Traffic-free fraud user recognition method and recognition system

An identification method and a traffic-free technology, applied in the field of communication, can solve the problems of inability to trace the source of traffic fraud users, inability to judge malicious traffic, etc., and achieve the effect of accurate identification

Active Publication Date: 2016-08-03
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1. Based on single-factor judgments such as traffic type or size, it is impossible to judge malicious traffic in the form of normal network protocols; 2. It is impossible to trace the source of traffic fraud users, and trace and deal with private malicious traffic forwarding proxy platforms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic-free fraud user recognition method and recognition system
  • Traffic-free fraud user recognition method and recognition system
  • Traffic-free fraud user recognition method and recognition system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] This embodiment provides a method for identifying users without traffic fraud, such as figure 1 shown, including:

[0057] Step S1: Preprocessing the user's telecommunications traffic data to obtain the user's billing-free traffic data.

[0058] Step S2: Analyzing and calculating the user's free-of-charge traffic data to obtain the user's suspicion of free-of-charge fraud.

[0059] Step S3: According to the user's suspicion of data-free fraud, analyze and determine whether the user is a suspected data-free fraud user.

[0060] Step S4: Analyze and determine whether the user is a traffic-free fraud user according to the traffic-free fraud suspicion degree of the suspected traffic-free fraud user.

[0061] Through the above identification method, by analyzing and calculating the user’s billing-free traffic data, it is possible to effectively and accurately judge the malicious free billing traffic in the form of a normal network protocol, thereby effectively and accurate...

Embodiment 2

[0063] This embodiment provides a method for identifying users without traffic fraud, including:

[0064] Step S1: Preprocessing the user's telecommunications traffic data to obtain the user's billing-free traffic data.

[0065] This step specifically includes:

[0066] Step S11: Counting the total traffic used by the user within the first set time period.

[0067] In this step, the first set time period can be set arbitrarily, for example, the first set time period can be set to 30 days.

[0068] Step S12: Counting the traffic of the bill-free special traffic type used by the user within the first set time period; the traffic of the bill-free special traffic type is the traffic of atypical users' mobile Internet services and functional network access free of billing flow.

[0069] In this step, the traffic of atypical users’ mobile Internet services, such as normal Internet business OTT (various application services provided to users through the Internet) traffic, TCP / IP (...

Embodiment 3

[0095] This embodiment provides an identification system for avoiding traffic fraud users, such as figure 2As shown, a preprocessing module 1 is included, which is used to preprocess the user's telecommunications traffic data to obtain the user's billing-free traffic data. The analysis and calculation module 2 is used to analyze and calculate the user's free billing traffic data to obtain the user's suspicion of free traffic fraud; and according to the user's suspicion of free traffic fraud, analyze and judge whether the user is a suspected free traffic fraud user. The analysis and judgment module 3 is used for analyzing and judging whether the user is a traffic-free fraud user according to the traffic-free fraud suspicion degree of the suspected traffic-free fraud user.

[0096] The identification system in this embodiment analyzes and calculates the user’s toll-free flow data through the analysis and calculation module, and can effectively and accurately judge the malicious...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a traffic-free fraud user recognition method and recognition system. The recognition method comprises the steps that telecommunication traffic data of a user are preprocessed so that free billing traffic data of the user are acquired; the free billing traffic data of the user are analyzed and calculated so that the traffic-free fraud suspected degree of the user is acquired; whether the user is a suspected traffic-free fraud user is analyzed and judged according to the traffic-free fraud suspected degree of the user; and whether the user is a traffic-free fraud user is analyzed and judged according to the traffic-free fraud suspected degree of the suspected traffic-free fraud user. According to the recognition method, malicious free billing traffic represented as a normal network protocol can be effectively and accurately screened out so that the traffic-free fraud user can be effectively and accurately recognized, and thus the problems of difficulty of recognition, interception and source tracing of current traffic billing flaws can be solved.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to an identification method and an identification system for traffic fraud-free users. Background technique [0002] Traffic-free fraud is a kind of telecom fraud that uses the loopholes in the operator's traffic billing to bypass the telecom operator's traffic billing system by building a private malicious traffic forwarding proxy platform to achieve the purpose of free traffic. [0003] The main principle of avoiding traffic fraud is to use a private traffic forwarding proxy platform to convert ordinary billed Internet traffic into special traffic that is not billed by telecom operators. These traffic mainly include DNS and other special protocol traffic, and some public welfare traffic , Access traffic of special websites. Since the existing traffic billing system of telecom operators cannot distinguish the authenticity of these special traffic, they all charge th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/14H04L63/1433H04L63/1466
Inventor 陶冶王志军张尼李正宫雪
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products