CN110381063A - A kind of method and device of determining cheating flow - Google Patents

A kind of method and device of determining cheating flow Download PDF

Info

Publication number
CN110381063A
CN110381063A CN201910662477.9A CN201910662477A CN110381063A CN 110381063 A CN110381063 A CN 110381063A CN 201910662477 A CN201910662477 A CN 201910662477A CN 110381063 A CN110381063 A CN 110381063A
Authority
CN
China
Prior art keywords
click
clicked
location coordinate
coordinate
target resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910662477.9A
Other languages
Chinese (zh)
Inventor
刘骎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Miaozhen Information Technology Co Ltd
Miaozhen Systems Information Technology Co Ltd
Original Assignee
Miaozhen Systems Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Miaozhen Systems Information Technology Co Ltd filed Critical Miaozhen Systems Information Technology Co Ltd
Priority to CN201910662477.9A priority Critical patent/CN110381063A/en
Publication of CN110381063A publication Critical patent/CN110381063A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

This application involves Internet technical field more particularly to a kind of method and devices of determining cheating flow.The application clicks the corresponding user behavior data of target resource by obtaining, it can determine click location coordinate when target resource is clicked every time, and then by detecting whether that there are the identical click location coordinates of coordinate in repeatedly clicking corresponding click location coordinate, and cheating flow is determined according to the identical click location coordinate of coordinate.Using aforesaid way, existing coordinate identical click location coordinate when being clicked by the target resource detected, it can determine that corresponding click of the identical click location coordinate of the coordinate is improper click, and then can efficiently and accurately identify cheating flow.

Description

A kind of method and device of determining cheating flow
Technical field
This application involves Internet technical field more particularly to a kind of method and devices of determining cheating flow.
Background technique
In internet area, flow of practising fraud refers to exposure improper to Internet resources, clicks generated flow, to work The identification work of disadvantage flow is known as anti-cheating.
Current anti-cheating mode is normally based on click to user or exposure behavior is monitored, if discovery click or Exposure behavior meets certain rule, then again to the user for clicking or exposing behavior carries out IP address, Cookie (is stored in user's sheet Data in ground terminal) etc. dimensions investigation, determine the part behavior generate flow whether be cheating flow.
But in practice, since cheating user can be by the cookie of removing browser, or use the hand of Agent IP Section is avoided monitoring, and there is the case where many cheating flows can not be identified.Therefore, a kind of more effective, accurate determine is made The mode of disadvantage flow becomes current urgent problem to be solved.
Summary of the invention
In view of this, a kind of method and device for being designed to provide determining cheating flow of the embodiment of the present application, it can be with Efficiently and accurately identify cheating flow.
The application mainly includes the following aspects:
In a first aspect, the embodiment of the present application provides a kind of method of determining cheating flow, which comprises
Target resource is obtained when being repeatedly clicked, clicks corresponding user behavior data every time;
According to the user behavior data, the click location coordinate when target resource is clicked every time is determined;
Detection is repeatedly clicked in corresponding click location coordinate, if there are the identical click location coordinates of coordinate;
If it exists, then the identical click location coordinate of coordinate is determined as target location coordinate;
According to the target location coordinate, cheating flow is determined.
In a kind of possible embodiment, the user behavior data is obtained according to following steps:
It disposes to click for the target resource and monitors script;
Monitor whether target resource described in script monitor is clicked based on the click;
When listening to the target resource and being clicked, obtains this time and click the corresponding user behavior data.
It is described according to the user behavior data in a kind of possible embodiment, determine that the target resource is each Click location coordinate when being clicked, comprising:
When identifying that the target resource is clicked from user behavior data, the page of the page where the target resource Size, and click the relative position coordinates relative to the page;
According to the mapping relations between the page size and pre-set dimension, the relative position coordinates are converted into click Position coordinates.
It is described according to the target location coordinate in a kind of possible embodiment, determine cheating flow, comprising:
According to the user behavior data, the first number of clicks and the mesh that the target resource is clicked are counted Corresponding second number of clicks of cursor position coordinate;
It determines the ratio between second number of clicks and first number of clicks, and judges whether the ratio is big In or equal to preset threshold;
If the ratio is greater than or equal to the preset threshold, determine that click corresponding with the target location coordinate is produced Raw flow is cheating flow.
In a kind of possible embodiment, described according to the target location coordinate, after determining cheating flow, institute State method further include:
According to the user behavior data corresponding with the target location coordinate, the access of the cheating flow is determined Source, and the click behavior of the access originator is intercepted.
Second aspect, the embodiment of the present application also provide a kind of device of determining cheating flow, and described device includes:
Module is obtained, for obtaining target resource when being repeatedly clicked, clicks corresponding user behavior data every time;
First determining module, for determining when the target resource is clicked every time according to the user behavior data Click location coordinate;
Detection module is repeatedly clicked in corresponding click location coordinate, if it is identical that there are coordinates for detecting Click location coordinate;If it exists, then the identical click location coordinate of coordinate is determined as target location coordinate;
Second determining module, for determining cheating flow according to the target location coordinate.
In a kind of possible embodiment, the acquisition module, for obtaining the user behavior according to following steps Data:
It disposes to click for the target resource and monitors script;
Monitor whether target resource described in script monitor is clicked based on the click;
When listening to the target resource and being clicked, obtains this time and click the corresponding user behavior data.
In a kind of possible embodiment, first determining module, for determining the target according to following steps Click location coordinate when resource is clicked every time:
When identifying that the target resource is clicked from user behavior data, the page of the page where the target resource Size, and click the relative position coordinates relative to the page;
According to the mapping relations between the page size and pre-set dimension, the relative position coordinates are converted into click Position coordinates.
In a kind of possible embodiment, second determining module includes:
Statistic unit, for counting the first click time that the target resource is clicked according to the user behavior data Number and corresponding second number of clicks of the target location coordinate;
Judging unit for determining the ratio between second number of clicks and first number of clicks, and judges Whether the ratio is greater than or equal to preset threshold;
Determination unit, if being greater than or equal to the preset threshold, the determining and target location coordinate for the ratio Flow caused by corresponding click is cheating flow.
In a kind of possible embodiment, described device further include:
Third determining module, for determining institute according to the user behavior data corresponding with the target location coordinate The access originator of cheating flow is stated, and the click behavior of the access originator is intercepted.
The third aspect, the embodiment of the present application also provide a kind of electronic equipment, comprising: processor, memory and bus, it is described Memory is stored with the executable machine readable instructions of the processor, when electronic equipment operation, the processor with it is described It is communicated between memory by the bus, the machine readable instructions execute above-mentioned first when being run by the processor Really the step of method of disadvantage flow is set in aspect or first aspect described in any possible embodiment.
Fourth aspect, it is described computer-readable to deposit the embodiment of the present application also provides a kind of computer readable storage medium Computer program is stored on storage media, the computer program executes above-mentioned first aspect or first party when being run by processor Really the step of method of disadvantage flow is set in face described in any possible embodiment.
In the embodiment of the present application, the corresponding user behavior data of target resource is clicked by obtaining, can determine target Click location coordinate when resource is clicked every time, and then by being detected in repeatedly clicking corresponding click location coordinate It whether there is the identical click location coordinate of coordinate out, and cheating flow determined according to the identical click location coordinate of coordinate.It adopts In fashion described above, the identical click location coordinate of existing coordinate, can determine when being clicked by the target resource detected Corresponding click of the identical click location coordinate of the coordinate is improper click out, and then can efficiently and accurately identify work Disadvantage flow.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows a kind of flow chart of the method for determining cheating flow provided by the embodiment of the present application one;
Fig. 2 shows provided by the embodiment of the present application two it is a kind of it is determining cheating flow device functional block diagram it One;
Fig. 3 show provided by the embodiment of the present application two it is a kind of it is determining cheating flow device functional block diagram it Two;
Fig. 4 shows the structural schematic diagram of a kind of electronic equipment provided by the embodiment of the present application three.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it should be understood that attached in the application Figure only plays the purpose of illustration and description, is not used to limit the protection scope of the application.In addition, it will be appreciated that schematical Attached drawing does not press scale.Process used herein is shown according to some embodiments of the present application realization It clicks.It should be appreciated that the click of flow chart can be realized out of order, the step of context relation of logic can not inverted Sequence is implemented simultaneously.In addition, those skilled in the art under the guide of teachings herein, can add one to flow chart Or other multiple clicks, one or more clicks can also be removed from flow chart.
In addition, described embodiments are only a part of embodiments of the present application, instead of all the embodiments.Usually exist The component of the embodiment of the present application described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, is not intended to limit claimed the application's to the detailed description of the embodiments herein provided in the accompanying drawings below Range, but it is merely representative of the selected embodiment of the application.Based on embodiments herein, those skilled in the art are not being done Whole other embodiments obtained under the premise of creative work out, shall fall in the protection scope of this application.
In order to enable those skilled in the art are able to use teachings herein, in conjunction with specific application scene " identification resource quilt Whether the flow generated when click is cheating flow ", following implementation is provided, to those skilled in the art, not In the case where being detached from spirit and scope, the General Principle defined here can be applied to other embodiments and application Scene.
The embodiment of the present application following methods, device, electronic equipment or computer readable storage medium can be applied to any Need to be determined the scene of cheating flow, the embodiment of the present application is not restricted specific application scenarios, any to use this Apply for that embodiment provides the scheme for the method and device for being set for disadvantage flow really in the application protection scope.
It is worth noting that, anti-cheating mode is normally based on to user's in existing scheme before the application proposition It clicks or exposes behavior and be monitored, if discovery is clicked or exposure behavior meets certain rule, then to click or exposure behavior User carry out the investigation of IP address, the dimensions such as Cookie (being stored in the data on user local terminal), determine the part row It whether is cheating flow for the flow of generation.But in practice, due to cheating user can by remove browser cookie, Or avoid monitoring using the means of Agent IP, there is the case where many cheating flows can not be identified.
It, can be in view of the above-mentioned problems, the embodiment of the present application clicks the corresponding user behavior data of target resource by obtaining Determine click location coordinate when target resource is clicked every time, and then by repeatedly clicking corresponding click location It detects whether that there are the identical click location coordinates of coordinate in coordinate, and is determined and made according to the identical click location coordinate of coordinate Disadvantage flow.Using aforesaid way, existing coordinate identical click location coordinate when being clicked by the target resource detected, It can determine that corresponding click of the identical click location coordinate of the coordinate is improper click, and then can be efficiently and accurately Identify cheating flow.
It should be noted that resource can be launched to user using during service in user in internet area, than Such as, user launches resource to user during using terminal is applied, and is installed by the click of user, exposure, downloading It can produce flow with behaviors such as activation.But for some purposes, exist and forge flow by the way of cheating and (referred to as make Disadvantage flow) the case where, and these flows forged can not embody bid value, thus, it is recognized accurately and practises fraud to this part Flow is just particularly important.
It should also be noted that, machine cheating, which refers to, forges user, and exposure, the click of analog subscriber by cheating machine Equal behaviors, around the anti-fraudulent means for distinguishing cheating with user's dimension.
To be carried out combined with specific embodiments below to technical solution provided by the present application detailed convenient for understanding the application It describes in detail bright.
Embodiment one
Referring to Fig. 1, executing the equipment for determining the method for cheating flow can be the monitoring platform or server of click behavior. Fig. 1 is a kind of flow chart of the method for determining cheating flow provided by the embodiment of the present application one.It is below point from executing subject The angle for hitting the monitoring platform of behavior is illustrated the method that cheating flow is determined provided by the embodiment of the present application.Such as Fig. 1 It is shown, the method for determining cheating flow provided by the embodiments of the present application, comprising the following steps:
S101: target resource is obtained when being repeatedly clicked, clicks corresponding user behavior data every time.
In specific implementation, when monitoring that target resource is clicked every time, corresponding user behavior is clicked in acquisition every time Data.Here, target resource can be one kind, be also possible to multiple resources, resource such as video, audio, advertisement, shopping network It stands, webpage etc..User behavior data may include the mark of pointing device, the IP address of pointing device, pointing device correspondence Browsing record (such as Cookie), target resource correspond to when being clicked screen, correspondence window, corresponding button multiple coordinates Deng.
It should be noted that can all correspond to generation flow when target resource is clicked every time, user behavior also can be all generated Data.
S102: according to the user behavior data, the click location coordinate when target resource is clicked every time is determined.
In specific implementation, when getting target resource and being clicked, after corresponding user behavior data, can pass through User behavior data is parsed, when obtaining target resource and being clicked, click location corresponding screen, corresponding window, The position of corresponding button, and then calculate according to above-mentioned position click location coordinate when target resource is clicked.
S103: detection is repeatedly clicked in corresponding click location coordinate, if there are the identical click locations of coordinate Coordinate.
In specific implementation, it can obtain within a preset period of time according to actual needs corresponding when target resource is clicked User behavior data, also available historical user's behavioral data, i.e. user behavior data can be obtained according to actual needs It takes.After getting user behavior data, when determining that target resource is repeatedly clicked according to these user behavior datas pair The multiple click location coordinates answered further judge corresponding multiple click location coordinates when target resource is repeatedly clicked In, if there are the identical click location coordinates of coordinate.
It should be noted that under normal conditions, corresponding position coordinates may be only when by mouse click target resource A pixel is only taken up, so it is the same position that multiple ordinary users, which click corresponding click location coordinate when target resource, Probability it is very negligible, even the same ordinary user when repeatedly clicking target resource corresponding click location coordinate also have Institute is different, but in practice, by the click of apparatus control, it is possible to there is corresponding click position when repeatedly clicking target resource The identical situation of coordinate is set, i.e., in such a way that machine is practised fraud, it is entirely possible to exist corresponding when repeatedly clicking target resource The identical situation of click location coordinate.Therefore, the application is for above-mentioned consideration, corresponding click position when being clicked to target resource It sets coordinate to be monitored, can determine to whether there is the identical click location coordinate of coordinate when repeatedly clicking target resource, And then the case where can rapidly, accurately judging with the presence or absence of machine cheating.
S104: if it exists, then the identical click location coordinate of coordinate is determined as target location coordinate.
In specific implementation, if there is seat when target resource is repeatedly clicked in corresponding multiple click location coordinates Identical click location coordinate is marked, then the click location coordinate of identical coordinate is determined as target location coordinate.In this way, can be with Tentatively judge that click location may be by machine cheating mode for the corresponding click behavior of the target location coordinate and carry out a little It hits, rather than what ordinary user was clicked.
Here, target location coordinate can be one or more, simply by the presence of the identical click location coordinate of coordinate, just will The identical click location coordinate of coordinate is determined as target location coordinate.
In one example, if when 5 click target resources corresponding 5 click location coordinates be respectively (0.10,0.12), (0.20,0.22), (0.10,0.12), (0.30,0.12), (0.10,0.12) exist corresponding when 3 click target resources Click location coordinate is identical, is (0.10,0.12), then (0.10,0.12) coordinate is determined as target location coordinate.
S105: according to the target location coordinate, cheating flow is determined.
In specific implementation, determining when target resource is clicked exist in corresponding multiple click location coordinates After the identical target location coordinate of coordinate, it can determine that the corresponding click behavior of the target location coordinate may be using machine The behavior that device cheating mode is clicked, in turn, the flow that the corresponding click behavior of target location coordinate can be generated as Cheating flow.
It should be noted that, although the prior art provides a variety of anti-cheat methods, but anti-cheat method is all root mostly When clicking target resource according to user, IP address, the Cookie of pointing device etc. in corresponding user behavior data, with determining IP Location is identical or the identical corresponding pointing device of Cookie clicks the flow that behavior generates as cheating flow.But in practice, by It can frequently replace IP address by removing browser cookie, or using the means of Agent IP in cheating user and avoid supervising It surveys, in this way, just will appear the case where many cheating flows can not be identified.In view of above situation, the application is directed to machine The characteristics of cheating, corresponding click location coordinate is monitored when being clicked to target resource, clicks target resource pair when multiple When the click location coordinate answered has that coordinate is identical, sat the identical click location coordinate of coordinate as target position Mark, and cheating flow is found out according to target location coordinate, it can efficiently and accurately identify the cheating stream that such mode generates Amount.
In the embodiment of the present application, the corresponding user behavior data of target resource is clicked by obtaining, can determines mesh Click location coordinate when mark resource is clicked every time, and then by being examined in repeatedly clicking corresponding click location coordinate It measures with the presence or absence of the identical click location coordinate of coordinate, and cheating flow is determined according to the identical click location coordinate of coordinate. Using aforesaid way, existing coordinate identical click location coordinate when being clicked by the target resource detected can be true Making corresponding click of the identical click location coordinate of the coordinate is improper click, and then can efficiently and accurately be identified Cheating flow.
In a kind of possible embodiment, the user behavior data is obtained according to following steps:
It disposes to click for the target resource and monitors script;Monitoring target resource described in script monitor based on the click is It is no to be clicked;When listening to the target resource and being clicked, obtains this time and click the corresponding user behavior data.
In specific implementation, monitoring script can be clicked click the target resource deployment of behavior monitoring, when When listening to target resource and being clicked, directly it can monitor script by clicking and get the corresponding user behavior number of this time click According to.In this way, can in time, rapidly can get this time when target resource is clicked every time and click corresponding use Family behavioral data.
Here, it clicks and monitors on the page that script can be arranged in where target resource, triggering can also be deployed in and clicked In the click button of behavior, other positions can also be deployed in, it is available to use as long as meeting when target resource is clicked Family behavioral data.Wherein, clicking and monitoring script can be one section of code, this section of code is clicked listening to target resource When, it can trigger and obtain the corresponding user behavior data of this time click.
Here, clicking button is trigger button when clicking target resource, such as in taking out website, and user, which submits, to take out Button when order;In electric business platform, user submits button when purchase order;It is looked forward in vehicle, user submits when reserving test ride Button.
In a kind of possible embodiment, according to the user behavior data in step S102, the target money is determined Click location coordinate when source is clicked every time, comprising the following steps:
Step 1021: when identifying that the target resource is clicked from user behavior data, where the target resource The page size of the page, and click the relative position coordinates relative to the page.
In specific implementation, when getting target resource and being clicked after corresponding user behavior data, to user behavior Data are parsed, and when obtaining target resource and being clicked, click location is in corresponding screen, corresponding window, corresponding button Position and target resource where the page size of the page calculate this time according to above-mentioned position and page size and click on Coordinate where the relative position coordinates of the page, i.e. this time click on target resource on the page.
Step 1022: according to the mapping relations between the page size and pre-set dimension, by the relative position coordinates Be converted to click location coordinate.
In specific implementation, due to the size of window where same target resource, the size of the place page, place screen Size, the equipment at place all may be different, so when calculated target resource is clicked every time, where target resource on the page Coordinate (relative position coordinates) cannot be used directly to be compared, so the application according to it is each click target resource when where The relative position coordinates obtained every time are all converted to and click position by the mapping relations between the page size and pre-set dimension of the page Coordinate is set, in this manner it is achieved that being compared the click location coordinate of distinct device in same page size, is avoided The case where appearance judges incorrectly according to coordinate position.
In a kind of possible embodiment, according to the target location coordinate in step S105, cheating flow, packet are determined Include following steps:
Step 1051: according to the user behavior data, the first number of clicks that the target resource is clicked is counted, with And corresponding second number of clicks of the target location coordinate.
In specific implementation, target resource is being got when being repeatedly clicked, click corresponding user behavior number every time According to later, the total degree that statistics target resource is clicked, i.e. the first number of clicks, and, when counting target resource and being clicked Corresponding coordinate is number of clicks, i.e. the second number of clicks corresponding to target location coordinate.
Step 1052: determining the ratio between second number of clicks and first number of clicks, and described in judgement Whether ratio is greater than or equal to preset threshold.
In specific implementation, the ratio that the second number of clicks accounts for the first number of clicks is calculated, i.e., by the second number of clicks It compares divided by the resulting ratio of the first number of clicks, and by the ratio with preset threshold, it is pre- to determine whether the ratio is greater than If threshold value.
Here, the second number of clicks be click location coordinate be target location coordinate corresponding to number of clicks, first point Hitting number is the total degree that target resource is clicked.
It should be noted that preset threshold is the constant less than 1, can be configured in advance according to actual business requirement.
Step 1053: if the ratio is greater than or equal to the preset threshold, determination is corresponding with the target location coordinate Click caused by flow be cheating flow.
In specific implementation, if the ratio calculated between the second number of clicks and the first number of clicks is greater than or equal in advance If threshold value, it may further determine that the corresponding click behavior of the target location coordinate is the click that machine cheating mode carries out, and The click that non-generic user carries out, in this way, can determine that the flow generated of clicking corresponding with target location coordinate is cheating Flow.By the way that above-mentioned ratio to be compared with preset threshold, the identical target location coordinate of the coordinate may further determine that Whether corresponding click behavior is that behavior is clicked in the cheating that machine carries out, and then judges that the corresponding click of target location coordinate produces Whether raw flow is cheating flow.That is, the application can efficiently and accurately identify cheating stream through the above way Amount.
Here, target location coordinate can be one or more, finally judge whether it is cheating according to target location coordinate Flow may be one or more, depend entirely on calculated result.
In a kind of possible embodiment, according to the target location coordinate described in the step S105, cheating stream is determined After amount, the method for determining cheating flow is further comprising the steps of:
According to the user behavior data corresponding with the target location coordinate, the access of the cheating flow is determined Source, and the click behavior of the access originator is intercepted.
It in specific implementation, can after determining the corresponding flow for clicking generation of target location coordinate for cheating flow To find out the access originator of the cheating flow in user behavior data corresponding with target location coordinate, and to the access originator Click behavior is intercepted.
It should be noted that can find and practise fraud according to information such as the access path of user in user behavior data The corresponding access originator of flow, access originator such as practise fraud flow from which media, from which equipment etc..
It here, can also be according to actual business requirement pair other than being intercepted to the access originator there are cheating The access of the access originator is limited, and can also be monitored the access originator as emphasis monitoring object.
In the embodiment of the present application, the corresponding user behavior data of target resource is clicked by obtaining, can determines mesh Click location coordinate when mark resource is clicked every time, and then by being examined in repeatedly clicking corresponding click location coordinate It measures with the presence or absence of the identical click location coordinate of coordinate, and cheating flow is determined according to the identical click location coordinate of coordinate. Using aforesaid way, existing coordinate identical click location coordinate when being clicked by the target resource detected can be true Making corresponding click of the identical click location coordinate of the coordinate is improper click, and then can efficiently and accurately be identified Cheating flow.
Embodiment two
Conceived based on same application, is additionally provided in the embodiment of the present application two and provide tailor-made disadvantage flow really with embodiment one The corresponding determining cheating flow of method device, the principle and the application solved the problems, such as due to the device in the embodiment of the present application The method that above-described embodiment one is set for disadvantage flow really is similar, therefore the implementation of device may refer to the implementation of method, repetition Place repeats no more.
It is shown in Figure 2, it is a kind of functional module of the device 200 for determining cheating flow that the embodiment of the present application two provides One of figure, it is shown in Figure 3, it is a kind of functional module of the device 200 for determining cheating flow that the embodiment of the present application two provides The two of figure.As shown in Figures 2 and 3, the device 200 of determining cheating flow includes:
Module 210 is obtained, for obtaining target resource when being repeatedly clicked, clicks corresponding user behavior number every time According to.
First determining module 220 is used for according to the user behavior data, when determining that the target resource is clicked every time Click location coordinate.
Detection module 230 is repeatedly clicked in corresponding click location coordinate, if it is identical that there are coordinates for detecting Click location coordinate;If it exists, then the identical click location coordinate of coordinate is determined as target location coordinate.
Second determining module 240, for determining cheating flow according to the target location coordinate.
In the embodiment of the present application, is obtained by obtaining module 210 and click the corresponding user behavior data of target resource, it can be with Click location coordinate when determining that target resource is clicked every time by the first determining module 220, and then by multiple point It hits in corresponding click location coordinate and detects identical click location coordinate, and is true according to identical click location coordinate It is set for disadvantage flow.It, can be true by identical click position coordinates existing for the click target resource that detects using aforesaid way Making corresponding click of the identical click position coordinates is improper click, and then can efficiently and accurately identify cheating stream Amount.
In a kind of possible embodiment, as shown in Figures 2 and 3, the acquisition module 210, for according to following step Suddenly the user behavior data is obtained:
It disposes to click for the target resource and monitors script;
Monitor whether target resource described in script monitor is clicked based on the click;
When listening to the target resource and being clicked, obtains this time and click the corresponding user behavior data.
In a kind of possible embodiment, as shown in Figures 2 and 3, first determining module 220, for according to Lower step determines the click location coordinate when target resource is clicked every time:
When identifying that the target resource is clicked from user behavior data, the page of the page where the target resource Size, and click the relative position coordinates relative to the page;
According to the mapping relations between the page size and pre-set dimension, the relative position coordinates are converted into click Position coordinates.
In a kind of possible embodiment, as shown in figure 3, second determining module 240 includes:
Statistic unit 242, for counting the target resource is clicked first and clicking according to the user behavior data Number and corresponding second number of clicks of the target location coordinate;
Judging unit 244 for determining the ratio between second number of clicks and first number of clicks, and is sentenced Whether the ratio that breaks is greater than or equal to preset threshold;
Determination unit 246, it is determining to be sat with the target position if being greater than or equal to the preset threshold for the ratio Flow caused by corresponding click is marked as cheating flow.
In a kind of possible embodiment, the device 200 of the determining cheating flow further include:
Third determining module 250, for determining according to the user behavior data corresponding with the target location coordinate The access originator of the cheating flow, and the click behavior of the access originator is intercepted.
In the embodiment of the present application, is obtained by obtaining module 210 and click the corresponding user behavior data of target resource, it can be with Click location coordinate when determining that target resource is clicked every time by the first determining module 220, and then by multiple point It hits in corresponding click location coordinate and detects whether there are the identical click location coordinate of coordinate, and is identical according to coordinate Click location coordinate determine cheating flow.Using aforesaid way, existing seat when being clicked by the target resource detected Identical click location coordinate is marked, can determine that corresponding click of the identical click location coordinate of the coordinate is improper point It hits, and then can efficiently and accurately identify cheating flow.
Embodiment three
Conceived based on same application, it is shown in Figure 4, it is a kind of electronic equipment 400 that the embodiment of the present application three provides Structural schematic diagram, comprising: processor 410, memory 420 and bus 430, the memory 420 are stored with the processor 410 Executable machine readable instructions pass through between the processor 410 and the memory 420 when electronic equipment 400 is run The bus 430 is communicated, and is executed as described in embodiment one when the machine readable instructions are run by the processor 410 The step of determining the method for cheating flow.
Specifically, following processing can be executed when the machine readable instructions are executed by the processor 410:
Target resource is obtained when being repeatedly clicked, clicks corresponding user behavior data every time;
According to the user behavior data, the click location coordinate when target resource is clicked every time is determined;
Detection is repeatedly clicked in corresponding click location coordinate, if there are the identical click location coordinates of coordinate;
If it exists, then the identical click location coordinate of coordinate is determined as target location coordinate;
According to the target location coordinate, cheating flow is determined.
Further, following processing can also be performed when the machine readable instructions are executed by the processor 410:
It disposes to click for the target resource and monitors script;
Monitor whether target resource described in script monitor is clicked based on the click;
When listening to the target resource and being clicked, obtains this time and click the corresponding user behavior data.
Further, following processing can also be performed when the machine readable instructions are executed by the processor 410:
When identifying that the target resource is clicked from user behavior data, the page of the page where the target resource Size, and click the relative position coordinates relative to the page;
According to the mapping relations between the page size and pre-set dimension, the relative position coordinates are converted into click Position coordinates.
Further, following processing can also be performed when the machine readable instructions are executed by the processor 410:
According to the user behavior data, the first number of clicks and the mesh that the target resource is clicked are counted Corresponding second number of clicks of cursor position coordinate;
It determines the ratio between second number of clicks and first number of clicks, and judges whether the ratio is big In or equal to preset threshold;
If the ratio is greater than or equal to the preset threshold, determine that click corresponding with the target location coordinate is produced Raw flow is cheating flow.
Further, following processing can also be performed when the machine readable instructions are executed by the processor 410:
According to the user behavior data corresponding with the target location coordinate, the access of the cheating flow is determined Source, and the click behavior of the access originator is intercepted.
In the embodiment of the present application, the corresponding user behavior data of target resource is clicked by obtaining, can determine target Click location coordinate when resource is clicked every time, and then by being detected in repeatedly clicking corresponding click location coordinate It whether there is the identical click location coordinate of coordinate out, and cheating flow determined according to the identical click location coordinate of coordinate.It adopts In fashion described above, the identical click location coordinate of existing coordinate, can determine when being clicked by the target resource detected Corresponding click of the identical click location coordinate of the coordinate is improper click out, and then can efficiently and accurately identify work Disadvantage flow.
Example IV
Conceived based on same application, the embodiment of the present application four additionally provides a kind of computer readable storage medium, the meter Computer program is stored on calculation machine readable storage medium storing program for executing, the computer program executes above-described embodiment when being run by processor Really the step of method for being set for disadvantage flow is provided in one.
Specifically, the storage medium can be general storage medium, such as mobile disk, hard disk, and the storage is situated between When computer program in matter is run, the method for being able to carry out above-mentioned determining cheating flow passes through the click target detected Identical click position coordinates existing for resource can determine that corresponding click of the identical click position coordinates is improper point It hits, and then can efficiently and accurately identify cheating flow.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.In the application In provided several embodiments, it should be understood that arriving, disclosed systems, devices and methods can be by another way It realizes.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, only a kind of logic Function division, there may be another division manner in actual implementation, in another example, multiple units or components can combine or can be with It is integrated into another system, or some features can be ignored or not executed.Another point, it is shown or discussed mutual Coupling, direct-coupling or communication connection can be the INDIRECT COUPLING or communication link by some communication interfaces, device or unit It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in the executable non-volatile computer-readable storage medium of a processor.Based on this understanding, the application Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with soft in other words The form of part product embodies, and the computer software product is stored in a storage medium, including some instructions to So that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation of the application The all or part of the steps of example the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. it is various It can store the medium of program code.
The above is only the protection scopes of the specific embodiment of the application, but the application to be not limited thereto, any to be familiar with Those skilled in the art within the technical scope of the present application, can easily think of the change or the replacement, and should all cover Within the protection scope of the application.Therefore, the protection scope of the application should be subject to the protection scope in claims.

Claims (10)

1. a kind of method of determining cheating flow, which is characterized in that the described method includes:
Target resource is obtained when being repeatedly clicked, clicks corresponding user behavior data every time;
According to the user behavior data, the click location coordinate when target resource is clicked every time is determined;
Detection is repeatedly clicked in corresponding click location coordinate, if there are the identical click location coordinates of coordinate;
If it exists, then the identical click location coordinate of coordinate is determined as target location coordinate;
According to the target location coordinate, cheating flow is determined.
2. the method according to claim 1, wherein obtaining the user behavior data according to following steps:
It disposes to click for the target resource and monitors script;
Monitor whether target resource described in script monitor is clicked based on the click;
When listening to the target resource and being clicked, obtains this time and click the corresponding user behavior data.
3. determining the mesh the method according to claim 1, wherein described according to the user behavior data Click location coordinate when mark resource is clicked every time, comprising:
When identifying that the target resource is clicked from user behavior data, the page ruler of the page where the target resource It is very little, and click the relative position coordinates relative to the page;
According to the mapping relations between the page size and pre-set dimension, the relative position coordinates are converted into click location Coordinate.
4. the method according to claim 1, wherein described according to the target location coordinate, determining cheating stream Amount, comprising:
According to the user behavior data, the first number of clicks and the target position that the target resource is clicked are counted Set corresponding second number of clicks of coordinate;
Determine the ratio between second number of clicks and first number of clicks, and judge the ratio whether be greater than or Equal to preset threshold;
If the ratio is greater than or equal to the preset threshold, determine caused by click corresponding with the target location coordinate Flow is cheating flow.
5. the method according to claim 1, wherein determining cheating according to the target location coordinate described After flow, the method also includes:
According to the user behavior data corresponding with the target location coordinate, the access originator of the cheating flow is determined, and The click behavior of the access originator is intercepted.
6. a kind of device of determining cheating flow, which is characterized in that described device includes:
Module is obtained, for obtaining target resource when being repeatedly clicked, clicks corresponding user behavior data every time;
First determining module, for determining the click when target resource is clicked every time according to the user behavior data Position coordinates;
Detection module is repeatedly clicked in corresponding click location coordinate for detecting, if there are the identical clicks of coordinate Position coordinates;If it exists, then the identical click location coordinate of coordinate is determined as target location coordinate;
Second determining module, for determining cheating flow according to the target location coordinate.
7. device according to claim 6, which is characterized in that the acquisition module, for obtaining institute according to following steps State user behavior data:
It disposes to click for the target resource and monitors script;
Monitor whether target resource described in script monitor is clicked based on the click;
When listening to the target resource and being clicked, obtains this time and click the corresponding user behavior data.
8. device according to claim 6, which is characterized in that first determining module, for true according to following steps Click location coordinate when the fixed target resource is clicked every time:
When identifying that the target resource is clicked from user behavior data, the page ruler of the page where the target resource It is very little, and click the relative position coordinates relative to the page;
According to the mapping relations between the page size and pre-set dimension, the relative position coordinates are converted into click location Coordinate.
9. a kind of electronic equipment characterized by comprising processor, memory and bus, the memory are stored with the place The executable machine readable instructions of device are managed, when electronic equipment operation, by described between the processor and the memory Bus is communicated, and is executed as described in any one of claims 1 to 5 when the machine readable instructions are run by the processor Really the step of being set for the method for disadvantage flow.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program executes when the computer program is run by processor and is set for disadvantage flow really as described in any one of claims 1 to 5 Method the step of.
CN201910662477.9A 2019-07-22 2019-07-22 A kind of method and device of determining cheating flow Pending CN110381063A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910662477.9A CN110381063A (en) 2019-07-22 2019-07-22 A kind of method and device of determining cheating flow

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910662477.9A CN110381063A (en) 2019-07-22 2019-07-22 A kind of method and device of determining cheating flow

Publications (1)

Publication Number Publication Date
CN110381063A true CN110381063A (en) 2019-10-25

Family

ID=68254841

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910662477.9A Pending CN110381063A (en) 2019-07-22 2019-07-22 A kind of method and device of determining cheating flow

Country Status (1)

Country Link
CN (1) CN110381063A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110909353A (en) * 2019-11-28 2020-03-24 网易(杭州)网络有限公司 Plug-in detection method and device
CN111611520A (en) * 2020-05-28 2020-09-01 北京学之途网络科技有限公司 Monitoring method and device for flow cheating, electronic equipment and storage medium
CN111610926A (en) * 2020-05-27 2020-09-01 北京学之途网络科技有限公司 Touch event attribute judgment method and device and electronic equipment
CN111611521A (en) * 2020-05-28 2020-09-01 北京学之途网络科技有限公司 Monitoring method and device for flow cheating, electronic equipment and storage medium
CN111612550A (en) * 2020-05-28 2020-09-01 北京学之途网络科技有限公司 Advertisement trigger cheating identification method and device, electronic equipment and storage medium
CN111625819A (en) * 2020-05-26 2020-09-04 北京思特奇信息技术股份有限公司 Method and system for preventing client from using plug-in
CN111722982A (en) * 2020-06-19 2020-09-29 广州万唯邑众信息科技有限公司 Method and device for detecting whether machine clicks or not
CN112399352A (en) * 2020-11-04 2021-02-23 北京嘀嘀无限科技发展有限公司 Cheating behavior recognition method, equipment and storage medium
CN113360864A (en) * 2021-06-01 2021-09-07 掌阅科技股份有限公司 Anti-cheating method, electronic device and computer storage medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009132148A2 (en) * 2008-04-22 2009-10-29 The 41St Parameter, Inc. Systems and methods for security management based on cursor events
CN103365441A (en) * 2013-06-24 2013-10-23 福州博远无线网络科技有限公司 Method for remotely controlling Android mobile phone desktop through computer terminal
CN104182663A (en) * 2013-05-27 2014-12-03 阿里巴巴集团控股有限公司 Method and device for identifying simulator operation
CN105183873A (en) * 2015-09-18 2015-12-23 北京博雅立方科技有限公司 Malicious clicking behavior detection method and device
CN105656982A (en) * 2015-03-23 2016-06-08 深圳酷派技术有限公司 IMS (IP Multimedia Subsystem) technology based remote control method and wireless terminal
CN105677221A (en) * 2015-12-30 2016-06-15 广州优视网络科技有限公司 Method and device for improving application data detecting accuracy and equipment
CN106101130A (en) * 2016-07-08 2016-11-09 北京易华录信息技术股份有限公司 A kind of network malicious data detection method, Apparatus and system
CN106097000A (en) * 2016-06-02 2016-11-09 腾讯科技(深圳)有限公司 A kind of information processing method and server
CN106254368A (en) * 2016-08-24 2016-12-21 杭州迪普科技有限公司 The detection method of Web vulnerability scanning and device
CN106506764A (en) * 2016-10-10 2017-03-15 武汉斗鱼网络科技有限公司 A kind of many mobile phone remote control systems and method
CN107102886A (en) * 2017-04-14 2017-08-29 北京洋浦伟业科技发展有限公司 The detection method and device of Android simulator
CN108073597A (en) * 2016-11-10 2018-05-25 北京国双科技有限公司 The page clicks on behavior methods of exhibiting, device and system
CN109471987A (en) * 2018-10-10 2019-03-15 北京奇虎科技有限公司 Thermodynamic chart processing method, device and electronic equipment

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009132148A2 (en) * 2008-04-22 2009-10-29 The 41St Parameter, Inc. Systems and methods for security management based on cursor events
CN104182663A (en) * 2013-05-27 2014-12-03 阿里巴巴集团控股有限公司 Method and device for identifying simulator operation
CN103365441A (en) * 2013-06-24 2013-10-23 福州博远无线网络科技有限公司 Method for remotely controlling Android mobile phone desktop through computer terminal
CN105656982A (en) * 2015-03-23 2016-06-08 深圳酷派技术有限公司 IMS (IP Multimedia Subsystem) technology based remote control method and wireless terminal
CN105183873A (en) * 2015-09-18 2015-12-23 北京博雅立方科技有限公司 Malicious clicking behavior detection method and device
CN105677221A (en) * 2015-12-30 2016-06-15 广州优视网络科技有限公司 Method and device for improving application data detecting accuracy and equipment
CN106097000A (en) * 2016-06-02 2016-11-09 腾讯科技(深圳)有限公司 A kind of information processing method and server
CN106101130A (en) * 2016-07-08 2016-11-09 北京易华录信息技术股份有限公司 A kind of network malicious data detection method, Apparatus and system
CN106254368A (en) * 2016-08-24 2016-12-21 杭州迪普科技有限公司 The detection method of Web vulnerability scanning and device
CN106506764A (en) * 2016-10-10 2017-03-15 武汉斗鱼网络科技有限公司 A kind of many mobile phone remote control systems and method
CN108073597A (en) * 2016-11-10 2018-05-25 北京国双科技有限公司 The page clicks on behavior methods of exhibiting, device and system
CN107102886A (en) * 2017-04-14 2017-08-29 北京洋浦伟业科技发展有限公司 The detection method and device of Android simulator
CN109471987A (en) * 2018-10-10 2019-03-15 北京奇虎科技有限公司 Thermodynamic chart processing method, device and electronic equipment

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110909353A (en) * 2019-11-28 2020-03-24 网易(杭州)网络有限公司 Plug-in detection method and device
CN111625819A (en) * 2020-05-26 2020-09-04 北京思特奇信息技术股份有限公司 Method and system for preventing client from using plug-in
CN111625819B (en) * 2020-05-26 2023-04-28 北京思特奇信息技术股份有限公司 Method and system for preventing client from using plug-in
CN111610926A (en) * 2020-05-27 2020-09-01 北京学之途网络科技有限公司 Touch event attribute judgment method and device and electronic equipment
CN111611520A (en) * 2020-05-28 2020-09-01 北京学之途网络科技有限公司 Monitoring method and device for flow cheating, electronic equipment and storage medium
CN111611521A (en) * 2020-05-28 2020-09-01 北京学之途网络科技有限公司 Monitoring method and device for flow cheating, electronic equipment and storage medium
CN111612550A (en) * 2020-05-28 2020-09-01 北京学之途网络科技有限公司 Advertisement trigger cheating identification method and device, electronic equipment and storage medium
CN111611521B (en) * 2020-05-28 2023-11-03 北京学之途网络科技有限公司 Flow cheating monitoring method and device, electronic equipment and storage medium
CN111611520B (en) * 2020-05-28 2024-03-08 北京明略昭辉科技有限公司 Flow cheating monitoring method and device, electronic equipment and storage medium
CN111722982A (en) * 2020-06-19 2020-09-29 广州万唯邑众信息科技有限公司 Method and device for detecting whether machine clicks or not
CN112399352A (en) * 2020-11-04 2021-02-23 北京嘀嘀无限科技发展有限公司 Cheating behavior recognition method, equipment and storage medium
CN113360864A (en) * 2021-06-01 2021-09-07 掌阅科技股份有限公司 Anti-cheating method, electronic device and computer storage medium

Similar Documents

Publication Publication Date Title
CN110381063A (en) A kind of method and device of determining cheating flow
CN107168854B (en) Internet advertisement abnormal click detection method, device, equipment and readable storage medium
US8413250B1 (en) Systems and methods of classifying sessions
US20090024971A1 (en) Cursor path vector analysis for detecting click fraud
CN107566358A (en) A kind of Risk-warning reminding method, device, medium and equipment
US20160092916A1 (en) Pixel cluster transit monitoring for detecting click fraud
CN106294508B (en) Brushing amount tool detection method and device
CN110609937A (en) Crawler identification method and device
CN110298662B (en) Automatic detection method and device for transaction repeated submission
CN112733045B (en) User behavior analysis method and device and electronic equipment
CN109271762B (en) User authentication method and device based on slider verification code
CN109726543B (en) Login method and device of application program, terminal equipment and storage medium
CN109547426A (en) Service response method and server
CN111160919B (en) Block chain address risk assessment method and device
US9306958B2 (en) Methods, systems and media for detecting non-intended traffic using co-visitation information
US8719088B2 (en) Pixel cluster transit monitoring for detecting click fraud
CN108243068A (en) A kind of method and server of determining abnormal flow
WO2021262344A1 (en) Method and apparatus to detect scripted network traffic
CN110365682A (en) A kind of anti-cheat method and device
CN109587248B (en) User identification method, device, server and storage medium
CN107465718A (en) Across the ID recognition methods of application and device, storage medium, terminal
CN114697079B (en) Method and system for detecting illegal user of application client
CN110533297B (en) Method and device for identifying abnormal equipment
CN112399352B (en) Cheating behavior identification method, device and storage medium
CN113923190A (en) Method and device for identifying equipment identification jump, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191025

RJ01 Rejection of invention patent application after publication