CN110381063A - A kind of method and device of determining cheating flow - Google Patents
A kind of method and device of determining cheating flow Download PDFInfo
- Publication number
- CN110381063A CN110381063A CN201910662477.9A CN201910662477A CN110381063A CN 110381063 A CN110381063 A CN 110381063A CN 201910662477 A CN201910662477 A CN 201910662477A CN 110381063 A CN110381063 A CN 110381063A
- Authority
- CN
- China
- Prior art keywords
- click
- clicked
- location coordinate
- coordinate
- target resource
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
This application involves Internet technical field more particularly to a kind of method and devices of determining cheating flow.The application clicks the corresponding user behavior data of target resource by obtaining, it can determine click location coordinate when target resource is clicked every time, and then by detecting whether that there are the identical click location coordinates of coordinate in repeatedly clicking corresponding click location coordinate, and cheating flow is determined according to the identical click location coordinate of coordinate.Using aforesaid way, existing coordinate identical click location coordinate when being clicked by the target resource detected, it can determine that corresponding click of the identical click location coordinate of the coordinate is improper click, and then can efficiently and accurately identify cheating flow.
Description
Technical field
This application involves Internet technical field more particularly to a kind of method and devices of determining cheating flow.
Background technique
In internet area, flow of practising fraud refers to exposure improper to Internet resources, clicks generated flow, to work
The identification work of disadvantage flow is known as anti-cheating.
Current anti-cheating mode is normally based on click to user or exposure behavior is monitored, if discovery click or
Exposure behavior meets certain rule, then again to the user for clicking or exposing behavior carries out IP address, Cookie (is stored in user's sheet
Data in ground terminal) etc. dimensions investigation, determine the part behavior generate flow whether be cheating flow.
But in practice, since cheating user can be by the cookie of removing browser, or use the hand of Agent IP
Section is avoided monitoring, and there is the case where many cheating flows can not be identified.Therefore, a kind of more effective, accurate determine is made
The mode of disadvantage flow becomes current urgent problem to be solved.
Summary of the invention
In view of this, a kind of method and device for being designed to provide determining cheating flow of the embodiment of the present application, it can be with
Efficiently and accurately identify cheating flow.
The application mainly includes the following aspects:
In a first aspect, the embodiment of the present application provides a kind of method of determining cheating flow, which comprises
Target resource is obtained when being repeatedly clicked, clicks corresponding user behavior data every time;
According to the user behavior data, the click location coordinate when target resource is clicked every time is determined;
Detection is repeatedly clicked in corresponding click location coordinate, if there are the identical click location coordinates of coordinate;
If it exists, then the identical click location coordinate of coordinate is determined as target location coordinate;
According to the target location coordinate, cheating flow is determined.
In a kind of possible embodiment, the user behavior data is obtained according to following steps:
It disposes to click for the target resource and monitors script;
Monitor whether target resource described in script monitor is clicked based on the click;
When listening to the target resource and being clicked, obtains this time and click the corresponding user behavior data.
It is described according to the user behavior data in a kind of possible embodiment, determine that the target resource is each
Click location coordinate when being clicked, comprising:
When identifying that the target resource is clicked from user behavior data, the page of the page where the target resource
Size, and click the relative position coordinates relative to the page;
According to the mapping relations between the page size and pre-set dimension, the relative position coordinates are converted into click
Position coordinates.
It is described according to the target location coordinate in a kind of possible embodiment, determine cheating flow, comprising:
According to the user behavior data, the first number of clicks and the mesh that the target resource is clicked are counted
Corresponding second number of clicks of cursor position coordinate;
It determines the ratio between second number of clicks and first number of clicks, and judges whether the ratio is big
In or equal to preset threshold;
If the ratio is greater than or equal to the preset threshold, determine that click corresponding with the target location coordinate is produced
Raw flow is cheating flow.
In a kind of possible embodiment, described according to the target location coordinate, after determining cheating flow, institute
State method further include:
According to the user behavior data corresponding with the target location coordinate, the access of the cheating flow is determined
Source, and the click behavior of the access originator is intercepted.
Second aspect, the embodiment of the present application also provide a kind of device of determining cheating flow, and described device includes:
Module is obtained, for obtaining target resource when being repeatedly clicked, clicks corresponding user behavior data every time;
First determining module, for determining when the target resource is clicked every time according to the user behavior data
Click location coordinate;
Detection module is repeatedly clicked in corresponding click location coordinate, if it is identical that there are coordinates for detecting
Click location coordinate;If it exists, then the identical click location coordinate of coordinate is determined as target location coordinate;
Second determining module, for determining cheating flow according to the target location coordinate.
In a kind of possible embodiment, the acquisition module, for obtaining the user behavior according to following steps
Data:
It disposes to click for the target resource and monitors script;
Monitor whether target resource described in script monitor is clicked based on the click;
When listening to the target resource and being clicked, obtains this time and click the corresponding user behavior data.
In a kind of possible embodiment, first determining module, for determining the target according to following steps
Click location coordinate when resource is clicked every time:
When identifying that the target resource is clicked from user behavior data, the page of the page where the target resource
Size, and click the relative position coordinates relative to the page;
According to the mapping relations between the page size and pre-set dimension, the relative position coordinates are converted into click
Position coordinates.
In a kind of possible embodiment, second determining module includes:
Statistic unit, for counting the first click time that the target resource is clicked according to the user behavior data
Number and corresponding second number of clicks of the target location coordinate;
Judging unit for determining the ratio between second number of clicks and first number of clicks, and judges
Whether the ratio is greater than or equal to preset threshold;
Determination unit, if being greater than or equal to the preset threshold, the determining and target location coordinate for the ratio
Flow caused by corresponding click is cheating flow.
