CN109246093A - Risk links recognition methods and device - Google Patents

Risk links recognition methods and device Download PDF

Info

Publication number
CN109246093A
CN109246093A CN201810969623.8A CN201810969623A CN109246093A CN 109246093 A CN109246093 A CN 109246093A CN 201810969623 A CN201810969623 A CN 201810969623A CN 109246093 A CN109246093 A CN 109246093A
Authority
CN
China
Prior art keywords
object linking
risk
link
clicks
click
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810969623.8A
Other languages
Chinese (zh)
Inventor
胡时豪
赵豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810969623.8A priority Critical patent/CN109246093A/en
Publication of CN109246093A publication Critical patent/CN109246093A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

This specification embodiment provides a kind of link recognition methods of risk and device, this method comprises: obtain in preset duration the number of clicks of Object linking with share number;According to the number of clicks of the Object linking with share number, determine the click sharing rate of the Object linking, the ratio for clicking sharing number and number of clicks that sharing rate is the Object linking;The relationship of click sharing rate and preset threshold based on the Object linking determines whether the Object linking is risk link.It can be seen that, in this specification embodiment, risk link and normal link can be distinguished by the sharing clicking rate of link, sharing rate after being clicked due to risk link is often higher than normally linking, therefore higher for the recognition accuracy of risk link, and corresponding risk link can be found that before long range diffusion propagation, timeliness is stronger.

Description

Risk links recognition methods and device
Technical field
This application involves field of computer technology more particularly to a kind of link recognition methods of risk and devices.
Background technique
As Internet technology constantly develops, the approach of sharing information is more and more between user, for example, user sees Interested web page contents can be linked and be shared with other users.But the chain of malicious user production is encountered sometimes It connects, guides user to share the link in the way of prize drawing, page prize-winning or false propaganda etc. and propagate, and then cheated It deceives, it is, therefore, desirable to provide a kind of risk links recognition methods.
Summary of the invention
The purpose of this specification embodiment is to provide a kind of link recognition methods of risk and device, this specification embodiment are It is achieved:
In a first aspect, providing a kind of risk link recognition methods, which comprises
Obtain preset duration in Object linking number of clicks with share number;
According to the number of clicks of the Object linking with share number, determine the click sharing rate of the Object linking, institute State the ratio for clicking sharing number and number of clicks that sharing rate is the Object linking;
The relationship of click sharing rate and preset threshold based on the Object linking, determines whether the Object linking is wind Danger link.
Second aspect, provides a kind of risk link identification device, and described device includes:
Obtain module, for obtain in preset duration the number of clicks of Object linking with share number;
First determining module, for according to the number of clicks of the Object linking with share number, determine the object chain The click sharing rate connect, the ratio for clicking sharing number and number of clicks that sharing rate is the Object linking;
Second determining module determines institute for the relationship of click sharing rate and preset threshold based on the Object linking State whether Object linking is risk link.
The third aspect provides a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed It manages device and executes following operation:
Obtain preset duration in Object linking number of clicks with share number;
According to the number of clicks of the Object linking with share number, determine the click sharing rate of the Object linking, institute State the ratio for clicking sharing number and number of clicks that sharing rate is the Object linking;
The relationship of click sharing rate and preset threshold based on the Object linking, determines whether the Object linking is wind Danger link.
Fourth aspect, provides a kind of computer storage medium, and the computer-readable recording medium storage one or more A program, one or more of programs are when the electronic equipment for being included multiple application programs executes, so that the electronics is set It is standby to execute following operation:
Obtain preset duration in Object linking number of clicks with share number;
According to the number of clicks of the Object linking with share number, determine the click sharing rate of the Object linking, institute State the ratio for clicking sharing number and number of clicks that sharing rate is the Object linking;
The relationship of click sharing rate and preset threshold based on the Object linking, determines whether the Object linking is wind Danger link.
The technical solution provided by above this specification embodiment is as it can be seen that link the psychology and risk of production user from risk The angle that fast propagation is capable of in link is analyzed, and relative to normal link (non-risk link), is led in the page of risk link Some temptation contents (for example, false prize information) can be often introduced, and these temptation contents are provided to Risk Chain and tap into row fastly Speed, which propagates the trap deliberately designed, in this specification embodiment, can pass through the sharing clicking rate of link in view of the situation It being linked to distinguish risk link with normal, the sharing rate after being clicked due to risk link is often higher than normally linking, because This is higher for the recognition accuracy of risk link, and can find that corresponding Risk Chain before long range diffusion propagation It connects, timeliness is stronger.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only The some embodiments recorded in this specification, for those of ordinary skill in the art, in not making the creative labor property Under the premise of, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow chart of the risk link recognition methods of one embodiment of this specification;
Fig. 2 is the flow chart of the risk link recognition methods of another embodiment of this specification;
Fig. 3 is the flow chart of the risk link recognition methods of another embodiment of this specification;
Fig. 4 is the structural schematic diagram of the risk link identification device of one embodiment of this specification;
Fig. 5 is the structural schematic diagram of the electronic equipment of one embodiment of this specification.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution in this specification, below in conjunction with this explanation Attached drawing in book embodiment is clearly and completely described the technical solution in this specification embodiment, it is clear that described Embodiment be only this specification a part of the embodiment, instead of all the embodiments.The embodiment of base in this manual, this This all should belong in field those of ordinary skill every other embodiment obtained without making creative work The range of specification protection.
This specification embodiment provides a kind of link recognition methods of risk and device.
A kind of risk link recognition methods that this specification embodiment provides is introduced first below.
It should be noted that the method that this specification embodiment provides is suitable for electronic equipment, in practical applications, the electricity Sub- equipment can be server, alternatively, the electronic equipment may be that the terminals such as mobile phone, tablet computer, personal digital assistant are set Standby, alternatively, the electronic equipment may be the computer equipments such as laptop, desktop computer, tabletop machine, this specification is implemented Example is not construed as limiting this.
Fig. 1 is the flow chart of the risk link recognition methods of one embodiment of this specification, as shown in Figure 1, this method It may comprise steps of: step 102, step 104 and step 106, wherein
In a step 102, obtain preset duration in Object linking number of clicks with share number.
In this specification embodiment, the number of clicks of Object linking is referred to: the accessed number of the Object linking, target The sharing number of link refers to: the number that the Object linking is shared, wherein one be linked at by before sharing certainly will by It clicks.
In this specification embodiment, preset duration can be 1 hour, 6 hours, 12 hours, 24 hours or 36 hours etc..
At step 104, according to the number of clicks of Object linking with share number, determine Object linking click share Rate, wherein click the ratio of sharing number and number of clicks that sharing rate is Object linking.
In this specification embodiment, click sharing rate=link sharing number/number of clicks of link.
In step 106, whether the relationship of click sharing rate and preset threshold based on Object linking, determine Object linking For risk link.
In view of the click sharing rate that the click sharing rate of risk link typically much higher than normally links, and risk links Click sharing rate would generally rapidly reach a higher value (for example, in order to obtain the falseness in the page of risk link Risk link repeatedly can be shared with multiple users, group or circle by reward, user), in view of the situation, this specification In embodiment, a threshold value (i.e. preset threshold) can be preset, by by the click sharing rate of Object linking and default threshold Value is compared, to identify whether Object linking is risk link.
In this specification embodiment, if the click sharing rate of Object linking is higher than preset threshold, it is determined that Object linking For risk link;If the click sharing rate of Object linking is not higher than preset threshold, it is determined that Object linking is the link of non-risk; Wherein, preset threshold can be 0.6,0.7 or 0.8 etc..
It, can be and pre- based on the relationship of click the sharing rate and preset threshold of Object linking in this specification embodiment If white list, determine Object linking whether be risk link.Specifically, being preset if the click sharing rate of Object linking is higher than Threshold value and not in default white list, it is determined that Object linking is that risk links;If the click sharing rate of Object linking is higher than Preset threshold and in default white list, it is determined that Object linking is that non-risk links;If the click sharing rate of Object linking Not higher than preset threshold, it is determined that Object linking is the link of non-risk;Wherein, non-risk link is linked as in white list.
In this specification embodiment, it is contemplated that businessman can plan some marketing activities to attract user under electric business scene, Such as promote, since the consumer for participating in marketing activity is usually relatively more, correspondingly, the click for the link that marketing activity is related to Sharing rate is also higher, in order to avoid this kind of link is misidentified as risk link, this kind of link can be put on record in advance, be deposited Storage is into default white list, wherein is linked as non-risk link in white list.
In this specification embodiment, after determining that Object linking is risk link, risk can be updated according to Object linking Object linking is added in risk chained library by chained library, wherein be linked as risk link in risk chained library.
As seen from the above-described embodiment, in the embodiment, the psychology of production user is linked from risk and risk link can be fast The angle that speed is propagated is analyzed, and relative to normal link (non-risk link), would generally introduce one in the page of risk link Temptation contents (for example, false prize information) a bit, and these temptation contents are provided to Risk Chain and tap into the event of row fast propagation institute Anticipate design trap, in view of the situation, in the embodiment, can be distinguished by the sharing clicking rate of link risk link and Normal link, the sharing rate after being clicked due to risk link is often higher than normally linking, for risk link Recognition accuracy is higher, and corresponding risk link can be found that before long range diffusion propagation, and timeliness is stronger.
Fig. 2 is the flow chart of the risk link recognition methods of another embodiment of this specification, and this method is applied to clothes It is engaged in end, in this specification embodiment, the opening of all-links all passes through server-side in client, that is to say, that server-side can be with Record via the number of clicks linked in all clients of server-side with share number, at this point, as shown in Fig. 2, this method can The following steps are included: step 202, step 204, step 206, step 208 and step 210, wherein
In step 202, share event with link to the links and accesses event that client is carried out via server-side to remember Record obtains sharing log and click logs.
In this specification embodiment, the opening of all-links is required via server-side in client, for example, user clicks The link of one " Baidu " in client could access the server of " Baidu " then client needs to first pass through server-side.
In step 204, it saves and shares log and click logs.
In this specification embodiment, server-side can save the sharing day in client via the all-links of the server-side Will and click logs.
In step 206, from the sharing log and click logs that server-side saves, Object linking in preset duration is obtained Number of clicks with share number.
, can be according to the mark of Object linking in this specification embodiment, the sharing log and click that are saved from server-side In log, obtain preset duration in Object linking number of clicks with share number.
In a step 208, according to the number of clicks of Object linking with share number, determine Object linking click share Rate, wherein click the ratio of sharing number and number of clicks that sharing rate is Object linking.
In this specification embodiment, click sharing rate=link sharing number/number of clicks of link.
In step 210, whether the relationship of click sharing rate and preset threshold based on Object linking, determine Object linking For risk link.
In view of the click sharing rate that the click sharing rate of risk link typically much higher than normally links, and risk links Click sharing rate would generally rapidly reach a higher value (for example, in order to obtain the falseness in the page of risk link Risk link repeatedly can be shared with multiple users, group or circle by reward, user), in view of the situation, this specification In embodiment, a threshold value (i.e. preset threshold) can be preset, by by the click sharing rate of Object linking and default threshold Value is compared, to identify whether Object linking is risk link.
In this specification embodiment, if the click sharing rate of Object linking is higher than preset threshold, it is determined that Object linking For risk link;If the click sharing rate of Object linking is not higher than preset threshold, it is determined that Object linking is the link of non-risk; Wherein, preset threshold can be 0.6,0.7 or 0.8 etc..
It, can be and pre- based on the relationship of click the sharing rate and preset threshold of Object linking in this specification embodiment If white list, determine Object linking whether be risk link.Specifically, being preset if the click sharing rate of Object linking is higher than Threshold value and not in default white list, it is determined that Object linking is that risk links;If the click sharing rate of Object linking is higher than Preset threshold and in default white list, it is determined that Object linking is that non-risk links;If the click sharing rate of Object linking Not higher than preset threshold, it is determined that Object linking is the link of non-risk;Wherein, non-risk link is linked as in white list.
In this specification embodiment, it is contemplated that businessman can plan some marketing activities to attract user under electric business scene, Such as promote, since the consumer for participating in marketing activity is usually relatively more, correspondingly, the click for the link that marketing activity is related to Sharing rate is also higher, in order to avoid this kind of link is misidentified as risk link, this kind of link can be put on record in advance, be deposited Storage is into default white list, wherein is linked as non-risk link in white list.
In this specification embodiment, after determining that Object linking is risk link, risk can be updated according to Object linking Object linking is added in risk chained library by chained library, wherein be linked as risk link in risk chained library.
In this specification embodiment, after determining that Object linking is risk link, if detected from client It for the links and accesses request of Object linking, is then sent to client and intercepts instruction, wherein interception instruction is used to indicate client Hold interception target link.Specifically, server-side can notify client objectives to be linked as risk link, and indicate client at this Ground renders the indicating risk page that can not be accessed, and risk can be had by prompting user to continue access.
As seen from the above-described embodiment, in the embodiment, the psychology of production user is linked from risk and risk link can be fast The angle that speed is propagated is analyzed, and relative to normal link (non-risk link), would generally introduce one in the page of risk link Temptation contents (for example, false prize information) a bit, and these temptation contents are provided to Risk Chain and tap into the event of row fast propagation institute The trap for design of anticipating, in view of the situation, in the embodiment, the click logs that can locally be saved from server-side with share log The middle number of clicks for obtaining link to be identified with share number, calculate the sharing clicking rate of the link, pass through the sharing point of link Rate is hit to distinguish risk link and normal link, the sharing rate after being clicked due to risk link is often than normally linking Height, thus it is higher for the recognition accuracy of risk link, and can be found that before long range diffusion propagation corresponding Risk link, timeliness are stronger.
Fig. 3 is the flow chart of the risk link recognition methods of another embodiment of this specification, and this method is applied to clothes It is engaged in end, in this specification embodiment, the opening of all-links is without server-side in client, at this point, as shown in figure 3, the party Method may comprise steps of: step 302, step 304, step 306 and step 308, wherein
In step 302, receive number of clicks that multiple client is reported for Object linking with share number.
In this specification embodiment, the opening of all-links is not via server-side in client, for example, user clicks visitor The link of one " Baidu " in the end of family, then client directly accesses the server of " Baidu ", without passing through server-side.
In this specification embodiment, client will record in the client number of clicks of all-links with share number, And server-side is reported to by its timing or when receiving and reporting instruction.
In step 304, the number of clicks reported to client each in preset duration is counted with number is shared, and is obtained In preset duration the number of clicks of Object linking with share number.
Within step 306, according to the number of clicks of Object linking with share number, determine Object linking click share Rate, wherein click the ratio of sharing number and number of clicks that sharing rate is Object linking.
In this specification embodiment, click sharing rate=link sharing number/number of clicks of link.
In step 308, whether the relationship of click sharing rate and preset threshold based on Object linking, determine Object linking For risk link.
In view of the click sharing rate that the click sharing rate of risk link typically much higher than normally links, and risk links Click sharing rate would generally rapidly reach a higher value (for example, in order to obtain the falseness in the page of risk link Risk link repeatedly can be shared with multiple users, group or circle by reward, user), in view of the situation, this specification is real It applies in example, a threshold value (i.e. preset threshold) can be preset, by by the click sharing rate and preset threshold of Object linking It is compared, to identify whether Object linking is risk link.
In this specification embodiment, if the click sharing rate of Object linking is higher than preset threshold, it is determined that Object linking For risk link;If the click sharing rate of Object linking is not higher than preset threshold, it is determined that Object linking is the link of non-risk; Wherein, preset threshold can be 0.6,0.7 or 0.8 etc..
It, can be and pre- based on the relationship of click the sharing rate and preset threshold of Object linking in this specification embodiment If white list, determine Object linking whether be risk link.Specifically, being preset if the click sharing rate of Object linking is higher than Threshold value and not in default white list, it is determined that Object linking is that risk links;If the click sharing rate of Object linking is higher than Preset threshold and in default white list, it is determined that Object linking is that non-risk links;If the click sharing rate of Object linking Not higher than preset threshold, it is determined that Object linking is the link of non-risk;Wherein, non-risk link is linked as in white list.
In this specification embodiment, it is contemplated that businessman can plan some marketing activities to attract user under electric business scene, Such as promote, since the consumer for participating in marketing activity is usually relatively more, correspondingly, the click for the link that marketing activity is related to Sharing rate is also higher, in order to avoid this kind of link is misidentified as risk link, this kind of link can be put on record in advance, be deposited Storage is into default white list, wherein is linked as non-risk link in white list.
In this specification embodiment, after determining that Object linking is risk link, risk can be updated according to Object linking Object linking is added in risk chained library by chained library, wherein be linked as risk link in risk chained library.
In this specification embodiment, after determining that Object linking is risk link, it can send and notify to each client Message, to notify each client objectives to be linked as risk link, when access target links client next time, there are wind for prompt Danger is simultaneously intercepted.
As seen from the above-described embodiment, in the embodiment, the psychology of production user is linked from risk and risk link can be fast The angle that speed is propagated is analyzed, and relative to normal link (non-risk link), would generally introduce one in the page of risk link Temptation contents (for example, false prize information) a bit, and these temptation contents are provided to Risk Chain and tap into the event of row fast propagation institute The trap of meaning design in the embodiment, can receive the number of clicks for the link to be identified that client reports in view of the situation With share number, calculate the sharing clicking rate of the link, distinguished by the sharing clicking rate of link risk link and normal, chain It connects, the sharing rate after being clicked due to risk link is often higher than normally linking, quasi- for the identification of risk link True rate is higher, and corresponding risk link can be found that before long range diffusion propagation, and timeliness is stronger.
Fig. 4 is the structural schematic diagram of the risk link identification device of one embodiment of this specification, as shown in figure 4, In a kind of Software Implementation, risk links identification device 400, may include: to obtain module 401,402 and of the first determining module Second determining module 403, wherein
Obtain module 401, for obtain in preset duration the number of clicks of Object linking with share number;
First determining module 402, for according to the number of clicks of the Object linking with share number, determine the target The click sharing rate of link, the ratio for clicking sharing number and number of clicks that sharing rate is the Object linking;
Second determining module 403 is determined for the relationship of click sharing rate and preset threshold based on the Object linking Whether the Object linking is risk link.
As seen from the above-described embodiment, in the embodiment, the psychology of production user is linked from risk and risk link can be fast The angle that speed is propagated is analyzed, and relative to normal link (non-risk link), would generally introduce one in the page of risk link Temptation contents (for example, false prize information) a bit, and these temptation contents are provided to Risk Chain and tap into the event of row fast propagation institute Anticipate design trap, in view of the situation, in the embodiment, can be distinguished by the sharing clicking rate of link risk link and Normal link, the sharing rate after being clicked due to risk link is often higher than normally linking, for risk link Recognition accuracy is higher, and corresponding risk link can be found that before long range diffusion propagation, and timeliness is stronger.
Optionally, as one embodiment, second determining module 403 may include:
First determines submodule, if the click sharing rate for the Object linking is higher than preset threshold, it is determined that institute Object linking is stated as risk link;
Second determines submodule, if the click sharing rate for the Object linking is not higher than preset threshold, it is determined that The Object linking is the link of non-risk.
Optionally, as one embodiment, the risk links identification device 400, can also include:
Update module is linked as in the risk chained library for updating risk chained library according to the Object linking Risk link.
Optionally, as one embodiment, second determining module 403 may include:
Third determines submodule, for the relationship of click sharing rate and preset threshold based on the Object linking, and Preset white list determines whether the Object linking is risk link, is linked as non-risk link in the white list.
Optionally, as one embodiment, the risk links identification device 400, can also include:
Logging modle, the links and accesses event for carrying out to client via server-side are shared event with link and are remembered Record obtains sharing log and click logs;
Preserving module, for saving the sharing log and click logs;
The acquisition module 401 may include:
Acquisition submodule, for obtaining in preset duration from the sharing log and click logs that the server-side saves The number of clicks of Object linking with share number.
Optionally, as one embodiment, the risk links identification device 400, can also include:
Sending module, if for detecting that the links and accesses for the Object linking from client are requested, It is sent to the client and intercepts instruction, the interception instruction is used to indicate client and intercepts the Object linking.
Optionally, as one embodiment, the acquisition module 401 may include:
Receiving submodule, the number of clicks reported for Object linking for receiving multiple client with share number;
Statistic submodule, the number of clicks for reporting to client each in preset duration are counted with number is shared, Obtain in the preset duration number of clicks of Object linking with share number.
Fig. 5 is the structural schematic diagram of the electronic equipment of one embodiment of this specification, as shown in figure 5, in hardware view, The electronic equipment includes processor, optionally further comprising internal bus, network interface, memory.Wherein, memory may include Memory, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-volatile deposit Reservoir (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible that it Hardware required for his business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA (Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always Line etc..Only to be indicated with a four-headed arrow in Fig. 5, it is not intended that an only bus or a type of convenient for indicating Bus.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer Risk is formed on face links identification device.Processor executes the program that memory is stored, and is specifically used for executing following behaviour Make:
Obtain preset duration in Object linking number of clicks with share number;
According to the number of clicks of the Object linking with share number, determine the click sharing rate of the Object linking, institute State the ratio for clicking sharing number and number of clicks that sharing rate is the Object linking;
The relationship of click sharing rate and preset threshold based on the Object linking, determines whether the Object linking is wind Danger link.
In this specification embodiment, the psychology for linking production user from risk links the angle for capableing of fast propagation with risk It is analyzed, relative to normal link (non-risk link), some temptation content (examples would generally be introduced in the page of risk link Such as, false prize information), and these temptation contents are provided to Risk Chain and tap into the trap that row fast propagation deliberately designs, In view of the situation, in the embodiment, risk link and normal link can be distinguished by the sharing clicking rate of link, due to Risk link be clicked after sharing rate it is often higher than normally linking, therefore for risk link recognition accuracy compared with Height, and corresponding risk link can be found that before long range diffusion propagation, timeliness is stronger.
Optionally, as one embodiment, the pass of click the sharing rate and preset threshold based on the Object linking System determines whether the Object linking is risk link, comprising:
If the click sharing rate of the Object linking is higher than preset threshold, it is determined that the Object linking is Risk Chain It connects;
If the click sharing rate of the Object linking is not higher than preset threshold, it is determined that the Object linking is non-risk Link.
Optionally, it is also wrapped after the determination Object linking is the step of risk links as one embodiment It includes:
Risk chained library is updated according to the Object linking, is linked as risk link in the risk chained library.
Optionally, as one embodiment, the pass of click the sharing rate and preset threshold based on the Object linking System determines whether the Object linking is risk link, comprising:
Relationship and the preset white list of click sharing rate and preset threshold based on the Object linking, determine institute State whether Object linking is risk link, is linked as non-risk link in the white list.
Optionally, as one embodiment, the number of clicks of Object linking and share secondary in the acquisition preset duration Before several steps, further includes:
Share event with link to the links and accesses event that client is carried out via server-side to record, obtains sharing day Will and click logs;
Save the sharing log and click logs;
In the acquisition preset duration number of clicks of Object linking with share number, comprising:
From the sharing log and click logs that the server-side saves, the click time of Object linking in preset duration is obtained It counts and shares number.
Optionally, it is also wrapped after the determination Object linking is the step of risk links as one embodiment It includes:
If detecting that the links and accesses for the Object linking from client are requested, sent out to the client Interception is sent to instruct, the interception instruction is used to indicate client and intercepts the Object linking.
Optionally, as one embodiment, it is described obtain in preset duration the number of clicks of Object linking with share number, Include:
Receive number of clicks that multiple client is reported for Object linking with share number;
The number of clicks reported to client each in preset duration is counted with number is shared, and obtains the preset duration The number of clicks of interior Object linking with share number.
The method that risk link identification device disclosed in the above-mentioned embodiment illustrated in fig. 5 such as this specification executes can be applied to In processor, or realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.? During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor or software form Instruction is completed.Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processor, DSP), it is specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing Field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device are divided Vertical door or transistor logic, discrete hardware components.It may be implemented or execute and is in this specification embodiment disclosed Each method, step and logic diagram.General processor can be microprocessor or the processor be also possible to it is any conventional Processor etc..The step of method in conjunction with disclosed in this specification embodiment, can be embodied directly in hardware decoding processor execution Complete, or in decoding processor hardware and software module combine execute completion.Software module can be located at random storage Device, flash memory, read-only memory, this fields such as programmable read only memory or electrically erasable programmable memory, register at In ripe storage medium.The storage medium is located at memory, and processor reads the information in memory, completes in conjunction with its hardware The step of stating method.
The method that the electronic equipment can also carry out Fig. 1, and realize the function of risk link identification device embodiment shown in Fig. 1 Can, details are not described herein for this specification embodiment.
This specification embodiment additionally provides a kind of computer readable storage medium, the computer-readable recording medium storage One or more programs, the one or more program include instruction, and the instruction is when by the portable electric including multiple application programs When sub- equipment executes, the method that the portable electronic device can be made to execute embodiment illustrated in fig. 1, and be specifically used for executing following Method:
Obtain preset duration in Object linking number of clicks with share number;
According to the number of clicks of the Object linking with share number, determine the click sharing rate of the Object linking, institute State the ratio for clicking sharing number and number of clicks that sharing rate is the Object linking;
The relationship of click sharing rate and preset threshold based on the Object linking, determines whether the Object linking is wind Danger link.
In short, being not intended to limit the protection of this specification the foregoing is merely the preferred embodiment of this specification Range.For all spirit in this specification within principle, any modification, equivalent replacement, improvement and so on should be included in this Within the protection scope of specification.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.

Claims (10)

1. a kind of risk links recognition methods, which comprises
Obtain preset duration in Object linking number of clicks with share number;
According to the number of clicks of the Object linking with share number, determine the click sharing rate of the Object linking, the point Hit the ratio of sharing number and number of clicks that sharing rate is the Object linking;
The relationship of click sharing rate and preset threshold based on the Object linking, determines whether the Object linking is Risk Chain It connects.
2. according to the method described in claim 1, the pass of click the sharing rate and preset threshold based on the Object linking System determines whether the Object linking is risk link, comprising:
If the click sharing rate of the Object linking is higher than preset threshold, it is determined that the Object linking is risk link;
If the click sharing rate of the Object linking is not higher than preset threshold, it is determined that the Object linking is non-Risk Chain It connects.
3. according to the method described in claim 2, also being wrapped after the determination Object linking is the step of risk links It includes:
Risk chained library is updated according to the Object linking, is linked as risk link in the risk chained library.
4. according to the method described in claim 1, the pass of click the sharing rate and preset threshold based on the Object linking System determines whether the Object linking is risk link, comprising:
Relationship and the preset white list of click sharing rate and preset threshold based on the Object linking, determine the mesh Whether mark link is risk link, is linked as non-risk link in the white list.
5. according to the method described in claim 1, the number of clicks of Object linking and sharing secondary in the acquisition preset duration Before several steps, further includes:
The links and accesses event carried out via server-side to client is shared event with link and is recorded, obtain sharing log and Click logs;
Save the sharing log and click logs;
In the acquisition preset duration number of clicks of Object linking with share number, comprising:
From the server-side save sharing log and click logs in, obtain preset duration in Object linking number of clicks and Share number.
6. according to the method described in claim 5, also being wrapped after the determination Object linking is the step of risk links It includes:
If detecting that the links and accesses for the Object linking from client are requested, blocked to client transmission Instruction is cut, the interception instruction is used to indicate client and intercepts the Object linking.
7. according to the method described in claim 1, it is described obtain preset duration in Object linking number of clicks with share number, Include:
Receive number of clicks that multiple client is reported for Object linking with share number;
The number of clicks reported to client each in preset duration is counted with number is shared, and obtains mesh in the preset duration Mark link number of clicks with share number.
8. a kind of risk links identification device, described device includes:
Obtain module, for obtain in preset duration the number of clicks of Object linking with share number;
First determining module, for according to the number of clicks of the Object linking with share number, determine the Object linking Click sharing rate, the ratio for clicking sharing number and number of clicks that sharing rate is the Object linking;
Second determining module determines the mesh for the relationship of click sharing rate and preset threshold based on the Object linking Whether mark link is risk link.
9. a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute following operation:
Obtain preset duration in Object linking number of clicks with share number;
According to the number of clicks of the Object linking with share number, determine the click sharing rate of the Object linking, the point Hit the ratio of sharing number and number of clicks that sharing rate is the Object linking;
The relationship of click sharing rate and preset threshold based on the Object linking, determines whether the Object linking is Risk Chain It connects.
10. a kind of computer storage medium, the computer-readable recording medium storage one or more program, it is one or Multiple programs are when the electronic equipment for being included multiple application programs executes, so that the electronic equipment executes following operation:
Obtain preset duration in Object linking number of clicks with share number;
According to the number of clicks of the Object linking with share number, determine the click sharing rate of the Object linking, the point Hit the ratio of sharing number and number of clicks that sharing rate is the Object linking;
The relationship of click sharing rate and preset threshold based on the Object linking, determines whether the Object linking is Risk Chain It connects.
CN201810969623.8A 2018-08-23 2018-08-23 Risk links recognition methods and device Pending CN109246093A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810969623.8A CN109246093A (en) 2018-08-23 2018-08-23 Risk links recognition methods and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810969623.8A CN109246093A (en) 2018-08-23 2018-08-23 Risk links recognition methods and device

Publications (1)

Publication Number Publication Date
CN109246093A true CN109246093A (en) 2019-01-18

Family

ID=65069536

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810969623.8A Pending CN109246093A (en) 2018-08-23 2018-08-23 Risk links recognition methods and device

Country Status (1)

Country Link
CN (1) CN109246093A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110765374A (en) * 2019-09-16 2020-02-07 阿里巴巴集团控股有限公司 Risk link identification method and device and computer equipment
CN111681024A (en) * 2020-04-16 2020-09-18 上海淇玥信息技术有限公司 Risk management method and device in information popularization, electronic equipment and storage medium
CN111931106A (en) * 2020-07-29 2020-11-13 上海博泰悦臻电子设备制造有限公司 Data processing method and related device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253809A (en) * 2013-06-29 2014-12-31 北京新媒传信科技有限公司 Method and system for detecting network content
CN104462118A (en) * 2013-09-21 2015-03-25 郑建锋 Information spreading risk control method and system
US20150222449A1 (en) * 2014-01-31 2015-08-06 Comcast Cable Communications, Llc Digital forward link in hybrid fiber-coax network
CN108268534A (en) * 2016-12-30 2018-07-10 北京国双科技有限公司 Propagating influence computational methods and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253809A (en) * 2013-06-29 2014-12-31 北京新媒传信科技有限公司 Method and system for detecting network content
CN104462118A (en) * 2013-09-21 2015-03-25 郑建锋 Information spreading risk control method and system
US20150222449A1 (en) * 2014-01-31 2015-08-06 Comcast Cable Communications, Llc Digital forward link in hybrid fiber-coax network
CN108268534A (en) * 2016-12-30 2018-07-10 北京国双科技有限公司 Propagating influence computational methods and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110765374A (en) * 2019-09-16 2020-02-07 阿里巴巴集团控股有限公司 Risk link identification method and device and computer equipment
CN110765374B (en) * 2019-09-16 2023-05-05 创新先进技术有限公司 Risk link identification method and device and computer equipment
CN111681024A (en) * 2020-04-16 2020-09-18 上海淇玥信息技术有限公司 Risk management method and device in information popularization, electronic equipment and storage medium
CN111931106A (en) * 2020-07-29 2020-11-13 上海博泰悦臻电子设备制造有限公司 Data processing method and related device

Similar Documents

Publication Publication Date Title
US20200389495A1 (en) Secure policy-controlled processing and auditing on regulated data sets
CN108885659B (en) Computer-implemented method and system for analyzing first digital interaction or mobile device application interaction
US10673889B2 (en) Selective website vulnerability and infection testing
US20210019674A1 (en) Risk profiling and rating of extended relationships using ontological databases
CN109479061B (en) Compliance violation detection
EP3780541B1 (en) Identity information identification method and device
TWI696194B (en) Sorting method and device of complaint report type
ES2866723T3 (en) Online fraud detection dynamic score aggregation methods and systems
KR102071160B1 (en) Application Information Methods and Devices for Risk Management
US11474926B2 (en) Method and system for measuring user engagement with content items
CN110442712B (en) Risk determination method, risk determination device, server and text examination system
US20150324362A1 (en) Method and system for measuring user engagement with content items
CN104765689B (en) A kind of interface capability data supervise method and apparatus in real time
US20210281609A1 (en) Rating organization cybersecurity using probe-based network reconnaissance techniques
US11308502B2 (en) Method for detecting web tracking services
US10467233B2 (en) Scoring messages based on sender attributes
US20140331142A1 (en) Method and system for recommending contents
CN109246093A (en) Risk links recognition methods and device
FR3025909A3 (en) VIDEO AUDIT ON THE WEB
US20230069970A1 (en) Identifying fraudulent requests for content
US20150302088A1 (en) Method and System for Providing Personalized Content
US11557005B2 (en) Addressing propagation of inaccurate information in a social networking environment
CN107481039A (en) A kind of event-handling method and terminal device
CN110971690A (en) Push message processing method, device and equipment of IOS client
US10686834B1 (en) Inert parameters for detection of malicious activity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200922

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118