CN101415000A - Method for preventing Dos aggression of business support system - Google Patents

Method for preventing Dos aggression of business support system Download PDF

Info

Publication number
CN101415000A
CN101415000A CNA2008101477277A CN200810147727A CN101415000A CN 101415000 A CN101415000 A CN 101415000A CN A2008101477277 A CNA2008101477277 A CN A2008101477277A CN 200810147727 A CN200810147727 A CN 200810147727A CN 101415000 A CN101415000 A CN 101415000A
Authority
CN
China
Prior art keywords
user
counter
support system
business support
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008101477277A
Other languages
Chinese (zh)
Other versions
CN101415000B (en
Inventor
徐苛杰
胡鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Sichuan Co Ltd
Original Assignee
China Mobile Group Sichuan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Sichuan Co Ltd filed Critical China Mobile Group Sichuan Co Ltd
Priority to CN2008101477277A priority Critical patent/CN101415000B/en
Publication of CN101415000A publication Critical patent/CN101415000A/en
Application granted granted Critical
Publication of CN101415000B publication Critical patent/CN101415000B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method of a service supporting system used for preventing Dos attack; when the user initiates service transaction request, the user ID is used to generate a user transaction behavior index counter at the upstream link of request disposal of the service supporting system; during one counting period, when the user transacts the service once by the service supporting system, the corresponding user transaction behavior index counter is counted and then compared with the user transaction behavior threshold; if the count of the counter exceeds the allowance of the threshold, the service request is refused in the link; if the count of the counter does not exceed the allowance of the threshold, the service request is allowed to continue to be processed in the downstream link of the service supporting system. The method starts from the application layer, analyses the normal operation index of the user, utilizes the unusual threshold to judge the attack behavior at the upstream link of the service supporting system, blocks the attack request to be transmitted to the downward request processing system when the Dos attack occurs, thus achieving the purpose of preventing the Dos attacks.

Description

A kind of method of preventing Dos aggression of business support system
Technical field
The present invention relates to network communication safe practice field, especially a kind of method of preventing Dos aggression of business support system.
Background technology
Along with development of computer, the business of company begins gradually and computer software, sets up model according to the business of company, is core with the computer system, and in conjunction with other software and hardware facilities, customization has formed the business support system of company.As the charge system of the communications industry, the trade managing system of bank, the transaction of website, payment system etc. all are typical business support systems.The safety of business support system is most important to the daily production and the business development of company.
At present, hacker's attack is one of the threat of the maximum of network security, and DoS (denial of service) attack is its most frequently used a kind of means, under the situation of network high development, the hacker utilizes means such as wooden horse, virus to control numerous network terminals especially, use these network terminals to launch a offensive simultaneously, form the DDoS (distributed denial of service) that more is difficult to take precautions against and attack.When the hacker initiates DoS (denial of service) attack, the numerous terminals that normally rely on its control are (as thousands of corpse machine, or be subjected to normal terminal/server of its commander), initiate a large amount of service request to a certain target, make target paralyse very soon, thereby can't serve normally the user because of surpassing reasons such as disposal ability, networking obstruction.
Prevent DoS attack at present, relatively Chang Yong method the black hole method is arranged, be provided with that the route Access Control List (ACL) is filtered and series connection firewall security equipment etc. several, but these methods all are that the abnormal flow at networking is discerned, attack that can't the security application layer, powerless especially to the attack of distributed use user regular traffic request.
The consideration of client and saving entity channel cost for convenience, business support system tends to be connected with Possum and the Internet, provide services such as picture Web bank, online business hall, self-aided terminal, but these services simultaneously for providing, hacker and malicious persons are initiated the approach that DoS (denial of service) attacks to business support system.
In order to improve the fail safe of business support system, telecom operators and banking system are in the Internet or Possum access, used interfacing mostly, promptly provide business service one by one by interface, when the user passes through public network or Possum transacting business, from the service routine of interface interchange related service, finish handling of related service to business support system by service routine.Because service routine is that fixing input and output mechanism is arranged, so interface mode is safer and reliable than the direct-connected business support system of public network (Possum).At present, call for convenience, the interface service program is normally write by professional and function.But interface mode itself is attacked the obvious effect that there is no to anti-DoS (denial of service), when hacker or other malicious persons use user's normal request is launched a offensive, interface still can be carried out calling service program, attack can be transmitted to the follow-up processing links of business support system, serious is that initiating system excess load or networking are blocked, and causes the paralysis of system.
Open day is on March 5th, 2008, publication number is that the Chinese patent file of CN101136922 discloses a kind of Business Stream recognition methods, device and distributed refusal service attack defending method, system, and the Business Stream recognition methods comprises: the user capture goal systems is detected; According to detected user the visit of goal systems and preset user visit statistical model are dynamically generated the user totem information set; Extract the user totem information in the Business Stream; Relatively whether the user totem information in user totem information of Ti Quing and the set mates with the definite user totem information that extracts and the user totem information of generation; Determine according to the comparative result of determining that whether mates whether described Business Stream is legitimate traffic stream.When above-mentioned Business Stream recognition methods is applied to distributed refusal service attack defending, above-mentioned definite legitimate traffic stream is carried out follow-up normal process operation, refusal carries out follow-up normal process operation to described definite illegal service stream.Thereby improved the accuracy of identification legitimate traffic stream, improved the defence capability of distributed refusal service attack defending system.
Above-mentioned prior art tackles strategy that anti-DoS (denial of service) attacks and method from exception flow of network, also and easily mistake stops user's normal request when stop attacking, and attack for distributed anti-DoS (denial of service), owing to be difficult to distinguish the normal users request and attack request, these strategies and method are difficult to prove effective especially, and technique scheme designs the attack protection system from network level rather than from application, so the Traffic Anomaly that some provisional activities are caused is difficult to the fast and flexible adjustment, more is difficult to use the actual conditions of service to tackle flexibly by the user.
Summary of the invention
For solving the problems of the technologies described above, the present invention proposes a kind of from application, start with from the normal running index of analysis user, judge attack in the upstream of business support system link such as the unusual threshold values of interface utilization, when DoS attack takes place, attack request demand processing system conduction downstream in the blocking-up of upstream link place, thereby reach the method for anti-DoS attack.
The present invention is achieved through the following technical solutions:
A kind of method of preventing Dos aggression of business support system, it is characterized in that: when the user initiates the business handling request, in the upstream link of handling with the business support system request, use user ID to generate the user and handle the behavioral indicator counter, in a count cycle, when the user handles once business by business support system, first user with correspondence handles the behavioral indicator counter and carries out counting operation, handling the behavior threshold values with the user again compares, if having surpassed threshold values, rolling counters forward allows, then, do not allow, then allow this service request to continue to handle in the downstream of business support system link if surpass threshold values in this link blocking-up service request; Perhaps also can be earlier and the user handle the behavior threshold values and compare, if the super threshold values of rolling counters forward allows, then in this link blocking-up service request, allow again user with correspondence to handle the behavioral indicator counter to carry out counter if surpass threshold values, and allow this service request to continue to handle in the downstream of business support system link; The user handles the behavioral indicator counter and carries out zero clearing when the new count cycle begins, put number or reconstruction.
Described user handles behavior and is meant the user from initiating service request to business support system, managing business request of business support system, and result fed back to user's overall process, counter can be counted in any link of this process.
The upstream link that described business support system request is handled is meant when the user initiates the business handling request, each link of system is handled the business handling request according to certain sequencing, the link of the relative reprocessing of handling earlier of link is called the upstream link, concerning whole system, be in the user and ask to handle front end, the link that user's request is handled is the upstream link earlier.As the online business hall part of telecom operators, website and interface are the upstream links, the Business Processing service of business support system, and database, the correlation subsystem that Business Processing is connected is the downstream link.
Described counter is meant the user is handled up counter or the subtract counter that behavior is counted, and can realize by hardware or software.
The described count cycle is meant to begin to count down at counter and rebuilds or time period of zero clearing, and this time period can be set to one minute, one hour, one day, a week or January or the like.
The user of described correspondence handles the behavioral indicator counter, is meant by can be unique to user ID conditions such as telephone number, ID card No., Bank Account Number, Alipay ID, email addresses determining that this client's handles the behavioral indicator counter.
Described counting operation is meant the working method according to counter, to the add deduct operation of fixed value of counter, as to up counter, adds fixed value (as adding 1) operation; To subtract counter, then subtract fixed value (as subtracting 1) operation.
Described user handles the behavior threshold values and is meant that one is normally handled a relevant numerical value of behavior with the user, this threshold values can draw by the behavior of normally handling of analysis user, as online business hall in telecom operators, the number of times that normal users was handled in one day is no more than 50 times, the number of times of one hour transacting business is no more than 30 times, or the like.In actual applications, can draw this threshold values by some simple calculations according to the working method of counter.For example, to up counter, can be handled the metered valve value day 50 or 60 (being 50+10) are set; To subtract counter, threshold values can be made as 0, use to put to count in the new count cycle and realize the effect identical with up counter.
Described rolling counters forward has surpassed threshold values and has allowed, be meant that counter carries out counting operation after, count value has departed from normal range (NR), to up counter, departs from for greater than threshold values is set, and to subtract counter, departs from for less than scope is set.
Described user handles the behavioral indicator counter and carries out zero clearing when the new count cycle begins, put number or reconstruction, be meant in the new count cycle, system handles the user of previous cycle user correspondence the behavioral indicator counter O reset, puts number, or counter removed, rebulid new counter, make counter can restart counting.To up counter, generally use the method for zero clearing, to subtract counter, the general several method of putting of using.The method of rebuilding all can be used the addition subtract counter, and the time of reconstruction can be after going up the one-period end, also can be the moment that needs to set up counter in the new count cycle.
The invention has the advantages that:
1, with publication number is that the Chinese patent file of CN101136922 is compared, the present invention is " in the upstream link of handling with the business support system request; use user ID to generate the user and handle the behavioral indicator counter; in a count cycle; when the user handles once when professional by business support system; earlier the user of correspondence is handled the behavioral indicator counter and carry out counting operation; handle the behavior threshold values with the user again and compare, if having surpassed threshold values, rolling counters forward allows, then in this link blocking-up service request, do not allow if surpass threshold values, then allow this service request to continue to handle in the downstream of business support system link; Perhaps also can be earlier and the user handle the behavior threshold values and compare, if the super threshold values of rolling counters forward allows, then in this link blocking-up service request, allow again user with correspondence to handle the behavioral indicator counter to carry out counter if surpass threshold values, and allow this service request to continue to handle in the downstream of business support system link; The user handles the behavioral indicator counter and carries out zero clearing when the new count cycle begins, put number or reconstruction." such technical scheme has following advantage; from application; start with; use user ID to generate the user and handle the behavioral indicator counter; utilize unusual threshold values to judge attack at link place, the upstream of business support system, when DoS attack takes place, attack request demand processing system conduction downstream in the blocking-up of upstream link place from the normal running index of analysis user; thus the downstream key subsystem of business support system protected, the fail safe that has improved whole system; Simultaneously, with respect to publication number is the Chinese patent file of CN101136922, technical scheme of the present invention can be discerned normal users more accurately and handle request and unusual attack request, not only can prevent organized DoS (denial of service) attack that utilizes regular traffic to handle when request, can also limit the abnormal behaviour of malicious user.
2, be the Chinese patent file of CN101136922 with respect to publication number, the threshold values of " user handles the behavioral indicator counter " among the present invention can be provided with as the case may be flexibly, so this method is increased sharply and can be supported provisional normal users use amount.
Embodiment
Embodiment one
The method that the anti-DoS (denial of service) of Ying Yetingjiekou attacks on the telecommunications network:
1, within one day, when the user logins online business hall for the first time, if password is by checking, then interface produces a session random code, the session random code is transmitted back to client, and preserves the random code of telephone number (user ID) and correspondence, and set up this user handle the index counter.
2, the session random code that the first step produces is preserved in online website, business hall (client of business support system) during session, when the each transacting business of user, random code is sent the service request of calling relevant business handling service routine as parameter to interface.
When 3, interface is received the random code that the second step client transmits, find this user's index counter, add 1 operation, handle the index threshold values, then refuse this request call follow-up service if rolling counters forward surpasses according to telephone number; If do not surpass threshold values, then find the session random code of preservation according to telephone number, the random code that transmits and the session random code of preservation are compared, then allow it to call corresponding business transact services program as unanimity, otherwise refuse this request call follow-up service.
4, after one day finishes, remove all index counters.
Wherein, the index counter reads the data-base recording field value realization that writes the respective user telephone number by program; The index counter can be realized removing in the delete database record; The index threshold values is a value that can be provided with, and can draw by the behavioural analysis to normal users, is no more than certain number of times as normal users business handling total amount within a day, handles a certain business and is no more than certain number of times.
Embodiment two
The method that side anti-DoS (denial of service) in website, business hall attacks on the telecommunications network:
1, within one day, when the user logins online business hall for the first time, handles the index counter according to what telephone number (user ID) was set up this user.
2, when the each transacting business of user, find this user's index counter according to telephone number, add 1 operation, if surpassing, rolling counters forward handles index counter threshold values, then refuse the interface service of this request call telecom business support system; If do not surpass threshold values, then allow this request by interface interchange corresponding business transact services program.
3, after one day finishes, remove all index counters.
Wherein, the index counter reads the data-base recording field value realization that writes the respective user telephone number by program; The index counter can be realized removing in the delete database record; The index threshold values is a value that can be provided with, and can draw by the behavioural analysis to normal users, is no more than certain number of times as normal users business handling total amount within a day, handles a certain business and is no more than certain number of times.
Practice by embodiment one and embodiment two, effectively limited the abnormal user behavior, prevented that malicious persons from initiating the abnormal load that a large amount of service request causes system by the approach of online business hall, effectively blocked attack, abnormal behaviour conducts to business support system downstream link.
Embodiment 3
A kind of method of preventing Dos aggression of business support system, when the user initiates the business handling request, in the upstream link of handling with the business support system request, use user ID to generate the user and handle the behavioral indicator counter, in a count cycle, when the user handles once business by business support system, first user with correspondence handles the behavioral indicator counter and carries out counting operation, handling the behavior threshold values with the user again compares, if having surpassed threshold values, rolling counters forward allows, then, do not allow, then allow this service request to continue to handle in the downstream of business support system link if surpass threshold values in this link blocking-up service request; Perhaps also can be earlier and the user handle the behavior threshold values and compare, if the super threshold values of rolling counters forward allows, then in this link blocking-up service request, allow again user with correspondence to handle the behavioral indicator counter to carry out counter if surpass threshold values, and allow this service request to continue to handle in the downstream of business support system link; The user handles the behavioral indicator counter and carries out zero clearing when the new count cycle begins, put number or reconstruction.Described user handles behavior and is meant the user from initiating service request to business support system, managing business request of business support system, and result fed back to user's overall process, counter can be counted in any link of this process.The upstream link that described business support system request is handled is meant when the user initiates the business handling request, each link of system is handled the business handling request according to certain sequencing, the link of the relative reprocessing of handling earlier of link is called the upstream link, concerning whole system, be in the user and ask to handle front end, the link that user's request is handled is the upstream link earlier.As the online business hall part of telecom operators, website and interface are the upstream links, the Business Processing service of business support system, and database, the correlation subsystem that Business Processing is connected is the downstream link.Described counter is meant the user is handled up counter or the subtract counter that behavior is counted, and can realize by hardware or software.The described count cycle is meant to begin to count down at counter and rebuilds or time period of zero clearing, and this time period can be set to one minute, one hour, one day, a week or January or the like.The user of described correspondence handles the behavioral indicator counter, is meant by can be unique to user ID conditions such as telephone number, ID card No., Bank Account Number, Alipay ID, email addresses determining that this client's handles the behavioral indicator counter.Described counting operation is meant the working method according to counter, to the add deduct operation of fixed value of counter.As to up counter, add fixed value (as adding 1) operation; To subtract counter, then subtract fixed value (as subtracting 1) operation.Described user handles the behavior threshold values and is meant that one is normally handled a relevant numerical value of behavior with the user.This threshold values can draw by the behavior of normally handling of analysis user, and as in the online business hall of telecom operators, the number of times that normal users was handled in a day is no more than 50 times, and the number of times of one hour transacting business is no more than 30 times, or the like.In actual applications, can draw this threshold values by some simple calculations according to the working method of counter.For example, to up counter, can be handled the metered valve value day 50 or 60 (being 50+10) are set; To subtract counter, threshold values can be made as 0, use to put to count in the new count cycle and realize the effect identical with up counter.Described rolling counters forward has surpassed threshold values and has allowed, be meant that counter carries out counting operation after, count value has departed from normal range (NR), to up counter, departs from for greater than threshold values is set, and to subtract counter, departs from for less than scope is set.Described user handles the behavioral indicator counter and carries out zero clearing when the new count cycle begins, put number or reconstruction, be meant in the new count cycle, system handles the user of previous cycle user correspondence the behavioral indicator counter O reset, puts number, or counter removed, rebulid new counter, make counter can restart counting.To up counter, generally use the method for zero clearing, to subtract counter, the general several method of putting of using.The method of rebuilding all can be used the addition subtract counter, and the time of reconstruction can be after going up the one-period end, also can be the moment that needs to set up counter in the new count cycle.

Claims (10)

1, a kind of method of preventing Dos aggression of business support system, it is characterized in that: when the user initiates the business handling request, in the upstream link of handling with the business support system request, use user ID to generate the user and handle the behavioral indicator counter, in a count cycle, when the user handles once business by business support system, first user with correspondence handles the behavioral indicator counter and carries out counting operation, handling the behavior threshold values with the user again compares, if having surpassed threshold values, rolling counters forward allows, then, do not allow, then allow this service request to continue to handle in the downstream of business support system link if surpass threshold values in this link blocking-up service request; Perhaps also can be earlier and the user handle the behavior threshold values and compare, if the super threshold values of rolling counters forward allows, then in this link blocking-up service request, allow again user with correspondence to handle the behavioral indicator counter to carry out counter if surpass threshold values, and allow this service request to continue to handle in the downstream of business support system link; The user handles the behavioral indicator counter and carries out zero clearing when the new count cycle begins, put number or reconstruction.
2, the method for a kind of preventing Dos aggression of business support system according to claim 1, it is characterized in that: described user handles behavior and is meant that the user is from initiating service request to business support system, the business support system request of managing business, and result fed back to user's overall process, counter can be at any link counting of this process.
3, the method for a kind of preventing Dos aggression of business support system according to claim 1, it is characterized in that: the upstream link that described business support system request is handled is meant when the user initiates the business handling request, each link of system is handled the business handling request according to sequencing, the link of the relative reprocessing of handling earlier of link is called the upstream link, concerning whole system, be in the user and ask to handle front end, the link that user's request is handled is the upstream link earlier.
4, the method for a kind of preventing Dos aggression of business support system according to claim 1 is characterized in that: described counter is meant the user is handled up counter or the subtract counter that behavior is counted.
5, the method for a kind of preventing Dos aggression of business support system according to claim 1, it is characterized in that: the described count cycle, be meant to begin to count down to and rebuild or time period of zero clearing that this time period can be set to one minute, one hour, one day, a week or January at counter.
6, the method for a kind of preventing Dos aggression of business support system according to claim 1 is characterized in that: the user of described correspondence handles the behavioral indicator counter, is meant by can be unique to the user ID condition determining that this client's handles the behavioral indicator counter.
7, the method for a kind of preventing Dos aggression of business support system according to claim 1 is characterized in that: described counting operation is meant the working method according to counter, to the add deduct operation of fixed value of counter.
8, the method for a kind of preventing Dos aggression of business support system according to claim 1 is characterized in that: described user handles the behavior threshold values and is meant that one is normally handled a relevant numerical value of behavior with the user.
9, the method for a kind of preventing Dos aggression of business support system according to claim 1, it is characterized in that: described rolling counters forward has surpassed threshold values and has allowed, after being meant that counter carries out counting operation, count value has departed from normal range (NR), to up counter, depart from for greater than threshold values is set,, depart from for less than scope is set subtract counter.
10, the method for a kind of preventing Dos aggression of business support system according to claim 1, it is characterized in that: described user handles the behavioral indicator counter and carries out zero clearing when the new count cycle begins, put number or reconstruction, be meant in the new count cycle, system handles the user of previous cycle user correspondence the behavioral indicator counter O reset, puts number, or counter removed, rebulid new counter, make counter can restart counting.
CN2008101477277A 2008-11-28 2008-11-28 Method for preventing Dos aggression of business support system Active CN101415000B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101477277A CN101415000B (en) 2008-11-28 2008-11-28 Method for preventing Dos aggression of business support system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101477277A CN101415000B (en) 2008-11-28 2008-11-28 Method for preventing Dos aggression of business support system

Publications (2)

Publication Number Publication Date
CN101415000A true CN101415000A (en) 2009-04-22
CN101415000B CN101415000B (en) 2012-07-11

Family

ID=40595313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101477277A Active CN101415000B (en) 2008-11-28 2008-11-28 Method for preventing Dos aggression of business support system

Country Status (1)

Country Link
CN (1) CN101415000B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827080A (en) * 2010-02-04 2010-09-08 蓝盾信息安全技术股份有限公司 Method for blocking network attacks and device
CN104239758A (en) * 2013-06-13 2014-12-24 阿里巴巴集团控股有限公司 Man-machine identification method and system
CN107104926A (en) * 2016-02-22 2017-08-29 华为技术有限公司 Attack guard system, method, device and the network equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7308714B2 (en) * 2001-09-27 2007-12-11 International Business Machines Corporation Limiting the output of alerts generated by an intrusion detection sensor during a denial of service attack
US20070245417A1 (en) * 2006-04-17 2007-10-18 Hojae Lee Malicious Attack Detection System and An Associated Method of Use
CN101102323B (en) * 2007-08-09 2011-04-20 华为技术有限公司 Method and device for preventing DOS attack

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827080A (en) * 2010-02-04 2010-09-08 蓝盾信息安全技术股份有限公司 Method for blocking network attacks and device
CN104239758A (en) * 2013-06-13 2014-12-24 阿里巴巴集团控股有限公司 Man-machine identification method and system
US10356114B2 (en) 2013-06-13 2019-07-16 Alibaba Group Holding Limited Method and system of distinguishing between human and machine
CN107104926A (en) * 2016-02-22 2017-08-29 华为技术有限公司 Attack guard system, method, device and the network equipment
CN107104926B (en) * 2016-02-22 2019-10-18 华为技术有限公司 Attack guard system, method, apparatus and the network equipment

Also Published As

Publication number Publication date
CN101415000B (en) 2012-07-11

Similar Documents

Publication Publication Date Title
Mbelli et al. Cyber security, a threat to cyber banking in South Africa: an approach to network and application security
Olasanmi Computer crimes and counter measures in the Nigerian banking sector
JP6438534B2 (en) System and method for performing secure online banking transactions
CN101969445B (en) Method and device for defensing DDoS (Distributed Denial of Service) and CC (Connections Flood) attacks
CN101706937A (en) Method and system for monitoring electronic bank risks
Gao et al. Information security investment when hackers disseminate knowledge
More et al. Online banking and cyber-attacks: the current scenario
CN106549980A (en) A kind of malice C&C server determines method and device
CN100557545C (en) A kind of method of distinguishing the harmful program behavior
CN108369541A (en) The system and method for threat risk score for security threat
CN101415000B (en) Method for preventing Dos aggression of business support system
CN107888576B (en) Anti-collision library safety risk control method using big data and equipment fingerprints
Kloba et al. CYBER THREATS OF THE BANKING SECTOR IN THE CONDITIONS OF THE WAR IN UKRAINE.
Pasricha et al. Electronic crime in Indian banking
CN101453363A (en) Network intrusion detection system
EP4068125B1 (en) Method of monitoring and protecting access to an online service
KR20190007697A (en) System for detectig time-series improper action on the basis of network bandwidth
Sijan et al. A review on e-banking security in Bangladesh: An empirical study
Gorton Using incident response trees as a tool for risk management of online financial services
Etsebeth Defining the current corporate IT risk landscape
Gorton Modeling fraud prevention of online services using incident response trees and value at risk
Umejiaku et al. An Overview of Social Media Related Cybercrimes and Its Legal Remedy
Opara et al. The relative frequency of reported cases by information technology professionals of breaches on security defenses
Emeksiz et al. Ransomware as an Imminent and Destructive Cyber-Threat of the Digital World
Mohammed Application of deep learning in fraud detection in payment systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant