Identity spoofing detection method and system, device and storage medium

A deception detection and identity technology, applied in the field of network security, can solve the problems of less interpretation and intuitive results, and achieve the effect of low network risk

Pending Publication Date: 2019-10-18
WUYI UNIV
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, there are technical flaws in the results output by supervised machine learning models, and these results are rarely interpretable and intuitive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity spoofing detection method and system, device and storage medium
  • Identity spoofing detection method and system, device and storage medium
  • Identity spoofing detection method and system, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] This part will describe the specific embodiment of the present invention in detail, and the preferred embodiment of the present invention is shown in the accompanying drawings. Each technical feature and overall technical solution of the invention, but it should not be understood as a limitation on the protection scope of the present invention.

[0035] In the description of the present invention, it should be understood that the orientation descriptions, such as up, down, front, back, left, right, etc. indicated orientations or positional relationships are based on the orientations or positional relationships shown in the drawings, and are only In order to facilitate the description of the present invention and simplify the description, it does not indicate or imply that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus should not be construed as limiting the present invention.

[0036] I...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity spoofing detection method, system and device and a storage medium. The identity spoofing detection method is composed of an identity spoofing detection machine learning model and an identity spoofing detection scoring model. The identity spoofing detection machine learning model uses supervised machine learning to identify appropriate attributes and features ofidentity-related information on the SMP, while calculating accuracy and entropy information of these attributes and features to determine whether the identity is spoofing. An identity spoofing detection scoring model uses entropy information to determine importance of attributes and features. This information is then used as a weighting variable in a linear formula to determine whether the identity is fraudulent. The network risk of identity spoofing used by a malicious user on the SMP is reduced to the minimum by intelligently detecting the account spoofing the identity, so that not only canthe detection be realized, but also the perception spoofing can be explained.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an identity deception detection method on a social media platform based on supervised machine learning, a system, a device, and a storage medium thereof. Background technique [0002] Cyberthreats are prevalent at present, and social media platforms (Social Media Platform, SMP) are the facilitators of cyberattacks. SMPs are vulnerable to cyber threats because they establish trust between individuals without any authoritative verification or validating participants. Cybercrime can have serious consequences. [0003] Past researchers have exploited properties discovered on SMPs to build new signatures that can detect identity spoofing. For example, identity deception features can be examined by spotting inconsistencies in gender and expected background colors chosen for humans; statistical inconsistencies in geolocation update times can help spot deceptive accounts; lang...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06N20/00
CPCG06F21/31G06N20/00
Inventor 邱天李千目龙华秋刘耀宗容振邦
Owner WUYI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products