CN109426700A - Data processing method, device, storage medium and electronic device - Google Patents

Data processing method, device, storage medium and electronic device Download PDF

Info

Publication number
CN109426700A
CN109426700A CN201710754737.6A CN201710754737A CN109426700A CN 109426700 A CN109426700 A CN 109426700A CN 201710754737 A CN201710754737 A CN 201710754737A CN 109426700 A CN109426700 A CN 109426700A
Authority
CN
China
Prior art keywords
data
data processing
request
model
classification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710754737.6A
Other languages
Chinese (zh)
Other versions
CN109426700B (en
Inventor
黄宙舒
连博
冯少伟
张智
万明月
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Beijing Co Ltd
Original Assignee
Tencent Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Beijing Co Ltd filed Critical Tencent Technology Beijing Co Ltd
Priority to CN201710754737.6A priority Critical patent/CN109426700B/en
Publication of CN109426700A publication Critical patent/CN109426700A/en
Application granted granted Critical
Publication of CN109426700B publication Critical patent/CN109426700B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Abstract

The invention discloses a kind of data processing method, device, storage medium and electronic devices.Wherein, this method comprises: obtaining the behavioral data of client;Behavioral data is handled into the model data for data processing model, wherein the data processing model with model data, for carrying out classification processing to the security level of the first request, the first request triggers object event for client request;By the data processing model with model data, classification processing is carried out to the security level of the first request, obtains the classification results of the first request, wherein classification results are used to indicate the security level of the first request;Operation corresponding with classification results is carried out to the first request.The present invention solves the technical issues of low efficiency of data processing in the related technology.

