CN106953832B - Method and system for processing online game suspicious account - Google Patents

Method and system for processing online game suspicious account Download PDF

Info

Publication number
CN106953832B
CN106953832B CN201610009142.3A CN201610009142A CN106953832B CN 106953832 B CN106953832 B CN 106953832B CN 201610009142 A CN201610009142 A CN 201610009142A CN 106953832 B CN106953832 B CN 106953832B
Authority
CN
China
Prior art keywords
login
accounts
account
same
registered
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610009142.3A
Other languages
Chinese (zh)
Other versions
CN106953832A (en
Inventor
黄钟贵
范福生
詹彦安
江洪
李正
郑晟
岳万恕
陈宏展
刘德建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian TQ Digital Co Ltd
Original Assignee
Fujian TQ Digital Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian TQ Digital Co Ltd filed Critical Fujian TQ Digital Co Ltd
Priority to CN201610009142.3A priority Critical patent/CN106953832B/en
Publication of CN106953832A publication Critical patent/CN106953832A/en
Application granted granted Critical
Publication of CN106953832B publication Critical patent/CN106953832B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/131Protocols for games, networked simulations or virtual reality

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method and a system for processing online game suspicious account numbers, which comprises the following steps: acquiring registration information and login information of an account; and counting the same registered IP address, login equipment UUID or other account data registered or logged in the same mode, and determining whether the account is a suspicious account. By the mode, the illegal invalid account number can be rejected, and the load of the game server can be ensured in real time; the method can effectively inhibit a large number of number brushing behaviors in the studio, improve the rights and interests of normal players and user experience, and enable the normal players to log in and play games without being affected.

