S13: using the access behavior of the user terminal as abnormal access behavior, and early warning is carried out;
Step S14: when corresponding comparison accesses data information for the first time and secondary access data information has any difference, the service
Device issues an early warning message.
Step S15: Lawful access information is acquired by server and/or the user terminal;
Step S16: according to personal behavior model described in the Lawful access information architecture.
In the present embodiment, step S11 to step S13 and step S15 to step S16 are identical to above-mentioned steps S01 to step
S05, therefore repeat no more, step S14 is described into emphasis below:
Wherein, anti-crawler method of the invention is learnt in addition to issuing warning information in advance for the administrative staff of server, useful
Family end carry out crawler behavior, furthermore, the present invention be even more reduce user terminal permission visitation frequency, wherein server with
User terminal is all embedded with plug-in card program, bury a little, during executing plug-in card program, learns and compares the MAC Address, institute
State IP address, the access time, the residence time, the click location, the click event, user terminal geography position
Set and when the comparison result of user terminal hobby has any difference, in addition to issuing warning information, server be even more be directed to it is described
Comparison result, which has any different user terminal to reduce, allows visitation frequency.
Whereby, to avoid or reduce website or number that server is crawled.
Above embodiments are applied to an anti-crawler device, and the anti-crawler device includes acquisition module and judgment module,
Wherein acquisition module acquires access to be measured by server and/or the user terminal and believes for responding the access behavior of user terminal
Breath;And judgment module works as institute for judging whether the access information to be measured is consistent with the personal behavior model pre-established
When stating access information to be measured and whether not being consistent with the personal behavior model pre-established, using the access behavior of the user terminal as
Abnormal access behavior, and carry out early warning;And the personal behavior model is specifically, Lawful access behavior in response to user terminal,
Lawful access information is acquired by server and/or the user terminal;According to user's row described in the Lawful access information architecture
For model.
Or the above implementation jasmine can be applied to a kind of electronic device, the electronic device include processor, communication interface,
Memory and communication bus, wherein processor, communication interface, memory complete mutual communication by communication bus;It is described
Memory, for storing computer program;The processor, when for executing the program stored on memory, described in realization
Anti- crawler method any embodiment.
Further, the present invention more can be a kind of computer readable storage medium, the computer readable storage medium memory
Computer program is contained, any embodiment of the anti-crawler method is realized when the computer program is executed by processor,
It data information should be accessed in acquisition, and in abnormal cases, provides alert, even reduction access times, or is visiting
In the case where asking that data information is legal, information model is established.
In short, above-mentioned plug-in card program be embedded into website or its server, and be embedded into user terminal bury a little, with
Collect the process after user terminal is logined every time with as a result, and be presented in server one by one and save, analyzed for subsequent comparison, with
And after the crawler behavior of confirmation user terminal, warning information is issued to alert the user terminal for carrying out crawler behavior, and ought repeatedly compare
The permission visitation frequency of user terminal is then reduced when being still exception to result after judgement.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Within mind and principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (14)
1. a kind of anti-crawler method based on user terminal behavior characterized by comprising
System acquires access information to be measured by server and/or the user terminal in response to the access behavior of user terminal;
System judges whether the access information to be measured is consistent with the personal behavior model pre-established, if not being consistent, then by institute
The access behavior of user terminal is stated as abnormal access behavior, and carries out early warning;
The personal behavior model specifically, system in response to user terminal Lawful access behavior, by server and/or described
User terminal acquires Lawful access information;And the personal behavior model according to the Lawful access information architecture.
2. anti-crawler method according to claim 1, which is characterized in that the access information to be measured includes following at least one
Kind: MAC Address, access time, the residence time, click location, clicks event, user terminal geographical location and user terminal at IP address
Hobby.
3. anti-crawler method according to claim 1, which is characterized in that the Lawful access information includes following at least one
Kind: MAC Address, access time, the residence time, click location, clicks event, user terminal geographical location and user at one IP address
End hobby.
4. anti-crawler method according to claim 2 or 3, which is characterized in that it is described when corresponding comparison is any different, be
The MAC Address is different MAC Address.
5. anti-crawler method according to claim 2 or 3, which is characterized in that it is described when corresponding comparison is any different, be
The IP address is different IP addresses.
6. anti-crawler method according to claim 2 or 3, which is characterized in that it is described when corresponding comparison is any different, be
The access time is that the difference of different access time is greater than a threshold value.
7. anti-crawler method according to claim 2 or 3, which is characterized in that it is described when corresponding comparison is any different, be
The residence time is that the difference of different residence times is greater than a threshold value.
8. anti-crawler method according to claim 2 or 3, which is characterized in that it is described when corresponding comparison is any different, be
The click location is different click locations.
9. anti-crawler method according to claim 2 or 3, which is characterized in that it is described when corresponding comparison is any different, be
The user terminal geographical location is different user end geographical location.
10. anti-crawler method according to claim 2 or 3, which is characterized in that it is described when corresponding comparison is any different,
It is that the user terminal hobby is liked for different user end.
11. anti-crawler method according to claim 2 or 3, which is characterized in that when corresponding comparison accesses data information for the first time
When having any difference with secondary access data information, the server issues an early warning message, further includes:
Further decreasing user terminal allows visitation frequency.
12. a kind of anti-crawler device based on user terminal behavior characterized by comprising
Acquisition module acquires access to be measured by server and/or the user terminal and believes for responding the access behavior of user terminal
Breath;
Judgment module, for judging whether the access information to be measured is consistent with the personal behavior model pre-established, when described
When whether access information to be measured is not consistent with the personal behavior model pre-established, using the access behavior of the user terminal as different
Behavior is asked in frequentation, and carries out early warning;
The personal behavior model passes through server and/or the user specifically, Lawful access behavior in response to user terminal
End acquisition Lawful access information;According to personal behavior model described in the Lawful access information architecture.
