Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A mobile malicious user identification method and system based on communication behavior rules

A malicious user and identification method technology, applied in wireless communication, electrical components, security devices, etc., can solve the problem that the identification method cannot be used directly, and achieve the effects of improving recall rate, reducing data scale, and good timeliness

Active Publication Date: 2021-05-28
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The technology of the present invention solves the problem: In view of the hysteresis of the existing mobile malicious user identification solutions and the problem that the traditional social network abnormal user identification method cannot be directly used, a mobile malicious user identification method and system based on communication behavior rules are provided, which can be based on The desensitized data analyzes the user's behavior rules to identify whether the user is a mobile malicious user, which has good timeliness and can identify mobile malicious users with high accuracy without involving the user's personal privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile malicious user identification method and system based on communication behavior rules
  • A mobile malicious user identification method and system based on communication behavior rules
  • A mobile malicious user identification method and system based on communication behavior rules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0057] like figure 1 As shown, a mobile malicious user identification method based on communication behavior rules of the present invention includes as follows:

[0058] Step 1: Collect data based on the non-uniform sampling method in the desensitized mobile communication flow data, and perform preprocessing operations.

[0059] Firstly, the desensitization operation is performed on the mobile communication flow data. Because the mobile phone number segment represents different meanings (2-digit country code, 3-digit mobile access code, 4-digit HLR identification code, 4-digit mobile subscriber number, and 11-digit mobile phone number is composed of the last three items), the mobile phone number is divided into The segment hash method; for the call record, only the start time and end time of the call are saved, and for the SMS record, only the conte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method and system for identifying mobile malicious users based on communication behavior rules. Sampling data, using the behavior pattern analysis in the mobile communication behavior analysis model to extract the user's call behavior characteristics, short message behavior characteristics and time distribution characteristics; based on the preprocessed mobile communication sampling data, using the communication network analysis in the mobile communication behavior analysis model Extract the user's social attribute features; based on the extracted user behavior pattern features and the extracted user social attribute features, build a mobile malicious user identification model; the present invention can analyze the user's behavior rules based on the desensitized data, and identify whether the user is a mobile malicious user The user has good timeliness and can identify mobile malicious users with high accuracy without involving the user's personal privacy.

Description

technical field [0001] The invention relates to a mobile malicious user identification method and system based on communication behavior rules, and belongs to the technical field of network space security. Background technique [0002] At present, for different purposes and interests, more and more illegal organizations or individuals use mobile communication devices to carry out malicious acts on the mobile Internet, such as telecommunication fraud and spam messages. Personal life and property safety of mobile communication users and the stable development of society pose a great threat. The 2017 China Mobile Security Status Report released by 360 Internet Security Center shows that in 2017, 360 Mobile Guard intercepted 38.09 billion harassing phone numbers and 9.85 billion spam text messages for users across the country, timely and effectively identifying them. Mobile malicious users engaged in malicious behaviors such as telecommunication fraud have important research si...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/121H04W12/122
CPCH04W12/121H04W12/122
Inventor 云晓春张永铮李书豪周文涛成振语
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products