In a kind of possible embodiment, described device further include:
Third determining module, for determining institute according to the user behavior data corresponding with the target location coordinate
The access originator of cheating flow is stated, and the click behavior of the access originator is intercepted.
The third aspect, the embodiment of the present application also provide a kind of electronic equipment, comprising: processor, memory and bus, it is described
Memory is stored with the executable machine readable instructions of the processor, when electronic equipment operation, the processor with it is described
It is communicated between memory by the bus, the machine readable instructions execute above-mentioned first when being run by the processor
Really the step of method of disadvantage flow is set in aspect or first aspect described in any possible embodiment.
Fourth aspect, it is described computer-readable to deposit the embodiment of the present application also provides a kind of computer readable storage medium
Computer program is stored on storage media, the computer program executes above-mentioned first aspect or first party when being run by processor
Really the step of method of disadvantage flow is set in face described in any possible embodiment.
In the embodiment of the present application, the corresponding user behavior data of target resource is clicked by obtaining, can determine target
Click location coordinate when resource is clicked every time, and then by being detected in repeatedly clicking corresponding click location coordinate
It whether there is the identical click location coordinate of coordinate out, and cheating flow determined according to the identical click location coordinate of coordinate.It adopts
In fashion described above, the identical click location coordinate of existing coordinate, can determine when being clicked by the target resource detected
Corresponding click of the identical click location coordinate of the coordinate is improper click out, and then can efficiently and accurately identify work
Disadvantage flow.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows a kind of flow chart of the method for determining cheating flow provided by the embodiment of the present application one;
Fig. 2 shows provided by the embodiment of the present application two it is a kind of it is determining cheating flow device functional block diagram it
One;
Fig. 3 show provided by the embodiment of the present application two it is a kind of it is determining cheating flow device functional block diagram it
Two;
Fig. 4 shows the structural schematic diagram of a kind of electronic equipment provided by the embodiment of the present application three.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it should be understood that attached in the application
Figure only plays the purpose of illustration and description, is not used to limit the protection scope of the application.In addition, it will be appreciated that schematical
Attached drawing does not press scale.Process used herein is shown according to some embodiments of the present application realization
It clicks.It should be appreciated that the click of flow chart can be realized out of order, the step of context relation of logic can not inverted
Sequence is implemented simultaneously.In addition, those skilled in the art under the guide of teachings herein, can add one to flow chart
Or other multiple clicks, one or more clicks can also be removed from flow chart.
In addition, described embodiments are only a part of embodiments of the present application, instead of all the embodiments.Usually exist
The component of the embodiment of the present application described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed the application's to the detailed description of the embodiments herein provided in the accompanying drawings below
Range, but it is merely representative of the selected embodiment of the application.Based on embodiments herein, those skilled in the art are not being done
Whole other embodiments obtained under the premise of creative work out, shall fall in the protection scope of this application.
In order to enable those skilled in the art are able to use teachings herein, in conjunction with specific application scene " identification resource quilt
Whether the flow generated when click is cheating flow ", following implementation is provided, to those skilled in the art, not
In the case where being detached from spirit and scope, the General Principle defined here can be applied to other embodiments and application
Scene.
The embodiment of the present application following methods, device, electronic equipment or computer readable storage medium can be applied to any
Need to be determined the scene of cheating flow, the embodiment of the present application is not restricted specific application scenarios, any to use this
Apply for that embodiment provides the scheme for the method and device for being set for disadvantage flow really in the application protection scope.
It is worth noting that, anti-cheating mode is normally based on to user's in existing scheme before the application proposition
It clicks or exposes behavior and be monitored, if discovery is clicked or exposure behavior meets certain rule, then to click or exposure behavior
User carry out the investigation of IP address, the dimensions such as Cookie (being stored in the data on user local terminal), determine the part row
It whether is cheating flow for the flow of generation.But in practice, due to cheating user can by remove browser cookie,
Or avoid monitoring using the means of Agent IP, there is the case where many cheating flows can not be identified.
It, can be in view of the above-mentioned problems, the embodiment of the present application clicks the corresponding user behavior data of target resource by obtaining
Determine click location coordinate when target resource is clicked every time, and then by repeatedly clicking corresponding click location
It detects whether that there are the identical click location coordinates of coordinate in coordinate, and is determined and made according to the identical click location coordinate of coordinate
Disadvantage flow.Using aforesaid way, existing coordinate identical click location coordinate when being clicked by the target resource detected,
It can determine that corresponding click of the identical click location coordinate of the coordinate is improper click, and then can be efficiently and accurately
Identify cheating flow.
It should be noted that resource can be launched to user using during service in user in internet area, than
Such as, user launches resource to user during using terminal is applied, and is installed by the click of user, exposure, downloading
It can produce flow with behaviors such as activation.But for some purposes, exist and forge flow by the way of cheating and (referred to as make
Disadvantage flow) the case where, and these flows forged can not embody bid value, thus, it is recognized accurately and practises fraud to this part
Flow is just particularly important.
It should also be noted that, machine cheating, which refers to, forges user, and exposure, the click of analog subscriber by cheating machine
Equal behaviors, around the anti-fraudulent means for distinguishing cheating with user's dimension.
To be carried out combined with specific embodiments below to technical solution provided by the present application detailed convenient for understanding the application
It describes in detail bright.
Embodiment one
Referring to Fig. 1, executing the equipment for determining the method for cheating flow can be the monitoring platform or server of click behavior.