13. a kind of electronic equipment, which is characterized in that including processor, communication interface, memory and communication bus, wherein processing
Device, communication interface, memory complete mutual communication by communication bus;
The memory, for storing computer program;
The processor when for executing the program stored on memory, realizes the described in any item sides of claim 1-11
Method step.
14. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium
Program realizes claim 1-11 described in any item method and steps when the computer program is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810948703.5A CN109150875A (en) | 2018-08-20 | 2018-08-20 | Anti-crawler method, anti-crawler device, electronic equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810948703.5A CN109150875A (en) | 2018-08-20 | 2018-08-20 | Anti-crawler method, anti-crawler device, electronic equipment and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109150875A true CN109150875A (en) | 2019-01-04 |
Family
ID=64790515
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810948703.5A Pending CN109150875A (en) | 2018-08-20 | 2018-08-20 | Anti-crawler method, anti-crawler device, electronic equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109150875A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110401639A (en) * | 2019-06-28 | 2019-11-01 | 平安科技(深圳)有限公司 | Abnormality determination method, device, server and its storage medium of network access |
CN110708309A (en) * | 2019-09-29 | 2020-01-17 | 武汉极意网络科技有限公司 | Anti-crawler system and method |
CN113453227A (en) * | 2021-09-01 | 2021-09-28 | 清华大学 | Chain establishment rejection method and device and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106296422A (en) * | 2016-07-29 | 2017-01-04 | 重庆邮电大学 | A kind of social networks junk user detection method merging many algorithms |
CN106534062A (en) * | 2016-09-23 | 2017-03-22 | 南京途牛科技有限公司 | Crawler prevention method |
CN106790292A (en) * | 2017-03-13 | 2017-05-31 | 摩贝(上海)生物科技有限公司 | The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis |
CN107517193A (en) * | 2016-06-17 | 2017-12-26 | 百度在线网络技术(北京)有限公司 | Malicious websites recognition methods and device |
-
2018
- 2018-08-20 CN CN201810948703.5A patent/CN109150875A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107517193A (en) * | 2016-06-17 | 2017-12-26 | 百度在线网络技术(北京)有限公司 | Malicious websites recognition methods and device |
CN106296422A (en) * | 2016-07-29 | 2017-01-04 | 重庆邮电大学 | A kind of social networks junk user detection method merging many algorithms |
CN106534062A (en) * | 2016-09-23 | 2017-03-22 | 南京途牛科技有限公司 | Crawler prevention method |
CN106790292A (en) * | 2017-03-13 | 2017-05-31 | 摩贝(上海)生物科技有限公司 | The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110401639A (en) * | 2019-06-28 | 2019-11-01 | 平安科技(深圳)有限公司 | Abnormality determination method, device, server and its storage medium of network access |
CN110401639B (en) * | 2019-06-28 | 2021-12-24 | 平安科技(深圳)有限公司 | Method and device for judging abnormality of network access, server and storage medium thereof |
CN110708309A (en) * | 2019-09-29 | 2020-01-17 | 武汉极意网络科技有限公司 | Anti-crawler system and method |
CN113453227A (en) * | 2021-09-01 | 2021-09-28 | 清华大学 | Chain establishment rejection method and device and electronic equipment |
CN113453227B (en) * | 2021-09-01 | 2021-11-12 | 清华大学 | A method, device and electronic device for rejecting chain establishment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11238366B2 (en) | Adaptive object modeling and differential data ingestion for machine learning | |
US10938845B2 (en) | Detection of user behavior deviation from defined user groups | |
US10104095B2 (en) | Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications | |
CN101326503B (en) | Method and device for monitoring page access | |
JP6608948B2 (en) | Network flow log for multi-tenant environments | |
CN103888490B (en) | A kind of man-machine knowledge method for distinguishing of full automatic WEB client side | |
CN104615852B (en) | The method for order and the raising source service efficiency of registering for guarantee online booking | |
CN102741839B (en) | Based on the url filtering of user browser history | |
US20120265824A1 (en) | Method and system for configuration-controlled instrumentation of application programs | |
Cohen et al. | Capturing, indexing, clustering, and retrieving system history | |
US8255514B2 (en) | Internet use monitoring system and method | |
CN111404937B (en) | Method and device for detecting server vulnerability | |
CN102065147A (en) | Method and device for obtaining user login information based on enterprise application system | |
US20030163731A1 (en) | Method, system and software product for restricting access to network accessible digital information | |
CN109150875A (en) | Anti-crawler method, anti-crawler device, electronic equipment and computer readable storage medium | |
CN112291264B (en) | Security control method, device, server and storage medium | |
CN107944293A (en) | Fictitious assets guard method, system, equipment and storage medium | |
US20030233447A1 (en) | Apparatus and methods for monitoring content requested by a client device | |
CN118802266A (en) | API security protection method, device, electronic device and storage medium | |
US9723017B1 (en) | Method, apparatus and computer program product for detecting risky communications | |
Linger et al. | Foundations for survivable system development: service traces, intrusion traces, and evaluation models | |
JP2024041055A (en) | Personal information connection record management method and device | |
CN116418777A (en) | Intelligent online chat room pushing system based on data analysis | |
Joshi et al. | Guardian Eye: Hoslitic Parental Control Solution | |
CN112134947A (en) | Internet service business data platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190104 |