CN104915455A - Website exception access identification method and system based on user behaviors - Google Patents

Website exception access identification method and system based on user behaviors Download PDF

Info

Publication number
CN104915455A
CN104915455A CN201510383614.7A CN201510383614A CN104915455A CN 104915455 A CN104915455 A CN 104915455A CN 201510383614 A CN201510383614 A CN 201510383614A CN 104915455 A CN104915455 A CN 104915455A
Authority
CN
China
Prior art keywords
abnormal
visits
access
website
chemical reaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510383614.7A
Other languages
Chinese (zh)
Other versions
CN104915455B (en
Inventor
房鹏展
张燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Focus Technology Co Ltd
Original Assignee
Focus Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Focus Technology Co Ltd filed Critical Focus Technology Co Ltd
Priority to CN201510383614.7A priority Critical patent/CN104915455B/en
Publication of CN104915455A publication Critical patent/CN104915455A/en
Application granted granted Critical
Publication of CN104915455B publication Critical patent/CN104915455B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Abstract

The invention discloses a website exception access identification method based on user behaviors. The website exception access identification method comprises the following steps: carrying out analysis processing on a website log, dividing a log record into a plurality of visits according to IP (Internet Protocol) and access interval time, and importing the visits into a database, wherein the access interval time is 30 minutes; aiming at each visits to carry out distributed computation on measurement indexes under four categories including continuous clicking, identity transformation, access sources and site distribution; carrying out distribution analysis on each measurement index, extracting an exception threshold value of each index, and extracting an exception judgment rule of each category; and according to the extracted threshold value of each index and the exception judgment rule, judging whether the continuous clicking, the identity transformation, the access sources and the site distribution are abnormal or not through judging whether the index is abnormal or not. The method and the system can effectively exclude an exception access record and improve the statistics and mining accuracy of subsequent user behaviors.

Description

A kind of access recognition methods of the website abnormal based on user behavior and system
Technical field
The present invention relates to data cleansing field, particularly a kind of website abnormal access recognition methods and system.
Background technology
Growing along with Internet technology, Internet user's number also day by day increases, and that accumulates over a long period creates a large amount of web logs, by the analysis to these large data, better can hold the Behavior preference of user, therefrom excavate larger commercial opportunity.But, but find have a lot of exceptions to click behavior in actual analysis, generally artificially can not accomplish, also have some clicks to be difficult to the normal intention being interpreted as user, be probably subject to the driving of certain improper object, such as the behavior of brush data, fraud etc.These junk datas disturb the collection of Internet firm's field feedback greatly, also and then to the value of analysis result also create significant impact, therefore get rid of these exception records for follow-up analysis and excavate particularly important.
Summary of the invention
The present invention in this context, propose the access recognition methods of a kind of Network Abnormal based on user behavior and system, mainly for four kinds of common exceptions: adopting consecutive click chemical reaction is abnormal, identity conversion is abnormal, access source exception and website abnormal distribution each provide corresponding recognition methods, last and consider and give abnormal log cleaning program.The method can effectively eliminate abnormal access record, improves the accuracy of subsequent user behavioral statistics and excavation.
Technical solution of the present invention is, a kind of access of the Network Abnormal based on user behavior recognition methods, comprises the steps:
Step one: web log file is carried out dissection process, is divided into multiple visitor visits (access time interval is 30 minutes) according to ip, access time interval by log recording, and imports in database;
Step 2: for each visits, the Measure Indexes under four classifications that distribution calculates adopting consecutive click chemical reaction, identity converts, access is originated, website distributes;
Step 3: carry out distributional analysis to each Measure Indexes, extracts the threshold value of each Indexes Abnormality, and extracts the abnormality juding rule of each classification;
Step 4: according to the metrics-thresholds extracted and abnormality juding rule, whether extremely judge whether extremely the conversion of adopting consecutive click chemical reaction, identity, access source, website distribute four classifications by index, and record abnormal data corresponding to this visits, be saved in database;
Step 5: when subsequent analysis is implemented with excavation, according to reality to the rate of precision needed for abnormal data filtration and coverage rate, selects suitable abnormal data to filter.
The present invention discloses a kind of Network Abnormal based on user behavior access recognition system, comprising: data source modules, web log file pretreatment module, anomalous identification module, abnormal click mark and filtering module.
Described data source modules, for the basic data stayed during recording user access websites, mainly website user's access log, comprises and comes from operation system, text or other data structure source.
Described web log file pretreatment module, resolves daily record and the setting of abnormal index threshold value.Comprising two each and every one submodules: daily record analyzing sub-module, metrics-thresholds setting submodule.Described daily record analyzing sub-module, carries out dissection process by web log file, and according to ip, log recording is divided into multiple visits (access time interval is 30 minutes) by the access time, and imports in database.Described metrics-thresholds setting submodule, for each visits, each Measure Indexes under four classifications that distribution calculates adopting consecutive click chemical reaction, identity converts, access is originated, website distributes, by the distributional analysis to each index, in conjunction with actual business, select suitable outlier threshold.
Described anomalous identification module, carries out anomalous identification to each visits.Comprising four each and every one submodules: the abnormal submodule of adopting consecutive click chemical reaction, identity convert abnormal submodule, access source abnormal submodule, website abnormal distribution submodule.The abnormal submodule of described adopting consecutive click chemical reaction, compares index value corresponding under each visits adopting consecutive click chemical reaction classification and outlier threshold, in conjunction with classification abnormality juding rule, judges whether this visits exists adopting consecutive click chemical reaction abnormal.Described identity converts abnormal submodule, corresponding index value and outlier threshold under each visits identity conversion classification is compared, in conjunction with classification abnormality juding rule, judges whether this visits exists identity conversion abnormal.The abnormal submodule in described access source, compares corresponding index value and outlier threshold under each visits website distribution classification, in conjunction with classification abnormality juding rule, judges whether this visits exists website abnormal distribution.Described website abnormal distribution submodule, compares corresponding index value and outlier threshold under each visits website distribution classification, in conjunction with classification abnormality juding rule, judges whether this visits exists website abnormal distribution.
Described abnormal click marks and filtering module, gathers, marks the abnormal class data of each visits, filter abnormal for four classifications according to actual needs before analyzing and excavating to the visits exceeding certain abnormal class data.
Beneficial effect of the present invention: click for the exception in web log file and carry out abnormal behaviour classification, and provide corresponding recognition methods respectively, finally all kinds of exception is integrated the cleaning method providing access log abnormal data.Through practice, the method can effectively eliminate abnormal access record, reduces the interference of abnormal data as much as possible, thus improves the confidence level of follow-up log analysis and Result, has given play to larger value.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet that the website abnormal access in the embodiment of the present invention identifies.
Fig. 2 is the structural representation that the website abnormal access in the embodiment of the present invention identifies.
Embodiment
Below in conjunction with the drawings and specific embodiments, the present invention is described in further detail.
In the present invention, from adopting consecutive click chemical reaction, identity converts, access is originated, website distributes, and anomalous identification is carried out to access log in four aspects, finally for each visits, mark the classification number of its exception, subsequent analysis is filtered according to actual needs with excavation.
Consult shown in Fig. 1, the flow chart of data processing of the embodiment of the present invention, concrete steps are:
Step 11: web log file is carried out dissection process, according to ip, log recording is divided into multiple visits (access time interval is 30 minutes) by the access time, and imports in database.
Step 12: for each visits, each Measure Indexes under four classifications that distribution calculates adopting consecutive click chemical reaction, identity converts, access is originated, website distributes.In embodiments of the present invention, choose following index to identify:
● adopting consecutive click chemical reaction chooses the clicks average per second of adopting consecutive click chemical reaction, the number of seconds accounting of adopting consecutive click chemical reaction.Wherein, for each visits, adopting consecutive click chemical reaction refers in 1 second and clicks more than 2 times and 2 times, and the number of seconds accounting of adopting consecutive click chemical reaction refers to that the number of seconds of adopting consecutive click chemical reaction accounts for the ratio that this visits always clicks number of seconds.
● cookie number, average each cookie clicks, cookie clicks standard deviation, cookie interleaving access ratio are chosen in identity conversion.Wherein, for each visits, cookie number refers to that the cookie that this visits uses records number, under cookie interleaving access refers to this visits, if the access time of certain cookie is in the access-hours of other any cookie, then counting this cookie is interleaving access, interleaving access ratio then accounts for the ratio of total cookie number for the cookie number that there is interleaving access, for weighing the behavior clicked by the multiple computers (multiple user) under the mode adopting consecutive click chemical reaction of clear cookie or same ip for individual machine simultaneously.
● access source choose average each referer (source page that user clicks at every turn) clicks, total clicks, directly access accounting.
● the number of clicks of average each page, the click distribution proportion of each type page are chosen in website distribution.
Step 13: carry out distributional analysis to each index, extracts the threshold value of each Indexes Abnormality, and extracts the abnormality juding rule of each classification.In embodiments of the present invention, extracting rule is as follows:
By index, whether step 14: according to the metrics-thresholds extracted and abnormality juding, judge whether extremely the conversion of adopting consecutive click chemical reaction, identity, access source, website distribute four classifications, and record abnormal data corresponding to this visits, are saved in database extremely.
Step 15: when subsequent analysis is implemented with excavation, according to reality to the rate of precision needed for abnormal filtration and coverage rate, selects suitable abnormal data to filter.
Consult shown in Fig. 2, the system architecture of the embodiment of the present invention, comprising:
Data source modules 21, web log file pretreatment module 22, anomalous identification module 23, abnormal click mark and filtering module 24.
Data source modules 21, for the basic data stayed during recording user access websites, mainly website user's access log, may come from operation system, text or other data structure source.
Web log file pretreatment module 22, resolves daily record and the setting of abnormal index threshold value.Comprising two each and every one submodules: daily record analyzing sub-module 221, metrics-thresholds setting submodule 222.
Daily record analyzing sub-module 221, carries out dissection process by web log file, and according to ip, log recording is divided into multiple visits (access time interval is 30 minutes) by the access time, and imports in database.
Metrics-thresholds setting submodule 222, for each visits, each Measure Indexes under four classifications that distribution calculates adopting consecutive click chemical reaction, identity converts, access is originated, website distributes, by the distributional analysis to each index, in conjunction with actual business, select suitable outlier threshold.
Anomalous identification module 23, carries out anomalous identification to each visits.Comprising four each and every one submodules: the abnormal submodule 231 of adopting consecutive click chemical reaction, identity convert abnormal submodule 232, access source abnormal submodule 233, website abnormal distribution submodule 244.
The abnormal submodule 231 of adopting consecutive click chemical reaction, compares index value corresponding under each visits adopting consecutive click chemical reaction classification and outlier threshold, in conjunction with classification abnormality juding rule, judges whether this visits exists adopting consecutive click chemical reaction abnormal.
Identity converts abnormal submodule 232, corresponding index value and outlier threshold under each visits identity conversion classification is compared, in conjunction with classification abnormality juding rule, judges whether this visits exists identity conversion abnormal.
The abnormal submodule 231 in access source, compares corresponding index value and outlier threshold under each visits access source categories, in conjunction with classification abnormality juding rule, judges whether this visits exists access source extremely.
Website abnormal distribution submodule 231, compares corresponding index value and outlier threshold under each visits website distribution classification, in conjunction with classification abnormality juding rule, judges whether this visits exists website abnormal distribution.
Abnormal click marks and filtering module 24, gathers, marks the abnormal class number of each visits, filter abnormal for four classifications according to actual needs before analyzing and excavating to the visits exceeding certain abnormal class number.

Claims (3)

1., based on a Network Abnormal access recognition methods for user behavior, it is characterized in that comprising the steps:
Step one: web log file is carried out dissection process, is divided into multiple visitor visits according to ip, access time interval by log recording, and access time interval is 30 minutes, and imports in database;
Step 2: for each visits, the Measure Indexes under four classifications that distribution calculates adopting consecutive click chemical reaction, identity converts, access is originated, website distributes;
Step 3: carry out distributional analysis to each Measure Indexes, extracts the threshold value of each Indexes Abnormality, and extracts the abnormality juding rule of each classification;
Step 4: according to the metrics-thresholds extracted and abnormality juding rule, whether extremely judge whether extremely the conversion of adopting consecutive click chemical reaction, identity, access source, website distribute four classifications by index, and record abnormal data corresponding to this visits, be saved in database;
Step 5: when subsequent analysis is implemented with excavation, according to reality to the rate of precision needed for abnormal data filtration and coverage rate, selects suitable abnormal data to filter.
2. Network Abnormal access recognition methods according to claim 1, is characterized in that choosing following index identifies:
1) adopting consecutive click chemical reaction chooses the clicks average per second of adopting consecutive click chemical reaction, the number of seconds accounting of adopting consecutive click chemical reaction; Wherein, for each visits, adopting consecutive click chemical reaction refers in 1 second and clicks more than 2 times and 2 times, and the number of seconds accounting of adopting consecutive click chemical reaction refers to that the number of seconds of adopting consecutive click chemical reaction accounts for the ratio that this visits always clicks number of seconds;
2) cookie number, average each cookie clicks, cookie clicks standard deviation, cookie interleaving access ratio are chosen in identity conversion;
3) access source choose the source page that average each user clicks at every turn clicks, total clicks, directly access accounting;
4) number of clicks of average each page, the click distribution proportion of each type page are chosen in website distribution.
3. the recognition system of Network Abnormal access recognition methods according to claim 1 and 2, is characterized in that comprising: data source modules, web log file pretreatment module, anomalous identification module, abnormal click mark and filtering module;
Described data source modules, for the basic data stayed during recording user access websites, mainly website user's access log, comprises and comes from operation system, text or other data structure source;
Described web log file pretreatment module, resolves daily record and the setting of abnormal index threshold value.Comprising two each and every one submodules: daily record analyzing sub-module, metrics-thresholds setting submodule; Described daily record analyzing sub-module, carries out dissection process by web log file, and according to ip, log recording is divided into multiple visits by the access time, and access time interval is 30 minutes, and imports in database.Described metrics-thresholds setting submodule, for each visits, each Measure Indexes under four classifications that distribution calculates adopting consecutive click chemical reaction, identity converts, access is originated, website distributes, by the distributional analysis to each index, in conjunction with actual business, select suitable outlier threshold;
Described anomalous identification module, carries out anomalous identification to each visits.Comprising four each and every one submodules: the abnormal submodule of adopting consecutive click chemical reaction, identity convert abnormal submodule, access source abnormal submodule, website abnormal distribution submodule;
The abnormal submodule of described adopting consecutive click chemical reaction, compares index value corresponding under each visits adopting consecutive click chemical reaction classification and outlier threshold, in conjunction with classification abnormality juding rule, judges whether this visits exists adopting consecutive click chemical reaction abnormal;
Described identity converts abnormal submodule, corresponding index value and outlier threshold under each visits identity conversion classification is compared, in conjunction with classification abnormality juding rule, judges whether this visits exists identity conversion abnormal;
The abnormal submodule in described access source, compares corresponding index value and outlier threshold under each visits website distribution classification, in conjunction with classification abnormality juding rule, judges whether this visits exists website abnormal distribution;
Described website abnormal distribution submodule, compares corresponding index value and outlier threshold under each visits website distribution classification, in conjunction with classification abnormality juding rule, judges whether this visits exists website abnormal distribution;
Described abnormal click marks and filtering module, gathers, marks the abnormal class data of each visits, filter abnormal for four classifications according to actual needs before analyzing and excavating to the visits exceeding certain abnormal class data.
CN201510383614.7A 2015-07-02 2015-07-02 A kind of website abnormal based on user behavior accesses recognition methodss and system Active CN104915455B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510383614.7A CN104915455B (en) 2015-07-02 2015-07-02 A kind of website abnormal based on user behavior accesses recognition methodss and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510383614.7A CN104915455B (en) 2015-07-02 2015-07-02 A kind of website abnormal based on user behavior accesses recognition methodss and system

Publications (2)

Publication Number Publication Date
CN104915455A true CN104915455A (en) 2015-09-16
CN104915455B CN104915455B (en) 2017-03-15

Family

ID=54084518

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510383614.7A Active CN104915455B (en) 2015-07-02 2015-07-02 A kind of website abnormal based on user behavior accesses recognition methodss and system

Country Status (1)

Country Link
CN (1) CN104915455B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105610616A (en) * 2015-12-29 2016-05-25 赛尔网络有限公司 Method and system for performing statistics to obtain average flow of single IP (Internet Protocol) of access network based on ICP (Internet Content Provider) activity
CN106341407A (en) * 2016-09-19 2017-01-18 成都知道创宇信息技术有限公司 Abnormal access log mining method based on website picture and apparatus thereof
CN106612202A (en) * 2015-10-27 2017-05-03 网易(杭州)网络有限公司 Method and system for pre-estimate and judgment of amount brushing of online game channel
CN106611348A (en) * 2015-10-23 2017-05-03 北京国双科技有限公司 Anomaly traffic detection method and apparus
CN106611346A (en) * 2015-10-22 2017-05-03 北京国双科技有限公司 Visitor screening method and device
CN106817235A (en) * 2015-11-30 2017-06-09 北京国双科技有限公司 The detection method and device of website abnormal visit capacity
CN107370719A (en) * 2016-05-13 2017-11-21 阿里巴巴集团控股有限公司 Abnormal login recognition methods, apparatus and system
CN107491970A (en) * 2017-08-17 2017-12-19 北京三快在线科技有限公司 Anti- cheating detection monitoring method and system and computing device in real time
CN107578263A (en) * 2017-07-21 2018-01-12 北京奇艺世纪科技有限公司 A kind of detection method, device and the electronic equipment of advertisement abnormal access
CN107888602A (en) * 2017-11-23 2018-04-06 北京白山耘科技有限公司 A kind of method and device for detecting abnormal user
CN108122116A (en) * 2016-11-29 2018-06-05 腾讯科技(深圳)有限公司 A kind of monitoring and managing method and system of product promotion channel
CN108255696A (en) * 2016-12-29 2018-07-06 航天信息软件技术有限公司 A kind of analysis method and system acquired based on user to web page operation behavior
CN108270727A (en) * 2016-12-30 2018-07-10 北京国双科技有限公司 Abnormal data analysis method and device
CN108683670A (en) * 2018-05-21 2018-10-19 中国科学院计算机网络信息中心 The malicious traffic stream recognition methods accessed based on website application system and system
CN111416790A (en) * 2019-01-04 2020-07-14 北京数安鑫云信息技术有限公司 Network abnormal access intelligent identification method and device based on user behavior, storage medium and computer equipment
CN117201090A (en) * 2023-08-28 2023-12-08 山东亚泽信息技术有限公司 Abnormal behavior detection processing method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080162688A1 (en) * 2007-01-03 2008-07-03 International Business Machines Corporation Proactive problem resolution system, method of proactive problem resolution and program product therefor
CN101232399A (en) * 2008-02-18 2008-07-30 刘峰 Analytical method of website abnormal visit
CN103297435A (en) * 2013-06-06 2013-09-11 中国科学院信息工程研究所 Abnormal access behavior detection method and system on basis of WEB logs
CN104462445A (en) * 2014-12-15 2015-03-25 北京国双科技有限公司 Webpage access data processing method and webpage access data processing device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080162688A1 (en) * 2007-01-03 2008-07-03 International Business Machines Corporation Proactive problem resolution system, method of proactive problem resolution and program product therefor
CN101232399A (en) * 2008-02-18 2008-07-30 刘峰 Analytical method of website abnormal visit
CN103297435A (en) * 2013-06-06 2013-09-11 中国科学院信息工程研究所 Abnormal access behavior detection method and system on basis of WEB logs
CN104462445A (en) * 2014-12-15 2015-03-25 北京国双科技有限公司 Webpage access data processing method and webpage access data processing device

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106611346A (en) * 2015-10-22 2017-05-03 北京国双科技有限公司 Visitor screening method and device
CN106611348A (en) * 2015-10-23 2017-05-03 北京国双科技有限公司 Anomaly traffic detection method and apparus
CN106612202A (en) * 2015-10-27 2017-05-03 网易(杭州)网络有限公司 Method and system for pre-estimate and judgment of amount brushing of online game channel
CN106817235A (en) * 2015-11-30 2017-06-09 北京国双科技有限公司 The detection method and device of website abnormal visit capacity
CN105610616A (en) * 2015-12-29 2016-05-25 赛尔网络有限公司 Method and system for performing statistics to obtain average flow of single IP (Internet Protocol) of access network based on ICP (Internet Content Provider) activity
CN105610616B (en) * 2015-12-29 2019-04-26 赛尔网络有限公司 The single IP average flow rate statistical method of access net and system based on ICP liveness
CN107370719A (en) * 2016-05-13 2017-11-21 阿里巴巴集团控股有限公司 Abnormal login recognition methods, apparatus and system
CN106341407A (en) * 2016-09-19 2017-01-18 成都知道创宇信息技术有限公司 Abnormal access log mining method based on website picture and apparatus thereof
CN108122116A (en) * 2016-11-29 2018-06-05 腾讯科技(深圳)有限公司 A kind of monitoring and managing method and system of product promotion channel
CN108255696A (en) * 2016-12-29 2018-07-06 航天信息软件技术有限公司 A kind of analysis method and system acquired based on user to web page operation behavior
CN108270727A (en) * 2016-12-30 2018-07-10 北京国双科技有限公司 Abnormal data analysis method and device
CN107578263A (en) * 2017-07-21 2018-01-12 北京奇艺世纪科技有限公司 A kind of detection method, device and the electronic equipment of advertisement abnormal access
CN107578263B (en) * 2017-07-21 2021-01-05 北京奇艺世纪科技有限公司 Advertisement abnormal access detection method and device and electronic equipment
CN107491970A (en) * 2017-08-17 2017-12-19 北京三快在线科技有限公司 Anti- cheating detection monitoring method and system and computing device in real time
CN107491970B (en) * 2017-08-17 2021-04-02 北京三快在线科技有限公司 Real-time anti-cheating detection monitoring method and system and computing equipment
CN107888602A (en) * 2017-11-23 2018-04-06 北京白山耘科技有限公司 A kind of method and device for detecting abnormal user
CN108683670A (en) * 2018-05-21 2018-10-19 中国科学院计算机网络信息中心 The malicious traffic stream recognition methods accessed based on website application system and system
CN108683670B (en) * 2018-05-21 2021-08-03 中国科学院计算机网络信息中心 Malicious traffic identification method and system based on website application system access
CN111416790A (en) * 2019-01-04 2020-07-14 北京数安鑫云信息技术有限公司 Network abnormal access intelligent identification method and device based on user behavior, storage medium and computer equipment
CN111416790B (en) * 2019-01-04 2022-08-09 北京数安鑫云信息技术有限公司 Network abnormal access intelligent identification method and device based on user behavior, storage medium and computer equipment
CN117201090A (en) * 2023-08-28 2023-12-08 山东亚泽信息技术有限公司 Abnormal behavior detection processing method and system

Also Published As

Publication number Publication date
CN104915455B (en) 2017-03-15

Similar Documents

Publication Publication Date Title
CN104915455A (en) Website exception access identification method and system based on user behaviors
CN107800591B (en) Unified log data analysis method
CN105357054B (en) Website traffic analysis method, device and electronic equipment
Takekawa et al. Accurate spike sorting for multi‐unit recordings
CN105577440B (en) A kind of network downtime localization method and analytical equipment
CN103178982A (en) Method and device for analyzing log
CN102724059A (en) Website operation state monitoring and abnormal detection based on MapReduce
CN103812961A (en) Method and device for recognizing Internet protocol (IP) addresses of designated class and defending method and system
CN104050178A (en) Internet monitoring anti-spamming method and device
CN102158355A (en) Log event correlation analysis method and device capable of concurrent and interrupted analysis
CN103227734A (en) Method for detecting abnormity of OpenStack cloud platform
CN104182506A (en) Log management method
CN105610616A (en) Method and system for performing statistics to obtain average flow of single IP (Internet Protocol) of access network based on ICP (Internet Content Provider) activity
CN104572976B (en) Website data update method and system
US10255371B2 (en) Methods and systems for identifying multiple devices belonging to a single user by merging deterministic and probabilistic data to generate a cross device data structure
CN105260414A (en) User behavior similarity computing method and device
CN115408586B (en) Intelligent channel operation data analysis method, system, equipment and storage medium
CN104298782A (en) Method for analyzing active access behaviors of internet users
CN104199945A (en) Data storing method and device
CN106131022A (en) A kind of network cooperating attacks storm origin detection method and device
WO2009092090A3 (en) Method and system of tracking, coordinating, and quantifying charitable actions and community service
CN104579771B (en) A kind of analysis method for the action trail that application system is published to user
CN112380126B (en) Web system health prediction device and method
CN112565422B (en) Method, system and storage medium for identifying fault data of power internet of things
CN109145109B (en) User group message propagation abnormity analysis method and device based on social network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant