Method and system for recognizing internet fraud behavior

A technology for identifying networks and behaviors, applied in the field of network security, can solve problems such as national and personal losses, and achieve the effect of rapid identification, convenient early warning and prevention of network fraud

Active Publication Date: 2017-02-22
RUN TECH CO LTD BEIJING
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Instant messaging tools have brought great convenience to people's lives, but at the same time it is also a double-edged sword. Its openness makes it very easy to become a breeding ground for criminal activities, spreading rumors, intrusions, attacks and Internet crimes such as fraud are becoming more and more rampant, and the Internet has become a new type of criminal tool and crime place. Instant messaging network fraud is a typical example. In recent years, instant messaging network fraud cases and fraudulent amounts have been on the rise year by year. Inflicted immeasurable losses on both individuals and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for recognizing internet fraud behavior
  • Method and system for recognizing internet fraud behavior
  • Method and system for recognizing internet fraud behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] figure 1 It is a flow chart of a method for identifying network fraud provided by Embodiment 1 of the present invention. This method is applicable to the detection and prevention of network fraud by public departments, and can be executed by a system for identifying network fraud. The system can be realized by hardware and / or software, the system architecture such as figure 2 As shown, the system includes a five-layer structure, specifically: the data access layer 210, which is used to collect all data information interacted through the telecommunications network, mainly including backbone network data, metropolitan area network data, mobile wireless network data, and network Crawling data, third-party system docking data, etc.; data preprocessing layer 220, used to perform preprocessing operations such as cleaning, extraction, association, comparison, and identification of data accessed by the data access layer 210, wherein data cleaning is for The raw data accessed ...

Embodiment 2

[0073] image 3 It is a schematic flowchart of a method for identifying online fraud provided by Embodiment 2 of the present invention. On the basis of Embodiment 1, this embodiment has been further optimized. The benefit of optimization is that it can accurately identify the online behavior information related to Fraud-related fraudulent behavior trajectories. For details, see image 3 As shown, the method specifically includes the following:

[0074] Step 310, acquiring the online behavior information of the target object through the data access layer.

[0075]Further, in order to improve the accuracy of identifying the trajectory of fraudulent behavior, after obtaining the online behavior information of the target object through the data access layer, it may also include:

[0076] The data of the online behavior information is preprocessed through the data preprocessing layer to facilitate the identification of fraudulent behavior tracks related to fraud in the online be...

Embodiment 3

[0087] Figure 5 A schematic structural diagram of a system for identifying network fraud provided by Embodiment 3 of the present invention, the system includes:

[0088] Data acquisition module 510, trajectory identification module 520, points calculation module 530 and fraudulent behavior identification module 540; wherein, data acquisition module 510 is configured in the data access layer for obtaining online behavior information of the target object; trajectory identification module 520, Configured in the data preprocessing layer, used to identify the fraudulent behavior trajectory related to fraud in the online behavior information; the integral calculation module 530, configured in the fraud prevention business layer, used to integrate the fraudulent behavior trajectory to obtain the fraudulent behavior Integral value; fraudulent behavior identification module 540, configured in the business application layer, is used to judge whether the integral value exceeds a set thr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for recognizing internet fraud behaviors. The method comprises the following steps: acquiring internet behavior information of a target object through a data access layer; recognizing a fraud behavior track related to fraud in the internet behavior information through a data preprocessing layer; integrating the fraud behavior track through a fraud prevention resource layer so as to obtain a fraud behavior integral value; determining whether the integral value exceeds a preset threshold or not through a service application layer, if the integral value exceeds the preset threshold, confirming that the target object has fraud behaviors. By adopting the method which is provided by the embodiment of the invention and is used for recognizing internet fraud behaviors, internet fraud behaviors can be accurately and rapidly recognized, and convenience can be brought to police departments to alarm and prevent internet fraud in advance.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of network security, in particular to a method and system for identifying network fraud. Background technique [0002] Instant messaging tools (such as Tencent QQ, WeChat, and Fetion) are loved by netizens because of their immediacy, intuitiveness, and cheapness. At present, China's Internet users have reached 710 million, and more than 90% of them use instant messaging tools. Instant messaging tools have brought great convenience to people's lives, but at the same time it is also a double-edged sword. Its openness makes it very easy to become a breeding ground for criminal activities, spreading rumors, intrusions, attacks and Internet crimes such as fraud are becoming more and more rampant, and the Internet has become a new type of criminal tool and crime place. Instant messaging network fraud is a typical example. In recent years, instant messaging network fraud cases and fraudul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/58H04L29/06G06F17/30
CPCH04L51/046H04L63/168H04L63/30G06F16/9535H04L51/212H04L51/23H04L51/52
Inventor 顾建国赵宏志万月亮贾晓芸
Owner RUN TECH CO LTD BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products