Fig. 1 is a kind of flow chart of the method for determining cheating flow provided by the embodiment of the present application one.It is below point from executing subject
The angle for hitting the monitoring platform of behavior is illustrated the method that cheating flow is determined provided by the embodiment of the present application.Such as Fig. 1
It is shown, the method for determining cheating flow provided by the embodiments of the present application, comprising the following steps:
S101: target resource is obtained when being repeatedly clicked, clicks corresponding user behavior data every time.
In specific implementation, when monitoring that target resource is clicked every time, corresponding user behavior is clicked in acquisition every time
Data.Here, target resource can be one kind, be also possible to multiple resources, resource such as video, audio, advertisement, shopping network
It stands, webpage etc..User behavior data may include the mark of pointing device, the IP address of pointing device, pointing device correspondence
Browsing record (such as Cookie), target resource correspond to when being clicked screen, correspondence window, corresponding button multiple coordinates
Deng.
It should be noted that can all correspond to generation flow when target resource is clicked every time, user behavior also can be all generated
Data.
S102: according to the user behavior data, the click location coordinate when target resource is clicked every time is determined.
In specific implementation, when getting target resource and being clicked, after corresponding user behavior data, can pass through
User behavior data is parsed, when obtaining target resource and being clicked, click location corresponding screen, corresponding window,
The position of corresponding button, and then calculate according to above-mentioned position click location coordinate when target resource is clicked.
S103: detection is repeatedly clicked in corresponding click location coordinate, if there are the identical click locations of coordinate
Coordinate.
In specific implementation, it can obtain within a preset period of time according to actual needs corresponding when target resource is clicked
User behavior data, also available historical user's behavioral data, i.e. user behavior data can be obtained according to actual needs
It takes.After getting user behavior data, when determining that target resource is repeatedly clicked according to these user behavior datas pair
The multiple click location coordinates answered further judge corresponding multiple click location coordinates when target resource is repeatedly clicked
In, if there are the identical click location coordinates of coordinate.
It should be noted that under normal conditions, corresponding position coordinates may be only when by mouse click target resource
A pixel is only taken up, so it is the same position that multiple ordinary users, which click corresponding click location coordinate when target resource,
Probability it is very negligible, even the same ordinary user when repeatedly clicking target resource corresponding click location coordinate also have
Institute is different, but in practice, by the click of apparatus control, it is possible to there is corresponding click position when repeatedly clicking target resource
The identical situation of coordinate is set, i.e., in such a way that machine is practised fraud, it is entirely possible to exist corresponding when repeatedly clicking target resource
The identical situation of click location coordinate.Therefore, the application is for above-mentioned consideration, corresponding click position when being clicked to target resource
It sets coordinate to be monitored, can determine to whether there is the identical click location coordinate of coordinate when repeatedly clicking target resource,
And then the case where can rapidly, accurately judging with the presence or absence of machine cheating.
S104: if it exists, then the identical click location coordinate of coordinate is determined as target location coordinate.
In specific implementation, if there is seat when target resource is repeatedly clicked in corresponding multiple click location coordinates
Identical click location coordinate is marked, then the click location coordinate of identical coordinate is determined as target location coordinate.In this way, can be with
Tentatively judge that click location may be by machine cheating mode for the corresponding click behavior of the target location coordinate and carry out a little
It hits, rather than what ordinary user was clicked.
Here, target location coordinate can be one or more, simply by the presence of the identical click location coordinate of coordinate, just will
The identical click location coordinate of coordinate is determined as target location coordinate.
In one example, if when 5 click target resources corresponding 5 click location coordinates be respectively (0.10,0.12),
(0.20,0.22), (0.10,0.12), (0.30,0.12), (0.10,0.12) exist corresponding when 3 click target resources
Click location coordinate is identical, is (0.10,0.12), then (0.10,0.12) coordinate is determined as target location coordinate.
S105: according to the target location coordinate, cheating flow is determined.
In specific implementation, determining when target resource is clicked exist in corresponding multiple click location coordinates
After the identical target location coordinate of coordinate, it can determine that the corresponding click behavior of the target location coordinate may be using machine
The behavior that device cheating mode is clicked, in turn, the flow that the corresponding click behavior of target location coordinate can be generated as
Cheating flow.
It should be noted that, although the prior art provides a variety of anti-cheat methods, but anti-cheat method is all root mostly
When clicking target resource according to user, IP address, the Cookie of pointing device etc. in corresponding user behavior data, with determining IP
Location is identical or the identical corresponding pointing device of Cookie clicks the flow that behavior generates as cheating flow.But in practice, by
It can frequently replace IP address by removing browser cookie, or using the means of Agent IP in cheating user and avoid supervising
It surveys, in this way, just will appear the case where many cheating flows can not be identified.In view of above situation, the application is directed to machine
The characteristics of cheating, corresponding click location coordinate is monitored when being clicked to target resource, clicks target resource pair when multiple
When the click location coordinate answered has that coordinate is identical, sat the identical click location coordinate of coordinate as target position
Mark, and cheating flow is found out according to target location coordinate, it can efficiently and accurately identify the cheating stream that such mode generates
Amount.
In the embodiment of the present application, the corresponding user behavior data of target resource is clicked by obtaining, can determines mesh
Click location coordinate when mark resource is clicked every time, and then by being examined in repeatedly clicking corresponding click location coordinate
It measures with the presence or absence of the identical click location coordinate of coordinate, and cheating flow is determined according to the identical click location coordinate of coordinate.
Using aforesaid way, existing coordinate identical click location coordinate when being clicked by the target resource detected can be true
Making corresponding click of the identical click location coordinate of the coordinate is improper click, and then can efficiently and accurately be identified
Cheating flow.
In a kind of possible embodiment, the user behavior data is obtained according to following steps:
It disposes to click for the target resource and monitors script;Monitoring target resource described in script monitor based on the click is
It is no to be clicked;When listening to the target resource and being clicked, obtains this time and click the corresponding user behavior data.
In specific implementation, monitoring script can be clicked click the target resource deployment of behavior monitoring, when
When listening to target resource and being clicked, directly it can monitor script by clicking and get the corresponding user behavior number of this time click
According to.In this way, can in time, rapidly can get this time when target resource is clicked every time and click corresponding use
Family behavioral data.
Here, it clicks and monitors on the page that script can be arranged in where target resource, triggering can also be deployed in and clicked
In the click button of behavior, other positions can also be deployed in, it is available to use as long as meeting when target resource is clicked
Family behavioral data.Wherein, clicking and monitoring script can be one section of code, this section of code is clicked listening to target resource
When, it can trigger and obtain the corresponding user behavior data of this time click.
Here, clicking button is trigger button when clicking target resource, such as in taking out website, and user, which submits, to take out
Button when order;In electric business platform, user submits button when purchase order;It is looked forward in vehicle, user submits when reserving test ride
Button.
In a kind of possible embodiment, according to the user behavior data in step S102, the target money is determined
Click location coordinate when source is clicked every time, comprising the following steps:
Step 1021: when identifying that the target resource is clicked from user behavior data, where the target resource
The page size of the page, and click the relative position coordinates relative to the page.
In specific implementation, when getting target resource and being clicked after corresponding user behavior data, to user behavior
Data are parsed, and when obtaining target resource and being clicked, click location is in corresponding screen, corresponding window, corresponding button
Position and target resource where the page size of the page calculate this time according to above-mentioned position and page size and click on
Coordinate where the relative position coordinates of the page, i.e. this time click on target resource on the page.
Step 1022: according to the mapping relations between the page size and pre-set dimension, by the relative position coordinates
Be converted to click location coordinate.
In specific implementation, due to the size of window where same target resource, the size of the place page, place screen
Size, the equipment at place all may be different, so when calculated target resource is clicked every time, where target resource on the page
Coordinate (relative position coordinates) cannot be used directly to be compared, so the application according to it is each click target resource when where
The relative position coordinates obtained every time are all converted to and click position by the mapping relations between the page size and pre-set dimension of the page
Coordinate is set, in this manner it is achieved that being compared the click location coordinate of distinct device in same page size, is avoided
The case where appearance judges incorrectly according to coordinate position.
In a kind of possible embodiment, according to the target location coordinate in step S105, cheating flow, packet are determined
Include following steps:
Step 1051: according to the user behavior data, the first number of clicks that the target resource is clicked is counted, with
And corresponding second number of clicks of the target location coordinate.
In specific implementation, target resource is being got when being repeatedly clicked, click corresponding user behavior number every time
According to later, the total degree that statistics target resource is clicked, i.e. the first number of clicks, and, when counting target resource and being clicked
Corresponding coordinate is number of clicks, i.e. the second number of clicks corresponding to target location coordinate.
Step 1052: determining the ratio between second number of clicks and first number of clicks, and described in judgement
Whether ratio is greater than or equal to preset threshold.
In specific implementation, the ratio that the second number of clicks accounts for the first number of clicks is calculated, i.e., by the second number of clicks
It compares divided by the resulting ratio of the first number of clicks, and by the ratio with preset threshold, it is pre- to determine whether the ratio is greater than
If threshold value.
Here, the second number of clicks be click location coordinate be target location coordinate corresponding to number of clicks, first point
Hitting number is the total degree that target resource is clicked.
It should be noted that preset threshold is the constant less than 1, can be configured in advance according to actual business requirement.
Step 1053: if the ratio is greater than or equal to the preset threshold, determination is corresponding with the target location coordinate
Click caused by flow be cheating flow.
In specific implementation, if the ratio calculated between the second number of clicks and the first number of clicks is greater than or equal in advance
If threshold value, it may further determine that the corresponding click behavior of the target location coordinate is the click that machine cheating mode carries out, and
The click that non-generic user carries out, in this way, can determine that the flow generated of clicking corresponding with target location coordinate is cheating
Flow.By the way that above-mentioned ratio to be compared with preset threshold, the identical target location coordinate of the coordinate may further determine that
Whether corresponding click behavior is that behavior is clicked in the cheating that machine carries out, and then judges that the corresponding click of target location coordinate produces
Whether raw flow is cheating flow.That is, the application can efficiently and accurately identify cheating stream through the above way
Amount.
Here, target location coordinate can be one or more, finally judge whether it is cheating according to target location coordinate
Flow may be one or more, depend entirely on calculated result.
In a kind of possible embodiment, according to the target location coordinate described in the step S105, cheating stream is determined
After amount, the method for determining cheating flow is further comprising the steps of:
According to the user behavior data corresponding with the target location coordinate, the access of the cheating flow is determined
Source, and the click behavior of the access originator is intercepted.
It in specific implementation, can after determining the corresponding flow for clicking generation of target location coordinate for cheating flow
To find out the access originator of the cheating flow in user behavior data corresponding with target location coordinate, and to the access originator
Click behavior is intercepted.
It should be noted that can find and practise fraud according to information such as the access path of user in user behavior data
The corresponding access originator of flow, access originator such as practise fraud flow from which media, from which equipment etc..
It here, can also be according to actual business requirement pair other than being intercepted to the access originator there are cheating
The access of the access originator is limited, and can also be monitored the access originator as emphasis monitoring object.
In the embodiment of the present application, the corresponding user behavior data of target resource is clicked by obtaining, can determines mesh
Click location coordinate when mark resource is clicked every time, and then by being examined in repeatedly clicking corresponding click location coordinate
It measures with the presence or absence of the identical click location coordinate of coordinate, and cheating flow is determined according to the identical click location coordinate of coordinate.
