Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile malicious user identification method and system based on communication behavior rule

A malicious user, identification method technology, applied in wireless communication, security devices, electrical components, etc., can solve the problem that the identification method cannot be used directly

Active Publication Date: 2020-07-10
INST OF INFORMATION ENG CAS
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The technology of the present invention solves the problem: In view of the hysteresis of the existing mobile malicious user identification solutions and the problem that the traditional social network abnormal user identification method cannot be directly used, a mobile malicious user identification method and system based on communication behavior rules are provided, which can be based on The desensitized data analyzes the user's behavior rules to identify whether the user is a mobile malicious user, which has good timeliness and can identify mobile malicious users with high accuracy without involving the user's personal privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile malicious user identification method and system based on communication behavior rule
  • Mobile malicious user identification method and system based on communication behavior rule
  • Mobile malicious user identification method and system based on communication behavior rule

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0057] Such as figure 1 As shown, a mobile malicious user identification method based on communication behavior rules of the present invention includes as follows:

[0058] Step 1: Collect data based on the non-uniform sampling method in the desensitized mobile communication flow data, and perform preprocessing operations.

[0059] Firstly, the desensitization operation is performed on the mobile communication flow data. Because the mobile phone number segment represents different meanings (2-digit country code, 3-digit mobile access code, 4-digit HLR identification code, 4-digit mobile subscriber number, and 11-digit mobile phone number is composed of the last three items), the mobile phone number is divided into The segment hash method; for the call record, only the start time and end time of the call are saved, and for the SMS record, only the co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a mobile malicious user identification method and system based on a communication behavior rule, and the method comprises the steps: collecting data in desensitized mobile communication flow data based on a non-uniform sampling method, and carrying out preprocessing; analyzing and extracting call behavior characteristics, short message behavior characteristics and time distribution characteristics of the user by utilizing a behavior mode in a mobile communication behavior analysis model based on the preprocessed mobile communication sampling data; based on the preprocessed mobile communication sampling data, analyzing and extracting social attribute characteristics of the user by utilizing a communication network in a mobile communication behavior analysis model; and constructing a mobile malicious user identification model based on the extracted user behavior mode characteristics and the extracted user social attribute characteristics. The behavior rule of theuser can be analyzed based on the desensitization data, whether the user is a mobile malicious user or not is recognized, timeliness is achieved, and the mobile malicious user can be recognized withhigh accuracy under the condition that personal privacy of the user is not involved.

Description

technical field [0001] The invention relates to a mobile malicious user identification method and system based on communication behavior rules, and belongs to the technical field of network space security. Background technique [0002] At present, for different purposes and interests, more and more illegal organizations or individuals use mobile communication devices to carry out malicious acts on the mobile Internet, such as telecommunication fraud and spam messages. Personal life and property safety of mobile communication users and the stable development of society pose a great threat. The 2017 China Mobile Security Status Report released by 360 Internet Security Center shows that in 2017, 360 Mobile Guard intercepted 38.09 billion harassing phone numbers and 9.85 billion spam text messages for users across the country, timely and effectively identifying them. Mobile malicious users engaged in malicious behaviors such as telecommunication fraud have important research si...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12
CPCH04W12/121H04W12/122
Inventor 云晓春张永铮李书豪周文涛成振语
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products