Description

Method and system for processing online game suspicious account
Technical Field
The invention relates to the technical field of online games, in particular to a method and a system for processing online game suspicious accounts.
Background
At present, a large number of account numbers of a studio exist in normal online games, and a plug-in or a tool is used for carrying out a series of operations of registering the account numbers and logging in the games in a large number, such as behavior of getting reward transactions or behavior of swiping coins and the like which disturbs the order of the games. In order to promote the fairness and justice of the game, a technical scheme for detecting the game in the mode needs to be provided.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the account data of the studio is analyzed and mined, the part of accounts are screened out for specific processing, a good game environment can be provided for the player, and meanwhile, part of load of the server is reduced.
In order to solve the technical problems, the invention adopts the technical scheme that: the method for processing the online game suspicious account number comprises the following steps:
acquiring registration information and login information of an account;
and counting the same registered IP address, login equipment UUID or other account data registered or logged in the same mode, and determining whether the account is a suspicious account.
In order to solve the above problem, the present invention further provides a system for processing a suspicious online game account, including:
the information acquisition module is used for acquiring the registration information and the login information of the account;
and the statistical analysis module is used for counting the data of the same registered IP address, login equipment UUID or other account numbers registered or logged in the same mode and determining whether the account numbers are suspicious.
The invention has the beneficial effects that: different from the prior art, the invention obtains the detection result by acquiring the registration information and the login information of the account and performing statistical analysis, and respectively lists the account numbers in the corresponding lists. By the mode, the illegal invalid account number can be rejected, and the load of the game server can be ensured in real time; the method can effectively inhibit a large number of number brushing behaviors in the studio, improve the rights and interests of normal players and user experience, and enable the normal players to log in and play games without being affected.
Drawings
FIG. 1 is a schematic flow chart of a first embodiment of the method of the present invention;
FIG. 2 is a first operational schematic diagram of an embodiment of the present invention;
FIG. 3 is a second operational diagram of an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of an embodiment of the system of the present invention.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
The most key idea of the invention is to analyze and count the data of the account from the stage of registration to login, find out the illegal account and process the illegal account.
Referring to fig. 1 to fig. 3, an embodiment of the present invention provides a method for processing a suspicious account of an online tour, including:
s1: acquiring registration information and login information of an account;
s2: and counting account data registered or logged in the same registration IP address, login equipment UUID (Universal unique identifier, computer unique identifier) or other same modes, and determining whether the account is a suspicious account.
Specifically, the invention requires a registration server, a game login client, an application program data layer, and application program service logic processing;
the registration information comprises a registration IP address, a registration mode and a UUID of a registration device; the registration mode comprises webpage registration, client APP registration and registration through other APPs;
the login information comprises a login IP address, a login mode and a UUID of login equipment.
When the user registers, the registration server submits the registration IP address of the user and the record of the registration mode (web page registration or client registration) to the application program data layer.
And when the game login client logs in, the login IP address and the PC UUID of the user are submitted to the application data layer.
The application data layer is mainly used for storage and query, such as the existing MySql and SqlServer, and other storage technologies can be used. The layer of data can be used for game client judgment and application service logic processing layer judgment.
In addition, the application program data layer mines, makes statistics and analyses on the data submitted by the registration server and the game client, namely the registration IP, the registration mode, the latest login IP and the latest PCUUID of the user, and mainly performs retrieval statistics on the data. As shown in figure 3 of the drawings,
and the application data layer also comprises a registration IP white (black) list and a white (black) list of the account, which are divided into manual configuration and dynamic configuration. Wherein the manual configuration is the confirmed source, and the dynamic configuration is the system judgment source. The method is mainly used for judging the login of the client. For example, if the user a is listed in the blacklist, when logging in the game client, the client queries the configuration as a blacklist user, and then refuses the user to log in the game.
Therefore, before implementing the scheme of the present invention, a white/black list of the registered IP address, the login IP address, and the account needs to be obtained.
The content of the application data layer statistics includes, but is not limited to:
the number of accounts in a certain time interval of the same login IP, PCUUID and registration IP and the number of accounts with the same prefix or suffix are overlapped, and when the number of accounts reaches a critical configuration condition, the number is processed through application program service logic, for example, the number of the illegal accounts is sealed or the login is blocked. Meanwhile, the subsequent similar data such as the account numbers (login IP, login MAC, and registration IP) can be directly subjected to number sealing processing or the login is blocked.
Specifically, in one particular embodiment:
determining whether the account is a suspicious account or a normal account according to the registration information and the login information; specifically, the following cases can be included but not limited to:
(1) counting the IP of the registered accounts and the corresponding registration mode within a current period of time (such as 5 days), and when the number of the accounts registered in the same registered IP or registration mode or equipment UUID exceeds a certain number, such as 1000, listing the accounts or all the accounts registered through the registered IP or registration mode or equipment UUID as suspicious accounts; for example, if a certain IP registers 1100 accounts in the last 5 days, all of the 1100 accounts are listed as suspicious accounts, and preferably, all of the 1100 accounts and the accounts that the IP has registered in the past are listed as suspicious accounts.
(2) Extracting all accounts which are not logged in the game (namely, are logged in but are not logged in the game for 10 days) within a certain time (such as 10 days) after the registration, counting the registration IP (Internet protocol) or the registration mode of the accounts or the IP which is logged in once or the UUID (user identifier) of a logging-in device, and if the number of the same IP exceeds a certain number (such as 1000), listing the accounts as suspicious accounts. For example, 10000 registered accounts are never logged in the last ten days, the IP addresses of the 10000 accounts during registration are counted, and if 1100 accounts belong to the same IP address for registration, the 1100 accounts are listed as suspicious accounts; or, counting the IP addresses or UUIDs of devices that the 10000 accounts have logged in, and if 2000 accounts have logged in the same IP address or the same device, listing the 2000 accounts as suspicious accounts.
(3) Counting the number of accounts logged in by the same IP address or login mode or device UUID in a recent period (such as 10 days), and if the number of accounts is more than a certain number (such as 1000), regarding the accounts or all accounts logged in by the IP address or login mode or device UUID as suspicious accounts; for example, if a certain IP logs in 1200 accounts in the last 5 days, all 1200 accounts are listed as suspicious accounts, and preferably all 1200 accounts and the accounts that the IP has logged in the past are listed as suspicious accounts.
(4) Extracting all accounts which are not logged in a specific period of time and have the account grades lower than a grade threshold value, counting registered IPs of the accounts or the IP which is logged in once or UUIDs of logging-in equipment, and if the number of the same IPs exceeds a certain number (such as 1000), classifying the accounts as suspicious accounts. For example, 10000 registered accounts are never logged in the last ten days, the grades of the accounts are lower than 10 grades, the IP addresses of the 10000 accounts during registration are counted, and if 1100 accounts belong to the same IP address for registration, the 1100 accounts are listed as suspicious accounts; or, counting the IP addresses or UUIDs of devices that the 10000 accounts have logged in, and if 2000 accounts have logged in the same IP address or the same device, listing the 2000 accounts as suspicious accounts.
Whether the counted number of accounts is smaller than the account number threshold (1000 described above), the limited time period (10 days or 5 days described above), and the account level threshold (10 levels described above) may be set as needed or according to the network usage.
Further, in the above various methods for determining suspicious account numbers, if the number of the suspicious account numbers exceeds a configuration critical value (e.g., N times of a threshold), the relevant account numbers are directly listed in a blacklist. For example, in the case of the above (1), if 10000 accounts are registered in a certain IP in the last 5 days and the threshold value is 9999, all the accounts or all the accounts registered with the IP are blacklisted. Furthermore, a white list can be set, and the white list can be manually configured and can be manually listed for the accounts of which the account sources are confirmed to be normal. Of course, the blacklist may also be manually configured, and accounts which are not in the above-mentioned counted suspicious accounts but whose account sources are confirmed to be abnormal may be manually blacklisted.
For suspicious accounts, when a user requests login, login is blocked or a number is sealed, and the user can be reminded that the account is abnormal. For the blacklist account, directly blocking login or number sealing; the suspicious account and the blacklist account are consistent and need to be blocked to log in and seal a number, and in order to achieve interactive experience, reminding can be conducted according to actual conditions. And (4) the white list account is not processed, and the account can be normally logged in. Of course, most accounts may not be suspicious accounts, nor blacklist or whitelist accounts, and may not be processed, and may be normally logged in for use.
Different from the prior art, the invention obtains the detection result by acquiring the registration information and the login information of the account and performing statistical analysis, and respectively lists the account numbers in the corresponding lists. By the mode, the illegal invalid account number can be rejected, and the load of the game server can be ensured in real time; the method can effectively inhibit a large number of number brushing behaviors in the studio, improve the rights and interests of normal players and user experience, and enable the normal players to log in and play games without being affected.
As shown in fig. 4, the present invention further provides a system 100 for processing a suspicious online game account, including:
an information obtaining module 110, configured to obtain registration information and login information of an account;
the statistical analysis module 120 is configured to statistically analyze the same registered IP address, login device UUID, or other account data registered or logged in the same manner, and determine whether the account is a suspicious account.
The registration information comprises a registration IP address, a registration mode and a UUID of a registration device; the registration mode comprises webpage registration, client APP registration and registration through other APPs;
the login information comprises a login IP address, a login mode and a UUID of login equipment.
The system 100 further comprises:
a list setting module 130, configured to obtain a white/black list of the registered IP address, the login IP address, and the account;
and the processing module 140 is configured to list the suspicious account into a white/black list.
The statistical analysis module 120 is specifically configured to:
counting the number of accounts registered or logged in the same registration IP address, login equipment UUID or other same modes, if the number exceeds a preset value, determining the accounts of the number as suspicious accounts, or determining all accounts registered or logged in the same registration IP address, login equipment UUID or other same modes as suspicious accounts.
The statistical analysis module 120 is specifically configured to:
counting registered accounts and the number of the same registered IP addresses or the same registered modes in a specific time period;
or counting the registered accounts with the same registered IP address or the same registered mode and the number thereof in all the registered accounts which are not logged in a specific time period;
or counting login accounts and the number of the login accounts of the same login IP address or login mode or login equipment UUID in a specific time period;
or counting accounts with the same registered IP address, used login IP address or login equipment UUID and the number thereof in all the accounts which are not logged in a specific time period;
or counting accounts and the number of the accounts which are not logged in a specific time period and have the same login IP address or login equipment UUID in the account with the grade lower than the grade threshold;
judging whether the counted account number is larger than an account number threshold value or not;
and if so, determining the accounts as suspicious accounts.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (6)

1. A method for processing a suspicious online game account is characterized by comprising the following steps:
acquiring registration information and login information of an account;
counting the same registered IP address, login equipment UUID or other account data registered or logged in the same mode, and determining whether the account is a suspicious account;
counting the same registered IP address, login equipment UUID or other account data registered or logged in the same mode, and determining whether the account is a suspicious account specifically comprises the following steps:
counting the number of accounts registered or logged in the same registration IP address, login equipment UUID or other same modes, if the number exceeds a preset value, determining the accounts with the number as suspicious accounts, or determining all accounts registered or logged in the same registration IP address, login equipment UUID or other same modes as suspicious accounts;
obtaining detection results according to statistical analysis, and respectively listing the account numbers in corresponding lists;
the suspicious account number refers to an illegal invalid account number;
the account numbers and the number of the account numbers under the same registered IP address, the same login IP address or the same login equipment UUID are counted, and the account numbers comprise:
counting registered accounts and the number of the same registered IP addresses or the same registered modes in a specific time period;
or counting the registered accounts with the same registered IP address or the same registered mode and the number thereof in all the registered accounts which are not logged in a specific time period;
or counting login accounts and the number of the login accounts of the same login IP address or login mode or login equipment UUID in a specific time period;
or counting accounts with the same registered IP address, used login IP address or login equipment UUID and the number thereof in all the accounts which are not logged in a specific time period;
or counting accounts with the same registered IP address, used login IP address or login equipment UUID and the number of accounts which are not logged in a specific time period and have the account level lower than the level threshold value.
2. The method for processing the online game suspicious account according to claim 1, wherein:
the registration information comprises a registration IP address, a registration mode and a UUID of a registration device; the registration mode comprises webpage registration, client APP registration and registration through other APPs;
the login information comprises a login IP address, a login mode and a UUID of login equipment.
3. The method for processing the online game suspicious account according to claim 1,
if the number of the statistics exceeds the critical value, the suspicious account is listed in a blacklist.
4. A system for processing online game suspicious account numbers is characterized by comprising:
the information acquisition module is used for acquiring the registration information and the login information of the account;
the statistical analysis module is used for counting the same registered IP address, login equipment UUID or other account data registered or logged in the same mode, and determining whether the account is a suspicious account;
the statistical analysis module is specifically configured to: counting the number of accounts registered or logged in the same registration IP address, login equipment UUID or other same modes, and if the number of accounts registered or logged in the same registration IP address, login equipment UUID or other same modes exceeds a preset value, determining that all accounts registered or logged in the same registration IP address, login equipment UUID or other same modes are suspicious accounts;
obtaining detection results according to statistical analysis, and respectively listing the account numbers in corresponding lists;
the suspicious account number refers to an illegal invalid account number;
the statistical analysis module is specifically configured to:
counting registered accounts and the number of the same registered IP addresses or the same registered modes in a specific time period;
or counting the registered accounts with the same registered IP address or the same registered mode and the number thereof in all the registered accounts which are not logged in a specific time period;
or counting login accounts and the number of the login accounts of the same login IP address or login mode or login equipment UUID in a specific time period;
or counting accounts with the same registered IP address, used login IP address or login equipment UUID and the number thereof in all the accounts which are not logged in a specific time period;
or counting accounts and the number of the accounts which are not logged in a specific time period and have the same login IP address or login equipment UUID in the account with the grade lower than the grade threshold;
judging whether the counted account number is larger than an account number threshold value or not;
and if so, determining the accounts as suspicious accounts.
5. The system for processing online game suspicious account according to claim 4, characterized in that:
the registration information comprises a registration IP address, a registration mode and a UUID of a registration device; the registration mode comprises webpage registration, client APP registration and registration through other APPs;
the login information comprises a login IP address, a login mode and a UUID of login equipment.
6. The system for processing the online game suspicious account according to claim 4, further comprising:
the list setting module is used for acquiring a white/black list of a registered IP address, a login IP address and an account;
and the processing module is used for listing the suspicious account number in a white/black list.
CN201610009142.3A 2016-01-07 2016-01-07 Method and system for processing online game suspicious account Active CN106953832B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610009142.3A CN106953832B (en) 2016-01-07 2016-01-07 Method and system for processing online game suspicious account

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610009142.3A CN106953832B (en) 2016-01-07 2016-01-07 Method and system for processing online game suspicious account

Publications (2)

Publication Number Publication Date
CN106953832A CN106953832A (en) 2017-07-14
CN106953832B true CN106953832B (en) 2020-04-07

Family

ID=59465860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610009142.3A Active CN106953832B (en) 2016-01-07 2016-01-07 Method and system for processing online game suspicious account

Country Status (1)

Country Link
CN (1) CN106953832B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107481126B (en) * 2017-09-27 2021-03-30 北京同城必应科技有限公司 Anti-ticket-swiping method, server and client
CN107733883B (en) * 2017-10-09 2020-08-04 武汉斗鱼网络科技有限公司 Method and device for detecting account numbers registered in batches
CN107819746B (en) * 2017-10-25 2020-09-04 珠海金山网络游戏科技有限公司 Method and device for controlling user login by reading account table by database server
CN108073945A (en) * 2017-11-13 2018-05-25 珠海金山网络游戏科技有限公司 A kind of method and apparatus that density anticipation game studios are logged in based on equipment
CN108295477B (en) * 2018-01-26 2021-10-15 珠海金山网络游戏科技有限公司 Game account safety detection method, system and device based on big data
CN108282490B (en) * 2018-02-09 2021-07-09 深圳壹账通智能科技有限公司 Processing method and device for abnormal registered user, computer equipment and storage medium
CN110227268B (en) * 2018-03-06 2022-06-07 腾讯科技(深圳)有限公司 Method and device for detecting illegal game account
CN108596653A (en) * 2018-04-04 2018-09-28 顺丰科技有限公司 A kind of discount coupon is abnormal to use detecting system, method, equipment and storage medium
CN109091871B (en) * 2018-09-17 2022-04-29 网易(杭州)网络有限公司 Method and device for detecting game cheating player
CN111298444B (en) * 2018-12-12 2023-10-20 上海波克城市网络科技股份有限公司 User separation method and device, storage medium and server
CN110418173B (en) * 2019-07-18 2021-10-08 北京达佳互联信息技术有限公司 Method, device, server and storage medium for determining abnormal account
CN111064741A (en) * 2019-12-27 2020-04-24 全知科技(杭州)有限责任公司 Method for identifying account borrowing risk in web application system
CN112090087B (en) * 2020-08-26 2022-05-06 完美世界(北京)软件科技发展有限公司 Game plug-in detection method and device, storage medium and computer equipment
CN112245930B (en) * 2020-09-11 2024-08-27 杭州浮云网络科技有限公司 Risk behavior identification method and device and computer equipment
CN113570199A (en) * 2021-06-30 2021-10-29 北京达佳互联信息技术有限公司 Information processing method, electronic resource distribution method, device, electronic equipment and storage medium
CN116747525A (en) * 2023-08-21 2023-09-15 成都初心互动科技有限公司 Automatic studio script detection method, device, equipment and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101316262A (en) * 2007-05-31 2008-12-03 中兴通讯股份有限公司 Method for controlling repeated registration of the same account terminal
CN101626295A (en) * 2008-07-08 2010-01-13 中国移动通信集团公司 Method, device and system for guaranteeing security of network logon
CN103905532A (en) * 2014-03-13 2014-07-02 微梦创科网络科技(中国)有限公司 Microblog marketing account recognition method and system
CN104426885A (en) * 2013-09-03 2015-03-18 深圳市腾讯计算机系统有限公司 Method and device for providing abnormal account
CN104980421A (en) * 2014-10-15 2015-10-14 腾讯科技(深圳)有限公司 Method and system for processing batch requests

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9087183B2 (en) * 2006-10-04 2015-07-21 Rob Bartlett Method and system of securing accounts

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101316262A (en) * 2007-05-31 2008-12-03 中兴通讯股份有限公司 Method for controlling repeated registration of the same account terminal
CN101626295A (en) * 2008-07-08 2010-01-13 中国移动通信集团公司 Method, device and system for guaranteeing security of network logon
CN104426885A (en) * 2013-09-03 2015-03-18 深圳市腾讯计算机系统有限公司 Method and device for providing abnormal account
CN103905532A (en) * 2014-03-13 2014-07-02 微梦创科网络科技(中国)有限公司 Microblog marketing account recognition method and system
CN104980421A (en) * 2014-10-15 2015-10-14 腾讯科技(深圳)有限公司 Method and system for processing batch requests

Also Published As

Publication number Publication date
CN106953832A (en) 2017-07-14

Similar Documents

Publication Publication Date Title
CN106953832B (en) Method and system for processing online game suspicious account
CN109951500B (en) Network attack detection method and device
Rafique et al. It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services.
US10193929B2 (en) Methods and systems for improving analytics in distributed networks
Gugelmann et al. An automated approach for complementing ad blockers’ blacklists
CN105262760A (en) Method and device for preventing action of maliciously visiting login/register interface
CN109194671B (en) Abnormal access behavior identification method and server
CN108183900B (en) Method, server, system, terminal device and storage medium for detecting mining script
CN110691080B (en) Automatic tracing method, device, equipment and medium
CN109937564B (en) Method and apparatus for detecting fraudulent account usage in a distributed computing system
US10482240B2 (en) Anti-malware device, anti-malware system, anti-malware method, and recording medium in which anti-malware program is stored
CN107294919A (en) A kind of detection method and device of horizontal authority leak
WO2017063274A1 (en) Method for automatically determining malicious-jumping and malicious-nesting offensive websites
CN104378255B (en) The detection method and device of web malicious users
CN110033302A (en) The recognition methods of malice account and device
CN109815702B (en) Software behavior safety detection method, device and equipment
CN108989294A (en) A kind of method and system for the malicious user accurately identifying website visiting
Hu et al. Multi-country study of third party trackers from real browser histories
Zhang et al. An empirical study of web resource manipulation in real-world mobile applications
CN115001789B (en) Method, device, equipment and medium for detecting collapse equipment
Dam et al. Large-scale analysis of pop-up scam on typosquatting urls
CN112069425A (en) Log management method and device, electronic equipment and readable storage medium
Durey et al. FP-Redemption: Studying browser fingerprinting adoption for the sake of web security
CN107172033B (en) WAF misjudgment identification method and device
CN106911665B (en) Method and system for identifying malicious code weak password intrusion behavior

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant