CN106878438A - The method and system of user behavior analysis under a kind of https environment - Google Patents
The method and system of user behavior analysis under a kind of https environment Download PDFInfo
- Publication number
- CN106878438A CN106878438A CN201710122538.3A CN201710122538A CN106878438A CN 106878438 A CN106878438 A CN 106878438A CN 201710122538 A CN201710122538 A CN 201710122538A CN 106878438 A CN106878438 A CN 106878438A
- Authority
- CN
- China
- Prior art keywords
- page
- https
- resource
- characteristic
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/957—Browsing optimisation, e.g. caching or content distillation
- G06F16/9574—Browsing optimisation, e.g. caching or content distillation of access to content, e.g. by caching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a kind of method and system of user behavior analysis under https environment, method includes:Step 1) content characteristic storehouse is set up to the Internet resources page that needs are analyzed, feature database is made up of multiple condition codes, and condition code includes:The Host of https request URLs, page-size, the page include resource content, resource content size, dynamic resource information, embedded one of URLs and quantity or combination;Step 2) to user access Internet resources https message datas analyze one by one, characteristic information extraction, with condition code the matching analysis;Step 3) daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse, also original subscriber truly accesses behavior, and is further analyzed and counts.
Description
Technical field
The invention belongs to internet arena, it is related to a kind of method of user behavior analysis under https environment.
Background technology
Http user access requests message data is all the time the user behavior analysis key data under internet environment
Source, by http messages, can effectively track user behavior path, content and frequency, so as to analyze the row of Internet user
It is custom, behavior prediction, so as to for enterprise, investor etc. provide strong decision-making foundation, be worked out according to different user and performed
Detailed, effective strategy.
With continuing to develop for internet, the business of carrying is more and more, particularly the business such as terminal payment, finance and money management
Development so that the security requirement more and more higher of data transfer, therefore many application/Web services progressively switch to http
Https, it is ensured that communications security between client and server, such as day cat, Taobao, Baidu, Jingdone district, IOS APP.
TLS/SSL agreements are added on the basis of https-over-http, TSL/SSL carrys out the body of authentication server by certificate
Part, and be the communication encryption between browser and server.And the method for accessing message analysis based on http originally cannot
The total data that user really accesses URL is grabbed, also the internet behavior of user cannot just be analysed in depth.
Mainly there is two ways at present:
Scheme one:
The limited information coarse analysis user behaviors such as the host of record are only capable of in https by analyzing.This scheme, due to
It is only capable of obtaining in plain text the host information of user access request in https data, it is impossible to recorded user and access under the host in detail
Path so as to obtain complete URL, therefore also cannot just accomplish user access content in-depth analysis, it is impossible to for decision-making is provided
Effective data supporting.
Scheme two:
Proxy agencies are set up between the server that client and user access, realizes that https is asked to kidnap.Pass through
Https is asked to kidnap, it is possible to achieve with the identical analytical effects of http, but cannot realize dividing the whole network user behavior
Analysis ability, is relatively adapted to enterprise network exit and sets up Proxy agencies, realizes the tracking of enterprises user behavior and analyzes, because
There is the technology restriction of Proxy proxy servers deployment, scene limitation and cost limitation in this program.
The content of the invention
Regarding to the issue above, the present invention is by setting up Internet content page feature database, with reference to having that https can be obtained
Limit information, based on big data analytical technology, user internet under https is realized in the accurate calculating to user's actual access content
Behavioural analysis.
The technical scheme that present invention solution above-mentioned technical problem is taken is as follows:
A kind of method of user behavior analysis under https environment, including:
Step 1) content characteristic storehouse is set up to the Internet resources page that needs are analyzed, feature database is by multiple feature code characters
Into condition code includes:The Host of https request URLs, page-size, the page include resource content, resource content size, dynamic
Resource information, embedded one of URLs and quantity or combination;
Step 2) to user access Internet resources https message datas analyze one by one, characteristic information extraction, with spy
Levy a yard the matching analysis;
Step 3) daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse, also original subscriber truly accesses
Behavior, and be further analyzed and count.
Preferably, step 1) in, required each analyzed is crawled by crawler technology for the website of analysis is needed
Webpage, Web page feature base is set up according to the data for crawling webpage.
Preferably, step 2) in, the characteristic information of extraction is selected from following:
Access the Host/Domain of URL;
The total length of the uncached part of https requests for page;
Uncached picture or CSS load the quantity of resource in https requests for page;
The size of each resource object of page loading;
The time that https requests occur.
Preferably, step 2) in, one or more characteristic informations combine and to form one or more features and refer to based on more than
Line, accesses https and asks to determine user access path by user in the range of certain hour.
Preferably, step 3) in the daily record of characteristic information extraction is matched into specific choosing with the condition code in content characteristic storehouse
From following method:
By fingerprint combination unique match;
If cannot by fingerprint combination unique match when, can by access during the webpage resource of loading simultaneously or
URL sequences many condition is matched;
The 3-5 contents of object that can must be loaded every time is obtained from the page, while obtaining the size of these contents of object
With host information, the host information and object size for accessing object sequence according to each loading page carries out as finger print information
Match somebody with somebody.
The system of user behavior analysis under a kind of https environment, including:
Feature database sets up unit, for setting up content characteristic storehouse to the Internet resources page for needing analysis, feature database by
Multiple condition code compositions, condition code includes:Host, page-size, the page of https request URLs are comprising in resource content, resource
Hold size, dynamic resource information, embedded one of URLs and quantity or combination;
Condition code matching unit, the https message datas for accessing user Internet resources are analyzed one by one, extract special
Reference cease, with condition code the matching analysis;
Behavior reduction unit, for the daily record of characteristic information extraction to be matched with the condition code in content characteristic storehouse, reduction
User truly accesses behavior, and is further analyzed and counts.
Preferably, the feature database sets up unit, required for being crawled by crawler technology for the website for needing to analyze
Each webpage of analysis, Web page feature base is set up according to the data for crawling webpage.
Preferably, described document information matching unit, the characteristic information of extraction is selected from following:
Access the Host/Domain of URL;
The total length of the uncached part of https requests for page;
Uncached picture or CSS load the quantity of resource in https requests for page;
The size of each resource object of page loading;
The time that https requests occur.
Preferably, described document information matching unit, is further used for one or more characteristic informations combination shape based on more than
Into one or more characteristic fingerprints, https is accessed by user in the range of certain hour and asks to determine user access path.
Preferably, the behavior reduction unit, by the condition code in the daily record of characteristic information extraction and content characteristic storehouse
Matching is chosen in particular from following method:
By fingerprint combination unique match;
If cannot by fingerprint combination unique match when, can by access during the webpage resource of loading simultaneously or
URL sequences many condition is matched;
The 3-5 contents of object that can must be loaded every time is obtained from the page, while obtaining the size of these contents of object
With host information, the host information and object size for accessing object sequence according to each loading page carries out as finger print information
Match somebody with somebody.
The program is main by following characteristics:
1st, need not increase additional investment, including change network structure or increase computing resource, based on existing data and set
It is standby to complete;
2nd, the data analysis and original http daily records after reduction user behavior are essentially identical, protect the throwing of original analysis system
Enter;
3rd, user behavior reduction granularity can be determined according to practical business demand, to reduce the exploitation and maintenance of feature database
Cost.
Other features and advantages of the present invention will be illustrated in the following description, also, the partly change from specification
Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages can be by the explanations write
Specifically noted structure is realized and obtained in book, claims and accompanying drawing.
Brief description of the drawings
The present invention is described in detail below in conjunction with the accompanying drawings, to cause above-mentioned advantage of the invention definitely.Its
In,
Fig. 1 is the schematic flow sheet of the method for user behavior analysis under https environment of the present invention;
Fig. 2 is the structural representation of the system of user behavior analysis under https environment of the present invention.
Specific embodiment
Describe embodiments of the present invention in detail below with reference to drawings and Examples, how the present invention is applied whereby
Technological means solves technical problem, and reaches the implementation process of technique effect and can fully understand and implement according to this.Need explanation
As long as not constituting conflict, each embodiment in the present invention and each feature in each embodiment can be combined with each other,
The technical scheme for being formed is within protection scope of the present invention.
In addition, can be in the such as one group department of computer science of computer executable instructions the step of the flow of accompanying drawing is illustrated
Performed in system, and, although logical order is shown in flow charts, but in some cases, can be with different from herein
Order perform shown or described step.
Embodiment one:
As shown in figure 1, under a kind of https environment user behavior analysis method, including:
Step 1) content characteristic storehouse is set up to the Internet resources page that needs are analyzed, feature database is by multiple feature code characters
Into condition code includes:The Host of https request URLs, page-size, the page include resource content, resource content size, dynamic
Resource information, embedded one of URLs and quantity or combination;
Step 2) to user access Internet resources https message datas analyze one by one, characteristic information extraction, with spy
Levy a yard the matching analysis;
Step 3) daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse, also original subscriber truly accesses
Behavior, and be further analyzed and count.
Limited information by setting up Internet content page feature database, can obtain with reference to https of the invention, based on big
User internet behavioural analysis under https is realized in data analysis technique, the accurate calculating to user's actual access content.
Embodiment two:
The present invention is carried out in conjunction with the embodiments continuing on, these, it is preferred to, step 2) in, the characteristic information of extraction
Selected from following:
Access the Host/Domain of URL;
The total length of the uncached part of https requests for page;
Uncached picture or CSS load the quantity of resource in https requests for page;
The size of each resource object of page loading;
The time that https requests occur.
Preferably, step 2) in, one or more characteristic informations combine and to form one or more features and refer to based on more than
Line, accesses https and asks to determine user access path by user in the range of certain hour.
Preferably, step 3) in the daily record of characteristic information extraction is matched into specific choosing with the condition code in content characteristic storehouse
From following method:
By fingerprint combination unique match;
If cannot by fingerprint combination unique match when, can by access during the webpage resource of loading simultaneously or
URL sequences many condition is matched;
The 3-5 contents of object that can must be loaded every time is obtained from the page, while obtaining the size of these contents of object
With host information, the host information and object size for accessing object sequence according to each loading page carries out as finger print information
Match somebody with somebody.
Embodiment three:
In one embodiment, the invention mainly comprises following key step:
1. pair Internet resources page for needing analysis sets up content characteristic storehouse
Each webpage of analysis required for being crawled by crawler technology for the website for needing analysis, according to crawling webpage
Data set up Web page feature base, and feature database is made up of multiple condition codes (fingerprint), and condition code includes but is not limited to https requests
The Host of URL, page-size, the page include resource content, resource content size, dynamic resource information, embedded URLs and quantity
Deng.
2. couple user accesses the https message datas of Internet resources and analyzes one by one, characteristic information extraction, with feature
Code/fingerprint matching is analyzed
When https passes through TLS/SSL encrypted communication channels, following letter still can be obtained after capturing message analysis
Breath:
(1) Host/Domain of URL is accessed
(2) total length of the uncached part of https requests for page
(3) quantity of loading resource uncached in https requests for page, such as picture, CSS
(4) size of each resource object of page loading
(5) time that https requests occur
One or more combinations form one or more characteristic fingerprints based on more than, are visited by user in the range of certain hour
Ask that request determines user access path to https.
3. the daily record of characteristic information extraction is matched by certain algorithm with content characteristic storehouse, also original subscriber truly accesses row
For, and be further analyzed and count.Feature Correspondence Algorithm mainly includes following methods:
(1) by fingerprint combination unique match;
(2) if cannot by fingerprint combination unique match when, can be by accessing during the webpage resource of loading simultaneously
Or the matching of URL sequences many condition, such as, a page not only loads the content of the page when loading, be also loaded with some special
Fixed picture, or a special new https/http request is initiated, can now be visited by fingerprint combination+definition URL
Ask sequence the accessed page of positioning jointly.
(3) the 3-5 contents of object (picture, media file, css, js etc.) that can must be loaded every time is obtained from the page,
Obtain the size and host information of these contents of object simultaneously, according to each loading page access object sequence host information and
Object size is used as finger print information.
The program is main by following characteristics:
1st, need not increase additional investment, including change network structure or increase computing resource, based on existing data and set
It is standby to complete;
2nd, the data analysis and original http daily records after reduction user behavior are essentially identical, protect the throwing of original analysis system
Enter;
3rd, user behavior reduction granularity can be determined according to practical business demand, to reduce the exploitation and maintenance of feature database
Cost.
Wherein, it is all to realize that the user behavior analysis method based on https daily records belongs to using same or similar algorithm
In the application protection domain of this patent:
1. by parse https ask in obtain host, page-size, the page include object size, dynamic resource load
The method that the information such as quantity uniquely position the https pages as fingerprint;
2. when many https pages are identical, other elements are increased, it is big that such as JS, picture, URL access visit sequence, content object
The method of the small unique positioning webpage of grade;
3. by the method for web crawlers technique construction Web page feature database.
Example IV:
It is corresponding with above method embodiment, present invention also offers user behavior analysis under a kind of https environment
System, including:
Feature database sets up unit, for setting up content characteristic storehouse to the Internet resources page for needing analysis, feature database by
Multiple condition code compositions, condition code includes:Host, page-size, the page of https request URLs are comprising in resource content, resource
Hold size, dynamic resource information, embedded one of URLs and quantity or combination;
Condition code matching unit, the https message datas for accessing user Internet resources are analyzed one by one, extract special
Reference cease, with condition code the matching analysis;
Behavior reduction unit, for the daily record of characteristic information extraction to be matched with the condition code in content characteristic storehouse, reduction
User truly accesses behavior, and is further analyzed and counts.
Preferably, the feature database sets up unit, required for being crawled by crawler technology for the website for needing to analyze
Each webpage of analysis, Web page feature base is set up according to the data for crawling webpage.
Preferably, described document information matching unit, the characteristic information of extraction is selected from following:
Access the Host/Domain of URL;
The total length of the uncached part of https requests for page;
Uncached picture or CSS load the quantity of resource in https requests for page;
The size of each resource object of page loading;
The time that https requests occur.
Preferably, described document information matching unit, is further used for one or more characteristic informations combination shape based on more than
Into one or more characteristic fingerprints, https is accessed by user in the range of certain hour and asks to determine user access path.
Preferably, the behavior reduction unit, by the condition code in the daily record of characteristic information extraction and content characteristic storehouse
Matching is chosen in particular from following method:
By fingerprint combination unique match;
If cannot by fingerprint combination unique match when, can by access during the webpage resource of loading simultaneously or
URL sequences many condition is matched;
The 3-5 contents of object that can must be loaded every time is obtained from the page, while obtaining the size of these contents of object
With host information, the host information and object size for accessing object sequence according to each loading page carries out as finger print information
Match somebody with somebody.
The program is main by following characteristics:
1st, need not increase additional investment, including change network structure or increase computing resource, based on existing data and set
It is standby to complete;
2nd, the data analysis and original http daily records after reduction user behavior are essentially identical, protect the throwing of original analysis system
Enter;
3rd, user behavior reduction granularity can be determined according to practical business demand, to reduce the exploitation and maintenance of feature database
Cost.
It should be noted that for above method embodiment, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the application is not limited by described sequence of movement because
According to the application, some steps can sequentially or simultaneously be carried out using other.Secondly, those skilled in the art should also know
Know, embodiment described in this description belongs to preferred embodiment, involved action and module not necessarily the application
It is necessary.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program
Product.Therefore, the application can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.
And, the application can be used and can use in one or more computers for wherein including computer usable program code
The computer program product implemented on storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Form.
Finally it should be noted that:The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention,
Although being described in detail to the present invention with reference to the foregoing embodiments, for a person skilled in the art, it still may be used
Modified with to the technical scheme described in foregoing embodiments, or equivalent is carried out to which part technical characteristic.
All any modification, equivalent substitution and improvements within the spirit and principles in the present invention, made etc., should be included in of the invention
Within protection domain.
Claims (10)
1. under a kind of https environment user behavior analysis method, it is characterised in that including:
Step 1) content characteristic storehouse is set up to the Internet resources page that needs are analyzed, feature database is made up of multiple condition codes, special
Levying code includes:The Host of https request URLs, page-size, the page include resource content, resource content size, dynamic resource letter
Breath, embedded one of URLs and quantity or combination;
Step 2) to user access Internet resources https message datas analyze one by one, characteristic information extraction, with condition code
The matching analysis;
Step 3) daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse, also original subscriber truly accesses row
For, and be further analyzed and count.
2. under https environment according to claim 1 user behavior analysis method, it is characterised in that step 1) in, pin
Each webpage that website to needing analysis is analyzed required for being crawled by crawler technology, net is set up according to the data for crawling webpage
Page feature database.
3. under https environment according to claim 1 and 2 user behavior analysis method, it is characterised in that step 2)
In, the characteristic information of extraction is selected from following:
Access the Host/Domain of URL;
The total length of the uncached part of https requests for page;
Uncached picture or CSS load the quantity of resource in https requests for page;
The size of each resource object of page loading;
The time that https requests occur.
4. under https environment according to claim 3 user behavior analysis method, it is characterised in that step 2) in, base
One or more characteristic informations combine to form one or more characteristic fingerprints more than, are accessed by user in the range of certain hour
Https requests determine user access path.
5. under https environment according to claim 1 user behavior analysis method, it is characterised in that step 3) in will
The daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse and is chosen in particular from following method:
By fingerprint combination unique match;
If cannot by fingerprint combination unique match when, can be by accessing during the webpage resource or URL sequences of loading simultaneously
Row many condition is matched;
The contents of object that 3-5 can must be loaded every time is obtained from the page, at the same obtain these contents of object size and
Host information, the host information and object size for accessing object sequence according to each loading page is carried out as finger print information
Match somebody with somebody.
6. under a kind of https environment user behavior analysis system, it is characterised in that including:
Feature database sets up unit, and for setting up content characteristic storehouse to the Internet resources page for needing analysis, feature database is by multiple
Condition code is constituted, and condition code includes:The Host of https request URLs, page-size, the page are big comprising resource content, resource content
Small, dynamic resource information, embedded one of URLs and quantity or combination;
Condition code matching unit, the https message datas for accessing user Internet resources are analyzed one by one, extract feature letter
Breath, with condition code the matching analysis;
Behavior reduction unit, for the daily record of characteristic information extraction to be matched with the condition code in content characteristic storehouse, goes back original subscriber
It is true to access behavior, and be further analyzed and count.
7. under https environment according to claim 6 user behavior analysis system, it is characterised in that the feature database
Unit is set up, each webpage of analysis required for being crawled by crawler technology for the website for needing analysis, according to crawling webpage
Data set up Web page feature base.
8. under the https environment according to claim 6 or 7 user behavior analysis system, it is characterised in that the feature
Code matching unit, the characteristic information of extraction is selected from following:
Access the Host/Domain of URL;
The total length of the uncached part of https requests for page;
Uncached picture or CSS load the quantity of resource in https requests for page;
The size of each resource object of page loading;
The time that https requests occur.
9. under https environment according to claim 8 user behavior analysis system, it is characterised in that described document information
Matching unit, is further used for one or more characteristic informations based on more than and combines to form one or more characteristic fingerprints, by one
User accesses https request determination user access paths in the range of fixing time.
10. under https environment according to claim 6 user behavior analysis system, it is characterised in that the behavior is also
Former unit, the daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse and is chosen in particular from following method:
By fingerprint combination unique match;
If cannot by fingerprint combination unique match when, can be by accessing during the webpage resource or URL sequences of loading simultaneously
Row many condition is matched;
The contents of object that 3-5 can must be loaded every time is obtained from the page, at the same obtain these contents of object size and
Host information, the host information and object size for accessing object sequence according to each loading page is carried out as finger print information
Match somebody with somebody.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710122538.3A CN106878438A (en) | 2017-03-03 | 2017-03-03 | The method and system of user behavior analysis under a kind of https environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710122538.3A CN106878438A (en) | 2017-03-03 | 2017-03-03 | The method and system of user behavior analysis under a kind of https environment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106878438A true CN106878438A (en) | 2017-06-20 |
Family
ID=59169594
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710122538.3A Pending CN106878438A (en) | 2017-03-03 | 2017-03-03 | The method and system of user behavior analysis under a kind of https environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106878438A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107577783A (en) * | 2017-09-15 | 2018-01-12 | 电子科技大学 | The type of webpage automatic identifying method excavated based on Web architectural features |
CN108023779A (en) * | 2017-12-20 | 2018-05-11 | 杭州云屏科技有限公司 | A kind of method and system based on network traffic analysis user behavior |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101808093A (en) * | 2010-03-15 | 2010-08-18 | 北京安天电子设备有限公司 | System and method for automatically detecting WEB security |
CN102143224A (en) * | 2011-01-25 | 2011-08-03 | 张金海 | Mobile phone Internet accessing-based user behavior analysis method and device |
CN103077356A (en) * | 2013-01-11 | 2013-05-01 | 中国地质大学(武汉) | Protecting and tracking method for primary information of mobile terminal based on user behavior pattern |
CN103561004A (en) * | 2013-10-22 | 2014-02-05 | 西安交通大学 | Cooperative type active defense system based on honey nets |
CN106161091A (en) * | 2016-07-13 | 2016-11-23 | 久远谦长(北京)技术服务有限公司 | A kind of method and system adding up Internet user's behavior |
US20160381166A1 (en) * | 2011-12-23 | 2016-12-29 | Akamai Technologies, Inc. | Assessment of content delivery services using performance measurements from within an end user client application |
-
2017
- 2017-03-03 CN CN201710122538.3A patent/CN106878438A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101808093A (en) * | 2010-03-15 | 2010-08-18 | 北京安天电子设备有限公司 | System and method for automatically detecting WEB security |
CN102143224A (en) * | 2011-01-25 | 2011-08-03 | 张金海 | Mobile phone Internet accessing-based user behavior analysis method and device |
US20160381166A1 (en) * | 2011-12-23 | 2016-12-29 | Akamai Technologies, Inc. | Assessment of content delivery services using performance measurements from within an end user client application |
CN103077356A (en) * | 2013-01-11 | 2013-05-01 | 中国地质大学(武汉) | Protecting and tracking method for primary information of mobile terminal based on user behavior pattern |
CN103561004A (en) * | 2013-10-22 | 2014-02-05 | 西安交通大学 | Cooperative type active defense system based on honey nets |
CN106161091A (en) * | 2016-07-13 | 2016-11-23 | 久远谦长(北京)技术服务有限公司 | A kind of method and system adding up Internet user's behavior |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107577783A (en) * | 2017-09-15 | 2018-01-12 | 电子科技大学 | The type of webpage automatic identifying method excavated based on Web architectural features |
CN108023779A (en) * | 2017-12-20 | 2018-05-11 | 杭州云屏科技有限公司 | A kind of method and system based on network traffic analysis user behavior |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MacFeely | The big (data) bang: Opportunities and challenges for compiling SDG indicators | |
Ocheja et al. | Managing lifelong learning records through blockchain | |
US11475437B2 (en) | Method and apparatus for managing subject data based on block chain | |
US10454918B1 (en) | Method for SSO service using PKI based on blockchain networks, and device and server using the same | |
CN104766014B (en) | For detecting the method and system of malice network address | |
Malandrino et al. | Privacy awareness about information leakage: Who knows what about me? | |
JP5368515B2 (en) | Advertising method and advertising system | |
Preibusch et al. | Shopping for privacy: Purchase details leaked to PayPal | |
US20180020005A1 (en) | Providing selective access to resources | |
CA3073714C (en) | Method and system for identifying potential fraud activity in a tax return preparation system to trigger an identity verification challenge through the tax return preparation system | |
CN101482882A (en) | Method and system for cross-domain treatment of COOKIE | |
US11087334B1 (en) | Method and system for identifying potential fraud activity in a tax return preparation system, at least partially based on data entry characteristics of tax return content | |
CN109450879A (en) | User access activity monitoring method, electronic device and computer readable storage medium | |
CN102868712B (en) | Method and system for data transmission | |
CN111815420B (en) | Matching method, device and equipment based on trusted asset data | |
CN102567821A (en) | Book management system based on network | |
WO2020047116A1 (en) | Techniques for data access control utilizing blockchains | |
US20140279578A1 (en) | Rights management for content aggregators | |
CN106878438A (en) | The method and system of user behavior analysis under a kind of https environment | |
CN113285936B (en) | Cross-domain data acquisition method and related device | |
CN109726187A (en) | A kind of adaptive authority control method and device towards Hadoop | |
US11928243B2 (en) | System and method of detecting hacking activities during the interaction of users with banking services | |
Al-Fayad | The European Union’s GDPR and Its Effect on Data-Driven Marketing Strategies | |
CN112633715A (en) | Method for analyzing loss of online service user | |
JP2009064220A (en) | Method and system for permitting access to web site for disclosing related information of printed matter, only to owner of printed matter |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170620 |
|
RJ01 | Rejection of invention patent application after publication |