主权项 |
1. A computer-implemented method, the method performed by one or more processors and a memory communicatively coupled with the one or more processors, the memory having instructions, which when executed cause the processors to perform the steps, comprising:
recording, when a request for accessing a designated network service is received, information of the request which includes a time of receiving the request and information of an access object that sends the request, the information of the access object including information of a terminal and the user associated with sending the request; computing in real time a statistical value of requests sent by the access object based on a record, the statistical value of the requests includes statistical value of requests sent by the terminal and by the user; determining that the access object is abnormal in response to the statistical value of the requests sent by the access object falling outside a predetermined normal range; determining whether the access object is a user or a terminal; and in response to determining that the access object is a terminal, isolating the terminal, refraining from receiving a request from the terminal, and stopping to compute the statistical value of the requests sent from the terminal upon determining that a number of anomalies associated with the terminal reaches a predetermined number of anomalies, M, wherein M=1 or M>1; or in response to determining that the access object is a user, isolating the user, refraining from receiving a request from the user, and stopping to compute the statistical value of the requests sent from the user upon determining that a number of anomalies associated with the user reaches a predetermined number of anomalies, N, wherein N=1 or N>1. |