Using aforesaid way, existing coordinate identical click location coordinate when being clicked by the target resource detected can be true
Making corresponding click of the identical click location coordinate of the coordinate is improper click, and then can efficiently and accurately be identified
Cheating flow.
Embodiment two
Conceived based on same application, is additionally provided in the embodiment of the present application two and provide tailor-made disadvantage flow really with embodiment one
The corresponding determining cheating flow of method device, the principle and the application solved the problems, such as due to the device in the embodiment of the present application
The method that above-described embodiment one is set for disadvantage flow really is similar, therefore the implementation of device may refer to the implementation of method, repetition
Place repeats no more.
It is shown in Figure 2, it is a kind of functional module of the device 200 for determining cheating flow that the embodiment of the present application two provides
One of figure, it is shown in Figure 3, it is a kind of functional module of the device 200 for determining cheating flow that the embodiment of the present application two provides
The two of figure.As shown in Figures 2 and 3, the device 200 of determining cheating flow includes:
Module 210 is obtained, for obtaining target resource when being repeatedly clicked, clicks corresponding user behavior number every time
According to.
First determining module 220 is used for according to the user behavior data, when determining that the target resource is clicked every time
Click location coordinate.
Detection module 230 is repeatedly clicked in corresponding click location coordinate, if it is identical that there are coordinates for detecting
Click location coordinate;If it exists, then the identical click location coordinate of coordinate is determined as target location coordinate.
Second determining module 240, for determining cheating flow according to the target location coordinate.
In the embodiment of the present application, is obtained by obtaining module 210 and click the corresponding user behavior data of target resource, it can be with
Click location coordinate when determining that target resource is clicked every time by the first determining module 220, and then by multiple point
It hits in corresponding click location coordinate and detects identical click location coordinate, and is true according to identical click location coordinate
It is set for disadvantage flow.It, can be true by identical click position coordinates existing for the click target resource that detects using aforesaid way
Making corresponding click of the identical click position coordinates is improper click, and then can efficiently and accurately identify cheating stream
Amount.
In a kind of possible embodiment, as shown in Figures 2 and 3, the acquisition module 210, for according to following step
Suddenly the user behavior data is obtained:
It disposes to click for the target resource and monitors script;
Monitor whether target resource described in script monitor is clicked based on the click;
When listening to the target resource and being clicked, obtains this time and click the corresponding user behavior data.
In a kind of possible embodiment, as shown in Figures 2 and 3, first determining module 220, for according to
Lower step determines the click location coordinate when target resource is clicked every time:
When identifying that the target resource is clicked from user behavior data, the page of the page where the target resource
Size, and click the relative position coordinates relative to the page;
According to the mapping relations between the page size and pre-set dimension, the relative position coordinates are converted into click
Position coordinates.
In a kind of possible embodiment, as shown in figure 3, second determining module 240 includes:
Statistic unit 242, for counting the target resource is clicked first and clicking according to the user behavior data
Number and corresponding second number of clicks of the target location coordinate;
Judging unit 244 for determining the ratio between second number of clicks and first number of clicks, and is sentenced
Whether the ratio that breaks is greater than or equal to preset threshold;
Determination unit 246, it is determining to be sat with the target position if being greater than or equal to the preset threshold for the ratio
Flow caused by corresponding click is marked as cheating flow.
In a kind of possible embodiment, the device 200 of the determining cheating flow further include:
Third determining module 250, for determining according to the user behavior data corresponding with the target location coordinate
The access originator of the cheating flow, and the click behavior of the access originator is intercepted.
In the embodiment of the present application, is obtained by obtaining module 210 and click the corresponding user behavior data of target resource, it can be with
Click location coordinate when determining that target resource is clicked every time by the first determining module 220, and then by multiple point
It hits in corresponding click location coordinate and detects whether there are the identical click location coordinate of coordinate, and is identical according to coordinate
Click location coordinate determine cheating flow.Using aforesaid way, existing seat when being clicked by the target resource detected
Identical click location coordinate is marked, can determine that corresponding click of the identical click location coordinate of the coordinate is improper point
It hits, and then can efficiently and accurately identify cheating flow.
Embodiment three
Conceived based on same application, it is shown in Figure 4, it is a kind of electronic equipment 400 that the embodiment of the present application three provides
Structural schematic diagram, comprising: processor 410, memory 420 and bus 430, the memory 420 are stored with the processor 410
Executable machine readable instructions pass through between the processor 410 and the memory 420 when electronic equipment 400 is run
The bus 430 is communicated, and is executed as described in embodiment one when the machine readable instructions are run by the processor 410
The step of determining the method for cheating flow.
Specifically, following processing can be executed when the machine readable instructions are executed by the processor 410:
Target resource is obtained when being repeatedly clicked, clicks corresponding user behavior data every time;
According to the user behavior data, the click location coordinate when target resource is clicked every time is determined;
Detection is repeatedly clicked in corresponding click location coordinate, if there are the identical click location coordinates of coordinate;
If it exists, then the identical click location coordinate of coordinate is determined as target location coordinate;
According to the target location coordinate, cheating flow is determined.
Further, following processing can also be performed when the machine readable instructions are executed by the processor 410:
It disposes to click for the target resource and monitors script;
Monitor whether target resource described in script monitor is clicked based on the click;
When listening to the target resource and being clicked, obtains this time and click the corresponding user behavior data.
Further, following processing can also be performed when the machine readable instructions are executed by the processor 410:
When identifying that the target resource is clicked from user behavior data, the page of the page where the target resource
Size, and click the relative position coordinates relative to the page;
According to the mapping relations between the page size and pre-set dimension, the relative position coordinates are converted into click
Position coordinates.
Further, following processing can also be performed when the machine readable instructions are executed by the processor 410:
According to the user behavior data, the first number of clicks and the mesh that the target resource is clicked are counted
Corresponding second number of clicks of cursor position coordinate;
It determines the ratio between second number of clicks and first number of clicks, and judges whether the ratio is big
In or equal to preset threshold;
If the ratio is greater than or equal to the preset threshold, determine that click corresponding with the target location coordinate is produced
Raw flow is cheating flow.
Further, following processing can also be performed when the machine readable instructions are executed by the processor 410:
According to the user behavior data corresponding with the target location coordinate, the access of the cheating flow is determined
Source, and the click behavior of the access originator is intercepted.
In the embodiment of the present application, the corresponding user behavior data of target resource is clicked by obtaining, can determine target
Click location coordinate when resource is clicked every time, and then by being detected in repeatedly clicking corresponding click location coordinate
It whether there is the identical click location coordinate of coordinate out, and cheating flow determined according to the identical click location coordinate of coordinate.It adopts
In fashion described above, the identical click location coordinate of existing coordinate, can determine when being clicked by the target resource detected
Corresponding click of the identical click location coordinate of the coordinate is improper click out, and then can efficiently and accurately identify work
Disadvantage flow.
Example IV
Conceived based on same application, the embodiment of the present application four additionally provides a kind of computer readable storage medium, the meter
Computer program is stored on calculation machine readable storage medium storing program for executing, the computer program executes above-described embodiment when being run by processor
Really the step of method for being set for disadvantage flow is provided in one.
Specifically, the storage medium can be general storage medium, such as mobile disk, hard disk, and the storage is situated between
When computer program in matter is run, the method for being able to carry out above-mentioned determining cheating flow passes through the click target detected
Identical click position coordinates existing for resource can determine that corresponding click of the identical click position coordinates is improper point
It hits, and then can efficiently and accurately identify cheating flow.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description
It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.In the application
In provided several embodiments, it should be understood that arriving, disclosed systems, devices and methods can be by another way
It realizes.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, only a kind of logic
Function division, there may be another division manner in actual implementation, in another example, multiple units or components can combine or can be with
It is integrated into another system, or some features can be ignored or not executed.Another point, it is shown or discussed mutual
Coupling, direct-coupling or communication connection can be the INDIRECT COUPLING or communication link by some communication interfaces, device or unit
It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in the executable non-volatile computer-readable storage medium of a processor.Based on this understanding, the application
Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with soft in other words
The form of part product embodies, and the computer software product is stored in a storage medium, including some instructions to
So that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation of the application
The all or part of the steps of example the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. it is various
It can store the medium of program code.
The above is only the protection scopes of the specific embodiment of the application, but the application to be not limited thereto, any to be familiar with
Those skilled in the art within the technical scope of the present application, can easily think of the change or the replacement, and should all cover
Within the protection scope of the application.Therefore, the protection scope of the application should be subject to the protection scope in claims.
Claims (10)
1. a kind of method of determining cheating flow, which is characterized in that the described method includes:
Target resource is obtained when being repeatedly clicked, clicks corresponding user behavior data every time;
According to the user behavior data, the click location coordinate when target resource is clicked every time is determined;
Detection is repeatedly clicked in corresponding click location coordinate, if there are the identical click location coordinates of coordinate;
If it exists, then the identical click location coordinate of coordinate is determined as target location coordinate;
According to the target location coordinate, cheating flow is determined.
2. the method according to claim 1, wherein obtaining the user behavior data according to following steps:
It disposes to click for the target resource and monitors script;
Monitor whether target resource described in script monitor is clicked based on the click;
When listening to the target resource and being clicked, obtains this time and click the corresponding user behavior data.
3. determining the mesh the method according to claim 1, wherein described according to the user behavior data
Click location coordinate when mark resource is clicked every time, comprising:
When identifying that the target resource is clicked from user behavior data, the page ruler of the page where the target resource
It is very little, and click the relative position coordinates relative to the page;
According to the mapping relations between the page size and pre-set dimension, the relative position coordinates are converted into click location
Coordinate.
4. the method according to claim 1, wherein described according to the target location coordinate, determining cheating stream
Amount, comprising:
According to the user behavior data, the first number of clicks and the target position that the target resource is clicked are counted
Set corresponding second number of clicks of coordinate;
Determine the ratio between second number of clicks and first number of clicks, and judge the ratio whether be greater than or
Equal to preset threshold;
If the ratio is greater than or equal to the preset threshold, determine caused by click corresponding with the target location coordinate
Flow is cheating flow.
5. the method according to claim 1, wherein determining cheating according to the target location coordinate described
After flow, the method also includes:
According to the user behavior data corresponding with the target location coordinate, the access originator of the cheating flow is determined, and
The click behavior of the access originator is intercepted.
6. a kind of device of determining cheating flow, which is characterized in that described device includes:
Module is obtained, for obtaining target resource when being repeatedly clicked, clicks corresponding user behavior data every time;
First determining module, for determining the click when target resource is clicked every time according to the user behavior data
Position coordinates;
Detection module is repeatedly clicked in corresponding click location coordinate for detecting, if there are the identical clicks of coordinate
Position coordinates;If it exists, then the identical click location coordinate of coordinate is determined as target location coordinate;
Second determining module, for determining cheating flow according to the target location coordinate.
7. device according to claim 6, which is characterized in that the acquisition module, for obtaining institute according to following steps
State user behavior data:
It disposes to click for the target resource and monitors script;
Monitor whether target resource described in script monitor is clicked based on the click;
When listening to the target resource and being clicked, obtains this time and click the corresponding user behavior data.
8. device according to claim 6, which is characterized in that first determining module, for true according to following steps
Click location coordinate when the fixed target resource is clicked every time:
When identifying that the target resource is clicked from user behavior data, the page ruler of the page where the target resource
It is very little, and click the relative position coordinates relative to the page;
According to the mapping relations between the page size and pre-set dimension, the relative position coordinates are converted into click location
Coordinate.
9. a kind of electronic equipment characterized by comprising processor, memory and bus, the memory are stored with the place
The executable machine readable instructions of device are managed, when electronic equipment operation, by described between the processor and the memory
Bus is communicated, and is executed as described in any one of claims 1 to 5 when the machine readable instructions are run by the processor
Really the step of being set for the method for disadvantage flow.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program executes when the computer program is run by processor and is set for disadvantage flow really as described in any one of claims 1 to 5
Method the step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910662477.9A CN110381063A (en) | 2019-07-22 | 2019-07-22 | A kind of method and device of determining cheating flow |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910662477.9A CN110381063A (en) | 2019-07-22 | 2019-07-22 | A kind of method and device of determining cheating flow |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110381063A true CN110381063A (en) | 2019-10-25 |
Family
ID=68254841
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910662477.9A Pending CN110381063A (en) | 2019-07-22 | 2019-07-22 | A kind of method and device of determining cheating flow |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110381063A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110909353A (en) * | 2019-11-28 | 2020-03-24 | 网易(杭州)网络有限公司 | Plug-in detection method and device |
CN111611520A (en) * | 2020-05-28 | 2020-09-01 | 北京学之途网络科技有限公司 | Monitoring method and device for flow cheating, electronic equipment and storage medium |
CN111610926A (en) * | 2020-05-27 | 2020-09-01 | 北京学之途网络科技有限公司 | Touch event attribute judgment method and device and electronic equipment |
CN111611521A (en) * | 2020-05-28 | 2020-09-01 | 北京学之途网络科技有限公司 | Monitoring method and device for flow cheating, electronic equipment and storage medium |
CN111612550A (en) * | 2020-05-28 | 2020-09-01 | 北京学之途网络科技有限公司 | Advertisement trigger cheating identification method and device, electronic equipment and storage medium |
CN111625819A (en) * | 2020-05-26 | 2020-09-04 | 北京思特奇信息技术股份有限公司 | Method and system for preventing client from using plug-in |
CN111722982A (en) * | 2020-06-19 | 2020-09-29 | 广州万唯邑众信息科技有限公司 | Method and device for detecting whether machine clicks or not |
CN112399352A (en) * | 2020-11-04 | 2021-02-23 | 北京嘀嘀无限科技发展有限公司 | Cheating behavior recognition method, equipment and storage medium |
CN113360864A (en) * | 2021-06-01 | 2021-09-07 | 掌阅科技股份有限公司 | Anti-cheating method, electronic device and computer storage medium |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009132148A2 (en) * | 2008-04-22 | 2009-10-29 | The 41St Parameter, Inc. | Systems and methods for security management based on cursor events |
CN103365441A (en) * | 2013-06-24 | 2013-10-23 | 福州博远无线网络科技有限公司 | Method for remotely controlling Android mobile phone desktop through computer terminal |
CN104182663A (en) * | 2013-05-27 | 2014-12-03 | 阿里巴巴集团控股有限公司 | Method and device for identifying simulator operation |
CN105183873A (en) * | 2015-09-18 | 2015-12-23 | 北京博雅立方科技有限公司 | Malicious clicking behavior detection method and device |
CN105656982A (en) * | 2015-03-23 | 2016-06-08 | 深圳酷派技术有限公司 | IMS (IP Multimedia Subsystem) technology based remote control method and wireless terminal |
CN105677221A (en) * | 2015-12-30 | 2016-06-15 | 广州优视网络科技有限公司 | Method and device for improving application data detecting accuracy and equipment |
CN106101130A (en) * | 2016-07-08 | 2016-11-09 | 北京易华录信息技术股份有限公司 | A kind of network malicious data detection method, Apparatus and system |
CN106097000A (en) * | 2016-06-02 | 2016-11-09 | 腾讯科技(深圳)有限公司 | A kind of information processing method and server |
CN106254368A (en) * | 2016-08-24 | 2016-12-21 | 杭州迪普科技有限公司 | The detection method of Web vulnerability scanning and device |
CN106506764A (en) * | 2016-10-10 | 2017-03-15 | 武汉斗鱼网络科技有限公司 | A kind of many mobile phone remote control systems and method |
CN107102886A (en) * | 2017-04-14 | 2017-08-29 | 北京洋浦伟业科技发展有限公司 | The detection method and device of Android simulator |
CN108073597A (en) * | 2016-11-10 | 2018-05-25 | 北京国双科技有限公司 | The page clicks on behavior methods of exhibiting, device and system |
CN109471987A (en) * | 2018-10-10 | 2019-03-15 | 北京奇虎科技有限公司 | Thermodynamic chart processing method, device and electronic equipment |
-
2019
- 2019-07-22 CN CN201910662477.9A patent/CN110381063A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009132148A2 (en) * | 2008-04-22 | 2009-10-29 | The 41St Parameter, Inc. | Systems and methods for security management based on cursor events |
CN104182663A (en) * | 2013-05-27 | 2014-12-03 | 阿里巴巴集团控股有限公司 | Method and device for identifying simulator operation |
CN103365441A (en) * | 2013-06-24 | 2013-10-23 | 福州博远无线网络科技有限公司 | Method for remotely controlling Android mobile phone desktop through computer terminal |
CN105656982A (en) * | 2015-03-23 | 2016-06-08 | 深圳酷派技术有限公司 | IMS (IP Multimedia Subsystem) technology based remote control method and wireless terminal |
CN105183873A (en) * | 2015-09-18 | 2015-12-23 | 北京博雅立方科技有限公司 | Malicious clicking behavior detection method and device |
CN105677221A (en) * | 2015-12-30 | 2016-06-15 | 广州优视网络科技有限公司 | Method and device for improving application data detecting accuracy and equipment |
CN106097000A (en) * | 2016-06-02 | 2016-11-09 | 腾讯科技(深圳)有限公司 | A kind of information processing method and server |
CN106101130A (en) * | 2016-07-08 | 2016-11-09 | 北京易华录信息技术股份有限公司 | A kind of network malicious data detection method, Apparatus and system |
CN106254368A (en) * | 2016-08-24 | 2016-12-21 | 杭州迪普科技有限公司 | The detection method of Web vulnerability scanning and device |
CN106506764A (en) * | 2016-10-10 | 2017-03-15 | 武汉斗鱼网络科技有限公司 | A kind of many mobile phone remote control systems and method |
CN108073597A (en) * | 2016-11-10 | 2018-05-25 | 北京国双科技有限公司 | The page clicks on behavior methods of exhibiting, device and system |
CN107102886A (en) * | 2017-04-14 | 2017-08-29 | 北京洋浦伟业科技发展有限公司 | The detection method and device of Android simulator |
CN109471987A (en) * | 2018-10-10 | 2019-03-15 | 北京奇虎科技有限公司 | Thermodynamic chart processing method, device and electronic equipment |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110909353A (en) * | 2019-11-28 | 2020-03-24 | 网易(杭州)网络有限公司 | Plug-in detection method and device |
CN111625819A (en) * | 2020-05-26 | 2020-09-04 | 北京思特奇信息技术股份有限公司 | Method and system for preventing client from using plug-in |
CN111625819B (en) * | 2020-05-26 | 2023-04-28 | 北京思特奇信息技术股份有限公司 | Method and system for preventing client from using plug-in |
CN111610926A (en) * | 2020-05-27 | 2020-09-01 | 北京学之途网络科技有限公司 | Touch event attribute judgment method and device and electronic equipment |
CN111611520A (en) * | 2020-05-28 | 2020-09-01 | 北京学之途网络科技有限公司 | Monitoring method and device for flow cheating, electronic equipment and storage medium |
CN111611521A (en) * | 2020-05-28 | 2020-09-01 | 北京学之途网络科技有限公司 | Monitoring method and device for flow cheating, electronic equipment and storage medium |
CN111612550A (en) * | 2020-05-28 | 2020-09-01 | 北京学之途网络科技有限公司 | Advertisement trigger cheating identification method and device, electronic equipment and storage medium |
CN111611521B (en) * | 2020-05-28 | 2023-11-03 | 北京学之途网络科技有限公司 | Flow cheating monitoring method and device, electronic equipment and storage medium |
CN111611520B (en) * | 2020-05-28 | 2024-03-08 | 北京明略昭辉科技有限公司 | Flow cheating monitoring method and device, electronic equipment and storage medium |
CN111722982A (en) * | 2020-06-19 | 2020-09-29 | 广州万唯邑众信息科技有限公司 | Method and device for detecting whether machine clicks or not |
CN112399352A (en) * | 2020-11-04 | 2021-02-23 | 北京嘀嘀无限科技发展有限公司 | Cheating behavior recognition method, equipment and storage medium |
CN113360864A (en) * | 2021-06-01 | 2021-09-07 | 掌阅科技股份有限公司 | Anti-cheating method, electronic device and computer storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110381063A (en) | A kind of method and device of determining cheating flow | |
CN107168854B (en) | Internet advertisement abnormal click detection method, device, equipment and readable storage medium | |
US8413250B1 (en) | Systems and methods of classifying sessions | |
US20090024971A1 (en) | Cursor path vector analysis for detecting click fraud | |
CN107566358A (en) | A kind of Risk-warning reminding method, device, medium and equipment | |
US20160092916A1 (en) | Pixel cluster transit monitoring for detecting click fraud | |
CN106294508B (en) | Brushing amount tool detection method and device | |
CN110609937A (en) | Crawler identification method and device | |
CN110298662B (en) | Automatic detection method and device for transaction repeated submission | |
CN112733045B (en) | User behavior analysis method and device and electronic equipment | |
CN109271762B (en) | User authentication method and device based on slider verification code | |
CN109726543B (en) | Login method and device of application program, terminal equipment and storage medium | |
CN109547426A (en) | Service response method and server | |
CN111160919B (en) | Block chain address risk assessment method and device | |
US9306958B2 (en) | Methods, systems and media for detecting non-intended traffic using co-visitation information | |
US8719088B2 (en) | Pixel cluster transit monitoring for detecting click fraud | |
CN108243068A (en) | A kind of method and server of determining abnormal flow | |
WO2021262344A1 (en) | Method and apparatus to detect scripted network traffic | |
CN110365682A (en) | A kind of anti-cheat method and device | |
CN109587248B (en) | User identification method, device, server and storage medium | |
CN107465718A (en) | Across the ID recognition methods of application and device, storage medium, terminal | |
CN114697079B (en) | Method and system for detecting illegal user of application client | |
CN110533297B (en) | Method and device for identifying abnormal equipment | |
CN112399352B (en) | Cheating behavior identification method, device and storage medium | |
CN113923190A (en) | Method and device for identifying equipment identification jump, server and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191025 |
|
RJ01 | Rejection of invention patent application after publication |