Description

Data processing method, device, storage medium and electronic device
Technical field
The present invention relates to computer fields, in particular to a kind of data processing method, device, storage medium and electricity Sub-device.
Background technique
Currently, the content of provider is illegally obtained by non-provider, and is supplied to user's use, to affect provider Interests, this behavior be known as steal chain.Multimedia robber's chain situation is more and more severeer, and the destruction technological means for stealing chain side passes through synchronization Authentication block, gets multimedia address, so that the copyright rights whatsoever of resource owning side is impaired, has increased and decreased bandwidth cost.
Existing multimedia anti-theft chain is mostly synchronous door chain, can be authenticated when multimedia is requested.Specifically Ground, client are encrypted by using key and play relevant parameter, are sent to broadcasting backstage, are carried out after authentication judgement from the background to obstructed The exception request crossed is hit.The advantages of synchronous door chain be take up less resources, authenticate it is fast, but because of the calculation of encryption parameter Method is present in client, and easily stolen chain side cracks, and normal users and robber's chain can not be just efficiently differentiated after cracking User, can only promote authentication effect by the upgrade algorithm of client, at high cost, come into force slow, lead to the efficiency of data processing Lowly.
The prior art is increased on the basis of synchronous door chain and is counted to the number of user behavior, from the background certain Judge that the behavior number of the user allows this user behavior if user has the behavior in addition to broadcasting in time interval Pass through, if behavior of the user not in addition to broadcasting, does not allow this user behavior to pass through, and to the user behavior into Row strike.In addition, stealing chain side while carrying out stealing chain broadcasting, it is only necessary to retransmit behavior request (such as: advertisement behavior Request), it will be passed through by anti-stealing link system.
If the quantity according to user behavior determines user behavior, rather than the presence or absence of user behavior is carried out Determine, will there are problems that the threshold value for determining the quantity of user behavior can not be selected accurately, if threshold value is excessively stringent Normal users behavior will be judged by accident, if threshold value is excessively loose, have robber's chain of major part to be leaked through.Thus synchronous door chain Scheme that there are upgrade costs is high, is easy to be modeled, the disadvantages of threshold values can not be accurately arranged, lead to the low efficiency of data processing Under.
The model that existing asynchronous door chain can only come out according to preparatory study, solely knows according to given data model Not once whether request is not to steal chain request, but can not provide the security level specifically requested.Know simultaneously at present in big data Not Dao chain request scheme in, can only by the existing behavior prediction that can be identified be whether steal chain;For stealing the new model of chain, Currently existing scheme can not go discovery to identify well, will be considered that current request is normal request, to let off some novel The doubtful request for stealing chain limits it and hits range;For that intelligent can not send out in robber's chain Antagonistic Environment for becoming increasingly complex Existing novel robber's chain situation, so as to cause the inefficiency of data processing.
In addition, after the authentication is passed, door chain backstage is right since authentication in the prior art occurs before multimedia Subsequent broadcasting can not be controlled, and stolen chain side and only needed normally play out by synchronizing authentication, without It needs to spend too many energy in the link other than broadcasting, be reduced so as to cause the safety of data processing.
Aiming at the problem that low efficiency of above-mentioned data processing, currently no effective solution has been proposed.
Summary of the invention
The embodiment of the invention provides a kind of data processing method, device, storage medium and electronic devices, at least to solve In the related technology the technical issues of the low efficiency of data processing.
According to an aspect of an embodiment of the present invention, a kind of data processing method is provided.The data processing method includes: Obtain the behavioral data of client;Behavioral data is handled into the model data for data processing model, wherein there is model data Data processing model, for carrying out classification processing to the security level of the first request, the first request is touched for client request Send out object event;By the data processing model with model data, classification processing is carried out to the security level of the first request, is obtained To the classification results of the first request, wherein classification results are used to indicate the security level of the first request;To first request carry out with The corresponding operation of classification results.
According to another aspect of an embodiment of the present invention, a kind of data processing equipment is additionally provided.The data processing equipment packet It includes: acquiring unit, for obtaining the behavioral data of client;First processing units, for handling behavioral data at data Manage the model data of model, wherein the data processing model with model data, for being carried out to the security level of the first request Classification processing, the first request trigger object event for client request;The second processing unit, for by with model data Data processing model, to first request security level carry out classification processing, obtain the classification results of the first request, wherein Classification results are used to indicate the security level of the first request;Operating unit, it is corresponding with classification results for being carried out to the first request Operation.
According to another aspect of an embodiment of the present invention, the program that a kind of storage medium includes storage is additionally provided, wherein journey The data processing method of the embodiment of the present invention is executed when sort run.
According to another aspect of an embodiment of the present invention, a kind of electronic device is additionally provided.The electronic device include memory, Processor and storage are on a memory and the computer program that can run on a processor, processor pass through computer program execution The data processing method of the embodiment of the present invention.
In embodiments of the present invention, the behavioral data of client is obtained;Behavioral data is handled as data processing model Model data, wherein the data processing model with model data, for being carried out at classification to the security level of the first request Reason, the first request trigger object event for client request;By the data processing model with model data, asked to first The security level asked carries out classification processing, obtains the classification results of the first request, wherein classification results are used to indicate the first request Security level;Operation corresponding with classification results is carried out to the first request.Due to that can identify the peace of the request of client Congruent grade, and then operation corresponding with security level is taken, reach the technical effect for improving the treatment effeciency of data, and then solve Determined data processing in the related technology low efficiency the technical issues of.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is a kind of schematic diagram of the hardware environment of data processing method according to an embodiment of the present invention;
Fig. 2 is a kind of flow chart of data processing method according to an embodiment of the present invention;
Fig. 3 is a kind of method for carrying out operation corresponding with classification results to the first request according to an embodiment of the present invention Flow chart;
Fig. 4 is the flow chart of another data processing method according to an embodiment of the present invention;
Fig. 5 is a kind of process of method that data processing model is adjusted by test result according to an embodiment of the present invention Figure;
Fig. 6 is the flow chart of another data processing method according to an embodiment of the present invention;
Fig. 7 is the flow chart of another data processing method according to an embodiment of the present invention;
Fig. 8 is the flow chart of another data processing method according to an embodiment of the present invention;
Fig. 9 is a kind of schematic diagram of data processing system according to an embodiment of the present invention;
Figure 10 is a kind of schematic diagram of policy scores system architecture according to an embodiment of the present invention;
Figure 11 is another policy scores system architecture according to an embodiment of the present invention;
Figure 12 is a kind of schematic diagram for being classified logic according to an embodiment of the present invention;
Figure 13 is a kind of logical schematic of decision tree according to an embodiment of the present invention;
Figure 14 is a kind of schematic diagram of data processing equipment according to an embodiment of the present invention;And
Figure 15 is a kind of structural block diagram of electronic device according to an embodiment of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work It encloses.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
Embodiment 1
According to embodiments of the present invention, a kind of embodiment of data processing method is provided.
Optionally, in the present embodiment, above-mentioned data processing method can be applied to as shown in Figure 1 by server 102 In the hardware environment constituted with terminal 104.Fig. 1 is a kind of hardware environment of data processing method according to an embodiment of the present invention Schematic diagram.As shown in Figure 1, server 102 is attached by network with terminal 104, above-mentioned network includes but is not limited to: wide Domain net, Metropolitan Area Network (MAN) or local area network, terminal 104 are not limited to PC, mobile phone, tablet computer etc..At the data of the embodiment of the present invention Reason method can be executed by server 102, can also be executed, be can also be by server 102 and terminal by terminal 104 104 common execution.Wherein, the data processing method that terminal 104 executes the embodiment of the present invention is also possible to by mounted thereto Client executes.
Fig. 2 is a kind of flow chart of data processing method according to an embodiment of the present invention.As shown in Fig. 2, this method can be with The following steps are included:
Step S202 obtains the behavioral data of client.
In the technical solution that the application above-mentioned steps S202 is provided, the behavioral data of client is obtained.
In this embodiment, client can be videoconference client, music client end, document client, animation client Deng herein with no restrictions.The behavioral data of client is obtained, the behavior number of client can be obtained by data processing system According to, behavior data are the sample data for adjusting data processing model, that is, data processing model is trained, In, data processing model can be used for handling the request of client transmission.
Optionally, the behavioral data of the embodiment can be the data that client generates in the process of running, can be visitor The data generated when the request of each processing module are being called at family end, are also possible to produce during client sends request data Raw data.For example, behavior data are data when video playing is authenticated, played, report play instruction, report advertisement, report The behaviors such as heartbeat data are also possible to the video ID requested when video playing, User IP, channel information, platform information, log in letter Breath etc. is also possible to the environmental information etc. of the player of client collection.
Optionally, which can continue to optimize behavioral data, for example, player is obtained when playing advertisement, screenshot Behavior and user is reported to open the behavioral datas such as homepage, details page.
Behavioral data is handled the model data for data processing model by step S204.
In the technical solution that the application above-mentioned steps S204 is provided, behavioral data is handled into the mould for data processing model Type data, wherein the data processing model with model data, for carrying out classification processing to the security level of the first request, First request triggers object event for client request.
After the behavioral data for obtaining client, behavioral data is handled into the model data for data processing model.It can Selection of land arranges behavioral data, will have the data screening for being used to adjust data processing model to get off in behavioral data, by it It is abstracted as the vector data of multidimensional, these vector datas can be classified and be classified.Optionally, logical to above-mentioned vector data Machine learning model is crossed, is trained, tested, fed back, final model data is obtained.
The data processing model of the embodiment can be by using decision-tree model, but is not limited to decision-tree model as base This model carries out classification prediction to various states and obtains, for example, assume that the depth of tree-model is 8, then the maximum number of leaf node Amount is 28-1=128.Optionally, a large amount of newest data can be all sampled every preset time to instruct data processing model Practice, data processing model is trained for example, can all sample a large amount of newest data every preset time, data processing model Itself constantly learns tuning, adjustment decision plan, to reach optimal strike effect to request data.Simultaneously in logarithm During being trained according to processing model, model parameter can be adjusted by the dynamic authentication to data, to further mention The recognition effect of high data processing model.
Step S206 is classified the security level of the first request by the data processing model with model data Processing, obtains the classification results of the first request.
In the technical solution that the application above-mentioned steps S206 is provided, by the data processing model with model data, Classification processing is carried out to the security level of the first request, obtains the classification results of the first request, wherein classification results are used to indicate The security level of first request.
After handling behavioral data for the model data of data processing model, at the data with model data Model is managed, classification processing is carried out to the security level of the first request, which can be client for requesting to play The request of video, for requesting the request for playing music not limit for requesting the service requests such as the request paid herein System.The classification results of first request are used to indicate the security level of the first request, which can be used to indicate that first Request the safety of corresponding behavior.Optionally, which can be bound with score, and different score thresholds represents Different security level, for example, when score is higher, then it represents that security level is higher, when score is lower, then it represents that safety etc. Grade is lower.
In this embodiment, it steals chain and refers to that the content of provider is illegal by non-provider, be retrieved and provided to user's use, Influence the behavior of the interests of provider.For the request that client is sent each time, a possibility that stealing chain request is all existed for, it should In the presence of corresponding with the security level of request a possibility that stealing chain request.
Step S208 carries out operation corresponding with classification results to the first request.
In the technical solution that the application above-mentioned steps S208 is provided, behaviour corresponding with classification results is carried out to the first request Make.
By the data processing model with model data, classification processing is carried out to the security level of the first request, is obtained To after the classification results of the first request, operation corresponding with classification results is carried out to the first request, which is also right The strategy that first request is taken when being handled can take different operations according to the different classification results of the first request. For example, then directly being asked to first when the security level for determining the first request by data processing model corresponds to and steals chain behavior It asks and is hit, the first request is not allowed to pass through.It is corresponding in the security level for determining the first request by data processing model When doubtful robber's chain behavior, then dependency rule can be runed out, is obtained by the data of the first request by manually being analyzed and being abstracted To the new operation that the first request is handled, and the operational order for being handled request is updated, realizes benign cycle, Improve data-handling efficiency.
The embodiment can judge whether request is to steal chain request under given data model, also can be according to tables of data Existing difference identifies the corresponding security level specifically requested, and then is gone to find novel robber's chain pattern according to security level, And rapid strike is given according to dependency rule, the safety of data processing is improved, data-handling efficiency is improved.
S202 to step S208 through the above steps, obtains the behavioral data of client;Behavioral data is handled as data Handle model model data, wherein with model data data processing model, for first request security level into Row classification processing, the first request trigger object event for client request;By the data processing model with model data, Classification processing is carried out to the security level of the first request, obtains the classification results of the first request, wherein classification results are used to indicate The security level of first request;Operation corresponding with classification results is carried out to the first request.Due to that can identify client The security level of request, and then operation corresponding with security level is taken, reach the technology effect for improving the treatment effeciency of data Fruit, and then solve the technical issues of low efficiency of data processing in the related technology.
As an alternative embodiment, step S208, carries out operation corresponding with classification results to the first request and wraps It includes: in the case where classification results are not existing classification results in data processing model, determining that the first request is destination request; Obtain the first operational order for being handled the abnormal data in destination request;The first operation is carried out to the first request to refer to The first indicated operation is enabled, and the first operational order is added in data processing model.
Fig. 3 is a kind of method for carrying out operation corresponding with classification results to the first request according to an embodiment of the present invention Flow chart.As shown in figure 3, method includes the following steps:
Step S301 determines first in the case where classification results are not existing classification results in data processing model Request is destination request.
It is not to have in data processing model in classification results in the technical solution that the application above-mentioned steps S301 is provided Classification results in the case where, determine the first request be destination request.
By the data processing model with model data, classification processing is carried out to the security level of the first request, is obtained To after the classification results of the first request, judge whether classification results are existing classification results in data processing model, if Judging classification results not is existing data result in data processing model, then the first request is determined as destination request, mesh Mark request is that doubtful robber's chain is requested, that is, first request is that robber's chain to be determined is requested.
Step S302 obtains the first operational order for being handled the abnormal data in destination request.
In the technical solution that the application above-mentioned steps S302 is provided, the first operational order, first operational order are obtained For handling the abnormal data in destination request, wherein operation corresponding with classification results includes the first operational order The first indicated operation, the first operational order are also used to indicate to the first request to there is the request of the same category to carry out first Operation.
After determining that the first request is destination request, it can be scored by data processing model destination request, Determine whether destination request is security request by appraisal result, if determining destination request not by appraisal result is to ask safely It asks, then can determine destination request to steal chain request, then obtain the abnormal data in destination request, it can be by manually to abnormal number It according to being analyzed, and is abstracted, obtains the first operational order, policy system can be passed through and obtain the first operational order, first behaviour Making instruction can serve to indicate that the first operation of request progress with the first request with the same category, for example, to appraisal result Same or similar a kind of chain of stealing is requested, and can be operated on it using identical operational order.
Optionally, which selects by classifier according to the performance of different data more widely to request data The sorting algorithm classified.Applicable usage scenario can be used for any required field for taking request data corresponding strategy Scape.
Step S303 carries out the first operation indicated by the first operational order to the first request, and by the first operational order It is added in data processing model.
In the technical solution that the application above-mentioned steps S303 is provided, the first request is carried out indicated by the first operational order The first operation, and the first operational order is added in data processing model.
After obtaining the first operational order for being handled the abnormal data in destination request, request first The first operation indicated by the first operational order is carried out, that is, carrying out first to the first request by the instruction of the first operational order Operation.Since the first operational order can serve to indicate that the first operation of request progress to having the same category with the first request, The first operational order can be then added in data processing model, thus to operational order existing in data processing model into Row updates, and realizes benign cycle, can directly to pass through when being subsequently encountered has the request of the same category with the first request First operational order carries out the first operation to the request, for example, carrying out strike operation, prevents the corresponding behavior of the request from leading to It crosses, improves the safety of data processing.
The embodiment is by the case where classification results are not existing classification results in data processing model, determining One request is destination request;Obtain the first operational order for being handled the abnormal data in destination request, wherein with The corresponding operation of classification results includes the first operation indicated by the first operational order, and the first operational order is used to indicate to the There is the request of the same category to carry out the first operation for one request;First behaviour indicated by first operational order is carried out to the first request Make, and the first operational order is added in data processing model, realizes corresponding with classification results to the first request progress The purpose of operation.
As an alternative embodiment, step S204, handles the pattern number for data processing model for behavioral data According to including: to be filtered to behavioral data, the vector data of data processing model is obtained, wherein vector data includes multiple dimensions Degree;Vector data is handled into the model data for data processing model.
In this embodiment, after the behavioral data for obtaining client, for example, when video playing is authenticated, is played Data, request data when reporting play quality, report advertisement, reporting the behavioral datas such as heartbeat or video playing, video ID, User IP, channel, platform number, client collect player environmental information, the behavioral datas such as User ID, log-on message it Afterwards, behavioral data is filtered, obtains the vector data of data processing model, for example, being carried out to the behavioral data got Cleaning is arranged, the vector data of multidimensional is abstracted as.
It is filtered to behavioral data, after obtaining the vector data of data processing model, is by vector data processing Vector data can be handled the model for data processing model by the model data of data processing model by data processing system These vector datas are optionally classified and are classified by strategy by data.Then these vector datas are passed through into engineering Practise model with training, test, feedback flow processing, obtain final model data.
The embodiment obtains the vector data of data processing model by being filtered to behavioral data, wherein vector number According to including multiple dimensions;Vector data is handled into the model data for data processing model, realize by behavioral data processing be The purpose of the model data of data processing model, and then by the data processing model with model data, to the first request Security level carries out classification processing, obtains the classification results of the first request;Behaviour corresponding with classification results is carried out to the first request Make, improves the purpose of data processing.
As an alternative embodiment, behavioral data is handled the model for data processing model in step S204 After data, this method further include: the test result tested model data is fed back into data processing model, and Data processing model is adjusted by test result, the data processing model after being adjusted.
Fig. 4 is the flow chart of another data processing method according to an embodiment of the present invention.As shown in figure 4, this method is also The following steps are included:
Step S401, tests model data, obtains test result.
In the technical solution that the application above-mentioned steps S401 is provided, handle by behavioral data as data processing model Model data tests model data, obtains test result.
After handling behavioral data for the model data of data processing model, model data is tested, it can be with Model data is tested by big data modeling, obtains test result.Optionally, according to machine learning model to mould Type data are automatically analyzed, and test result is obtained, which can be used for adjusting data processing model.
Test result is fed back to data processing model, and adjusts data processing model by test result by step S402, Data processing model after being adjusted.
In the technical solution that the application above-mentioned steps S402 is provided, test result is fed back into data processing model, and Data processing model is adjusted by test result, the data processing model after being adjusted.
It is tested to model data, after obtaining test result, test result is fed back into data processing model, it can Test result is fed back to data verification system by big data modeling, and then data processing mould is adjusted by test result Type can adjust data processing model by test result according to machine learning model, and then the data processing after being adjusted Model realizes the training to data processing model.
It optionally, in this embodiment, can be by order to guarantee accuracy that data processing model determines request data It samples a large amount of newest behavioral datas according to preset time period to be trained data processing model, for example, acquisition is a large amount of most daily New behavioral data is trained data processing model, such data processing model itself constantly study tuning, and then intelligence Adjustable strategies, to improve the efficiency hit illegal request data.
The embodiment by after handling behavioral data for the model data of data processing model, to model data into Row test, obtains test result;Test result is fed back into data processing model, and data processing mould is adjusted by test result Type, the data processing model after being adjusted realize the training to data processing model, and then improve data processing model The efficiency of processing.
As an alternative embodiment, step S402, adjusts data processing model by test result, is adjusted Data processing model afterwards includes: validation test as a result, obtaining the first verification result;Meet first condition in the first verification result In the case where, adjust the parameter of data processing model.
Fig. 5 is a kind of process of method that data processing model is adjusted by test result according to an embodiment of the present invention Figure.As shown in figure 5, this method comprises:
Step S501, validation test is as a result, obtain the first verification result.
In the technical solution that the application above-mentioned steps S501 is provided, validation test is as a result, obtain the first verification result.
It is tested to model data, after obtaining test result, can be tested by data verification system and test is tied Fruit is verified, and test result is obtained.
Step S502 adjusts the parameter of data processing model in the case where the first verification result meets first condition.
In the technical solution that the application above-mentioned steps S502 is provided, the case where the first verification result meets first condition Under, adjust the parameter of data processing model.
In validation test as a result, after obtaining the first verification result, judge whether the first verification result meets first condition, The first condition can be the condition for adjusting the parameter of data processing model, to improve data processing model to request data The accuracy of identification.
The embodiment is by validation test as a result, obtaining the first verification result;Meet first condition in the first verification result In the case where, the parameter of data processing model is adjusted, realizes and data processing model is adjusted by test result, after being adjusted Data processing model purpose, realize the training to data processing model, so improve data processing model processing Efficiency.
As an alternative embodiment, in step S206, by the data processing model with model data, to The security level of one request carries out classification processing, when obtaining the classification results of the first request, this method further include: in the first request In the case where meeting second condition, to the first request addition first identifier, wherein first identifier is used to identify the peace of the first request Total state.
In this embodiment, the safe condition of the first request, can be whether the first request is safe state, if be The state etc. of suspected security.When normal client is when sending request data, meeting go to call according to set sequence and frequency The request of modules, generated module request number and frequency can be used as the behavioural characteristic of client.Optionally, judge Whether request of data meets the request of normal client sending, if request of data is the request that normal client issues, to The state that first request addition is used to indicate the first request is the first identifier of safe condition;If request of data is to steal chain client The request issued is held, then is used to indicate the first identifier that the first request is non-secure states to the first request addition;It is asked first In the case where asking as destination request, that is, being used in the case where the first request is the request of doubtful robber's chain to the first request addition Indicate that the first request is the first identifier for stealing chain request to be determined.
Optionally, every kind of safety can also be subdivided out under every kind of solicited status to the first identifier of the first request addition The mark of the sub- states of difference under state clearly to mark the state of request, and then improves data processing model to asking The accuracy for asking data to identify.
As an alternative embodiment, behavioral data is handled the model for data processing model in step S204 When data, this method further include: obtain the target sample of data processing model and the sample observations of target sample;By target sample The quantity processing of this sample size and sample observations is the first index of data processing model;In the mesh of data processing model In standard specimen sheet, the sample size of the corresponding sample size of each classification of target sample and target sample is handled as data processing Second index of model;First index and the second index are handled into the classification scoring for data processing model.
Fig. 6 is the flow chart of another data processing method according to an embodiment of the present invention.As shown in fig. 6, this method packet Include following steps:
Step S601, by the number of the sample size of the target sample of data processing model and the sample observations of target sample Amount, handles the first index for data processing model.
In the technical solution that the application above-mentioned steps S601 is provided, by the sample number of the target sample of data processing model The quantity processing of the sample observations of amount and target sample is the first index of data processing model, wherein target sample includes Behavioral data, the first index are used to indicate the request of client by the data handling path in data processing model, are handled Generalization ability.
In this embodiment, the peace for the request that the data processing model with model data can be used for sending client Congruent grade carries out classification processing.Data processing model can be trained constantly to be optimized to data processing model, be mentioned The treatment effeciency of high data processing model.Optionally, decision-tree model is used as basic model to carry out dividing for various states Class prediction.
The embodiment can calculate each of the sample obtained by behavioral data when being trained to data processing model The importance of the sample factor, for example, can be used the methods of Geordie (gini) coefficient, information gain-ratio calculating be used to indicate it is each The data of the importance of the sample factor, wherein the sample factor is used to indicate causality, the correlation etc. between data.? To after the data for the importance for being used to indicate each sample factor, the most important sample in selecting current sample, most by this The important sample factor is determined as the root node of data processing model;Maximum point can be calculated according to the sample factor chosen The sample data of sample is divided into two parts according to the target sample factor by the target sample factor for splitting sample class, will be drawn The two parts divided are as leaf node.Optionally, above-mentioned steps, Jin Ersheng are repeated to the corresponding subsample of leaf node At data processing model.
Optionally, by the quantity of the sample size of the target sample of data processing model and the sample observations of target sample Processing is the first index of data processing model, can be by the sample size and target sample of the target sample of data processing model The quotient of quantity of sample observations be determined as the first index of data processing model, wherein target sample includes behavioral data, First index is also the extensive index in path, can be one kind for indicating the index of novel robber's chain behavior, be used to indicate The generalization ability that the request of client is handled by the data handling path in data processing model.Wherein, generalization ability is Refer to machine learning algorithm to the adaptability of fresh sample, the destination of study is to acquire the rule for lying in data behind, to tool There are the data other than the study collection of same rule, trained network can also provide suitable output, and the ability is also as general Change ability.
In this embodiment, the value of the first index is bigger, indicates that the logic in the leaf path in the data processing model is general Change ability is better.
Step S602, in target sample, by the corresponding sample size of each classification of target sample and target sample Sample size handles the second index for data processing model.
In the technical solution that the application above-mentioned steps S602 is provided, in the target sample of data processing model, by mesh The sample size processing of the corresponding sample size of each classification and target sample of standard specimen sheet is the second finger of data processing model Number, wherein the second index is used to indicate the accuracy rate of the classification of the request of determining client.
In the target sample of data processing model, by the corresponding sample size of each classification and target sample of target sample This sample size processing is the second index of data processing model, can be by the corresponding sample number of each classification of target sample The quotient of amount and the sample size of target sample is determined as the second index of data processing model, can be for for indicating novel robber's chain One kind of the index of behavior.Second index namely path classification index, the value of the second index is bigger, indicates that this class of paths is other Predictablity rate is higher, and the value of the second index is lower, indicates that the other predictablity rate of this class of paths is lower, this path classification Confusion degree it is bigger.Wherein, in the case where the other confusion degree of class of paths is big, it is meant that there are novel robber's chain behavior, That is, not processed by data processing model before robber's chain behavior.
First index and the second index are handled the classification scoring for data processing model by step S603.
In the technical solution that the application above-mentioned steps S603 is provided, the first index and the second index are handled as at data Manage the classification scoring of model, wherein each classification that classification scoring is used to indicate target sample is the degree of target category.
It is handled by the quantity of the sample size of the target sample of data processing model and the sample observations of target sample For the first index of data processing model, by the sample number of each classification corresponding sample size and target sample of target sample After amount processing is the second index of data processing model, the first index and the second index are handled to the class for data processing model It does not score, it can be novel robber's chain mould that each classification that category scoring is used to indicate target sample, which is the degree of target category, Formula scoring, classification scoring is higher, indicates in the sample for reaching the leaf node in data processing model, existing potential robber's chain The degree of new behavior is higher.
Behavioral data when being handled the model data for data processing model by the embodiment, by the mesh of data processing model The quantity processing of the sample observations of the sample size and target sample of standard specimen sheet is the first index of data processing model, In, target sample includes behavioral data, and the first index is used to indicate the request of client by the data in data processing model The generalization ability that line of reasoning diameter is handled;It is in the target sample of data processing model, each classification of target sample is corresponding Sample size and target sample sample size processing be data processing model the second index, wherein the second index is used for Indicate the accuracy rate of the classification of the request of determining client;First index and the second index are handled to the class for data processing model It does not score, wherein each classification that classification scoring is used to indicate target sample is the degree of target category, to realize logarithm According to the training of processing model.
As an alternative embodiment, step S601, by the number of the sample size of target sample and sample observations Amount, handling as the first index of data processing model includes: to obtain the first Index A by following first formula: Wherein, samples is used to indicate that the sample size of target sample, n to be used to indicate the quantity of the sample observations of target sample.
As an alternative embodiment, step S602, by the corresponding sample size of each classification of target sample and The sample size of target sample, handling as the second index of data processing model includes: to obtain second by following second formula Index B:Wherein, maxvalueiThe sample size under i-th of classification for indicating target sample is greater than The sample size under classification in multiple classifications of target sample in addition to i-th of classification.
As an alternative embodiment, step S603 handles the first index and the second index for data processing mould The classification scoring of type includes: to obtain classification scoring C by following third formula:Wherein, Samples is used to indicate that the sample size of target sample, n to be used to indicate the quantity of the sample observations of target sample, maxvalueiThe sample size under i-th of classification for indicating target sample is greater than in multiple classifications of target sample, except the The corresponding sample size of classification except i classification.
In this embodiment, above-mentioned samples can be used to indicate that the sample size into subtree, and value is for indicating Quantity (value under each classificationiIndicate the quantity of i-th of classification of this node).In general, have in leaf node The classification of absolute predominance could be as the route result of this leaf node, that is, prediction result.
The data processing model of the embodiment can be obtained by gini coefficient.For stochastic variable X, if using p (x) table Show the probability density function of X, E [X] indicates the expectation of X, then for the n sample observations x of Xi, the representation formula of gini coefficient Are as follows:
As an alternative embodiment, the first index and the second index are handled as data processing mould in step S603 After the classification scoring of type, this method further include: filter out in data processing model greater than corresponding to the second index of target value Node;In data processing model in filtered node, score according to classification corresponding with filtered node to filtering Node afterwards is ranked up, and obtains ranking results;It is target section by the vertex ticks that ranking is predetermined sequence in ranking results Point.
Fig. 7 is the flow chart of another data processing method according to an embodiment of the present invention.As shown in fig. 7, this method packet Include following steps:
Step S701 filters out node corresponding to the second index greater than target value in data processing model.
In the technical solution that the application above-mentioned steps S701 is provided, filter out in data processing model greater than target value Node corresponding to second index.
After handling the first index and the second index as the classification scoring of data processing model, data processing is filtered out Greater than node corresponding to the second index of target value in model.For example, filtering out in Data Data model The second index, wherein k is used to indicate the preset value that screens the second index, can be accuracy rate, for example, accuracy rate It is 90%.
Step S702, in data processing model in filtered node, according to classification corresponding with filtered node Scoring, is ranked up filtered node, obtains ranking results.
In the technical solution that the application above-mentioned steps S702 is provided, in data processing model in filtered node, Filtered node is ranked up according to classification corresponding with filtered node scoring, obtains ranking results.
The vertex ticks that ranking is predetermined sequence is destination node in ranking results by step S703.
It is predetermined sequence by ranking in ranking results in the technical solution that the application above-mentioned steps S703 is provided Vertex ticks is destination node, wherein the corresponding behavioral data of destination node robber's chain behavioral data to be determined for client.
It is greater than after node corresponding to the second index of target value in filtering out data processing model, in ranking results In, it is destination node by the vertex ticks that ranking is predetermined sequence, can be ranked up according to new behavior modal index, selection is doubted It is that doubtful new behavior steals chain node by the vertex ticks for being arranged in several former like leaf node, it can also be according to novel robber's chain mould Formula scoring be ranked up, by novel robber's chain pattern scoring it is descending be ranked up, be by the vertex ticks for being arranged in several former Doubtful new behavior steals chain node, and then takes out doubtful new behavior and steal the corresponding sample number progress OA operation analysis of chain node.
The embodiment by the first index and the second index are handled for data processing model classification scoring after, mistake It filters in data processing model greater than node corresponding to the second index of target value;The filtered section in data processing model In point, filtered node is ranked up according to classification corresponding with filtered node scoring, obtains ranking results;It is arranging It is destination node by the vertex ticks that ranking is predetermined sequence in sequence result, wherein the corresponding behavioral data of destination node waits for really It is set to robber's chain behavioral data of client.
As an alternative embodiment, being target section by the vertex ticks that ranking is predetermined sequence in step S703 After point, this method further include: obtain data on the corresponding line of destination node;Data on the corresponding line of destination node are verified, are obtained To the second verification result;In the case where the second verification result meets third condition, the class of the corresponding data of destination node is determined It Wei not target category.
Fig. 8 is the flow chart of another data processing method according to an embodiment of the present invention.As shown in figure 8, this method packet Include following steps:
Step S801 obtains data on the corresponding line of destination node.
In the technical solution that the application above-mentioned steps S801 is provided, data on the corresponding line of destination node are obtained, wherein Data are the behavioral data of client corresponding with destination node when predict on line to data processing model on line.
Be by ranking predetermined sequence vertex ticks be destination node after, obtain number on the corresponding line of destination node According to data processing model that is trained and analyzing can be used, carried out in system to the grading classification of preset quantity It is predicted on line, obtains data on line.
Step S802 verifies data on the corresponding line of destination node, obtains the second verification result.
In the technical solution that the application above-mentioned steps S802 is provided, data on the corresponding line of verifying destination node are obtained Second verification result.
On obtaining the corresponding line of destination node after data, data on the corresponding line of verifying destination node obtain second Verification result, and the data that doubtful new behavior steals chain node are subjected to on-line analysis, verifying, to find novel robber's chain mould Formula, wherein the second verification result includes novel robber's chain pattern.
Step S803 determines the corresponding data of destination node in the case where the second verification result meets third condition Classification is target category.
In the technical solution that the application above-mentioned steps S803 is provided, the case where the second verification result meets third condition Under, determine that the classification of the corresponding data of destination node is target category.
The data on the corresponding line of verifying destination node, after obtaining the second verification result, meet in the second verification result In the case where third condition, determine the corresponding data of destination node classification be target category, the third condition can for for The classification for determining the corresponding data of destination node is the condition of target category, for example, determining the class of the corresponding data of destination node Wei the condition of chain classification not be stolen, to find novel robber's chain pattern, wherein the second verification result includes novel robber's chain pattern.
The embodiment by be by ranking predetermined sequence vertex ticks be destination node after, the party obtains target section Data on the corresponding line of point, wherein corresponding with destination node when data is predict on to data processing model progress line on line Client behavioral data;Data on the corresponding line of destination node are verified, the second verification result is obtained;In the second verification result In the case where meeting third condition, determines that the classification of the corresponding data of destination node is target category, realize to data processing Model carries out the purpose predicted on line, and then improves data-handling efficiency.
The embodiment can be applied in multimedia, for example, video playing.Using big data intelligent anti-theft chain It afterwards,, can be according to difference by the Scoring System scheme of the embodiment in the case where encountering many novel robber's chain patterns Classification realizes the strike strategy of multiple combinations, doubtful novel robber's chain can be also identified, so that it is preparatory to do how novel robber's chain pattern Identification, prevention, improve data-handling efficiency.
It should be noted that the embodiment is applied to the preferred embodiment that video playing scene is only the embodiment of the present invention, The scheme for not representing the embodiment of the present invention is only limitted to video playing scene, and any need identifies request data, improves The scene of the safety of data processing and data-handling efficiency is not another herein all within the scope of the embodiment of the present invention One illustrates.
Embodiment 2
Technical solution of the present invention is illustrated below with reference to preferred embodiment, specifically whether is judging request data To steal chain request, quickly robber's chain request is hit according to corresponding strategy, is illustrated.
It in this embodiment, also can root while judging whether request data is robber's chain request by data processing model According to the difference of Data Representation, specifically one security level of request is identified;It is gone to find novel robber's chain pattern according to security level, Dependency rule is being found and runed out at the first time, and quickly robber's chain request is being beaten according to the strategy obtained by dependency rule It hits.
The embodiment mainly includes anti-stealing link system grading framework and data processing model.Wherein, anti-stealing link system is graded Framework is mainly used for describing the general frame and principle of anti-stealing link system;Data processing model can be used in multimedia Foundation, training and judgement of behavioural characteristic model etc..
Fig. 9 is a kind of schematic diagram of data processing system according to an embodiment of the present invention.As shown in figure 9, at door chain The overall architecture of reason, the client (video, music, document, animation) of the embodiment can by advertisement behavior, quality behaviors, its The corresponding data of characteristic behaviors such as its behavior (open, use) are sent to background server to carry out model training, refine Algorithm model.Model judgement is carried out by the data processing model after training, and then carries out asynchronous authentication.The client of the embodiment End can preferentially synchronize authentication, and multimedia resource is handled, and asynchronous authentication is then carried out again, in this way in asynchronous door chain On the basis of, more detailed-oriented result scoring is exported, security property is given according to different scorings, and then send to client Corresponding data and strategy.
The basic principle and Technical Architecture of tactful points-scoring system are illustrated below.
Figure 10 is a kind of schematic diagram of policy scores system architecture according to an embodiment of the present invention.As shown in Figure 10, sample Data can be the behavioral data of client, sample data be accessed data processing system, by data processing system to sample number According to being handled, processing result is obtained.Processing result is input to policy system again by data processing system, by policy system according to Processing result acquisition strategy, and then strategy is input to big data modeling, by big data modeling to data processing mould Type is tested, and test result is obtained, and data verification system verifies test result, and the data of verifying are input to and are sentenced Certainly system, which can inquire court verdict by inquiry data acquisition, and then make decisions service.
Figure 11 is another policy scores system architecture according to an embodiment of the present invention.As shown in Figure 10 and Figure 11, sample Data when data include video playing authentication, play, on give the correct time data, heartbeat, qualitative data, further include play quality report, The data requested when the behaviors such as advertisement reports, heartbeat reports, video playing, video ID, User IP, channel, platform number, client The parameters such as the player environmental information of collection, User ID, log-on message.Sample data is input to data processing system, data Behavioral data is abstracted into the vector data of multidimensional by processing system, carries out feature extraction, then in tactful rating system, pass through plan Slightly these vector datas are classified and are classified, which is also used to add strategy, more new strategy.Policy system will be to Amount data be input to big data modeling, by machine learning model with training, model measurement, pass through data verification system again It automatically analyzed, verified, and feedback validation is as a result, to be adjusted data processing model.Big data modeling simultaneously Data processing model also by adjusting after provides mode decision scheme to decision system, and decision system is according to strategy and enters judgement behaviour The data of work make decisions service, and export as a result, by analyzing result, and then the more new strategy in policy system.
The embodiment can use the model data in final data processing model and ask to the video playing of each user It asks data to be classified, different strategies is taken according to classification situation, improves the efficiency of data processing.
Figure 12 is a kind of schematic diagram for being classified logic according to an embodiment of the present invention.As shown in figure 12, it reflects to request Power obtains normally performed activity data and abnormal behavioral data, and normally performed activity data are further divided into normal behaviour letter Abnormal behavioral data is further divided into normal behaviour information and abnormal behaviour information by breath and abnormal behaviour information, then Normal behaviour information in normally performed activity data is further divided into normal information 1 and exception information 7, by normally performed activity Abnormal behaviour information in data is further divided into normal information 2 and exception information 8, will be normal in abnormal behavioral data Behavioural information is divided into normal information 3 and exception information 9, and the abnormal behaviour information in abnormal behavioral data is divided into normally Information 4 and exception information 10, to realize the continuous subdivision to information.
The embodiment, can be with every in order to guarantee whether data processing model decision request data are the accuracy for stealing chain request It samples a large amount of newest data every preset time to be trained data processing model, for example, sampling a large amount of newest numbers daily It is trained according to data processing model, so that data processing model itself constantly study tuning, adjustment determine plan Slightly, and then reach optimal strike effect.Data verification dynamic adjustment model can be passed through in model training test process simultaneously Parameter improves the recognition effect of data processing model.
The data processing model of the embodiment simultaneously can also be to doubtful novel robber's chain pattern scoring except classification, after judgement Abnormal data can have manual analysis and be abstracted, then hierarchical policy is updated, to realize benign cycle.
Data processing model is introduced again below.
In this embodiment it is possible to the case where predicting various robber's chains using more disaggregated models, detailed process is as follows:
The corresponding behavioral data of characteristic behavior that client is generated in request data is obtained, according to client in number of request According to when the corresponding behavioral data of characteristic behavior that generates predict chain is stolen.Normal client can be according to set in request Sequence and frequency go to call the request of modules, the quantity and frequency of generated module request can be used as client Behavioural characteristic.Optionally, the condition for requesting whether to meet the request for normal client each time is determined using rule.Make It is determined after requesting the condition of request that satisfaction is normal client each time, can be stamped for request of data each time with rule The label of one state for being used to indicate request data is used to indicate for example, being used to indicate the label for normal request to steal chain The label of request is used to indicate the label etc. for doubtful robber's chain request.Optionally, every kind of label can also subdivide label, from And improve the accuracy that data processing model identifies request.
The embodiment can be used decision-tree model but be not limited to decision tree mould when being trained to data processing model Type carries out the classification prediction of various states as basic model.Optionally, calculate include behavioral data sample it is each because The importance (the methods of gini coefficient, information gain-ratio can be used) of son, selects the most important factor of current sample, will be most heavy Root node of the factor wanted as data processing model;Selection can be used for calculating the factor point of maximum division sample class, press Sample data is divided into two parts according to this factor point, the leaf node as data processing model.Obtained each section Sample repeats carry out above-mentioned steps, and until result reaches predetermined condition, which can be for for asking client The security level asked carries out the condition of classification processing, or accuracy rate and recall rate data processing model all up to standard.
The embodiment can also analyze data processing model.In an accuracy rate and recall rate number all up to standard After generating according to processing model, tester is needed to carry out the logic analysis of decision tree to data processing model, passes through logic point Analysis obtains the model logic of each classification in data processing model, and to there may be the paths of novel robber's chain behavior to mark Note, for being used on line.
The logic of the decision tree subtree based on gini coefficient is introduced below.
Figure 13 is a kind of logical schematic of decision tree according to an embodiment of the present invention.As shown in figure 13, wherein samples For indicating entry into the sample size of subtree, value is used to indicate the quantity (value under each classificationiFor indicating this node I-th of classification quantity).Optionally, when leaf node has the classification of absolute predominance, corresponding path could be used as this The route result of a leaf node, that is, prediction result.Gini is for indicating gini coefficient, for stochastic variable X, if using p (x) probability density function of X is indicated, E [X] indicates the expectation of X, then for the n sample observations x of Xi, the table of gini coefficient Show formula are as follows:
It should be noted that X [1], the corresponding numerical value of samples, value, gini in embodiment illustrated in fig. 13, only originally Citing of the inventive embodiments to the structure of decision-tree model, does not constitute the limit to the data processing model of the embodiment of the present invention It is fixed.
In order to find novel robber's chain pattern, which also defines several statistics come for indicating the new of leaf path Type steals chain Activity Index.Including the extensive index in path and path classification index.
The extensive index in path:When the value of the extensive index in path is bigger, indicate that the logic in this leaf path is general Change ability is better.
Path classification index:When path classification index value is bigger, this path classification predictablity rate is higher; When path classification index value is lower, indicate that the classification confusion degree in this path is bigger.Confusion degree then means to exist greatly new Type steals chain behavior.
Novel robber's chain pattern scoring:Novel robber's chain mould When the numerical value of formula scoring is higher, indicate in the corresponding sample of this leaf node, existing potential robber's chain new behavior degree is higher.
After complete to data processing model training, it is assumed that the depth of tree is 8, then the maximum quantity of leaf node is 28-1 =128;Filter out path classification index(k indicates accuracy rate, such as node 90%), can be according to Doubtful leaf node in new behavior modal index sequencing selection data processing model, it is doubtful for marking several nodes being arranged in front Like robber's chain node of new behavior, and corresponding sample data is taken out for OA operation analysis.
Optionally, the data processing model of the embodiment can be used a variety of evaluation methods and generate, including information gain, letter Ratio of profit increase etc. is ceased, herein with no restrictions.
The embodiment can also carry out data processing model to predict on line.It can be used trained, and analyzed Decision-tree model predicted on the lines of set several grading classifications, carry out strike feedback in real time to chain request is stolen, and The data on-line analysis verifying of chain node will be stolen by doubtful new behavior, so as to find novel robber's chain pattern.
In this embodiment, after using big data intelligent anti-theft chain, many novel robber's chain patterns can be encountered, in the past Model be difficult to identify, and Scoring System scheme through the embodiment of the present invention, can on the basis of intelligence asynchronous door chain, Algorithm model is refined, more detailed-oriented result scoring can be exported, security property is given according to different scorings, is done It can also be identified doubtful to more comprehensive careful door chain logic to hit strategy according to different classes of realization multiple combinations Novel robber's chain identifies in advance, takes precautions against to do how novel robber's chain pattern, improves data-handling efficiency.
In this embodiment it is possible to continue to optimize behavioural characteristic, for example, screenshot when playing advertisement inside player reports And user opens the behaviors such as homepage, details page.Classifier can select more widely to have according to different Data Representations more The sorting algorithm of classification capacity.Usage scenario can be used for any need and carry out safety detection to request data, to robber's chain request The scene hit, herein with no restrictions.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation The method of example can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but it is very much In the case of the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to existing The part that technology contributes can be embodied in the form of software products, which is stored in a storage In medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, calculate Machine, server or network equipment etc.) execute method described in each embodiment of the present invention.
Embodiment 3
According to embodiments of the present invention, it additionally provides a kind of for implementing the data processing equipment of above-mentioned data processing method. Figure 14 is a kind of schematic diagram of data processing equipment according to an embodiment of the present invention.As shown in figure 14, the apparatus may include: obtain Take unit 10, first processing units 20, the second processing unit 30 and execution unit 40.
Acquiring unit 10, for obtaining the behavioral data of client.
First processing units 20, for behavioral data to be handled to the model data for data processing model, wherein there is mould The data processing model of type data, for carrying out classification processing to the security level of the first request, the first request is used for client Request triggering object event.
The second processing unit 30, for by the data processing model with model data, to the safety etc. of the first request Grade carries out classification processing, obtains the classification results of the first request, wherein classification results are used to indicate safety of the first request etc. Grade.
Operating unit 40, for carrying out operation corresponding with classification results to the first request.
It should be noted that the acquiring unit 10 in the embodiment can be used for executing the step in the embodiment of the present application 1 S202, the first processing units 20 in the embodiment can be used for executing the step S204 in the embodiment of the present application 1, the embodiment In the second processing unit 30 can be used for executing the step S206 in the embodiment of the present application 1, the operating unit in the embodiment 40 can be used for executing the step S208 in the embodiment of the present application 1.
Operating unit 40 comprises determining that module, obtains module and operation module.Wherein it is determined that module, for being tied in classification Fruit is not to determine that the first request is destination request in data processing model in the case where existing classification results;Module is obtained, is used In obtaining the first operational order, wherein the first operational order is for handling the abnormal data in destination request, with classification As a result corresponding operation includes the first operation indicated by the first operational order, and the first operational order is also used to indicate to first The request with the same category is requested to carry out the first operation;Operation module, for carrying out the first operation to the first request, and by the One operational order is added in data processing model.
First processing units 20 include: filtering module and processing module.Wherein, filtering module, for behavioral data into Row filtering, obtains the vector data of data processing model, wherein vector data includes multiple dimensions;Processing module, for will be to Measure the model data that data processing is data processing model.
Optionally, device further include: test cell and adjustment unit.Wherein, test cell, for by behavioral data After processing is the model data of data processing model, model data is tested, test result is obtained;Adjustment unit is used In test result is fed back to data processing model, and data processing model is adjusted by test result, the number after being adjusted According to processing model.
Optionally, adjustment unit includes: authentication module and adjustment module.Wherein, authentication module is used for validation test knot Fruit obtains the first verification result;Module is adjusted, for adjusting data in the case where the first verification result meets first condition Handle the parameter of model.
Optionally, which further includes adding unit, for by the data processing model with model data, to The security level of one request carries out classification processing, when obtaining the classification results of the first request, meets second condition in the first request In the case where, first identifier is added for the first request, wherein first identifier is used to identify the safe condition of the first request.
Optionally, device further include: first acquisition unit, third processing unit, fourth processing unit and fourth process Unit.Wherein, first acquisition unit, for obtaining number when behavioral data to be handled to the model data for data processing model According to the target sample of processing model and the sample observations of target sample;Third processing unit, for by the sample of target sample The quantity of quantity and sample observations handles the first index for data processing model, wherein target sample includes behavior number According to the first index is used to indicate the request of client by the data handling path in data processing model, and what is handled is extensive Ability;Fourth processing unit is used in target sample, by the corresponding sample size of each classification and target sample of target sample This sample size, handles the second index for data processing model, wherein the second index is used to indicate asking for determining client The accuracy rate for the classification asked;Fourth processing unit, for handling the class for data processing model for the first index and the second index It does not score, wherein each classification that classification scoring is used to indicate target sample is the degree of target category.
Optionally, third processing unit is used to obtain the first Index A by following first formula:Wherein, Samples is used to indicate that the sample size of target sample, n to be used to indicate the quantity of the sample observations of target sample.
Optionally, fourth processing unit is used to obtain the second index B by following second formula:Its In, maxvalueiThe sample size under i-th of classification for indicating target sample, which is greater than in multiple classifications of target sample, to be removed The sample size under classification except i-th of classification.
Optionally, fourth processing unit is used to obtain classification scoring C by following third formula: Wherein, samples is used to indicate that the sample size of target sample, n to be used to indicate the quantity of the sample observations of target sample, maxvalueiThe sample size under i-th of classification for indicating target sample is greater than in multiple classifications of target sample, except the The corresponding sample size of classification except i classification.
Optionally, the device further include: filter element, for handling as at data by the first index and the second index After the classification scoring for managing model, in data processing model, node corresponding to the second index greater than target value is filtered out; Sequencing unit, in filtered node, scoring according to classification corresponding with filtered node in data processing model, Filtered node is ranked up, ranking results are obtained;Marking unit, for being default sequence by ranking in ranking results The vertex ticks of column is destination node, wherein the corresponding behavioral data of destination node robber's chain behavior number to be determined for client According to.
Optionally, device further include: second acquisition unit, authentication unit and determination unit.Wherein, second list is obtained Member, for be by ranking predetermined sequence vertex ticks be destination node after, obtain data on the corresponding line of destination node, Wherein, data are the behavior number of client corresponding with destination node when predict on line to data processing model on line According to;Authentication unit obtains the second verification result for verifying data on the corresponding line of destination node;Determination unit, for the In the case that two verification results meet third condition, determine that the classification of the corresponding data of destination node is target category.
The embodiment obtains the behavioral data of client by acquiring unit 10, by first processing units 20 by behavior number It is the model data of data processing model according to processing, wherein the data processing model with model data, for requesting first Security level carry out classification processing, the first request triggers object event for client request, and the second processing unit 30 passes through Data processing model with model data carries out classification processing to the security level of the first request, obtains point of the first request Grade result, wherein classification results are used to indicate the security level of the first request, by operating unit 40 to first request carry out with The corresponding operation of classification results.Due to that can identify the security level of the request of client, and then take and security level pair The operation answered has reached the technical effect for improving the treatment effeciency of data, and then has solved the effect of data processing in the related technology The low technical problem of rate.
Herein it should be noted that example and application scenarios phase that said units and module are realized with corresponding step Together, but it is not limited to the above embodiments 1 disclosure of that.It should be noted that above-mentioned module can be with as a part of device It operates in hardware environment as shown in Figure 1, hardware realization can also be passed through, wherein hardware environment by software realization Including network environment.
Embodiment 4
According to embodiments of the present invention, it additionally provides a kind of for implementing the electronic device of above-mentioned data processing method.
Figure 15 is a kind of structural block diagram of electronic device according to an embodiment of the present invention.As shown in figure 15, the electronics dress being somebody's turn to do Setting may include: one or more (one is only shown in figure) processors 151, memory 153.Optionally, as shown in figure 15, should Electronic device can also include transmitting device 155, input-output equipment 157.
Wherein, memory 153 can be used for storing software program and module, such as the data processing side in the embodiment of the present invention Method and the corresponding program instruction/module of device, processor 151 by the software program that is stored in memory 153 of operation and Module realizes above-mentioned data processing method thereby executing various function application and data processing.Memory 153 can wrap Include high speed random access memory, can also include nonvolatile memory, as one or more magnetic storage device, flash memory or Other non-volatile solid state memories of person.In some instances, memory 153 can further comprise remote relative to processor 151 The memory of journey setting, these remote memories can pass through network connection to electronic device.The example of above-mentioned network include but It is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
Above-mentioned transmitting device 155 is used to that data to be received or sent via network, can be also used for processor with Data transmission between memory.Above-mentioned network specific example may include cable network and wireless network.In an example, Transmitting device 155 includes a network adapter (Network Interface Controller, NIC), can pass through cable It is connected with other network equipments with router so as to be communicated with internet or local area network.In an example, transmission dress 155 are set as radio frequency (Radio Frequency, RF) module, is used to wirelessly be communicated with internet.
Wherein, specifically, memory 153 is for storing application program.
The application program that processor 151 can call memory 153 to store by transmitting device 155, to execute following steps It is rapid:
Obtain the behavioral data of client;
Behavioral data is handled into the model data for data processing model, wherein the data processing mould with model data Type, for carrying out classification processing to the security level of the first request, the first request triggers object event for client request;
By the data processing model with model data, classification processing is carried out to the security level of the first request, is obtained The classification results of first request, wherein classification results are used to indicate the security level of the first request;
Operation corresponding with classification results is carried out to the first request.
Processor 151 is also used to execute following step: not being existing classification knot in data processing model in classification results In the case where fruit, determine that the first request is destination request;The first operational order is obtained, the first operational order is used for destination request In abnormal data handled, wherein it is corresponding with classification results operation include the first operational order indicated by first behaviour Make, the first operational order is also used to indicate the first operation of request progress to having the same category with the first request;It is asked to first It asks and carries out the first operation indicated by the first operational order, and the first operational order is added in data processing model.
Processor 151 is also used to execute following step: being filtered to behavioral data, obtains the vector of data processing model Data, wherein vector data includes multiple dimensions;Vector data is handled into the model data for data processing model.
Processor 151 is also used to execute following step: behavioral data is being handled to the model data for data processing model Later, model data is tested, obtains test result;Test result is fed back into data processing model, and passes through test As a result data processing model is adjusted, the data processing model after being adjusted.
Processor 151 is also used to execute following step: validation test is as a result, obtain the first verification result;In the first verifying As a result in the case where meeting first condition, the parameter of data processing model is adjusted.
Processor 151 is also used to execute following step: by the data processing model with model data, asking to first The security level asked carries out classification processing, when obtaining the classification results of the first request, meets the feelings of second condition in the first request Under condition, to the first request addition first identifier, wherein first identifier is used to identify the safe condition of the first request.
Processor 151 is also used to execute following step: behavioral data is being handled to the model data for data processing model When, obtain the target sample of data processing model and the sample observations of target sample;By the sample size and sample of target sample The quantity processing of this observation is the first index of data processing model, wherein target sample includes behavioral data, the first index It is used to indicate the generalization ability that the request of client is handled by the data handling path in data processing model;In target sample In this, the sample size of each classification corresponding sample size and target sample of target sample is handled as data processing mould Second index of type, wherein the second index is used to indicate the accuracy rate of the classification of the request of determining client;By the first index and Second index handles the classification scoring for data processing model, wherein classification, which scores, is used to indicate each classification of target sample For the degree of target category.
Processor 151 is also used to execute following step: the first Index A is obtained by following first formula: Wherein, samples is used to indicate that the sample size of target sample, n to be used to indicate the quantity of the sample observations of target sample.
Processor 151 is also used to execute following step: the second index B is obtained by following second formula: Wherein, maxvalueiThe sample size under i-th of classification for indicating target sample is greater than in multiple classifications of target sample The sample size under classification in addition to i-th of classification.
Processor 151 is also used to execute following step: classification scoring C is obtained by following third formula:Wherein, samples is used to indicate the sample size of target sample, and n is for indicating target The quantity of the sample observations of sample, maxvalueiThe sample size under i-th of classification for indicating target sample is greater than mesh The corresponding sample size of classification in multiple classifications of standard specimen sheet, in addition to i-th of classification.
Processor 151 is also used to execute following step: by the first index and the second index, handling as data processing model Classification scoring after, in data processing model, filter out node corresponding to the second index greater than target value;In data It handles in model in filtered node, scores according to classification corresponding with filtered node, filtered node is carried out Sequence, obtains ranking results;It is destination node by the vertex ticks that ranking is predetermined sequence, wherein target in ranking results The corresponding behavioral data of node robber's chain behavioral data to be determined for client.
Processor 151 is also used to execute following step: by the vertex ticks that ranking is predetermined sequence be destination node it Afterwards, data on the corresponding line of destination node are obtained, wherein when data is predict on to data processing model progress line on line, The behavioral data of client corresponding with destination node;Data on the corresponding line of destination node are verified, the second verification result is obtained; In the case where the second verification result meets third condition, determine that the classification of the corresponding data of destination node is target category.
Using the embodiment of the present invention, a kind of scheme of data processing is provided.By the behavioral data for obtaining client;It will Behavioral data processing is the model data of data processing model, wherein the data processing model with model data, for the The security level of one request carries out classification processing, and the first request triggers object event for client request;By with model The data processing model of data carries out classification processing to the security level of the first request, obtains the classification results of the first request, In, classification results are used to indicate the security level of the first request;Operation corresponding with classification results is carried out to the first request.Due to It can identify the security level of the request of client, and then take operation corresponding with security level, reach raising data Treatment effeciency technical effect, and then solve the technical issues of low efficiency of data processing in the related technology.
Optionally, the specific example in the present embodiment can be with reference to example described in above-described embodiment, the present embodiment Details are not described herein.
It will appreciated by the skilled person that structure shown in figure 15 is only to illustrate, electronic device can be intelligence Mobile phone (such as Android phone, iOS mobile phone), tablet computer, palm PC and mobile internet device (Mobile Internet Devices, MID), the electronic devices such as PAD.Figure 15 it does not cause to limit to the structure of above-mentioned electronic device.Example Such as, electronic device may also include than shown in Figure 15 more perhaps less component (such as network interface, display device) or With the configuration different from shown in Figure 15.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing the relevant hardware of electronic device by program, which can store in a computer readable storage medium In, storage medium may include: flash disk, read-only memory (Read-Only Memory, ROM), random access device (Random Access Memory, RAM), disk or CD etc..
Embodiment 5
The embodiments of the present invention also provide a kind of storage mediums.Optionally, in the present embodiment, above-mentioned storage medium can With the program code for configuration for executing data processing.
Optionally, in the present embodiment, above-mentioned storage medium can be located at multiple in network shown in above-described embodiment On at least one network equipment in the network equipment.
Optionally, in the present embodiment, storage medium is arranged to store the program code for executing following steps:
Obtain the behavioral data of client;
Behavioral data is handled into the model data for data processing model, wherein the data processing mould with model data Type, for carrying out classification processing to the security level of the first request, the first request triggers object event for client request;
By the data processing model with model data, classification processing is carried out to the security level of the first request, is obtained The classification results of first request, wherein classification results are used to indicate the security level of the first request;
Operation corresponding with classification results is carried out to the first request.
Optionally, storage medium is also configured to store the program code for executing following steps: classification results not In the case where for classification results existing in data processing model, determine that the first request is destination request;The first operation is obtained to refer to It enables, the first operational order is for handling the abnormal data in destination request, wherein operation packet corresponding with classification results The first operation indicated by the first operational order is included, the first operational order is also used to indicate to have the same category to the first request Request carry out first operation;First operation indicated by first operational order is carried out to the first request, and the first operation is referred to Order is added in data processing model.
Optionally, storage medium is also configured to store the program code for executing following steps: to behavioral data into Row filtering, obtains the vector data of data processing model, wherein vector data includes multiple dimensions;It is by vector data processing The model data of data processing model.
Optionally, storage medium is also configured to store the program code for executing following steps: by behavioral data After processing is the model data of data processing model, model data is tested, test result is obtained;Test result is anti- It is fed to data processing model, and data processing model is adjusted by test result, the data processing model after being adjusted.
Optionally, storage medium is also configured to store the program code for executing following steps: validation test as a result, Obtain the first verification result;In the case where the first verification result meets first condition, the parameter of data processing model is adjusted.
Optionally, storage medium is also configured to store the program code for executing following steps: by with mould The data processing model of type data carries out classification processing to the security level of the first request, obtains the classification results of the first request When, in the case where the first request meets second condition, to the first request addition first identifier, wherein first identifier is for marking Know the safe condition of the first request.
Optionally, storage medium is also configured to store the program code for executing following steps: by behavioral data When processing is the model data of data processing model, the sample observation of the target sample and target sample of data processing model is obtained Value;The quantity of the sample size of target sample and sample observations is handled into the first index for data processing model, wherein mesh Standard specimen originally includes behavioral data, and the first index is used to indicate the request of client by the data processing road in data processing model Diameter, the generalization ability handled;In target sample, by the corresponding sample size of each classification and target sample of target sample This sample size, handles the second index for data processing model, wherein the second index is used to indicate asking for determining client The accuracy rate for the classification asked;By the first index and the second index, the classification scoring for data processing model is handled, wherein classification Each classification that scoring is used to indicate target sample is the degree of target category.
Optionally, storage medium is also configured to store the program code for executing following steps: by following first Formula obtains the first Index A:Wherein, samples is used to indicate the sample size of target sample, and n is for indicating The quantity of the sample observations of target sample.
Optionally, storage medium is also configured to store the program code for executing following steps: by following second Formula obtains the second index B:Wherein, maxvalueiUnder i-th of classification for indicating target sample Sample size is greater than the sample size under the classification in multiple classifications of target sample in addition to i-th of classification.
Optionally, storage medium is also configured to store the program code for executing following steps: by following third Formula obtains classification scoring C:Wherein, samples is used to indicate the sample of target sample Quantity, n are used to indicate the quantity of the sample observations of target sample, maxvalueiFor indicating i-th of classification of target sample Under sample size be greater than target sample multiple classifications in, the corresponding sample size of classification in addition to i-th of classification.
Optionally, storage medium is also configured to store the program code for executing following steps: by the first index It in data processing model, is filtered out greater than target value after handling the classification scoring for data processing model with the second index The second index corresponding to node;In data processing model in filtered node, according to corresponding with filtered node Classification scoring, filtered node is ranked up, ranking results are obtained;It is predetermined sequence by ranking in ranking results Vertex ticks be destination node, wherein the corresponding behavioral data of destination node robber's chain behavioral data to be determined for client.
Optionally, storage medium is also configured to store the program code for executing following steps: being pre- by ranking If the vertex ticks of sequence is data on the corresponding line of acquisition destination node, wherein data are right on line after destination node When data processing model predict on line, the behavioral data of client corresponding with destination node;It is corresponding to verify destination node Line on data, obtain the second verification result;In the case where the second verification result meets third condition, destination node pair is determined The classification for the data answered is target category.
Optionally, the specific example in the present embodiment can be with reference to example described in above-described embodiment, the present embodiment Details are not described herein.
Optionally, in the present embodiment, above-mentioned storage medium can include but is not limited to: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk or The various media that can store program code such as CD.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
If the integrated unit in above-described embodiment is realized in the form of SFU software functional unit and as independent product When selling or using, it can store in above-mentioned computer-readable storage medium.Based on this understanding, skill of the invention Substantially all or part of the part that contributes to existing technology or the technical solution can be with soft in other words for art scheme The form of part product embodies, which is stored in a storage medium, including some instructions are used so that one Platform or multiple stage computers equipment (can be personal computer, server or network equipment etc.) execute each embodiment institute of the present invention State all or part of the steps of method.
In the above embodiment of the invention, it all emphasizes particularly on different fields to the description of each embodiment, does not have in some embodiment The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed client, it can be by others side Formula is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, and only one Kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or It is desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or discussed it is mutual it Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (15)

1. a kind of data processing method characterized by comprising
Obtain the behavioral data of client;
The behavioral data is handled into the model data for data processing model, wherein the number with the model data According to processing model, for carrying out classification processing to the security level of the first request, first request is asked for the client Seek triggering object event;
By the data processing model with the model data, the security level of first request is carried out at classification Reason obtains the classification results of first request, wherein the classification results are used to indicate the safety etc. of first request Grade;
Operation corresponding with the classification results is carried out to first request.
2. the method according to claim 1, wherein described carry out and the classification results first request Corresponding operation includes:
In the case where the classification results are not existing classification results in the data processing model, determine that described first asks It asks as destination request;
Obtain the first operational order, wherein first operational order is used to carry out the abnormal data in the destination request Processing, the operation corresponding with the classification results include first operating indicated by first operational order, and described the One operational order is also used to indicate request progress first operation to having the same category with first request;
First operation is carried out to first request, and first operational order is added to the data processing model In.
3. the method according to claim 1, wherein described handle the behavioral data for data processing model Model data include:
The behavioral data is filtered, the vector data of the data processing model is obtained, wherein the vector data packet Include multiple dimensions;
The vector data is handled into the model data for the data processing model.
4. the method according to claim 1, wherein the behavioral data is handled as data processing mould described After the model data of type, the method also includes:
The model data is tested, test result is obtained;
The test result is fed back into the data processing model, and the data processing mould is adjusted by the test result Type, the data processing model after being adjusted.
5. according to the method described in claim 4, it is characterized in that, described adjust the data processing by the test result Model, the data processing model after being adjusted include:
The test result is verified, the first verification result is obtained;
In the case where first verification result meets first condition, the parameter of the data processing model is adjusted.
6. the method according to claim 1, wherein passing through the data with the model data described Model is handled, classification processing is carried out to the security level of first request, when obtaining the classification results of first request, institute State method further include:
In the case where first request meets second condition, for the first request addition first identifier, wherein described the One mark is for identifying the safe condition of first request.
7. method as claimed in any of claims 1 to 6, which is characterized in that it is described will be at the behavioral data When reason is the model data of data processing model, the method also includes:
Obtain the target sample of the data processing model and the sample observations of the target sample;
By the quantity of the sample size of the target sample and the sample observations, handling is the of the data processing model One index, wherein the target sample includes the behavioral data, and first index is used to indicate the request of the client By the data handling path in the data processing model, the generalization ability that is handled;
In the target sample, by the sample of each classification corresponding sample size and the target sample of the target sample This quantity handles the second index for the data processing model, wherein second index, which is used to indicate, determines the client The accuracy rate of the classification of the request at end;
By first index and second index, the classification scoring for the data processing model is handled, wherein the class Each classification that the target sample Ping Fen be used to indicate is the degree of target category.
8. the method according to the description of claim 7 is characterized in that
The quantity by the sample size of the target sample and the sample observations is handled as the data processing model The first index include: that first Index A is obtained by following first formula:
Wherein, samples is used to indicate the sample size of the target sample, and n is for indicating the target sample The quantity of this sample observations.
9. the method according to the description of claim 7 is characterized in that the corresponding sample of each classification by the target sample The sample size of this quantity and the target sample, handling as the second index of the data processing model includes: by as follows Second formula obtains the second index B:
Wherein, maxvalueiThe sample size under i-th of classification for indicating the target sample is big The sample size under classification in multiple classifications of the target sample in addition to i-th of classification.
10. the method according to the description of claim 7 is characterized in that described by first index and second index, place Reason is that the classification scoring of the data processing model includes: to obtain the classification scoring C by following third formula:
Wherein, samples is used to indicate that the sample size of the target sample, n to be used for Indicate the quantity of the sample observations of the target sample, maxvalueiUnder i-th of classification for indicating the target sample Sample size be greater than the target sample multiple classifications in, the corresponding sample number of classification in addition to i-th of classification Amount.
11. the method according to the description of claim 7 is characterized in that described by first index and second index, After processing is the classification scoring of the data processing model, the method also includes:
In the data processing model, node corresponding to the second index greater than target value is filtered out;
In the data processing model in filtered node, score according to classification corresponding with the filtered node, The filtered node is ranked up, ranking results are obtained;
It is destination node by the vertex ticks that ranking is predetermined sequence, wherein the destination node pair in the ranking results The behavioral data answered robber's chain behavioral data to be determined for the client.
12. according to the method for claim 11, which is characterized in that be by the vertex ticks that ranking is predetermined sequence described After destination node, the method also includes:
Obtain data on the corresponding line of the destination node, wherein on the line data be to the data processing model into When being predicted on line, the behavioral data of the client corresponding with the destination node;
Data on the corresponding line of the destination node are verified, the second verification result is obtained;
In the case where second verification result meets third condition, determine that the classification of the corresponding data of the destination node is The target category.
13. a kind of data processing equipment characterized by comprising
Acquiring unit, for obtaining the behavioral data of client;
First processing units, for the behavioral data to be handled to the model data for data processing model, wherein have described The data processing model of model data, for carrying out classification processing, first request to the security level of the first request Object event is triggered for the client request;
The second processing unit, for requesting described first by the data processing model with the model data Security level carries out classification processing, obtains the classification results of first request, wherein the classification results are used to indicate described The security level of first request;
Operating unit, for carrying out operation corresponding with the classification results to first request.
14. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein when described program is run Execute data processing method described in any one of claim 1 to 12.
15. a kind of electronic device, including memory, processor and it is stored on the memory and can transports on the processor Capable computer program, which is characterized in that the processor executes the claim 1 to 12 times by the computer program Data processing method described in one.
CN201710754737.6A 2017-08-28 2017-08-28 Data processing method, data processing device, storage medium and electronic device Active CN109426700B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710754737.6A CN109426700B (en) 2017-08-28 2017-08-28 Data processing method, data processing device, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710754737.6A CN109426700B (en) 2017-08-28 2017-08-28 Data processing method, data processing device, storage medium and electronic device

Publications (2)

Publication Number Publication Date
CN109426700A true CN109426700A (en) 2019-03-05
CN109426700B CN109426700B (en) 2023-04-25

Family

ID=65503335

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710754737.6A Active CN109426700B (en) 2017-08-28 2017-08-28 Data processing method, data processing device, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN109426700B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111063230A (en) * 2019-12-13 2020-04-24 中国人民解放军空军工程大学 Motion filter of simulation training simulation system
CN111818305A (en) * 2020-07-09 2020-10-23 杭州海康威视数字技术股份有限公司 Distributed system, service control method and device
WO2020232899A1 (en) * 2019-05-23 2020-11-26 平安科技(深圳)有限公司 Troubleshooting method for data analysis system, and related device
CN112115468A (en) * 2020-09-07 2020-12-22 沈建锋 Service information detection method based on big data and cloud computing center
CN112637148A (en) * 2020-12-11 2021-04-09 平安普惠企业管理有限公司 Method, device, electronic equipment and medium for verifying user

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102385705A (en) * 2010-09-02 2012-03-21 大猩猩科技股份有限公司 Abnormal behavior detection system and method by utilizing automatic multi-feature clustering method
CN102724317A (en) * 2012-06-21 2012-10-10 华为技术有限公司 Network data flow classification method and device
CN105516211A (en) * 2016-02-06 2016-04-20 北京祥云天地科技有限公司 Method, device and system for recognizing database accessing behaviors based on behavior model
CN105897676A (en) * 2015-12-01 2016-08-24 乐视网信息技术(北京)股份有限公司 User resource access behavior processing method and device
US20160255139A1 (en) * 2016-03-12 2016-09-01 Yogesh Chunilal Rathod Structured updated status, requests, user data & programming based presenting & accessing of connections or connectable users or entities and/or link(s)
CN106354799A (en) * 2016-08-26 2017-01-25 河海大学 Subject data set multi-layer facet filtration method and system based on data quality
CN106384282A (en) * 2016-06-14 2017-02-08 平安科技(深圳)有限公司 Method and device for building decision-making model
CN106611189A (en) * 2016-06-28 2017-05-03 四川用联信息技术有限公司 Method for constructing integrated classifier of standardized multi-dimensional cost sensitive decision-making tree
CN107015993A (en) * 2016-01-28 2017-08-04 中国移动通信集团上海有限公司 A kind of user type recognition methods and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102385705A (en) * 2010-09-02 2012-03-21 大猩猩科技股份有限公司 Abnormal behavior detection system and method by utilizing automatic multi-feature clustering method
CN102724317A (en) * 2012-06-21 2012-10-10 华为技术有限公司 Network data flow classification method and device
CN105897676A (en) * 2015-12-01 2016-08-24 乐视网信息技术(北京)股份有限公司 User resource access behavior processing method and device
CN107015993A (en) * 2016-01-28 2017-08-04 中国移动通信集团上海有限公司 A kind of user type recognition methods and device
CN105516211A (en) * 2016-02-06 2016-04-20 北京祥云天地科技有限公司 Method, device and system for recognizing database accessing behaviors based on behavior model
US20160255139A1 (en) * 2016-03-12 2016-09-01 Yogesh Chunilal Rathod Structured updated status, requests, user data & programming based presenting & accessing of connections or connectable users or entities and/or link(s)
CN106384282A (en) * 2016-06-14 2017-02-08 平安科技(深圳)有限公司 Method and device for building decision-making model
CN106611189A (en) * 2016-06-28 2017-05-03 四川用联信息技术有限公司 Method for constructing integrated classifier of standardized multi-dimensional cost sensitive decision-making tree
CN106354799A (en) * 2016-08-26 2017-01-25 河海大学 Subject data set multi-layer facet filtration method and system based on data quality

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CLARA ROCHA 等: "An algorithm for ordinal sorting based on ELECTRE with categories defined by examples" *
梁晓月: "中文问答系统中问题分类相关技术的研究" *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020232899A1 (en) * 2019-05-23 2020-11-26 平安科技(深圳)有限公司 Troubleshooting method for data analysis system, and related device
CN111063230A (en) * 2019-12-13 2020-04-24 中国人民解放军空军工程大学 Motion filter of simulation training simulation system
CN111818305A (en) * 2020-07-09 2020-10-23 杭州海康威视数字技术股份有限公司 Distributed system, service control method and device
CN111818305B (en) * 2020-07-09 2021-12-10 杭州海康威视数字技术股份有限公司 Distributed system, service control method and device
CN112115468A (en) * 2020-09-07 2020-12-22 沈建锋 Service information detection method based on big data and cloud computing center
CN112115468B (en) * 2020-09-07 2021-04-02 深圳市瑞冠信息科技有限公司 Service information detection method based on big data and cloud computing center
CN112637148A (en) * 2020-12-11 2021-04-09 平安普惠企业管理有限公司 Method, device, electronic equipment and medium for verifying user
CN112637148B (en) * 2020-12-11 2022-10-21 平安普惠企业管理有限公司 Method, device, electronic equipment and medium for verifying user

Also Published As

Publication number Publication date
CN109426700B (en) 2023-04-25

Similar Documents

Publication Publication Date Title
CN109426700A (en) Data processing method, device, storage medium and electronic device
CN109922032B (en) Method, device, equipment and storage medium for determining risk of logging in account
CN108156131B (en) Webshell detection method, electronic device and computer storage medium
CN110009171B (en) User behavior simulation method, device, equipment and computer readable storage medium
CN103530365B (en) Obtain the method and system of the download link of resource
CN109241711A (en) User behavior recognition method and device based on prediction model
CN107332811A (en) The methods, devices and systems of intrusion detection
CN106777024A (en) Recognize the method and device of malicious user
CN108334758A (en) A kind of detection method, device and the equipment of user's ultra vires act
CN107733863A (en) Daily record adjustment method and device under a kind of distributed hadoop environment
CN110493262A (en) It is a kind of to improve the network attack detecting method classified and system
Kistijantoro Vitality based feature selection for intrusion detection
CN110008976A (en) A kind of network behavior classification method and device
Neri Comparing local search with respect to genetic evolution to detect intrusions in computer networks
Garcia et al. A deep learning-based intrusion detection and preventation system for detecting and preventing denial-of-service attacks
CN110572302B (en) Diskless local area network scene identification method and device and terminal
CN104731937A (en) User behavior data processing method and device
CN110598794A (en) Classified countermeasure network attack detection method and system
CN112822223A (en) DNS hidden tunnel event automatic detection method and device and electronic equipment
CN110519228B (en) Method and system for identifying malicious cloud robot in black-production scene
CN112184241A (en) Identity authentication method and device
CN106039711A (en) User identity authentication method and device
Farid et al. Learning intrusion detection based on adaptive bayesian algorithm
CN106789411B (en) Method and device for acquiring active IP data in machine room
Merkle Automated network forensics

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant