CN111416817A - Mode identification method based on network verification code - Google Patents

Mode identification method based on network verification code Download PDF

Info

Publication number
CN111416817A
CN111416817A CN202010187508.2A CN202010187508A CN111416817A CN 111416817 A CN111416817 A CN 111416817A CN 202010187508 A CN202010187508 A CN 202010187508A CN 111416817 A CN111416817 A CN 111416817A
Authority
CN
China
Prior art keywords
abnormal
verification
pattern recognition
client
behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010187508.2A
Other languages
Chinese (zh)
Inventor
刘放美
宋德涛
武丰龙
景晓悦
栗想
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou University of Light Industry
Original Assignee
Zhengzhou University of Light Industry
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou University of Light Industry filed Critical Zhengzhou University of Light Industry
Priority to CN202010187508.2A priority Critical patent/CN111416817A/en
Publication of CN111416817A publication Critical patent/CN111416817A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a pattern recognition method based on a network verification code, which comprises the following steps: s1: counting abnormal behavior characteristics of an abnormal client in advance, and setting matching degree scores corresponding to the abnormal behavior characteristics; s2: after a user logs in a service server through a client, the service server records service behavior information of the user and stores the service behavior information in a behavior statistical database; s3: and establishing a pattern recognition system at a network server end for storing and processing a pattern recognition object to be recognized. The method for identifying the abnormal client judges whether the client is the abnormal client or not based on the behavior of the client, so that the problem of cracking of intelligent identification software and artificial customer service can be avoided, the reliability of identification can be ensured, and the normal service of a common client cannot be influenced.

Description

Mode identification method based on network verification code
Technical Field
The invention relates to the technical field of network security, in particular to a pattern recognition method based on a network verification code.
Background
The generation of verification codes is accompanied with the development of computer technology and the continuous improvement of hacker technology, in order to prevent hackers from using an automatic registration tool to register website accounts in batch and fill water, the verification codes go through a process from pure numbers to distorted pictures and characters and symbols, and go through a process from simple to complex and difficult to distinguish, although the difficulty of identification by the automatic registration tool is improved.
Although the security of the system can be improved by setting the verification code, aiming at software in an actual production system, because automatic testing or other requirements need to be carried out, if the verification code is manually input in each test, the testing efficiency is greatly reduced, and the actual requirements cannot be met. The traditional automatic identifying method for the identifying code mainly comprises four steps of image denoising pretreatment, cutting, normalization and identification, wherein the difficulty is that the identifying code image is difficult to be effectively cut, and further subsequent identification fails.
Disclosure of Invention
Technical problem to be solved
The present invention is directed to a pattern recognition method based on a network verification code, so as to solve the problems set forth in the background art. The method for identifying the abnormal client judges whether the client is the abnormal client or not based on the behavior of the client, so that the problem of cracking of intelligent identification software and artificial customer service can be avoided, the reliability of identification can be ensured, and the normal service of a common client cannot be influenced.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme: a pattern recognition method based on network verification codes comprises the following steps:
s1: counting abnormal behavior characteristics of an abnormal client in advance, and setting matching degree scores corresponding to the abnormal behavior characteristics;
s2: after a user logs in a service server through a client, the service server records service behavior information of the user and stores the service behavior information in a behavior statistical database;
s3: establishing a pattern recognition system at a network server end for storing and processing a pattern recognition object to be recognized;
s4: decomposing and cutting the pattern recognition object into one verification code unit in sequence, establishing a pattern recognition database by taking the verification code unit as an element, storing the position relation of the verification code unit relative to the pattern recognition object in the database, distributing the verification code unit to different website netizen recognition verification codes, and feeding back the recognized information to the pattern recognition database of the network server end;
s5: when each preset monitoring period is finished, the monitoring server reads the service behavior information of the online users recorded in the period from the behavior statistical database, determines the abnormal matching degree of the behavior of each online user matched with the abnormal behavior characteristics according to the read service behavior information, the abnormal behavior characteristics and the abnormal matching degree scores corresponding to the abnormal behavior characteristics, and determines whether the client where the online user is located is an abnormal client according to the abnormal matching degree of the online user and a preset abnormal matching threshold;
s5: when the network request is overtime, the proxy IP is limited to access, and the picture verification code appears, different processing is carried out by the program, and when the webpage needing to be crawled is accessed, the content of the webpage is downloaded and stored.
Preferably, the abnormal matching degree includes: for each online user, according to the read service behavior information of the online user, counting the current individual behavior characteristics of the online user, determining the individual abnormal behavior characteristics matched with the counted individual behavior characteristics, and according to the abnormal matching degree score corresponding to each matched individual abnormal behavior characteristic, obtaining the abnormal matching degree of the online user.
Preferably, the program in S5 needs to be preprocessed, and specifically includes the following steps:
101. continuously accessing the webpage needing crawling by the crawler by using a browser until the picture verification code appears;
102. acquiring an xpath path of the picture verification code area, and counting the xpath path as a path 1;
103. after the picture verification code is successfully verified, selecting an xpath path of html elements of the webpage of the stage different from the webpages of other stages, and recording the xpath path as a path 2;
104. and continuing to use the browser to access the webpage until the IP is limited to access, and then selecting an xpath path of html elements of the webpage at the stage, which is different from other webpages, and counting as a path 3.
Preferably, a plurality of hot areas or buttons need to be created in the S5 picture, each hot area or button is assigned with a coordinate code, a keyword of each hot area or button is extracted, a verification prompt is generated according to the keyword, a user clicks or drags the hot area or button on the picture to generate coordinate code set verification information according to the requirement of the verification prompt, and the coordinate code set verification information is transmitted to a verification server system to analyze and compare, so as to complete the verification process of the verification code, wherein the verification server system comprises a picture repository, an identification module, an encryption module, a verification module and a picture synthesis module.
(III) advantageous effects
The invention provides a pattern recognition method based on a network verification code, which has the following beneficial effects:
(1) the method for identifying the abnormal client judges whether the client is the abnormal client or not based on the behavior of the client, so that the problem of cracking of intelligent identification software and artificial customer service can be avoided, the reliability of identification can be ensured, and the normal service of a common client cannot be influenced;
(2) the invention can make the website be continuously crawled by manually identifying the picture verification code when the crawled website limits the network to crawl the website content by using the picture verification code, and has wide practical range and high safety performance.
(3) The verification process using the verification code can be easily completed without inputting, is more convenient for small-screen mobile terminal users, can complete verification in a few times, and can complete verification of the verification code even by one-time finger sliding.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A pattern recognition method based on network verification codes comprises the following steps:
s1: counting abnormal behavior characteristics of an abnormal client in advance, and setting matching degree scores corresponding to the abnormal behavior characteristics;
s2: after a user logs in a service server through a client, the service server records service behavior information of the user and stores the service behavior information in a behavior statistical database;
s3: establishing a pattern recognition system at a network server end for storing and processing a pattern recognition object to be recognized;
s4: decomposing and cutting the pattern recognition object into one verification code unit in sequence, establishing a pattern recognition database by taking the verification code unit as an element, storing the position relation of the verification code unit relative to the pattern recognition object in the database, distributing the verification code unit to different website netizen recognition verification codes, and feeding back the recognized information to the pattern recognition database of the network server end;
s5: when each preset monitoring period is finished, the monitoring server reads the service behavior information of the online users recorded in the period from the behavior statistical database, determines the abnormal matching degree of the behavior of each online user matched with the abnormal behavior characteristics according to the read service behavior information, the abnormal behavior characteristics and the abnormal matching degree scores corresponding to the abnormal behavior characteristics, and determines whether the client where the online user is located is an abnormal client according to the abnormal matching degree of the online user and a preset abnormal matching threshold;
s5: when the network request is overtime, the proxy IP is limited to access, and the picture verification code appears, different processing is carried out by the program, and when the webpage needing to be crawled is accessed, the content of the webpage is downloaded and stored.
The abnormal matching degree comprises: for each online user, according to the read service behavior information of the online user, counting the current individual behavior characteristics of the online user, determining the individual abnormal behavior characteristics matched with the counted individual behavior characteristics, and according to the abnormal matching degree score corresponding to each matched individual abnormal behavior characteristic, obtaining the abnormal matching degree of the online user.
The program in the step S5 needs preprocessing, and specifically includes the following steps:
101. continuously accessing the webpage needing crawling by the crawler by using a browser until the picture verification code appears;
102. acquiring an xpath path of the picture verification code area, and counting the xpath path as a path 1;
103. after the picture verification code is successfully verified, selecting an xpath path of html elements of the webpage of the stage different from the webpages of other stages, and recording the xpath path as a path 2;
104. and continuing to use the browser to access the webpage until the IP is limited to access, and then selecting an xpath path of html elements of the webpage at the stage, which is different from other webpages, and counting as a path 3.
The S5 picture needs to create a plurality of hot areas or buttons, each hot area or button is endowed with a coordinate code, the key word of each hot area or button is extracted, a verification prompt is generated according to the key word, a user clicks or drags the hot area or button on the picture to generate coordinate code set verification information according to the requirement of the verification prompt, the coordinate code set verification information is transmitted to a verification server system to be analyzed and compared to complete the verification process of the verification code, and the verification server system comprises a picture repository, an identification module, an encryption module, a verification module and a picture synthesis module.
The implementation mode is specifically as follows: the provided identification method of the abnormal client judges whether the client is the abnormal client or not based on the behavior of the client, so that the problem of cracking of intelligent identification software and artificial customer service can be avoided, the identification reliability can be ensured, and the normal service of the common client cannot be influenced; when the crawled website uses the picture verification code to limit the network to crawl the website content, the picture verification code is manually identified, so that the webpage can be continuously crawled, and the method has the advantages of wide practical range and high safety performance; the verification process using the verification code can be completed easily without inputting, is particularly convenient for small-screen mobile terminal users, can complete verification after a few times of light, and can complete verification of the verification code by once sliding of fingers sometimes.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (4)

1. A pattern recognition method based on network verification codes is characterized by comprising the following steps:
s1: counting abnormal behavior characteristics of an abnormal client in advance, and setting matching degree scores corresponding to the abnormal behavior characteristics;
s2: after a user logs in a service server through a client, the service server records service behavior information of the user and stores the service behavior information in a behavior statistical database;
s3: establishing a pattern recognition system at a network server end for storing and processing a pattern recognition object to be recognized;
s4: decomposing and cutting the pattern recognition object into one verification code unit in sequence, establishing a pattern recognition database by taking the verification code unit as an element, storing the position relation of the verification code unit relative to the pattern recognition object in the database, distributing the verification code unit to different website netizen recognition verification codes, and feeding back the recognized information to the pattern recognition database of the network server end;
s5: when each preset monitoring period is finished, the monitoring server reads the service behavior information of the online users recorded in the period from the behavior statistical database, determines the abnormal matching degree of the behavior of each online user matched with the abnormal behavior characteristics according to the read service behavior information, the abnormal behavior characteristics and the abnormal matching degree scores corresponding to the abnormal behavior characteristics, and determines whether the client where the online user is located is an abnormal client according to the abnormal matching degree of the online user and a preset abnormal matching threshold;
s5: when the network request is overtime, the proxy IP is limited to access, and the picture verification code appears, different processing is carried out by the program, and when the webpage needing to be crawled is accessed, the content of the webpage is downloaded and stored.
2. The method for making the pattern recognition method based on the network authentication code according to claim 1, wherein: the abnormal matching degree comprises: for each online user, according to the read service behavior information of the online user, counting the current individual behavior characteristics of the online user, determining the individual abnormal behavior characteristics matched with the counted individual behavior characteristics, and according to the abnormal matching degree score corresponding to each matched individual abnormal behavior characteristic, obtaining the abnormal matching degree of the online user.
3. The pattern recognition method based on the network authentication code as claimed in claim 1, wherein: the program in the step S5 needs preprocessing, and specifically includes the following steps:
101. continuously accessing the webpage needing crawling by the crawler by using a browser until the picture verification code appears;
102. acquiring an xpath path of the picture verification code area, and counting the xpath path as a path 1;
103. after the picture verification code is successfully verified, selecting an xpath path of html elements of the webpage of the stage different from the webpages of other stages, and recording the xpath path as a path 2;
104. and continuing to use the browser to access the webpage until the IP is limited to access, and then selecting an xpath path of html elements of the webpage at the stage, which is different from other webpages, and counting as a path 3.
4. The pattern recognition method based on the network authentication code as claimed in claim 2, wherein: the S5 picture needs to create a plurality of hot areas or buttons, each hot area or button is endowed with a coordinate code, the key word of each hot area or button is extracted, a verification prompt is generated according to the key word, a user clicks or drags the hot area or button on the picture to generate coordinate code set verification information according to the requirement of the verification prompt, the coordinate code set verification information is transmitted to a verification server system to be analyzed and compared to complete the verification process of the verification code, and the verification server system comprises a picture repository, an identification module, an encryption module, a verification module and a picture synthesis module.
CN202010187508.2A 2020-03-17 2020-03-17 Mode identification method based on network verification code Pending CN111416817A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010187508.2A CN111416817A (en) 2020-03-17 2020-03-17 Mode identification method based on network verification code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010187508.2A CN111416817A (en) 2020-03-17 2020-03-17 Mode identification method based on network verification code

Publications (1)

Publication Number Publication Date
CN111416817A true CN111416817A (en) 2020-07-14

Family

ID=71493092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010187508.2A Pending CN111416817A (en) 2020-03-17 2020-03-17 Mode identification method based on network verification code

Country Status (1)

Country Link
CN (1) CN111416817A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113643042A (en) * 2021-08-20 2021-11-12 武汉极意网络科技有限公司 Safety verification system based on online business safety

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102724182A (en) * 2012-05-30 2012-10-10 北京像素软件科技股份有限公司 Recognition method of abnormal client side
US20130111019A1 (en) * 2011-10-28 2013-05-02 Electronic Arts Inc. User behavior analyzer
CN103139204A (en) * 2012-12-19 2013-06-05 姚爱军 Network identifying code method and system
CN105844140A (en) * 2016-03-21 2016-08-10 国家电网公司 Website login brute force crack method and system capable of identifying verification code
CN106603560A (en) * 2016-12-30 2017-04-26 北京经纬信安科技有限公司 Mode recognition method based on network verification codes
CN108062468A (en) * 2017-12-25 2018-05-22 南京烽火软件科技有限公司 A kind of web crawlers method based on picture validation code identification

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130111019A1 (en) * 2011-10-28 2013-05-02 Electronic Arts Inc. User behavior analyzer
CN102724182A (en) * 2012-05-30 2012-10-10 北京像素软件科技股份有限公司 Recognition method of abnormal client side
CN103139204A (en) * 2012-12-19 2013-06-05 姚爱军 Network identifying code method and system
CN105844140A (en) * 2016-03-21 2016-08-10 国家电网公司 Website login brute force crack method and system capable of identifying verification code
CN106603560A (en) * 2016-12-30 2017-04-26 北京经纬信安科技有限公司 Mode recognition method based on network verification codes
CN108062468A (en) * 2017-12-25 2018-05-22 南京烽火软件科技有限公司 A kind of web crawlers method based on picture validation code identification

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113643042A (en) * 2021-08-20 2021-11-12 武汉极意网络科技有限公司 Safety verification system based on online business safety
CN113643042B (en) * 2021-08-20 2024-04-05 武汉极意网络科技有限公司 Security verification system based on online business security

Similar Documents

Publication Publication Date Title
CN113098870B (en) Phishing detection method and device, electronic equipment and storage medium
EP2748781B1 (en) Multi-factor identity fingerprinting with user behavior
CA2827478C (en) System and methods for identifying compromised personally identifiable information on the internet
CN101187979B (en) Personal identification device, personal identification method, updating method for identification dictionary data, and updating program for identification dictionary data
CN104426884A (en) Method for authenticating identity and device for authenticating identity
CN109190380A (en) The method and system that batch website loophole quickly detects are realized based on web fingerprint
CN107451819B (en) Identity verification method and device based on user operation behavior characteristics
WO2009055785A2 (en) Fraud detection using honeytoken data tracking
CN101971591A (en) System and method of analyzing web addresses
CA3038029A1 (en) Identity recognition method and device
CN104580230B (en) Verification method and device are attacked in website
CN109871673B (en) Continuous identity authentication method and system based on different context environments
CN111865925A (en) Network traffic based fraud group identification method, controller and medium
US10341382B2 (en) System and method for filtering electronic messages
CN110708339B (en) Correlation analysis method based on WEB log
CN107517180B (en) Login method and device
CN112149093A (en) Identity authentication system and method based on browser fingerprint
EP3550789A1 (en) Method for protecting web applications by automatically generating application models
CN111416817A (en) Mode identification method based on network verification code
CN112751804A (en) Method, device and equipment for identifying counterfeit domain name
CN111882425B (en) Service data processing method, device and server
CN113239333A (en) Browser user identity authentication method and system based on cross-domain resource access
CN112215622A (en) Risk prevention and control method and system based on order information
JP2018028759A (en) Program and information processing apparatus
CN107679865B (en) Identity verification method and device based on touch area

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200714