CN109300028A - Real-time anti-fraud method and system and storage medium based on network data - Google Patents

Real-time anti-fraud method and system and storage medium based on network data Download PDF

Info

Publication number
CN109300028A
CN109300028A CN201811057556.9A CN201811057556A CN109300028A CN 109300028 A CN109300028 A CN 109300028A CN 201811057556 A CN201811057556 A CN 201811057556A CN 109300028 A CN109300028 A CN 109300028A
Authority
CN
China
Prior art keywords
fraud
data
model
network
user behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811057556.9A
Other languages
Chinese (zh)
Inventor
贺晓麟
王涛
王丹
钟良
杨光辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI NETIS TECHNOLOGIES Co Ltd
Original Assignee
SHANGHAI NETIS TECHNOLOGIES Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI NETIS TECHNOLOGIES Co Ltd filed Critical SHANGHAI NETIS TECHNOLOGIES Co Ltd
Priority to CN201811057556.9A priority Critical patent/CN109300028A/en
Publication of CN109300028A publication Critical patent/CN109300028A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Abstract

The present invention provides a kind of real-time anti-fraud method and system based on network data collects raw network data, by receiving and analyzing raw network data, obtains customer transaction information, user behavior information;Customer transaction information, user behavior information are sent to fraud Model Matching;Customer transaction information, user behavior information are analyzed, model is cheated by rule match engine combination machine learning and is matched, processing result to fraud is exported according to fraud model and is judged;Fraud judgement is carried out to the processing result of fraud model output, forms specific fraud;It calls data to supply interface, specific fraud is sent to external treatment end.The present invention is by the real-time collection analysis to network data, and it is not necessary to modify subscriber service systems, directly acquire network layer information, and high-performance parses network data, exports fraud result to anti-fraud platform.Provide real-time, full dose fraud detection data and analysis result.

Description

Real-time anti-fraud method and system and storage medium based on network data
Technical field
The present invention relates to anti-fraud fields in real time, and in particular, to a kind of real-time hair fraud method based on network data With system and storage medium.
Background technique
With the fast development of the networking of conventional banking facilities services interconnection and Novel Internet financial models, internet fraud Means become more and more varied, and user and internet financial platform are also being sharply increased by the risk cheated.Statistical number According to display, China Internet risk of fraud global ranking first three, loss caused by network fraud has reached GDP's 0.63%, this number is only second to the 0.64% of the U.S..
Anti- fraud data acquisition means common at present are by database or log or bury dot pattern acquisition information, effective Or it is comprehensive not enough, by from database obtain database in data, timeliness is poor, and will not store transaction cross number of passes According to, final transaction results data are only stored, it is not high to the accuracy of fraud judgement;There is no network messages in log Information lacks the network information for playing important references in anti-fraud analysis, and needs to modify operation system with unified day Will format and content;Burying dot pattern acquisition has network bandwidth and application performance additional loss, while being difficult to ensure information Safety.
Patent document CN108038700A provides a kind of anti-fraud data analysing method and system, to from a Back end data Data Mart is obtained in library and chart database is sent to an analysis model, and the Data Mart and the chart database are root It is generated according to the basic data about fraud collected in advance;The analysis model is to the Data Mart and the diagram data Library is analyzed, to obtain an analysis result;The analysis result is exported to a front end and shown.Individual risk of fraud is known Other model is combined with group's risk of fraud identification model, and anti-fraud system is more complete.And integrated supervised study, Semi-supervised Study and the study of unsupervised formula, handle data, improve recognition accuracy, and enable model modification speed faster, adapt to Property is stronger.Meanwhile establish it is counter cheat real-time points-scoring system, and score and calculate more acurrate, anti-fraud analysis result observation is more intuitive. Visual user's relation map can also intuitively show analysis as a result, user experience is good.The data that above patent document passes through acquisition Source carries out anti-fraud and calculates, but data are obtained from database, and process data is caused to lack.
Patent document CN104679777A provides a kind of method for detecting fraudulent trading, which comprises obtains History fraudulent trading record and history arm's length dealing is taken to record;Based on fraudulent trading record and arm's length dealing record The two extracts characterization factor;Training sample set is generated from fraudulent trading record and arm's length dealing record;With described Training sample set constructs decision tree, wherein constructing leaf node as target elements using two classifications of arm's length dealing and fraudulent trading And other nodes of the decision tree are constructed according to the characterization factor;From all from root node to finger of the decision tree Show the path extraction fraud rule of the leaf node of fraudulent trading;And fraud inspection is carried out to transaction data according to the fraud rule It surveys.Above patent document carries out anti-fraud by the data source obtained and calculates, but is calculated merely with historical data source, no It is enough comprehensive.
Summary of the invention
For the defects in the prior art, the real-time hair fraudulent party based on network data that the object of the present invention is to provide a kind of Method and system and storage medium.
A kind of real-time anti-fraud method based on network interconnection data provided according to the present invention, includes the following steps, net Network data collection steps: collecting raw network data, and raw network data is sent to data analysis and processing step;Data point Analysis and processing step: by receiving and analyzing raw network data, customer transaction information, user behavior information are obtained, by user Transaction Information, user behavior information are sent to fraud Model Matching step;Cheat Model Matching step: to customer transaction information, User behavior information is analyzed, and is cheated model by rule match engine combination machine learning and is matched, is tied according to matching Fruit exports to fraud judgment step;Fraud judgment step: to fraud Model Matching step output matching result into Row fraud judgement, forms specific fraud;Fraud exports step: specific fraud is sent to external treatment End.
Preferably, the network data acquisition step includes acquisition step: receiving the primitive network number that external equipment is sent According to;Network layer decoding step: network layer decoder is carried out to raw network data, forms first network data;Forwarding step: the is enabled One network data is forwarded to data analysis and processing step.
Preferably, the data analysis includes data reception step with processing step: receiving network data acquisition step turns The first network data of hair;Application layer decoding step: application layer protocol decoding is carried out to first network data, is formed unstructured Trading activity data;Transaction association step: transaction association is carried out to trading activity data according to Trading Model, user is formed and hands over Easy information, user behavior information;Message exports step: customer transaction information, user behavior information are exported to fraud model With step.
Preferably, the fraud Model Matching step includes customer relationship analytical procedure: to customer transaction information, user Customer relationship in behavioural information is analyzed, and in conjunction with customer relationship historical data, forms customer relationship net;User behavior analysis Step: the user behavior in customer transaction information, user behavior information is analyzed, in conjunction with user behavior historical data, shape At user behavior state;Machine learning step: it is taken advantage of in machine learning model according to customer relationship net, user behavior state Swindleness behavior matching, exports processing result.
Preferably, the fraud judgment step includes real-time judge rule step: rule of thumb model, nerve net Network model judges whether the processing result for cheating model output belongs to fraud, enumerates specific fraud;Rule configuration step It is rapid: to judge whether the processing result for cheating model output belongs to fraud according to setting rule, enumerate specific fraud;Machine Device learning data input step: it enables the processing result of fraud model output that label is set, and is input to fraud Model Matching step.
Preferably, the fraud exports step, and short message interface notifying process: specific fraud is connect by short message Mouth is sent to external treatment end;Electric kernel interface notifying process: specific fraud is audited into artificial treatment by phone and is sent to External treatment end;Api interface notifying process: specific fraud is interacted by api interface with ESB bus and is sent to external place Manage end.
Preferably, the real-time anti-fraud method based on network interconnection data further includes the anti-fraud Policy Updates of dynamic Step;The dynamic is counter to cheat Policy Updates step: enable the first anti-fraud rule of rule match engine be increased newly or modified, Anti- fraud rule, asynchronous building suspend data analysis and processing step after the completion for asynchronous building second, enable the second anti-fraud regular Anti- fraud rule, setup rule match engine for replacement first, restore data analysis and processing step.
Preferably, the real-time anti-fraud method based on network interconnection data, further include Nonstationary Machine Learning Model more New step;Nonstationary Machine Learning Model updates step: the label of history fraud and normal behaviour is carried out in set period of time Data set training obtains latest data collection training pattern, the analysis of pause data and place after latest data collection training pattern is formed Step is managed, triggering machine learning fraud model replacement restores data analysis and processing step.
A kind of real-time anti-fake system based on network interconnection data provided according to the present invention, comprises the following modules, net Network data acquisition module: collecting raw network data, and raw network data is sent to data analysis and processing module;Data point Analysis and processing module: by receiving and analyzing raw network data, customer transaction information, user behavior information are obtained, by user Transaction Information, user behavior information are sent to fraud model fitting module;Cheat model fitting module: to customer transaction information, User behavior information is analyzed, and is cheated model by machine learning and is matched, extremely according to fraud model output processing result Fraud judgment module;Fraud judgment module: fraud judgement, shape are carried out to the processing result of fraud model output At specific fraud;Data supplying module: specific fraud is sent to external treatment end.
A kind of computer readable storage medium for being stored with computer program provided according to the present invention, the computer journey The step of above method is realized when sequence is executed by processor.
Compared with prior art, the present invention have it is following the utility model has the advantages that
1, it supports seamless deployment, the number for supporting anti-fraud scene can be acquired under the premise of not modifying subscriber service system According to;
2, it is used as user behavior data source, the behavioral data comprising all operating process of user, phase using network data Than the final result data of database, it is capable of providing more accurately analysis result;
3, suitable for operation system no dependence, being suitable for not there are each service link of user behavior and transaction With operation system and platform;
4, by the real-time acquisition and processing to network data, and it is sent to anti-fraud platform in real time and carries out fraud knowledge Not, there is higher real-time compared to database, the anti-scene cheated in thing can be supported;
5, high-performance parsing network data and export recognition result to anti-fraud platform, can support level extension, support Real-time anti-fraud detection based on mass data.
Detailed description of the invention
Upon reading the detailed description of non-limiting embodiments with reference to the following drawings, other feature of the invention, Objects and advantages will become more apparent upon:
Fig. 1 is module relation diagram of the invention;
Fig. 2 is system flow chart of the invention;
Fig. 3 is data collection and analysis link flow chart of the invention;
Fig. 4 is marketing link flow chart of the invention.
Specific embodiment
The present invention is described in detail combined with specific embodiments below.Following embodiment will be helpful to the technology of this field Personnel further understand the present invention, but the invention is not limited in any way.It should be pointed out that the ordinary skill of this field For personnel, without departing from the inventive concept of the premise, several changes and improvements can also be made.These belong to the present invention Protection scope.
A kind of real-time anti-fraud method based on network interconnection data provided according to the present invention, comprising the following steps: net Network data collection steps: by light-dividing device (TAP) mirror user operation system network data and it is sent to anti-fake system Data receiver is sent to data analysis and processing to collect raw network data after being pre-processed raw network data Step simultaneously stores initial data for subsequent further analysis;Data analysis and processing step: pretreated network data is received simultaneously Application layer protocol, which is carried out, according to configuration obtains process of exchange data to decode.According to Trading Model to decoded process of exchange number According to transaction association is carried out, customer transaction information, user behavior information are formed, customer transaction information, user behavior information are sent To fraud Model Matching step;Fraud Model Matching step: analyzing customer transaction information, user behavior information, in conjunction with Machine learning cheats model and carries out fraud matching, exports matching result to fraud judgment step according to fraud model; Fraud judgment step: fraud judgement is carried out to the processing result of fraud model output, forms specific fraud;It takes advantage of Swindleness behavior exports step: calling data to supply interface, specific fraud is sent to external treatment end.
Specifically, the network data acquisition step includes data collection steps: being used by light-dividing device (TAP) mirror image Family operation system network data and the data receiver for being sent to anti-fake system receive the primitive network number that external equipment provides According to;Network layer decoding step: being decoded raw network data according to TCP/IP layer agreement, forms application layer data;Network Data forwarding and storing step: it enables application layer data be forwarded to data analysis and simultaneously stores raw network data with processing step For subsequent applications in being locally stored.
Specifically, the data analysis includes data reception step with processing step: receiving network data acquisition step turns The first network data of hair;Application layer decoding step: application layer protocol solution is carried out according to protocol stack arrangement to first network data Code, forms non-structured process of exchange data;Transaction association step: process of exchange data are carried out according to transaction association model Transaction association forms customer transaction information, user behavior information;Message exports step: customer transaction information, user behavior are believed Breath output extremely fraud Model Matching step.
Specifically, the fraud Model Matching step includes customer relationship analytical procedure: to customer transaction information, user Customer relationship in behavioural information is analyzed, and in conjunction with customer relationship historical data, forms customer relationship net.Preferably, user Input data can be integrated into a netted model by relationship analysis, by analyzing the contact person of user, the history note of connection The information such as record, calculate whether user belongs to potential malicious user, to avoid risk.For example certain user is obtained from network packet Transfer information etc., in conjunction with the information that other existing channels obtain, what can be more clear depicts the relational graph of user;With Family behavioural analysis step: the user behavior in customer transaction information, user behavior information is analyzed, is gone through in conjunction with user behavior History data form user behavior state.Preferably, user behavior analysis can depict user when different according to input data Between, different location, the habit on distinct device to analyze whether user may be likely to be fraudulent user, or is taken advantage of Swindleness clique malice usurps account.For example the information of full channel is obtained in users from networks packet, for example user is in a short time more A channel continues to try to withdraw the money, then shows that the user exists by steal-number risk;Machine learning step: it according to customer relationship net, uses Family behavior state carries out fraud matching in machine learning model, exports processing result.Preferably, machine learning model meeting With the information that quasi real time pattern analysis processing is obtained from network data source and other data sources, by the calculating of artificial intelligence with point Analysis calculates different models, is matched after truthful data input and is output to fraud judgment step.
Specifically, the fraud judgment step includes real-time judge rule step: rule of thumb model, nerve net Network model judges whether the processing result for cheating model output belongs to fraud, enumerates specific fraud;Rule configuration step It is rapid: to judge whether the processing result for cheating model output belongs to fraud according to setting rule, enumerate specific fraud.Institute Stating setting rule is operator's rule of thumb tuning parameter or threshold value, configures the rule and mould of fraud according to the actual situation Type.;Machine learning data input step: it enables the processing result of fraud model output that label is set, and is input to fraud model With step.Preferably, tagged to the processing result of each output according to network packet or other data sources, and again Machine learning model is input to carry out calculating behavior and relationship information that user is improved in study, it can essence according to the content of network packet Quasi- judges each input, the study of support AI that can be better according to the accurate label stamped.
Specifically, the data supplying step includes short message interface notifying process: specific fraud is connect by short message Mouth is sent to external treatment end;Electric kernel interface notifying process: specific fraud is audited into artificial treatment by phone and is sent to External treatment end;Api interface notifying process: specific fraud is interacted by api interface with ESB bus and is sent to external place Manage end.
A kind of computer readable storage medium for being stored with computer program provided according to the present invention, the computer journey The step of above method is realized when sequence is executed by processor.
A kind of real-time anti-fake system based on network interconnection data provided according to the present invention, as shown in Figure 1, include with Lower module, network data acquisition module: collecting raw network data, and raw network data is sent to data analysis and processing mould Block;Data analysis and processing module: by receiving and analyzing raw network data, customer transaction information, user behavior letter are obtained Breath, is sent to fraud model fitting module for customer transaction information, user behavior information;Cheat model fitting module: to user Transaction Information, user behavior information are analyzed, and are cheated model by machine learning and are matched, at fraud model output Result is managed to fraud judgment module;Fraud judgment module: fraud row is carried out to the processing result of fraud model output For judgement, specific fraud is formed;Data supplying module: calling data to supply interface, specific fraud is sent to outer Portion processing end.
The network data acquisition module includes acquisition module: receiving the raw network data that external equipment provides;Network Layer decoder module: being decoded raw network data according to TCP/IP layer agreement, forms application layer data;Forwarding module: it enables Application layer data is forwarded to data analysis and processing module.
The data are analyzed with processing module
Receiving module: the application layer data of receiving network data acquisition module forwarding;
Application layer decoder module: application layer protocol decoding is carried out to application layer data, forms non-structured process of exchange Record;
Transaction association module: recording process of exchange according to Trading Model and carry out transaction association, formation customer transaction information, User behavior information;
Message output module: customer transaction information, user behavior information are exported to fraud model fitting module.
The fraud model fitting module includes:
Customer relationship analysis module: analyzing the customer relationship in customer transaction information, user behavior information, in conjunction with Customer relationship historical data forms customer relationship net;
User behavior analysis module: analyzing the user behavior in customer transaction information, user behavior information, in conjunction with User behavior historical data forms user behavior state;
Machine learning module: fraud is carried out in machine learning model according to customer relationship net, user behavior state Matching exports processing result.
The fraud judgment module includes:
Real-time judge rule module: the processing result that rule of thumb model, neural network model judgement fraud model export Whether belong to fraud, enumerates specific fraud;
Rule configuration module: judging whether the processing result for cheating model output belongs to fraud according to setting rule, Enumerate specific fraud;
Machine learning data input module: it enables the processing result of fraud model output that label is set, and is input to fraud mould Type matching module.
The data supplying module:
Short message interface notification module: specific fraud is sent to external treatment end by short message interface;
Electric kernel interface notification module: specific fraud is audited into artificial treatment by phone and is sent to external treatment end;
Api interface notification module: specific fraud is interacted by api interface with ESB bus and is sent to external treatment End.
Real-time anti-fake system provided by the invention based on network interconnection data, can be by being based on network interconnection data Real-time anti-fraud method step process realize.Those skilled in the art counter can take advantage of real-time based on network interconnection data Swindleness method is interpreted as the preference of the real-time anti-fake system based on network interconnection data.
As shown in figure 3, in network data acquisition step, data analysis and processing step, it can be real by following steps Existing, load configuration: initializing entire data collection and analysis link according to configuration, mainly includes following content: the net of monitoring Card information, Data Matching rule to be processed, the protocol stack information of data to be analyzed, output configuration information etc.;Monitor network interface card stream Amount: higher place can be provided relative to common message-oriented middleware according to configuring binding server network interface card and therefrom receiving data Rationality energy;Network layer decoder: being decoded data according to ICP/IP protocol, to generate network session information;Data filtering: root Data are filtered with the session information generated before according to configuration, abandon nontransaction data;Using layer decoder: according to configuration pair Filtered network data is carried out using layer decoder, and content such as HTTP, XML etc. applies layer decoder, to obtain detailed transaction Details;Transaction data association: transaction details data are associated based on the algorithm of state machine according to configuration, by one or more Detailed data is associated to a complete transaction data;Transaction data output: association is completed by transaction data according to configuration and is sent Subsequent operation is carried out to marketing platform.
As shown in figure 4, can be realized in real-time anti-fraud detecting step by following steps, counter take advantage of is initialized It cheats engine step: anti-fraud engine is initialized according to loading configuration file.Configuration file mainly includes the following contents: customer relationship Analysis rule, user behavior matching rule, training pattern data export configuration rule;Binding data source step: it is tied up according to configuration Determine data source, the customer transaction data that receiving network data acquisition and analysis system provide.Specifically use memory switching technology To optimize data transmission performance;Customer relationship analytical procedure: according to the relationship between the rule analysis user of definition, user is closed System is organized into graph data structure, for downstream use.It, can be dynamically right if occurring the variation of rule in operational process Rule is updated, and can be come into force in next treatment process immediately after the completion of update;User behavior analysis step: according to Family transaction data and customer relationship figure identify the behavior of user using traditional rule match mode;Machine learning matching step: On the basis of traditional rule is matched, using the machine learning algorithm based on deep neural network, data instruction is cheated according to history Practice fraud identification model, to complete the identification of user behavior.Fraud exports step: the fraud information recognized is deposited Storage, to develop the related application based on fraud later, is limited into database as user credit evaluation, user access System etc..Fraud can also be sent in real time to anti-fraud platform by message, cheat platform by counter and realize real-time friendship The easily high real-times application scenarios such as blocking.
Preferably, the invention also includes the anti-fraud Policy Updates steps of dynamic, are based on the network interconnection provided by the invention In the real-time anti-fake system operational process of data, user can be newly-increased by interface or modifies anti-fraud rule.It is advised in application After then, system can asynchronously construct the new anti-rule match engine cheated, and of short duration pause data flow and replace after the completion of building Engine is changed, restores data flow after being replaced successfully again.The rule match engine batch processing, by trading information data and user The rule of definition is matched, and will be marked on the data band of successful match.Such as: rule 1: the same account is adjacent to be operated twice Time interval is greater than x minutes, and x takes the numerical value greater than 0;Rule 2: the adjacent operation twice of the same account is apart greater than y kilometers, y Take the numerical value greater than 0.If an account meets above-mentioned condition simultaneously, suspicious record can be marked as.
Preferably, the invention also includes dynamic machines to learn fraud model modification step, and it is base that model is cheated in machine learning It is formed in the flag data collection training of history fraud and normal behaviour.In order to enable machine learning fraud model with when Between develop, the present invention can periodically based on newest data set training new model.After the completion of model training, trigger model updates stream Journey, of short duration pause data flow and substitution model, restore data flow again after being replaced successfully.
In preferred specific embodiment, it is illustrated, will be acquired by taking the anti-fraud scene of certain bank as an example below Module is deployed on all channels of bank, for example, Web bank, Mobile banking, on telephone bank's server, it is not necessary to modify preceding A large amount of network informations of full channel are obtained in the case where the application of end in real time, while sending data analysis and processing for network data Device, and network data can be stored in storage medium;After data analysis receives network data with processing module, according to The data model of configuration obtained after network data is analyzed and handled user behavior and transaction data (such as user account, The amount of the loan, the channel classification used, number of attempt etc.), while next mould is sent by the behavior of user and transaction data Block, and the behavior of user and transaction data can be stored in storage medium;Judgment models are according to using machine learning module tune It is carried out calculating matching historical record with customer relationship module and user behavior module, and final processing result is output to and is taken advantage of Swindleness behavior judgment module;Rule configuration module input experience configuration is first passed through in advance, when then judgment module receives Real time request, The rule rule of thumb configured, and this time whether request belongs to fraud according to the judgement of the result various dimensions of judgment models, And it is tagged.After machine learning input module periodically arranges judging result simultaneously, it is directed back to the machine of fraud judgment models Study module carries out calculating learning classification;The result of judgement is finally sent to downstream platform, such as phone by diversified forms It audits platform and carries out manual examination and verification, or related personnel is sent to by short message, or sending result by API has downstream platform certainly Dynamic processing.
In another preferred embodiment, in the application of certain internet financing corporation, by data collection point portion Administration is on the channel of all network data acquisitions.According to the information got, such as the behavioural information that user transfers accounts etc., pass through Artificial intelligence module analyzes the relationship between user, forms the relational network of user, and is stored in storage medium.With In the operation of family next time, the trade network of the matching analysis user is carried out according to the calculated user model of artificial intelligence before In whether there is high risk user, to calculate the risk of the user, and this information is passed into behavior judgment module.It is passing through After crossing manual examination and verification or rule audit, system automatically records down the risk situation of the user, to enter data into back machine Study module judges the risk of other users associated there according to the label information of this user.
One skilled in the art will appreciate that in addition to realizing system provided by the invention in a manner of pure computer readable program code It, completely can be by the way that method and step be carried out programming in logic come so that provided by the invention other than system, device and its modules System, device and its modules are declined with logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion The form of controller etc. realizes identical program.So system provided by the invention, device and its modules may be considered that It is a kind of hardware component, and the knot that the module for realizing various programs for including in it can also be considered as in hardware component Structure;It can also will be considered as realizing the module of various functions either the software program of implementation method can be Hardware Subdivision again Structure in part.
Specific embodiments of the present invention are described above.It is to be appreciated that the invention is not limited to above-mentioned Particular implementation, those skilled in the art can make a variety of changes or modify within the scope of the claims, this not shadow Ring substantive content of the invention.In the absence of conflict, the feature in embodiments herein and embodiment can any phase Mutually combination.

Claims (10)

1. a kind of real-time anti-fraud method based on network interconnection data, which comprises the following steps:
Network data acquisition step: collecting raw network data, and raw network data is sent to data analysis and processing step;
Data analysis and processing step: by receiving and analyzing raw network data, customer transaction information, user behavior letter are obtained Customer transaction information, user behavior information are sent to fraud Model Matching step by breath;
Fraud Model Matching step: customer transaction information, user behavior information are analyzed, combined by rule match engine Machine learning fraud model is matched, and is exported according to matching result to fraud judgment step;
Fraud judgment step: fraud judgement is carried out to the matching result of fraud Model Matching step output, forms tool Body fraud;
Fraud exports step: specific fraud is sent to external treatment end.
2. the real-time anti-fraud method according to claim 1 based on network interconnection data, which is characterized in that the network Data collection steps include:
Acquisition step: the raw network data that external equipment is sent is received;
Network layer decoding step: network layer decoder is carried out to raw network data, forms first network data;
Forwarding step: enable first network data forwarding to data analysis and processing step.
3. the real-time anti-fraud method according to claim 1 based on network interconnection data, which is characterized in that the data It analyzes with processing step and includes:
Data reception step: the first network data of receiving network data acquisition step forwarding;
Application layer decoding step: application layer protocol decoding is carried out to first network data, forms non-structured trading activity number According to;
Transaction association step: transaction association is carried out to trading activity data according to Trading Model, forms customer transaction information, user Behavioural information;
Message exports step: customer transaction information, user behavior information are exported to fraud Model Matching step.
4. the real-time anti-fraud method according to claim 1 based on network interconnection data, which is characterized in that the fraud Model Matching step includes:
Customer relationship analytical procedure: the customer relationship in customer transaction information, user behavior information is analyzed, in conjunction with user Relationship historical data forms customer relationship net;
User behavior analysis step: the user behavior in customer transaction information, user behavior information is analyzed, in conjunction with user Behavior historical data forms user behavior state;
Machine learning step: carrying out fraud matching according to customer relationship net, user behavior state in machine learning model, Export processing result.
5. the real-time anti-fraud method according to claim 1 based on network interconnection data, which is characterized in that the fraud Behavior judgment step includes:
Real-time judge rule step: rule of thumb model, neural network model judge cheat model output processing result whether Belong to fraud, enumerates specific fraud;
Regular configuration step: judge whether the processing result for cheating model output belongs to fraud according to setting rule, enumerate Specific fraud;
Machine learning data input step: it enables the processing result of fraud model output that label is set, and is input to fraud model With step.
6. the real-time anti-fraud method according to claim 1 based on network interconnection data, which is characterized in that the fraud Behavior exports step:
Short message interface notifying process: specific fraud is sent to external treatment end by short message interface;
Electric kernel interface notifying process: specific fraud is audited into artificial treatment by phone and is sent to external treatment end;
Api interface notifying process: specific fraud is interacted by api interface with ESB bus and is sent to external treatment end.
7. the real-time anti-fraud method according to claim 1 based on network interconnection data, which is characterized in that further include moving State is counter to cheat Policy Updates step;
The dynamic is counter to cheat Policy Updates step: enable the first anti-fraud rule of rule match engine be increased newly or modified, Anti- fraud rule, asynchronous building suspend data analysis and processing step after the completion for asynchronous building second, enable the second anti-fraud regular Anti- fraud rule, setup rule match engine for replacement first, restore data analysis and processing step.
8. the real-time anti-fraud method described in claim 1 based on network interconnection data, which is characterized in that further include dynamic machine Device learning model updates step;
Nonstationary Machine Learning Model updates step: the flag data of history fraud and normal behaviour is carried out in set period of time Collection training obtains latest data collection training pattern, and the analysis of pause data is walked with processing after latest data collection training pattern is formed Suddenly, triggering machine learning fraud model replacement restores data analysis and processing step.
9. a kind of real-time anti-fake system based on network interconnection data, which is characterized in that comprise the following modules:
Network data acquisition module: collecting raw network data, and raw network data is sent to data analysis and processing module;
Data analysis and processing module: by receiving and analyzing raw network data, customer transaction information, user behavior letter are obtained Breath, is sent to fraud model fitting module for customer transaction information, user behavior information;
Fraud model fitting module: customer transaction information, user behavior information are analyzed, model is cheated by machine learning It is matched, processing result is exported to fraud judgment module according to fraud model;
Fraud judgment module: fraud judgement is carried out to the processing result of fraud model output, forms specific fraud row For;
Data supplying module: specific fraud is sent to external treatment end.
10. a kind of computer readable storage medium for being stored with computer program, which is characterized in that the computer program is located The step of reason device realizes method described in any item of the claim 1 to 8 when executing.
CN201811057556.9A 2018-09-11 2018-09-11 Real-time anti-fraud method and system and storage medium based on network data Pending CN109300028A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811057556.9A CN109300028A (en) 2018-09-11 2018-09-11 Real-time anti-fraud method and system and storage medium based on network data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811057556.9A CN109300028A (en) 2018-09-11 2018-09-11 Real-time anti-fraud method and system and storage medium based on network data

Publications (1)

Publication Number Publication Date
CN109300028A true CN109300028A (en) 2019-02-01

Family

ID=65166481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811057556.9A Pending CN109300028A (en) 2018-09-11 2018-09-11 Real-time anti-fraud method and system and storage medium based on network data

Country Status (1)

Country Link
CN (1) CN109300028A (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109829721A (en) * 2019-02-13 2019-05-31 同济大学 Online trading multiagent behavior modeling method based on heterogeneous network representative learning
CN110148001A (en) * 2019-04-29 2019-08-20 上海欣方智能系统有限公司 A kind of system and method for realizing fraudulent trading intelligent early-warning
CN110213239A (en) * 2019-05-08 2019-09-06 阿里巴巴集团控股有限公司 Suspicious transaction message generation method, device and server
CN110362981A (en) * 2019-06-29 2019-10-22 上海淇毓信息科技有限公司 The method and system of abnormal behaviour are judged based on credible equipment fingerprint
CN110363649A (en) * 2019-06-27 2019-10-22 上海淇馥信息技术有限公司 A kind of method for prewarning risk based on user operation case, device, electronic equipment
CN110675263A (en) * 2019-09-27 2020-01-10 支付宝(杭州)信息技术有限公司 Risk identification method and device for transaction data
CN110956547A (en) * 2019-11-28 2020-04-03 广州及包子信息技术咨询服务有限公司 Search engine-based method and system for identifying cheating group in real time
CN110990810A (en) * 2019-11-28 2020-04-10 中国建设银行股份有限公司 User operation data processing method, device, equipment and storage medium
CN111080441A (en) * 2019-12-20 2020-04-28 四川新网银行股份有限公司 Method for judging negative information of bank user after loan
CN111581253A (en) * 2020-05-04 2020-08-25 上海维信荟智金融科技有限公司 Real-time detection method and system based on anti-fraud model
CN112053223A (en) * 2020-08-14 2020-12-08 百维金科(上海)信息科技有限公司 Internet financial fraud behavior detection method based on GA-SVM algorithm
CN112200583A (en) * 2020-10-28 2021-01-08 交通银行股份有限公司 Knowledge graph-based fraud client identification method
CN112399013A (en) * 2019-08-15 2021-02-23 中国电信股份有限公司 Abnormal telephone traffic identification method and device
CN112506983A (en) * 2020-09-18 2021-03-16 上海欣方智能系统有限公司 Anti-fraud method based on big data support
CN112579864A (en) * 2020-12-25 2021-03-30 北京明朝万达科技股份有限公司 Anti-fraud processing method and device
CN112751835A (en) * 2020-12-23 2021-05-04 石溪信息科技(上海)有限公司 Traffic early warning method, system, equipment and storage device
CN112862009A (en) * 2021-03-29 2021-05-28 中信银行股份有限公司 Real-time anti-fraud data processing method and system based on stream computing
CN113259402A (en) * 2021-07-19 2021-08-13 北京明略软件系统有限公司 Method and device for determining abnormal network protocol address
CN113610534A (en) * 2021-07-28 2021-11-05 浙江惠瀜网络科技有限公司 Data processing method and device for anti-fraud
CN113706176A (en) * 2021-09-02 2021-11-26 赵琦 Information anti-fraud processing method and service platform system combined with cloud computing
CN113793132A (en) * 2021-09-24 2021-12-14 上海通联金融服务有限公司 Automatic approval method, system and terminal based on machine learning
CN114971642A (en) * 2022-05-30 2022-08-30 平安科技(深圳)有限公司 Knowledge graph-based anomaly identification method, device, equipment and storage medium
CN116562901A (en) * 2023-06-25 2023-08-08 福建润楼数字科技有限公司 Automatic generation method of anti-fraud rule based on machine learning
CN116579774A (en) * 2023-07-14 2023-08-11 深圳明辉智能技术有限公司 Cross encryption-based payment platform system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714479A (en) * 2012-10-09 2014-04-09 四川欧润特软件科技有限公司 Intelligent centralized monitor method and system for bank personal business fraudulent conducts
CN103886495A (en) * 2013-09-30 2014-06-25 上海本家空调系统有限公司 Monitoring method and system based on network transaction
CN105976242A (en) * 2016-04-21 2016-09-28 中国农业银行股份有限公司 Transaction fraud detection method and system based on real-time streaming data analysis
CN107067324A (en) * 2017-04-18 2017-08-18 上海翼翎数据信息技术有限公司 A kind of utilization network packet capturing data realize the method and system of transaction risk control
CN108038700A (en) * 2017-12-22 2018-05-15 上海前隆信息科技有限公司 A kind of anti-fraud data analysing method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714479A (en) * 2012-10-09 2014-04-09 四川欧润特软件科技有限公司 Intelligent centralized monitor method and system for bank personal business fraudulent conducts
CN103886495A (en) * 2013-09-30 2014-06-25 上海本家空调系统有限公司 Monitoring method and system based on network transaction
CN105976242A (en) * 2016-04-21 2016-09-28 中国农业银行股份有限公司 Transaction fraud detection method and system based on real-time streaming data analysis
CN107067324A (en) * 2017-04-18 2017-08-18 上海翼翎数据信息技术有限公司 A kind of utilization network packet capturing data realize the method and system of transaction risk control
CN108038700A (en) * 2017-12-22 2018-05-15 上海前隆信息科技有限公司 A kind of anti-fraud data analysing method and system

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109829721A (en) * 2019-02-13 2019-05-31 同济大学 Online trading multiagent behavior modeling method based on heterogeneous network representative learning
CN109829721B (en) * 2019-02-13 2023-06-06 同济大学 Online transaction multi-subject behavior modeling method based on heterogeneous network characterization learning
CN110148001A (en) * 2019-04-29 2019-08-20 上海欣方智能系统有限公司 A kind of system and method for realizing fraudulent trading intelligent early-warning
CN110213239A (en) * 2019-05-08 2019-09-06 阿里巴巴集团控股有限公司 Suspicious transaction message generation method, device and server
CN110213239B (en) * 2019-05-08 2021-06-01 创新先进技术有限公司 Suspicious transaction message generation method and device and server
CN110363649A (en) * 2019-06-27 2019-10-22 上海淇馥信息技术有限公司 A kind of method for prewarning risk based on user operation case, device, electronic equipment
CN110362981A (en) * 2019-06-29 2019-10-22 上海淇毓信息科技有限公司 The method and system of abnormal behaviour are judged based on credible equipment fingerprint
CN110362981B (en) * 2019-06-29 2022-12-02 上海淇毓信息科技有限公司 Method and system for judging abnormal behavior based on trusted device fingerprint
CN112399013A (en) * 2019-08-15 2021-02-23 中国电信股份有限公司 Abnormal telephone traffic identification method and device
CN110675263A (en) * 2019-09-27 2020-01-10 支付宝(杭州)信息技术有限公司 Risk identification method and device for transaction data
CN110675263B (en) * 2019-09-27 2022-06-03 支付宝(杭州)信息技术有限公司 Risk identification method and device for transaction data
CN110956547B (en) * 2019-11-28 2023-11-03 广州及包子信息技术咨询服务有限公司 Method and system for identifying fraudulent party in real time based on search engine
CN110990810A (en) * 2019-11-28 2020-04-10 中国建设银行股份有限公司 User operation data processing method, device, equipment and storage medium
CN110956547A (en) * 2019-11-28 2020-04-03 广州及包子信息技术咨询服务有限公司 Search engine-based method and system for identifying cheating group in real time
CN111080441A (en) * 2019-12-20 2020-04-28 四川新网银行股份有限公司 Method for judging negative information of bank user after loan
CN111080441B (en) * 2019-12-20 2023-04-18 四川新网银行股份有限公司 Method for judging negative information of bank user after loan
CN111581253A (en) * 2020-05-04 2020-08-25 上海维信荟智金融科技有限公司 Real-time detection method and system based on anti-fraud model
CN112053223A (en) * 2020-08-14 2020-12-08 百维金科(上海)信息科技有限公司 Internet financial fraud behavior detection method based on GA-SVM algorithm
CN112506983A (en) * 2020-09-18 2021-03-16 上海欣方智能系统有限公司 Anti-fraud method based on big data support
CN112200583B (en) * 2020-10-28 2023-12-19 交通银行股份有限公司 Knowledge graph-based fraudulent client identification method
CN112200583A (en) * 2020-10-28 2021-01-08 交通银行股份有限公司 Knowledge graph-based fraud client identification method
CN112751835B (en) * 2020-12-23 2023-05-02 石溪信息科技(上海)有限公司 Flow early warning method, system, equipment and storage medium
CN112751835A (en) * 2020-12-23 2021-05-04 石溪信息科技(上海)有限公司 Traffic early warning method, system, equipment and storage device
CN112579864B (en) * 2020-12-25 2022-09-16 北京明朝万达科技股份有限公司 Anti-fraud processing method and device
CN112579864A (en) * 2020-12-25 2021-03-30 北京明朝万达科技股份有限公司 Anti-fraud processing method and device
CN112862009A (en) * 2021-03-29 2021-05-28 中信银行股份有限公司 Real-time anti-fraud data processing method and system based on stream computing
CN113259402A (en) * 2021-07-19 2021-08-13 北京明略软件系统有限公司 Method and device for determining abnormal network protocol address
CN113610534A (en) * 2021-07-28 2021-11-05 浙江惠瀜网络科技有限公司 Data processing method and device for anti-fraud
CN113706176B (en) * 2021-09-02 2022-08-19 江西裕民银行股份有限公司 Information anti-fraud processing method and service platform system combined with cloud computing
CN113706176A (en) * 2021-09-02 2021-11-26 赵琦 Information anti-fraud processing method and service platform system combined with cloud computing
CN113793132A (en) * 2021-09-24 2021-12-14 上海通联金融服务有限公司 Automatic approval method, system and terminal based on machine learning
CN114971642A (en) * 2022-05-30 2022-08-30 平安科技(深圳)有限公司 Knowledge graph-based anomaly identification method, device, equipment and storage medium
CN116562901A (en) * 2023-06-25 2023-08-08 福建润楼数字科技有限公司 Automatic generation method of anti-fraud rule based on machine learning
CN116562901B (en) * 2023-06-25 2024-04-02 福建润楼数字科技有限公司 Automatic generation method of anti-fraud rule based on machine learning
CN116579774A (en) * 2023-07-14 2023-08-11 深圳明辉智能技术有限公司 Cross encryption-based payment platform system and method
CN116579774B (en) * 2023-07-14 2024-01-12 深圳明辉智能技术有限公司 Cross encryption-based payment platform system and method

Similar Documents

Publication Publication Date Title
CN109300028A (en) Real-time anti-fraud method and system and storage medium based on network data
CN110399550A (en) A kind of information recommendation method and device
CN106803168B (en) Abnormal transfer detection method and device
US6920440B1 (en) Forming a signature of parameters extracted from information
CN109410036A (en) A kind of fraud detection model training method and device and fraud detection method and device
CN110267272A (en) A kind of fraud text message recognition methods and identifying system
CN107067324A (en) A kind of utilization network packet capturing data realize the method and system of transaction risk control
CN110248322B (en) Fraud group partner identification system and identification method based on fraud short messages
GB2321364A (en) Retraining neural network
CN110163618A (en) Extremely detection method, device, equipment and the computer readable storage medium traded
CN103796183B (en) A kind of refuse messages recognition methods and device
CN108629379A (en) A kind of individual's reference appraisal procedure and system
CN107819747A (en) A kind of telecommunication fraud correlation analysis system and method based on communication event sequence
CN109656792A (en) Applied performance analysis method, apparatus, computer equipment and storage medium based on network call log
US11086991B2 (en) Method and system for active risk control based on intelligent interaction
CN109685336A (en) Collection task distribution method, device, computer equipment and storage medium
CN108777848A (en) For intercept information and the method for determining intercept information
CN111401447A (en) Artificial intelligence-based flow cheating identification method and device and electronic equipment
CN106055664A (en) Method and system for filtering UGC (User Generated Content) spam based on user comments
CN109327325A (en) Multi-stage data acquisition and the evidences collection method of facing cloud platform Credibility Assessment
CN110457601B (en) Social account identification method and device, storage medium and electronic device
CN110336791A (en) A kind of breakpoint data transmission method, device, equipment and computer storage medium
CN111681044A (en) Method and device for processing point exchange cheating behaviors
CN116645134A (en) Method, device, equipment and medium for recommending credit card in stages
CN110852338A (en) User portrait construction method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190201

RJ01 Rejection of invention patent application after publication