CN108052543A - A kind of similar account detection method of microblogging based on map analysis cluster - Google Patents

A kind of similar account detection method of microblogging based on map analysis cluster Download PDF

Info

Publication number
CN108052543A
CN108052543A CN201711181758.XA CN201711181758A CN108052543A CN 108052543 A CN108052543 A CN 108052543A CN 201711181758 A CN201711181758 A CN 201711181758A CN 108052543 A CN108052543 A CN 108052543A
Authority
CN
China
Prior art keywords
user
similarity
information
sim
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711181758.XA
Other languages
Chinese (zh)
Other versions
CN108052543B (en
Inventor
姜伟
田原
庄俊玺
吴贤达
潘邵芹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN201711181758.XA priority Critical patent/CN108052543B/en
Publication of CN108052543A publication Critical patent/CN108052543A/en
Application granted granted Critical
Publication of CN108052543B publication Critical patent/CN108052543B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/23Clustering techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Abstract

The invention discloses a kind of similar account detection method of microblogging based on map analysis cluster and multidimensional similarity calculation, particular content includes:S1. malice account identification problem is converted into user's similarity calculation problem;S2. user information is calculated into structure digraph by scheming;S3. using map analysis algorithm to user clustering;S4. consistency weight d, the user for filtering Sparse are introduced;S5. MDUS algorithms are introduced, similarity is calculated based on various dimensions information;S6. each dimensionality weight is calculated using analytic hierarchy process (AHP), obtains Weighted Similarity;S7. reptile obtains m user data, is tested in spark, inputs target user's information, obtains similar account set as suspicious malice account, the accuracy rate of MDUS algorithms is up to 80%.This method will be based on map analysis cluster and multidimensional similarity calculation is combined, and realizes the account number that quickly notes abnormalities, to safeguarding that social network sites stabilization has great importance.

Description

A kind of similar account detection method of microblogging based on map analysis cluster
Technical field
The invention belongs to information technology fields, and in particular to a kind of micro- based on map analysis cluster and multidimensional similarity calculation Win similar account detection method.It realizes the similar account of quick discovery microblogging, perceives malice group behavior, effectively identify network navy Or reincarnation account, have great importance to social networks improvement.
Background technology
At present, the analytical technology of social networks is becoming the hot spot and trend of network technology research, academia and industry Boundary proposes numerous studies scheme, including analysis user characteristics, user behavior pattern and network structure, pacifies for social networks Entirely, privacy of user protection, network colony event monitoring etc. have important value.Domestic and international many universities and research institution are all herein Field expands further investigation, external such as University of California Berkeley, Carnegie Mellon University;It is and Microsoft Research, clear The units such as Hua Da, Peking University are the representatives of studies in China, some important achievements in research repeatedly appear in S&P, CCS, On the top-level meeting and periodical of the international information-securities such as USS, KDD, AAAI field and Data Mining, wherein there is hundreds of It is related to social networks safety problem, the academic research more than thousand is related with social network user similitude.In current network There are a collection of account numbers, they are concentrated in a certain period of time, carry out substantial amounts of malicious act.These account numbers may be attacker's wound The a large amount of false account numbers built and the account number usurped, this kind of account should find and handle as early as possible, prevent to social network sites and user Privacy causes security risk.However the manual examination and verification stage is remained in for the main monitoring means of this kind of account at present, therefore, A kind of method for quickly detecting similar account number is conducive to efficiently safeguard the stability and security of social network space.
The content of the invention
The invention discloses a kind of similar accounts of microblogging calculated based on Spark Graph X map analysis clusters and various dimensions Detection method carries out graphX map analysis clusters based on user basic information and behavioural characteristic, passes through MDUS in respective classes (calculating similarity based on user's various dimensions information) algorithm, obtains similar account number sequence.Particular content includes:
S1. since the malice account number of batch has the similitude of height, the identification problem of malice account is converted into user Similarity calculation problem obtains similar account set by similarity calculation, chooses topN (N can choose 3,5,10 etc.) and makees For suspicious malice account, be conducive to network administrator and examined;
S2. microblog users information by large-scale parallel figure is calculated and carries out user's portrait, drawn a portrait including customer relationship It draws a portrait with user behavior, builds user's concern relation digraph and microblogging forwarding relation digraph respectively;
S3. using digraph as data source, using Spark GraphX map analysis algorithm Connected Components, It is connected based on the user in network to user clustering, it is generally recognized that it is divided into the similarity that a kind of user has bigger, therefore, Data set to be tested will be used as in of a sort user with target user, so as to reduce answering for similarity calculation between mass users Polygamy;
S4. consistency weight d is introduced, considers the bean vermicelli number m of user1, concern number m2And hair microblogging number m3With the user The average value n of all users in the classification of placeiThe ratio between (i=1,2,3), by formulaObtain consistency weight d, mistake It filters the user of Sparse (d < α), solves caused by microblog users Deta sparseness that accuracy rate of testing result is not high to ask Topic;
S5. after the user for filtering out Sparse, calculate in target user u and place classification between other users u ' Similarity Sim (u, u '), the calculating of similarity introduces MDUS algorithms, i.e., calculates similarity based on user's various dimensions information, will Microblog users information is divided into four dimensions, and background information, blog article information, bean vermicelli concern information, comment forwarding information use respectively Editing distance, tf-idf, LDA, cosine similarity algorithm calculate similarity;
S6. total similarity is calculated by the following formula
Sim (u, u ')=
w1Simbackgroud(u, u ')+w2Simtext(u, u ')+w3Simfang(u, u ')+w4Simtweet(u, u '), wherein w1+ w2+w3+w4=1, and w1, w2, w3, w4Value drawn by the layer discrimination matrix computations in analytic hierarchy process (AHP), finally by formula Calculate Weighted Similarity.
S7. choose n (n > 500) and organize k (k > 100) the name beans vermicelli of the well-known user of Sina as similarity threshold training set, The similarity Sim (u, u ') between account is calculated, and calculates the average value of each group of Sim (u, u ')And standard deviation sigma, by formulaObtain similarity threshold μ;
S8. m (m are obtained by reptile>100000) name microblog users data, are tested on spark, and input target is used Family (u) information verifies the accuracy of MDUS algorithms.Inspection result is arranged according to the numerical values recited of similarity, similar account For topN (N can use 3,5,10 etc.) in set as suspicious malice account, Detection accuracy reaches maximum in N=5.
Description of the drawings
Fig. 1 is the calculating process of MDUS algorithms;
Fig. 2 is holistic approach frame;
Specific embodiment
The similar account detection method of microblogging based on map analysis cluster and multidimensional information similarity calculation
S1. m (m are obtained at random by reptile>100000) name microblog users data are as initial data set, including user's Background information, blog article information, bean vermicelli, concern information and comment, forwarding information;
S2. tested in spark platforms, the information of input target user (u) passes through large-scale together with m users Parallel map analysis carries out user's portrait, draws a portrait including customer relationship and user behavior is drawn a portrait, and is respectively that each user builds pass Note relation digraph and microblogging forwarding relation digraph;
S3. using digraph as data source, using Spark GraphX map analysis algorithm Connected Components, User is clustered based on user's connection in network, it is generally recognized that it is divided into the similarity that a kind of user has bigger, Therefore, testing data collection will be used as in of a sort all users with target user u, so as to reduce similarity between mass users The complexity of calculating;
S4. the consistency weight d that testing data concentrates each user is calculated, considers the bean vermicelli number m of user1, concern number m2 And hair microblogging number m3With the average value n of all users in the categoryiThe ratio between (i=1,2,3), by formulaIt obtains Consistency weight d, filters out Sparse (d<α, through cross validation, α=0.5) user, solve microblog users Sparse The problem of accuracy rate of testing result caused by property is not high;S5. after the user for filtering out Sparse, respectively using editor away from From, tf-idf, LDA, cosine similarity algorithm calculate user u and testing data and concentrate background information between each user u ', win Literary information, bean vermicelli concern information, the similarity Sim for commenting on forwarding information four dimensionsbackgroud(u, u '), Simtext(u, U '), Simfans(u, u '), Simtweet(u, u ');
S6. total similarity is calculated by the following formula
Sim (u, u ')=
w1Simbackgroud(u, u ')+w2Simtext(u, u ')+w3Simfans(u, u ')+w4Simtweet(u, u '), wherein w1+ w2+w3+w4- 1, and w1, w2, w3, w4Value drawn by the layer discrimination matrix computations in analytic hierarchy process (AHP), due to the back of the body of user Scape information is smaller including mailbox, real-name authentication role when calculating similarity, therefore is assigned to relatively low weights, conversely, Microblogging text message is assigned to higher weights;
S7. using MDUS algorithms, similarity is calculated based on various dimensions information, user u and testing data are obtained with reference to weights Concentrate the Weighted Similarity between each user u ';
S8. through Spark Distributed Calculations, obtain the similar account set of target user u, according to similarity numerical value by greatly to It is small to be arranged, during due to similarity threshold μ=0.25, rate of accuracy reached to peak, therefore μ=0.25 is chosen, if similarity Numerical value is more than similarity threshold, then labeled as similar account number.TopN (N can use 3,5,10 etc.) in set is as suspicious malice Account, Detection accuracy reach maximum in N=5, therefore choose top5 as testing result, rate of accuracy reached to 80%.

Claims (1)

1. a kind of similar account number detection method of microblogging based on map analysis cluster, it is characterised in that:
S1. since the malice account number of batch has the similitude of height, it is similar that the identification problem of malice account is converted into user Computational problem is spent, similar account set is obtained by similarity calculation, chooses topN as suspicious malice account;
S2. microblog users information is subjected to user's portrait by scheming to calculate parallel, is drawn including customer relationship portrait and user behavior Picture, customer relationship portrait include concern, are concerned information, and behavior portrait includes comment, forwarding information, builds user's concern respectively Relation digraph and microblogging forwarding relation digraph;
S3. using Spark GraphX map analysis algorithm Connected Components, based on user's connection pair in network User clustering, it is generally recognized that be divided into the similarity that a kind of user has bigger, therefore, with target user in of a sort use Family will be used as data set to be tested, so as to reduce the complexity of similarity calculation between mass users;;
S4. consistency weight d is introduced, considers bean vermicelli number m1, concern number m2 and the hair microblogging number m3 of user and the user place The average value n of all users in classificationiThe ratio between, wherein i=1,2,3, by formulaObtain consistency weight d, mistake Filter the Sparse i.e. user of d < 0.5;
S5. it is similar between calculating target user u and other users u ' in the classification of place after the user for filtering out Sparse Degree Sim (u, u '), the calculating of similarity introduces MDUS algorithms, i.e., similarity is calculated based on user's various dimensions information, by microblogging User information is divided into four dimensions, background information, blog article information, bean vermicelli concern information, comment forwarding information, respectively using editor Distance, tf-idf, LDA, cosine similarity algorithm calculate similarity;
S6. total similarity is calculated by the following formula
Sim (u, u ')=w1Simbaokgroud(u, u ')+W2Simtext(u, u ')+W3Simfan3(u, u ')+W4Simtweet(u, u '),
Wherein w1+w2+w3+w4=1, and w1, w2, w3, w4Value drawn by the layer discrimination matrix computations in analytic hierarchy process (AHP), Weighted Similarity is finally calculated by formula;Wherein w1, w2, w3, w4Respectively background information, blog article information, bean vermicelli concern information, Comment on the similarity weights of forwarding information;
S7. the k name beans vermicelli of the n groups well-known user of Sina are collected as similarity threshold training set, calculate the similarity between account Sim (u, u '), and calculate the average value of each group of Sim (u, u ')And standard deviation sigma, by formulaObtain similitude Threshold value μ;
S8. m microblog users data are obtained by reptile, inputs target user (u) information, if similarity numerical value is more than similitude Threshold value μ, then labeled as suspicious malice account number.
CN201711181758.XA 2017-11-23 2017-11-23 Microblog similar account detection method based on graph analysis clustering Active CN108052543B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711181758.XA CN108052543B (en) 2017-11-23 2017-11-23 Microblog similar account detection method based on graph analysis clustering

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711181758.XA CN108052543B (en) 2017-11-23 2017-11-23 Microblog similar account detection method based on graph analysis clustering

Publications (2)

Publication Number Publication Date
CN108052543A true CN108052543A (en) 2018-05-18
CN108052543B CN108052543B (en) 2021-02-26

Family

ID=62120388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711181758.XA Active CN108052543B (en) 2017-11-23 2017-11-23 Microblog similar account detection method based on graph analysis clustering

Country Status (1)

Country Link
CN (1) CN108052543B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108876644A (en) * 2018-05-24 2018-11-23 微梦创科网络科技(中国)有限公司 A kind of similar account calculation method and device based on social networks
CN108898505A (en) * 2018-05-28 2018-11-27 武汉斗鱼网络科技有限公司 Recognition methods, corresponding medium and the electronic equipment of cheating clique
CN109040447A (en) * 2018-08-01 2018-12-18 武汉斗鱼网络科技有限公司 A kind of recognition methods, device, server and the storage medium of mobile phone wall
CN109460930A (en) * 2018-11-15 2019-03-12 武汉斗鱼网络科技有限公司 A kind of method and relevant device of determining adventure account
CN109587248A (en) * 2018-12-06 2019-04-05 腾讯科技(深圳)有限公司 User identification method, device, server and storage medium
CN109587523A (en) * 2018-11-30 2019-04-05 武汉斗鱼网络科技有限公司 A kind of recognition methods of false concern and relevant device
CN110598157A (en) * 2019-09-20 2019-12-20 北京字节跳动网络技术有限公司 Target information identification method, device, equipment and storage medium
CN110633734A (en) * 2019-08-22 2019-12-31 成都信息工程大学 Method for anomaly detection based on graph theory correlation theory
CN110876072A (en) * 2018-08-31 2020-03-10 武汉斗鱼网络科技有限公司 Batch registered user identification method, storage medium, electronic device and system
CN111047332A (en) * 2019-11-13 2020-04-21 支付宝(杭州)信息技术有限公司 Model training and risk identification method, device and equipment
CN112016934A (en) * 2019-05-31 2020-12-01 慧安金科(北京)科技有限公司 Method, apparatus, and computer-readable storage medium for detecting abnormal data
CN112100220A (en) * 2020-09-22 2020-12-18 福建天晴在线互动科技有限公司 System for realizing real-time monitoring of illegal account group
CN112148947A (en) * 2020-09-28 2020-12-29 微梦创科网络科技(中国)有限公司 Method and system for mining and reviewing users in batches
CN112800304A (en) * 2021-01-08 2021-05-14 上海海事大学 Microblog water army group detection method based on clustering
CN113378899A (en) * 2021-05-28 2021-09-10 百果园技术(新加坡)有限公司 Abnormal account identification method, device, equipment and storage medium
CN113806616A (en) * 2021-08-16 2021-12-17 北京智慧星光信息技术有限公司 Microblog user identification method, system, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101571870A (en) * 2009-06-09 2009-11-04 北京航空航天大学 User interest modeling method based on conceptual clustering
CN103118043A (en) * 2011-11-16 2013-05-22 阿里巴巴集团控股有限公司 Identification method and equipment of user account
US20130317910A1 (en) * 2012-05-23 2013-11-28 Vufind, Inc. Systems and Methods for Contextual Recommendations and Predicting User Intent
CN103905532A (en) * 2014-03-13 2014-07-02 微梦创科网络科技(中国)有限公司 Microblog marketing account recognition method and system
CN103942489A (en) * 2014-03-31 2014-07-23 中国科学院信息工程研究所 Attack detection method and system on basis of cursor hidden scene
CN105376210A (en) * 2014-12-08 2016-03-02 哈尔滨安天科技股份有限公司 Account threat identification and defense method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101571870A (en) * 2009-06-09 2009-11-04 北京航空航天大学 User interest modeling method based on conceptual clustering
CN103118043A (en) * 2011-11-16 2013-05-22 阿里巴巴集团控股有限公司 Identification method and equipment of user account
US20130317910A1 (en) * 2012-05-23 2013-11-28 Vufind, Inc. Systems and Methods for Contextual Recommendations and Predicting User Intent
CN103905532A (en) * 2014-03-13 2014-07-02 微梦创科网络科技(中国)有限公司 Microblog marketing account recognition method and system
CN103942489A (en) * 2014-03-31 2014-07-23 中国科学院信息工程研究所 Attack detection method and system on basis of cursor hidden scene
CN105376210A (en) * 2014-12-08 2016-03-02 哈尔滨安天科技股份有限公司 Account threat identification and defense method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
庄俊玺 等: "一种可信网络身份鉴别方案", 《北京工业大学学报》 *

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108876644B (en) * 2018-05-24 2022-02-22 微梦创科网络科技(中国)有限公司 Similar account calculation method and device based on social network
CN108876644A (en) * 2018-05-24 2018-11-23 微梦创科网络科技(中国)有限公司 A kind of similar account calculation method and device based on social networks
CN108898505A (en) * 2018-05-28 2018-11-27 武汉斗鱼网络科技有限公司 Recognition methods, corresponding medium and the electronic equipment of cheating clique
CN109040447A (en) * 2018-08-01 2018-12-18 武汉斗鱼网络科技有限公司 A kind of recognition methods, device, server and the storage medium of mobile phone wall
CN110876072B (en) * 2018-08-31 2022-02-08 武汉斗鱼网络科技有限公司 Batch registered user identification method, storage medium, electronic device and system
CN110876072A (en) * 2018-08-31 2020-03-10 武汉斗鱼网络科技有限公司 Batch registered user identification method, storage medium, electronic device and system
CN109460930A (en) * 2018-11-15 2019-03-12 武汉斗鱼网络科技有限公司 A kind of method and relevant device of determining adventure account
CN109460930B (en) * 2018-11-15 2021-11-26 武汉斗鱼网络科技有限公司 Method for determining risk account and related equipment
CN109587523A (en) * 2018-11-30 2019-04-05 武汉斗鱼网络科技有限公司 A kind of recognition methods of false concern and relevant device
CN109587523B (en) * 2018-11-30 2021-05-28 武汉斗鱼网络科技有限公司 False attention identification method and related equipment
CN109587248A (en) * 2018-12-06 2019-04-05 腾讯科技(深圳)有限公司 User identification method, device, server and storage medium
CN109587248B (en) * 2018-12-06 2023-08-29 腾讯科技(深圳)有限公司 User identification method, device, server and storage medium
CN112016934A (en) * 2019-05-31 2020-12-01 慧安金科(北京)科技有限公司 Method, apparatus, and computer-readable storage medium for detecting abnormal data
CN112016934B (en) * 2019-05-31 2023-12-29 慧安金科(北京)科技有限公司 Method, apparatus and computer readable storage medium for detecting abnormal data
CN110633734B (en) * 2019-08-22 2022-08-19 成都信息工程大学 Method for anomaly detection based on graph theory correlation theory
CN110633734A (en) * 2019-08-22 2019-12-31 成都信息工程大学 Method for anomaly detection based on graph theory correlation theory
CN110598157A (en) * 2019-09-20 2019-12-20 北京字节跳动网络技术有限公司 Target information identification method, device, equipment and storage medium
CN110598157B (en) * 2019-09-20 2023-01-03 北京字节跳动网络技术有限公司 Target information identification method, device, equipment and storage medium
CN111047332A (en) * 2019-11-13 2020-04-21 支付宝(杭州)信息技术有限公司 Model training and risk identification method, device and equipment
CN112100220B (en) * 2020-09-22 2022-06-21 福建天晴在线互动科技有限公司 System for realizing real-time monitoring of illegal account group
CN112100220A (en) * 2020-09-22 2020-12-18 福建天晴在线互动科技有限公司 System for realizing real-time monitoring of illegal account group
CN112148947A (en) * 2020-09-28 2020-12-29 微梦创科网络科技(中国)有限公司 Method and system for mining and reviewing users in batches
CN112148947B (en) * 2020-09-28 2024-03-22 微梦创科网络科技(中国)有限公司 Method and system for excavating and brushing users in batches
CN112800304A (en) * 2021-01-08 2021-05-14 上海海事大学 Microblog water army group detection method based on clustering
CN113378899A (en) * 2021-05-28 2021-09-10 百果园技术(新加坡)有限公司 Abnormal account identification method, device, equipment and storage medium
CN113806616A (en) * 2021-08-16 2021-12-17 北京智慧星光信息技术有限公司 Microblog user identification method, system, electronic equipment and storage medium
CN113806616B (en) * 2021-08-16 2023-08-22 北京智慧星光信息技术有限公司 Microblog user identification method, system, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN108052543B (en) 2021-02-26

Similar Documents

Publication Publication Date Title
CN108052543A (en) A kind of similar account detection method of microblogging based on map analysis cluster
Ritter et al. Weakly supervised extraction of computer security events from twitter
CN106845265B (en) Document security level automatic identification method
US9870465B1 (en) Apparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
Nizamani et al. Detection of fraudulent emails by employing advanced feature abundance
CN104899508B (en) A kind of multistage detection method for phishing site and system
Wu et al. Social spammer and spam message co-detection in microblogging with social context regularization
US9563770B2 (en) Spammer group extraction apparatus and method
Khan et al. Segregating spammers and unsolicited bloggers from genuine experts on twitter
CN108170692A (en) A kind of focus incident information processing method and device
Zafarani et al. 10 bits of surprise: Detecting malicious users with minimum information
EP3201782B1 (en) Protected indexing and querying of large sets of textual data
CN110134876B (en) Network space population event sensing and detecting method based on crowd sensing sensor
Riadi et al. Log analysis techniques using clustering in network forensics
CN108197474A (en) The classification of mobile terminal application and detection method
CN102324007A (en) Method for detecting abnormality based on data mining
Stuessy et al. The importance of comprehensive phylogenetic (evolutionary) classification—a response to S chmidt‐L ebuhn's commentary on paraphyletic taxa
Sarode et al. Audit and Analysis of Impostors: An experimental approach to detect fake profile in online social network
Yu et al. A hybrid web log based intrusion detection model
Kaja et al. A two stage intrusion detection intelligent system
CN109558555A (en) Microblog water army detection method and detection system based on artificial immunity danger theory
Raihan et al. Human behavior analysis using association rule mining techniques
CN105069158B (en) Data digging method and system
Kozik et al. Packets tokenization methods for web layer cyber security
WO2015074493A1 (en) Method and apparatus for filtering out low-frequency click, computer program, and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant