Movatterモバイル変換


[0]ホーム

URL:


CN113750538B - A method and system for building a mobile game security platform based on big data - Google Patents

A method and system for building a mobile game security platform based on big data
Download PDF

Info

Publication number
CN113750538B
CN113750538BCN202010487195.2ACN202010487195ACN113750538BCN 113750538 BCN113750538 BCN 113750538BCN 202010487195 ACN202010487195 ACN 202010487195ACN 113750538 BCN113750538 BCN 113750538B
Authority
CN
China
Prior art keywords
data
hand
model
tour
game
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010487195.2A
Other languages
Chinese (zh)
Other versions
CN113750538A (en
Inventor
蒋渭华
沈华锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENGQU INFORMATION TECHNOLOGY (SHANGHAI) CO LTD
Original Assignee
SHENGQU INFORMATION TECHNOLOGY (SHANGHAI) CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENGQU INFORMATION TECHNOLOGY (SHANGHAI) CO LTDfiledCriticalSHENGQU INFORMATION TECHNOLOGY (SHANGHAI) CO LTD
Priority to CN202010487195.2ApriorityCriticalpatent/CN113750538B/en
Publication of CN113750538ApublicationCriticalpatent/CN113750538A/en
Application grantedgrantedCritical
Publication of CN113750538BpublicationCriticalpatent/CN113750538B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

Translated fromChinese

本发明公开了一种基于大数据的手游安全平台的构建方法和系统。该方法采集手游客户端数据、手游服务器端数据、以及手游安全爬虫数据;将采用分布式日志收集系统收集采集数据并存储至分布式文件系统中;采用树集成模型和神经网络模型对所述分布式文件系统中存储所述采集数据进行训练分别产生用于识别游戏中异常行为的手游安全模型。本发明提供的技术方案能够识别未知模式的手游安全问题,解决了数据孤岛问题并且具有良好的自学习能力,提高了手游安全平台的可靠性和可扩展性。

The present invention discloses a method and system for constructing a mobile game security platform based on big data. The method collects mobile game client data, mobile game server data, and mobile game security crawler data; uses a distributed log collection system to collect the collected data and stores it in a distributed file system; uses a tree integration model and a neural network model to train the collected data stored in the distributed file system to generate a mobile game security model for identifying abnormal behaviors in the game. The technical solution provided by the present invention can identify mobile game security issues with unknown patterns, solves the problem of data islands, has good self-learning capabilities, and improves the reliability and scalability of the mobile game security platform.

Description

Big data-based hand-tour security platform construction method and system
Technical Field
The invention relates to the field of mobile game safety, in particular to construction of a mobile game safety platform based on big data.
Background
With the progress of network technology and the popularization of smart phones, the hand-tour industry is rapidly developed, and the hand-tour market becomes more prosperous. Behind the market of the hand game, the hand game safety problems of external hanging, substitution training, theft number, illegal information and the like are hidden, and the benefits of wide players and game manufacturers are infringed. For example, with the heat of tactical games of recent 2 years, the number of external hanging on hand is increased by 10 times, the external hanging black products become more industrialized, and trends of platformization, customization, hardware and the like are presented.
At present, the hand tour safety problems are solved by adopting techniques of hand tour reinforcement, hand tour anti-externally hung and the like. But these approaches are increasingly unable to accommodate existing security challenges.
The existing scheme also analyzes actions of the plug-in and the cashing studio and the like which endanger game safety based on the detection and reporting of the plug-in characteristic value of the client and the user action of the server. However, the existing scheme is based on rules set empirically, and cannot identify the plug-in of the unknown mode. In addition, the existing plug-in identification often needs to consider a very large number of feature fields, and as for feature rules, the plug-in mode can only be judged from the angle of each single feature, and interaction between different features cannot be considered. In addition, the data acquired by the existing scheme has few dimensions and single field, and multidimensional association operation cannot be performed.
Disclosure of Invention
The invention provides a big data-based hand-tour safety platform construction method which comprises the steps of collecting hand-tour client data, hand-tour server data and hand-tour crawler data, storing the collected data into a distributed file system, and training the collected data by adopting a tree integration model and a neural network model to respectively generate hand-tour safety models for identifying abnormal behaviors in games.
Further, the step of collecting the hand-tour client data, the hand-tour server data and the hand-tour crawler data comprises the steps of integrating a hand-tour security SDK in the hand-tour client to collect the client data, and collecting the server data by adopting a direct flow protocol analysis or mirror image tool mode for the hand-tour server. And monitoring the game forum and the security technology website forum in real time by utilizing a crawler technology, and analyzing the hand-tour security data. The collected data is collected by a distributed log collection system, and is transmitted and stored in a distributed file system in an encrypted or compressed form. The distributed log data collection system is characterized in that a plurality of nodes are deployed in the distributed file system, so that the data throughput efficiency is improved and the single-point problem is solved.
The training sample is manually marked as an abnormal behavior sample and a normal behavior sample according to experience of operation and maintenance personnel, the training tree integrated model or the neural network model is trained according to the behavior sample after the manual marking, the trained model is evaluated according to a corresponding preset model measurement index, the evaluation is passed and is used as a hand game safety recognition model, and the hand game safety recognition model carries out game behavior abnormal recognition on the standardized behavior characteristics extracted from hand game client data, hand game server data and hand game crawler data acquired in real time by adopting the characteristic extraction module.
The construction method further comprises the steps of correlating the safety result of the specific game behaviors identified by the game safety identification model with corresponding standardized behavior characteristics, storing the safety result in an identification behavior sample library, and periodically retraining the tree integration model and the neural network model according to newly-added sample data in the identification behavior sample library to generate a new game safety model for identifying abnormal behaviors in the game, and iterating the old game safety model by using the new game safety model.
Further, the tree integration model includes one or more of random forest, xgbt, catgboost, and lightgb models. Grid search is employed for some of the main parameters in the tree integration model, such as n_ estimators, max_depth, and min_sample of files, to explore the super-parametric space. In particular, the scope of the exploration space needs to be adjusted according to the specific game. The neural network model is preferably a deep neural network model using a fully connected network, wherein the number of layers (depth) of the network, the number of unit cells of the hidden layer (network layer scale), are all adjusted according to the specific game.
The invention further provides a hand-tour safety platform system based on big data, which comprises a data acquisition module, a data storage module, a model training module and a model online module, wherein the data acquisition module is used for acquiring hand-tour client data, hand-tour server data and hand-tour crawler data, the data storage module is used for transmitting and storing the data acquired by the data acquisition module to a distributed file system, the model training module is used for training a tree integrated model and a neural network by adopting the acquired data stored in the distributed file system to respectively generate hand-tour safety models for identifying abnormal behaviors in games, and the model online module is used for setting the hand-tour safety identification models on a wind control server to operate and identifying the abnormal behaviors in the games in real time.
The specific implementation details of the hand-tour safety platform system correspond to the details in the hand-tour safety platform construction method based on big data.
The beneficial effects of the invention include:
1. Compared with the existing hand-tour safety recognition system, the hand-tour safety recognition system sets rules according to experience, performs operation analysis by collecting multidimensional data such as client data, server data, hand-tour safety crawler data and the like, synthesizes related information in different fields, considers interaction among different features, builds a hand-tour safety intelligent recognition model through machine learning, can recognize the plug-in of an unknown mode, and provides early warning for hand-tour safety problems or anomalies;
2. the invention adopts big data technology stack technology, improves the processing capacity of burst big data volume, and effectively solves the problems of reliability, expandability and the like;
3. the method can realize the feature classification and pretreatment of the data of different channels, can carry out the normalization and integration operation on the data with non-uniform standards, solves the problem of data island, and enhances the multiplexing of heterogeneous data;
4. The invention adopts a distributed file system to disperse access pressure to each node, has no obvious transmission bottleneck, supports online capacity expansion, avoids the problems of shutdown maintenance and the like, and solves the problems of single-point failure and expansion.
Drawings
FIG. 1 is a flow chart of a method for constructing a big data based hand-tour security platform according to an embodiment of the present invention.
FIG. 2 is a block diagram of a hand-tour security platform system according to an embodiment of the present invention.
Detailed Description
In order to make the technical problems, technical schemes and beneficial effects solved by the invention more clear, the invention is further described in detail below with reference to the accompanying drawings. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
FIG. 1 illustrates a method of constructing a hand-tour security platform of the present invention. The method for constructing the hand-tour safety platform comprises the following steps:
step 100, collecting hand tour client data, hand tour server data and hand tour security crawler data.
Integrating a hand game safety SDK in a hand game client to collect client data. The client data includes client hardware information (e.g., client IP address, MAC address, etc.), hand-in-hand information, sensor status information, network information, etc. The client data to be collected may notify the user in the game privacy protocol.
And collecting server data by adopting a direct flow protocol analysis or mirror image tool mode for the hand-stream server. Direct streaming protocol communication analysis may be performed by either end-of-traffic mirroring tools at the hand-streaming server or integrating the relevant SDKs at the hand-streaming server. The protocol communication data can be subjected to flow calculation analysis in real time by adopting a flow analysis tool and imported into a hand-tour database. Wherein data already stored in the hand-tour database may also be imported for analysis in real time.
And (3) monitoring related game forums, safety technology website forums and the like in real time by utilizing a crawler technology, analyzing hand-tour safety data, and importing the hand-tour safety data into a hand-tour client big data platform.
Step 200, the collected data is transmitted and stored to a distributed file system. The collected data can be collected and transmitted by adopting a distributed log collection system (such as a Flume and the like), so that high-reliability collection of data of a large number of different data sources is realized.
The distributed log collection system may include a proxy point layer, a collection node layer, and a storage layer, each of which may be horizontally scalable. The agent point and the collection node are uniformly managed by the main node, so that the system is easier to monitor and maintain. Alternatively, multiple master nodes may be allowed and set up, avoiding single point failure problems. Optionally, the data is transmitted in a compressed manner, for example, gzip, bzip2, and the like, so as to reduce network traffic. In addition, the data can be transmitted in an encrypted mode, so that sensitive data is prevented from being intercepted or tampered.
The collected data is transferred and stored to a hand-tour secure big data platform distributed file system (e.g., HDFS, etc.). The distributed file system adopts a master-slave structure model, and a cluster consists of a name node (NameNode) and a plurality of data nodes (DataNode). The name node serves as a main server and manages the name space of the file system and the access operation of the client to the file. The data nodes in the cluster manage the stored data. The distributed file system provides high fault tolerance and high throughput data access, providing high reliability underlying storage support.
The data stored in the distributed file system may also include firewall data or firewall related data. Some or all of the hand-tour client data, hand-tour server-side data, hand-tour database data, firewall data, security intelligence data (e.g., hand-tour security crawler data), etc. are stored in the distributed file system after formatting.
And 300, training data by using a tree integration model and a neural network, and evaluating and determining a hand-tour safety model. The method comprises the steps of collecting data, utilizing a feature extraction module to extract behavior features from the collected data and standardizing the behavior features to obtain training samples, manually marking the training samples into abnormal behavior samples and normal behavior samples according to experience of game operators, training a training tree integrated model or a neural network model according to the behavior samples after manual marking, evaluating the trained model according to a corresponding preset model measurement index, and taking the evaluated model as a hand game safety recognition model to conduct online, wherein the hand game safety recognition model carries out abnormal game behavior recognition on the standardized behavior features extracted from hand game client data, hand game server data and hand game crawler data which are collected in real time by the feature extraction module.
Wherein the hand-tour client data may include client IP addresses, MAC addresses, etc. The hand-tour database data includes identification data, character base data, spatiotemporal data, and game behavior data. The identification data includes account name, account ID, zone ID, game character name, and the like. The character basic data includes player level, occupation, player meeting name, and the like. The spatiotemporal data includes a location map ID, coordinate information, a time stamp, and the like. Game behavior data includes character unique identifiers, behavior types (e.g., login, attack, exit, etc.), time stamps, etc., as shown in table 1 below.
IdAction_typeTime_stamp
ALog_in2020-04-16 12:20
Battack2020-04-16 12:21
ALog_out2020-04-16 12:22
Table 1 game behavior data
And then, extracting behavior characteristics from the acquired data by utilizing a characteristic extraction module, and normalizing the behavior characteristics to obtain a training sample. A time window is set to count the data. For example, a daily window statistic of 5 minutes per unit time may be set. The time window may be set according to the desired service. According to the game service, the data will be divided into character basic data, game client data and character behavior data. The character basic data and the game client data can be directly used within a set time window. The character behavior data needs to count each feature of the character in the basic unit time, and then obtain descriptive statistics of each feature according to the count. Descriptive statistics of the feature include aggregate, mean, quartile, and maximum. Statistics of these features and role base data and client data make up a feature space for training the model. According to different game services, different fields, feature types and corresponding feature processing modes are set. The feature type can be set as continuous feature or classified feature, and the pretreatment mode of the feature can be set as no-treatment, digital sequential coding, single-heat coding and standardized pretreatment. Preferably, in the tree model, the continuous characteristic data adopts a non-processing mode, the classified characteristic data adopts digital sequential coding, and in the neural network model, the continuous characteristic data adopts standardized processing, and the classified characteristic data adopts independent thermal coding.
The data preprocessing scheme under an exemplary tree model is shown as follows:
Character basic data
Feature namesFeature typeFeature processing
Game levelContinuous typeWithout any means for
Occupation ofClassificationDigital sequential encoding
Whether to join a familyClassificationDigital sequential encoding
Maximum time for single loginContinuous typeWithout any means for
Total duration of activityContinuous typeWithout any means for
Number of loginsContinuous typeWithout any means for
Character behavior data
Game client data
Feature namesFeature typeFeature processing
Different ip numbers of clientsContinuous typeWithout any means for
Number of different mac addresses at clientContinuous typeWithout any means for
The data preprocessing scheme under an exemplary neural network model is shown as follows:
Character basic data
Feature namesFeature typeFeature processing
Game levelContinuous typeNormalization
Occupation ofClassificationSingle hot coding
Whether to join a familyClassificationSingle hot coding
Maximum time for single loginContinuous typeNormalization
Total duration of activityContinuous typeNormalization
Number of loginsContinuous typeNormalization
Character behavior data
Game client data
Feature namesFeature typeFeature processing
Different ip numbers of clientsContinuous typeNormalization
Number of different mac addresses at clientContinuous typeNormalization
Wherein, the data is normalized according to the following formula (1):
Wherein xinitial is the current value of the variable, xmean is the mean value of the variable, and xstd is the standard deviation of the variable.
Step 303, training the tree integration model and the neural network model, and checking and determining the hand-tour safety recognition model by using model measurement indexes.
Training the tree integration model requires training random forest, xgbt, catgboost, and lightgb models, respectively, and then weighted averaging the individual model results as an output tree integration model. The main parameters in the tree integration model (e.g., n_ estimators, max_depth, and min_sample of files, etc.) may employ a grid search method to explore the super-parametric space. In particular, the exploration space range may be adjusted according to a particular game. The neural network model uses a fully connected neural network model. The number of layers (depth) of the neural network, the number of unit elements of the hidden layer (network layer scale) can be adjusted according to the specific game.
And determining a final hand-tour safety recognition model according to the model measurement indexes. Model metrics include performance scores, precision, recall, etc. Roc _ auc _score may be used to measure the performance of the model. And the final model is determined by comprehensively considering the precision and recall rate according to the service requirement. The generated hand-tour safety recognition model can recognize hand-tour plug-in, a gold stamping working room, DDOS attack, hand-tour account safety, hand-tour information safety and the like.
And periodically retraining the tree integration model and the neural network model according to newly-added sample data in the recognition behavior sample library to generate a new hand game safety model for recognizing abnormal behaviors in the game, and iterating the old hand game safety model by using the new hand game safety model. In general, player behavior data varies with version, i.e., the data distribution changes with version changes. The data for model training is time-efficient. The model is trained by default using data in the last half year, updated every month. When the model is updated in an iteration mode, the sample label is updated in time according to the model prediction result and manual verification so as to improve the performance of the model.
The method for constructing the hand-tour safety platform further comprises the step of displaying alarm information and alarming. The audience needing game safety data can register and subscribe relevant alarm information, and relevant data such as prediction data is acquired in real time, so that game service prospects are predicted, and a game service module is adjusted according to the prediction information to better serve game services.
The invention also provides a hand tour safety recognition system. As shown in fig. 2, the system includes:
The game machine comprises a data acquisition module, a data storage module, a model training module and a model online module, wherein the data acquisition module is used for acquiring hand game client data, hand game server data and hand game crawler data, the data acquisition data storage module is used for transmitting and storing the data acquired by the data acquisition module to a distributed file system, the model training module is used for training a tree integrated model and a neural network by adopting the acquired data stored in the distributed file system to respectively generate hand game safety models for identifying abnormal behaviors in a game, and the model online module is used for setting the hand game safety identification models on a wind control server to operate and identifying the abnormal behaviors in the game in real time.
The data acquisition module comprises a client data acquisition module, a server data acquisition module and a hand-tour safety crawler data acquisition module, wherein the client data acquisition module is used for acquiring hand-tour client data by using a hand-tour SDK, the server data acquisition module is used for acquiring hand-tour server data in a direct flow protocol analysis or mirror image tool mode, and the hand-tour safety crawler data acquisition module is used for acquiring data related to hand-tour safety business on the Internet by using a crawler technology. The data collection and storage module collects data by adopting a distributed log collection system, encrypts and/or compresses the collected data, and then transmits and stores the data into the distributed file system, wherein the distributed log data collection system and the distributed file system are provided with a plurality of nodes for solving the single-point problem and providing data throughput efficiency.
Further, the system also comprises a recognition result database and a model iteration module. The recognition behavior sample library is used for carrying out association storage on results generated by abnormal behavior recognition on the data acquired by the data acquisition module in real time by the hand tour safety recognition model and corresponding standardized behavior characteristics, wherein before the abnormal recognition is carried out on the data acquired by the data acquisition module by the hand tour safety recognition model, the behavior characteristics of the data acquired by the data acquisition module are extracted and standardized by the characteristic extraction module; the model iteration module is used for retraining the tree integration model and the neural network model according to the newly added sample data in the recognition behavior sample library at regular intervals to generate a new hand game safety model for recognizing abnormal behaviors in the game, and the old hand game safety model is iteratively updated by using the new hand game safety model.
The specific implementation details of the hand-tour safety platform system correspond to the details in the hand-tour safety platform construction method based on big data.

Claims (10)

Training the acquired data by adopting a tree integration model and a neural network model to respectively generate a hand-tour safety model for identifying abnormal behaviors in a game, wherein the hand-tour safety model specifically comprises the steps of extracting behavior characteristics from the acquired data by utilizing a characteristic extraction module and standardizing the behavior characteristics to be used as training samples, manually marking the training samples into abnormal behavior samples and normal behavior samples according to experience of game operators, training the training tree integration model or the neural network model according to the manually marked behavior samples, evaluating the trained model according to corresponding preset model measurement indexes, and taking the evaluation as a hand-tour safety recognition model to be online, wherein the hand-tour safety recognition model carries out game behavior abnormal recognition on the standardized behavior characteristics extracted by adopting the characteristic extraction module to acquire hand-tour client data, hand-tour server data and hand-tour crawler data in real time;
CN202010487195.2A2020-06-022020-06-02 A method and system for building a mobile game security platform based on big dataActiveCN113750538B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202010487195.2ACN113750538B (en)2020-06-022020-06-02 A method and system for building a mobile game security platform based on big data

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202010487195.2ACN113750538B (en)2020-06-022020-06-02 A method and system for building a mobile game security platform based on big data

Publications (2)

Publication NumberPublication Date
CN113750538A CN113750538A (en)2021-12-07
CN113750538Btrue CN113750538B (en)2025-02-14

Family

ID=78782278

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202010487195.2AActiveCN113750538B (en)2020-06-022020-06-02 A method and system for building a mobile game security platform based on big data

Country Status (1)

CountryLink
CN (1)CN113750538B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN114422225B (en)*2022-01-132023-07-07深圳市爱的番茄科技有限公司 A cloud game big data analysis method and system based on network information security
CN115501610B (en)*2022-09-262023-05-05广州星火文化科技有限公司Abnormal data processing method and system of game system
CN116049787A (en)*2023-01-122023-05-02网易(杭州)网络有限公司Account association and identification method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108123834A (en)*2017-12-182018-06-05佛山市米良仓科技有限公司Log analysis system based on big data platform
CN109858549A (en)*2019-01-302019-06-07腾讯科技(深圳)有限公司Training method, device and the medium of application identification and its identification model

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108905209B (en)*2018-06-112022-03-22网易(杭州)网络有限公司Method and system for detecting plug-in game, electronic equipment and storage medium
CN110489453B (en)*2019-07-022023-04-14广东工业大学 User game real-time recommendation method and system based on big data log analysis
CN110910204A (en)*2019-10-242020-03-24东莞市盟大塑化科技有限公司 An artificial intelligence-based user monitoring system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108123834A (en)*2017-12-182018-06-05佛山市米良仓科技有限公司Log analysis system based on big data platform
CN109858549A (en)*2019-01-302019-06-07腾讯科技(深圳)有限公司Training method, device and the medium of application identification and its identification model

Also Published As

Publication numberPublication date
CN113750538A (en)2021-12-07

Similar Documents

PublicationPublication DateTitle
CN112769796B (en) A cloud-network-terminal collaborative defense method and system based on terminal-side edge computing
Fan et al.An iot device identification method based on semi-supervised learning
CN113313421B (en) A method and system for analyzing security risk status of the perception layer of power Internet of Things
CN111614690B (en)Abnormal behavior detection method and device
CN113750538B (en) A method and system for building a mobile game security platform based on big data
CN107528832B (en)Baseline construction and unknown abnormal behavior detection method for system logs
CN112491779B (en) A kind of abnormal behavior detection method and device, electronic equipment
CN113612763A (en)Network attack detection device and method based on network security malicious behavior knowledge base
CN110648172B (en)Identity recognition method and system integrating multiple mobile devices
CN113706100B (en) Method and system for real-time detection and identification of IoT terminal equipment in distribution network
CN118018229A (en)Network threat detection method based on big data
CN118264473A (en)Method and system for detecting network attack of telecommunication network signaling system
CN116384736A (en)Smart city risk perception method and system
CN118694617A (en) Network data transmission monitoring system and method based on big data analysis
CN117650940A (en)Intelligent intrusion detection system and method thereof
CN116963072A (en)Fraud user early warning method and device, electronic equipment and storage medium
CN110225009B (en)Proxy user detection method based on communication behavior portrait
CN104484389B (en)A kind of Internet user's maximum likelihood geographic position discover method and the system of discovery
CN117640432B (en)Operation and maintenance monitoring method for distributed data center
CN118677750A (en)Earthquake early warning network flow abnormality monitoring and analyzing system
CN119006029A (en)User portrait construction method, equipment, medium and product based on multi-source data
CN117997975A (en)APP communication protocol identification method, device and storage medium based on decision tree
CN117614712A (en)Security audit method and system based on user portrait and association analysis
CN117411708A (en)Attack detection method, device, equipment and medium based on flow characteristic matching
Benova et al.Detecting anomalous user behavior from NGINX web server logs

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp