CN106686264B - Fraud telephone screening and analyzing method and system - Google Patents

Fraud telephone screening and analyzing method and system Download PDF

Info

Publication number
CN106686264B
CN106686264B CN201610965273.9A CN201610965273A CN106686264B CN 106686264 B CN106686264 B CN 106686264B CN 201610965273 A CN201610965273 A CN 201610965273A CN 106686264 B CN106686264 B CN 106686264B
Authority
CN
China
Prior art keywords
calling
parameter
model
numbers
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610965273.9A
Other languages
Chinese (zh)
Other versions
CN106686264A (en
Inventor
万辛
李鹏
张震
安茂波
刘振业
侯伟
高圣翔
黄远
杨晶超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Computer Network and Information Security Management Center
Original Assignee
National Computer Network and Information Security Management Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Computer Network and Information Security Management Center filed Critical National Computer Network and Information Security Management Center
Priority to CN201610965273.9A priority Critical patent/CN106686264B/en
Publication of CN106686264A publication Critical patent/CN106686264A/en
Application granted granted Critical
Publication of CN106686264B publication Critical patent/CN106686264B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it

Abstract

The invention belongs to the technical field of monitoring of harmful telephones in telecommunication, and particularly relates to a fraud telephone screening and analyzing method and system. The system analyzes historical data by utilizing a fraud telephone analysis model, and determines each characteristic weight value of the model; and analyzing and detecting the real-time data, and comparing the detection result with a set threshold value to give the confidence level of the fraud call. The whole system consists of a data query management system, a real-time detection system, a model self-learning system, a trend prediction system and a data storage system. The data query management system provides functions of whole ticket query, fraud ticket query, model parameter management, self-learning management and trend prediction analysis. The real-time detection system analyzes and detects the ticket data in real time through a fraud call discovery model to discover fraud calls. The model self-learning system analyzes the historical ticket data and continuously optimizes the model parameters through a self-learning algorithm. The trend prediction system provides prediction of future fraud phone trends and changes. The data storage system adopts a distributed storage system, and the big data analysis processing engine provides the functions of fast data capture, data distribution and data query for the whole system.

Description

Fraud telephone screening and analyzing method and system
Technical Field
The invention belongs to the technical field of monitoring of harmful telephones in telecommunication, and particularly relates to a fraud telephone screening and analyzing method and system.
Background
At present, the fraud telephone discovery of the telecommunication network mainly depends on the analysis of typical call patterns, such as 'one sound', 'you killed', 'counterfeit numbers', and the like, and the classification comparison analysis is carried out on specific call patterns. The analysis technology can only aim at specific typical call modes, but the harmful call types of the current telecommunication network are endless, the means are continuously updated and changed, and automatic analysis and identification cannot be realized.
Disclosure of Invention
Aiming at the characteristic that the harmful calling means are continuously changed, the invention provides a fraud telephone screening and analyzing method and system in order to make up for the defect that the harmful telephone cannot be automatically identified.
A fraud telephone screening and analyzing method comprises primary screening and secondary screening, wherein suspected numbers of fraud telephones are obtained through the primary screening and the secondary screening;
the preliminary screening includes the steps of,
obtaining the calling history of at least one analyzed number in time T from a communication server;
calculating calling frequency parameters M1 and calling time interval parameters M2 of each analyzed number within time t; calling call duration parameter M3, counterfeit times parameter M4 and calling number feature M5;
a calling frequency weight Q1, a calling time interval weight Q2; calling call duration weight Q3, mock times weight Q4, calling number feature weight Q5, the calling frequency parameter M1 and the calling time interval parameter M2; combining the calling call duration parameter M3, the counterfeit times parameter M4 and the calling number feature M5 to generate a primary screening analysis model M of each telephone, which is M1Q1+ M2Q2+ M3Q3+ M4Q4+ M5Q 5;
comparing the primary screening analysis model with a primary comparison value K, marking the telephone as a primary suspicious telephone number when M is larger than K, and marking the telephone as a common telephone number when M is less than or equal to K;
the secondary screening step comprises the steps of,
acquiring the called history of the suspicious number within the time T from a communication server;
extracting called number characteristic parameters M6, called relation network characteristic parameters M7 and called type characteristic parameters M8 of the suspicious telephone numbers screened out primarily;
substituting called number feature weight Q6, called number relational network analysis feature weight Q7 and called type feature weight Q8 into the called number feature weight M6, called relational network feature weight M7 and called type feature weight M8 to obtain a secondary screening analysis model M which is M6Q6+ M7Q7+ M8Q 8;
and comparing the secondary analysis model m with a secondary comparison value k, marking as a fraud call when m is larger than k, and re-acquiring the call records of the number in other time periods as a key monitoring number when m is less than or equal to k, and repeating the screening steps.
Further, in the above-mentioned case,
the calculation method of the calling frequency parameter M1 is that the analyzed number multiplies the frequency parameter T1 by all the calling times R1 within the time T, that is, M1 is R1T 1;
the calling time interval parameter M2 is calculated by multiplying the sum of all calling time intervals R2 of analyzed numbers in time T by an interval parameter T2, namely M2-R2T 2;
the calculation method of the calling call duration parameter M3 is that the sum of all calling call times of the analyzed number within the time T is R3 times the call parameter T3, that is, M3 is R3T 3;
the calculation method of the calling counterfeit times parameter M4 is that the counterfeit times R4 of all calling users of the analyzed number in the time T multiply the interval parameter T4, namely M4 is R4T 4;
further, the method for obtaining the weight comprises the following steps:
and (3) assuming a blacklist set B in a data set E and a whitelist set W in the set E, respectively calculating the set B and the set W by using each model, and obtaining the proportion of the number conforming to a model MX in the list, wherein X is {1,2,3,4,5 }. The ratio BX of the number corresponding to the model MX in the set B, the ratio WX of the number corresponding to the model MX in the set W, and the respective model weights QX — WX.
Further, K ═ Σ BX- Σ WX.
Further, the method for acquiring the calling number features M5 includes classifying calling numbers according to number lengths, assuming that a number length set L is { L1, L2 … … LN }, Li belongs to L, obtaining nm 'from the front Li-2 bits of the number nm, classifying the numbers with different calling numbers nm and the same nm' into hundred-segment numbers, and so on, classifying the numbers with the same front Li-3 bits into thousand-segment numbers, and classifying the numbers with the same front Li-4 bits into ten thousand-segment numbers.
An apparatus adopting the above fraud call screening method, the apparatus comprising:
the acquisition module is used for acquiring data of number call times and time records from an operator server;
the storage module is used for storing the call records of the obtained numbers and the data of the call times;
the extraction module is used for extracting calling frequency parameters M1 and calling time interval parameters M2 from the stored data; a calling call duration parameter M3, a counterfeit number parameter M4, a calling number feature M5, a called number feature weight Q6, a called number relational network analysis feature weight Q7 and a called type feature weight Q8;
a primary calculation module for calculating M ═ M1Q1+ M2Q2+ M3Q3+ M4Q4+ M5Q 5;
the primary comparison module is used for comparing the values of M and K to obtain a primary suspicious telephone number;
a secondary calculation module for calculating M ═ M6Q6+ M7Q7+ M8Q 8;
and the secondary comparison module is used for comparing the values of m and k to obtain the suspicious telephone number.
The system analyzes historical data by utilizing a fraud telephone analysis model, and determines each characteristic weight value of the model; and analyzing and detecting the real-time data, and comparing the detection result with a set threshold value to give the confidence level of the fraud call. The whole system consists of a data query management system, a real-time detection system, a model self-learning system, a trend prediction system and a data storage system. The data query management system provides functions of whole ticket query, fraud ticket query, model parameter management, self-learning management and trend prediction analysis. The real-time detection system analyzes and detects the ticket data in real time through a fraud call discovery model to discover fraud calls. The model self-learning system analyzes the historical ticket data and continuously optimizes the model parameters through a self-learning algorithm. The trend prediction system provides prediction of future fraud phone trends and changes. The data storage system adopts a distributed storage system, and the big data analysis processing engine provides the functions of fast data capture, data distribution and data query for the whole system.
Detailed Description
The technical solutions of the present invention will be described clearly and completely below, and it should be apparent that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., indicate orientations and positional relationships shown, are merely used for convenience in describing the present invention and simplifying the description, and do not indicate or imply that the system or element referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
An embodiment of the present invention.
A fraud telephone screening and analyzing method comprises primary screening and secondary screening, wherein suspected numbers of fraud telephones are obtained through the primary screening and the secondary screening;
the preliminary screening includes the steps of,
obtaining the calling history of at least one analyzed number in time T from a communication server;
calculating calling frequency parameters M1 and calling time interval parameters M2 of each analyzed number within time t; calling call duration parameter M3, counterfeit times parameter M4 and calling number feature M5;
a calling frequency weight Q1, a calling time interval weight Q2; calling call duration weight Q3, mock times weight Q4, calling number feature weight Q5, the calling frequency parameter M1 and the calling time interval parameter M2; combining the calling call duration parameter M3, the counterfeit times parameter M4 and the calling number feature M5 to generate a primary screening analysis model M of each telephone, which is M1Q1+ M2Q2+ M3Q3+ M4Q4+ M5Q 5;
comparing the primary screening analysis model with a primary comparison value K, marking the telephone as a primary suspicious telephone number when M is larger than K, and marking the telephone as a common telephone number when M is less than or equal to K;
the secondary screening step comprises the steps of,
acquiring the called history of the suspicious number within the time T from a communication server;
extracting called number characteristic parameters M6, called relation network characteristic parameters M7 and called type characteristic parameters M8 of the suspicious telephone numbers screened out primarily;
substituting called number feature weight Q6, called number relational network analysis feature weight Q7 and called type feature weight Q8 into the called number feature weight M6, called relational network feature weight M7 and called type feature weight M8 to obtain a secondary screening analysis model M which is M6Q6+ M7Q7+ M8Q 8;
and comparing the secondary analysis model m with a secondary comparison value k, marking as a fraud call when m is larger than k, and re-acquiring the call records of the number in other time periods as a key monitoring number when m is less than or equal to k, and repeating the screening steps.
Further, in the above-mentioned case,
the calculation method of the calling frequency parameter M1 is that the analyzed number multiplies the frequency parameter T1 by all the calling times R1 within the time T, that is, M1 is R1T 1;
the calling time interval parameter M2 is calculated by multiplying the sum of all calling time intervals R2 of analyzed numbers in time T by an interval parameter T2, namely M2-R2T 2;
the calculation method of the calling call duration parameter M3 is that the sum of all calling call times of the analyzed number within the time T is R3 times the call parameter T3, that is, M3 is R3T 3;
the calculation method of the calling counterfeit times parameter M4 is that the counterfeit times R4 of all calling users of the analyzed number in the time T multiply the interval parameter T4, namely M4 is R4T 4;
further, the method for obtaining the weight comprises the following steps:
and (3) assuming a data set E, a blacklist set B in the set E and a white list set W in the set E, and respectively calculating the set B and the set W by using each model to obtain the proportion of the number conforming to a model MX in the list, wherein X is {1,2,3,4,5 }. The ratio BX of the number corresponding to the model MX in the set B, the ratio WX of the number corresponding to the model MX in the set W, and the respective model weights QX — WX.
Further, K ═ Σ BX-∑WX
Further, the method for acquiring the calling number features M5 includes classifying calling numbers according to number lengths, assuming that a number length set L is { L1, L2 … … LN }, Li belongs to L, obtaining nm 'from the front Li-2 bits of the number nm, classifying the numbers with different calling numbers nm and the same nm' into hundred-segment numbers, and so on, classifying the numbers with the same front Li-3 bits into thousand-segment numbers, and classifying the numbers with the same front Li-4 bits into ten thousand-segment numbers.
An apparatus adopting the above fraud call screening method, the apparatus comprising:
the acquisition module is used for acquiring data of number call times and time records from an operator server;
the storage module is used for storing the call records of the obtained numbers and the data of the call times;
the extraction module is used for extracting calling frequency parameters M1 and calling time interval parameters M2 from the stored data; a calling call duration parameter M3, a counterfeit number parameter M4, a calling number feature M5, a called number feature weight Q6, a called number relational network analysis feature weight Q7 and a called type feature weight Q8;
a primary calculation module for calculating M ═ M1Q1+ M2Q2+ M3Q3+ M4Q4+ M5Q 5;
the primary comparison module is used for comparing the values of M and K to obtain a primary suspicious telephone number;
a secondary calculation module for calculating M ═ M6Q6+ M7Q7+ M8Q 8;
and the secondary comparison module is used for comparing the values of m and k to obtain the suspicious telephone number.
The system analyzes historical data by utilizing a fraud telephone analysis model, and determines each characteristic weight value of the model; and analyzing and detecting the real-time data, and comparing the detection result with a set threshold value to give the confidence level of the fraud call. The whole system consists of a data query management system, a real-time detection system, a model self-learning system, a trend prediction system and a data storage system. The data query management system provides functions of whole ticket query, fraud ticket query, model parameter management, self-learning management and trend prediction analysis. The real-time detection system analyzes and detects the ticket data in real time through a fraud call discovery model to discover fraud calls. The model self-learning system analyzes the historical ticket data and continuously optimizes the model parameters through a self-learning algorithm. The trend prediction system provides prediction of future fraud phone trends and changes. The data storage system adopts a distributed storage system, and the big data analysis processing engine provides the functions of fast data capture, data distribution and data query for the whole system.
The technical solutions described above only represent the preferred technical solutions of the present invention, and some possible modifications to some parts of the technical solutions by those skilled in the art all represent the principles of the present invention, and fall within the protection scope of the present invention.

Claims (4)

1. A fraud telephone screening and analyzing method is characterized by comprising primary screening and secondary screening, wherein suspected numbers of fraud telephones are obtained through the primary screening and the secondary screening;
the preliminary screening includes the steps of,
obtaining the calling history of at least one analyzed number in time T from a communication server;
calculating a calling frequency parameter M1, a calling time interval parameter M2, a calling call duration parameter M3, a counterfeit number parameter M4 and calling number characteristics M5 of each analyzed number within the time T;
combining the calling frequency weight Q1, the calling time interval weight Q2, the calling call duration weight Q3, the mock frequency weight Q4 and the calling number feature weight Q5 with the calling frequency parameter M1, the calling time interval parameter M2, the calling call duration parameter M3, the mock frequency parameter M4 and the calling number feature M5 to generate a primary screening analysis model M of each telephone number, which is M1Q1+ M2Q2+ M3Q3+ M4Q4+ M5Q 5;
comparing the primary screening analysis model with a primary comparison value K, marking the telephone number as a primary suspicious telephone number when M is larger than K, and marking the telephone number as a common telephone number when M is smaller than or equal to K;
the secondary screening step comprises the steps of,
acquiring the called history of the suspicious telephone numbers within the time T from the communication server;
extracting called number characteristic parameters M6, called relation network characteristic parameters M7 and called type characteristic parameters M8 of the suspicious telephone numbers screened out primarily;
substituting called number feature weight Q6, called number relational network analysis feature weight Q7 and called type feature weight Q8 into the called number feature weight M6, called relational network feature weight M7 and called type feature weight M8 to obtain a secondary screening analysis model M which is M6Q6+ M7Q7+ M8Q 8;
comparing the secondary analysis model m with a secondary comparison value k, marking as a fraud phone when m is larger than k, and re-acquiring call records of the phone number in other time periods as a key monitoring number when m is less than or equal to k, and repeating the screening steps;
the calculation method of the calling frequency parameter M1 is that the analyzed number multiplies the frequency parameter T1 by all the calling times R1 within the time T, that is, M1 is R1T 1;
the calling time interval parameter M2 is calculated by multiplying the sum of all calling time intervals R2 of analyzed numbers in time T by an interval parameter T2, namely M2-R2T 2;
the calculation method of the calling call duration parameter M3 is that the sum of all calling call times of the analyzed number within the time T is R3 times the call parameter T3, that is, M3 is R3T 3;
the calculation method of the counterfeit times parameter M4 is that the counterfeit times R4 of all calling parties of the analyzed number in the time T multiply the interval parameter T4, namely M4 is R4T 4;
the method for acquiring the weight of each model comprises the following steps:
assuming a data set E, a blacklist set B in the set E and a white list set W in the set E, respectively calculating the set B and the set W by using each model, and obtaining the proportion of numbers conforming to a model MX in a list, wherein X is {1,2,3,4,5 }; the ratio BX of the number corresponding to the model MX in the set B, the ratio WX of the number corresponding to the model MX in the set W, and the respective model weights QX — WX.
2. The fraud phone screening analysis method of claim 1, wherein the K ═ Σ BX- Σ WX.
3. The fraud phone screening analysis method of claim 2, wherein the calling number feature M5 obtaining method comprises classifying calling numbers by number length, assuming that the number length set L is { L1, L2 … … LN }, Li ∈ L, i is 1-N; the first Li-2 bits of the number nm are taken to obtain nm ', the numbers with different calling numbers nm and the same nm' are classified into hundreds of numbers, and so on, the numbers with the same first Li-3 bits are classified into thousands of numbers, and the numbers with the same first Li-4 bits are classified into thousands of numbers.
4. A system employing the fraud phone screening analysis method of claim 1, wherein the system comprises:
the acquisition module is used for acquiring data of number call times and time records from an operator server;
the storage module is used for storing the call records of the obtained numbers and the data of the call times;
the extraction module is used for extracting a calling frequency parameter M1, a calling time interval parameter M2, a calling call duration parameter M3, a counterfeit times parameter M4, a calling number feature M5, a called number feature weight Q6, a called number relational network analysis feature weight Q7 and a called type feature weight Q8 from the stored data;
a primary calculation module for calculating M ═ M1Q1+ M2Q2+ M3Q3+ M4Q4+ M5Q 5;
the primary comparison module is used for comparing the values of M and K to obtain a primary suspicious telephone number;
a secondary calculation module for calculating M ═ M6Q6+ M7Q7+ M8Q 8;
and the secondary comparison module is used for comparing the values of m and k to obtain the suspicious telephone number.
CN201610965273.9A 2016-11-04 2016-11-04 Fraud telephone screening and analyzing method and system Active CN106686264B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610965273.9A CN106686264B (en) 2016-11-04 2016-11-04 Fraud telephone screening and analyzing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610965273.9A CN106686264B (en) 2016-11-04 2016-11-04 Fraud telephone screening and analyzing method and system

Publications (2)

Publication Number Publication Date
CN106686264A CN106686264A (en) 2017-05-17
CN106686264B true CN106686264B (en) 2021-03-02

Family

ID=58839237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610965273.9A Active CN106686264B (en) 2016-11-04 2016-11-04 Fraud telephone screening and analyzing method and system

Country Status (1)

Country Link
CN (1) CN106686264B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107342986B (en) * 2017-06-20 2018-08-24 深圳安巽科技有限公司 A kind of fraudulent call early warning system and method for early warning
CN107770777B (en) * 2017-09-30 2020-12-25 杭州东信北邮信息技术有限公司 Method for identifying recorded fraud calls
CN109756901A (en) * 2017-11-06 2019-05-14 中国电信股份有限公司 Anti- swindle method and apparatus
CN108156333A (en) * 2018-02-01 2018-06-12 天津市国瑞数码安全系统股份有限公司 A kind of control system for preventing swindle
CN108156336A (en) * 2018-02-01 2018-06-12 天津市国瑞数码安全系统股份有限公司 A kind of control system based on multiple features weighted model analysis ticket number
CN109379327A (en) * 2018-04-13 2019-02-22 国家计算机网络与信息安全管理中心 Based on manifold signaling list criticality analysis method and analysis system
CN108924333B (en) * 2018-06-12 2020-09-18 阿里巴巴集团控股有限公司 Fraud telephone identification method, device and system
CN109493882A (en) * 2018-11-04 2019-03-19 国家计算机网络与信息安全管理中心 A kind of fraudulent call voice automatic marking system and method
CN109510903B (en) * 2018-11-16 2020-08-11 杭州东信北邮信息技术有限公司 Method for identifying international fraud number
CN110059889B (en) * 2019-03-28 2021-05-28 国家计算机网络与信息安全管理中心 Fraud call sequence detection method based on unsupervised learning
CN110248322B (en) * 2019-06-28 2021-10-22 国家计算机网络与信息安全管理中心 Fraud group partner identification system and identification method based on fraud short messages
CN111915468B (en) * 2020-08-14 2021-09-10 中国科学院自动化研究所 Network anti-fraud active inspection and early warning system
CN113163057B (en) * 2021-01-20 2022-09-30 北京工业大学 Method for constructing dynamic identification interval of fraud telephone

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5970405A (en) * 1997-02-28 1999-10-19 Cellular Technical Services Co., Inc. Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint analysis
CN101217820A (en) * 2008-01-15 2008-07-09 中兴通讯股份有限公司 An identification system and identification method on disturbance telephone numbers
CN101257671A (en) * 2007-07-06 2008-09-03 浙江大学 Method for real time filtering large scale rubbish SMS based on content
CN102368853A (en) * 2011-09-26 2012-03-07 广州市动景计算机科技有限公司 Communication event processing method and system thereof
CN104038648A (en) * 2014-06-06 2014-09-10 陈伟 Method and device for recognizing crank calls
CN104243727A (en) * 2014-10-15 2014-12-24 上海欣方智能系统有限公司 System and method for performing big data analysis confirmation and interception on phone scams
CN104244216A (en) * 2014-09-29 2014-12-24 中国移动通信集团浙江有限公司 Method and system for intercepting fraud phones in real time during calling
CN104469025A (en) * 2014-11-26 2015-03-25 杭州东信北邮信息技术有限公司 Clustering-algorithm-based method and system for intercepting fraud phone in real time
CN104735671A (en) * 2015-02-27 2015-06-24 腾讯科技(深圳)有限公司 Malicious call recognition method and device
CN105611084A (en) * 2016-01-29 2016-05-25 中国联合网络通信集团有限公司 User fraud suspiciousness degree calculation method and suspiciousness degree calculation system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5970405A (en) * 1997-02-28 1999-10-19 Cellular Technical Services Co., Inc. Apparatus and method for preventing fraudulent calls in a wireless telephone system using destination and fingerprint analysis
CN101257671A (en) * 2007-07-06 2008-09-03 浙江大学 Method for real time filtering large scale rubbish SMS based on content
CN101217820A (en) * 2008-01-15 2008-07-09 中兴通讯股份有限公司 An identification system and identification method on disturbance telephone numbers
CN102368853A (en) * 2011-09-26 2012-03-07 广州市动景计算机科技有限公司 Communication event processing method and system thereof
CN104038648A (en) * 2014-06-06 2014-09-10 陈伟 Method and device for recognizing crank calls
CN104244216A (en) * 2014-09-29 2014-12-24 中国移动通信集团浙江有限公司 Method and system for intercepting fraud phones in real time during calling
CN104243727A (en) * 2014-10-15 2014-12-24 上海欣方智能系统有限公司 System and method for performing big data analysis confirmation and interception on phone scams
CN104469025A (en) * 2014-11-26 2015-03-25 杭州东信北邮信息技术有限公司 Clustering-algorithm-based method and system for intercepting fraud phone in real time
CN104735671A (en) * 2015-02-27 2015-06-24 腾讯科技(深圳)有限公司 Malicious call recognition method and device
CN105611084A (en) * 2016-01-29 2016-05-25 中国联合网络通信集团有限公司 User fraud suspiciousness degree calculation method and suspiciousness degree calculation system

Also Published As

Publication number Publication date
CN106686264A (en) 2017-05-17

Similar Documents

Publication Publication Date Title
CN106686264B (en) Fraud telephone screening and analyzing method and system
CN109615116B (en) Telecommunication fraud event detection method and system
CN106899435B (en) A kind of complex attack recognition methods towards wireless invasive detection system
CN110209820B (en) User identification detection method, device and storage medium
CN108471429A (en) A kind of network attack alarm method and system
CN111917574B (en) Social network topology model and construction method, user confidence and affinity calculation method and telecom fraud intelligent interception system
CN109168168B (en) Method for detecting international embezzlement
CN108133061A (en) A kind of swindle Stock discrimination system
CN105825129B (en) Malware discrimination method and system in a kind of converged communication
CN109359098A (en) A kind of dispatch data net behavior monitoring system and method
CN109816404B (en) Telecom fraud group clustering method and telecom fraud group clustering system based on DBSCAN algorithm
CN107092651B (en) Key character mining method and system based on communication network data analysis
CA3057037A1 (en) Systems and methods for anomaly or fraud detection
CN110493476A (en) A kind of detection method, device, server and storage medium
US20220224793A1 (en) Systems and methods of gateway detection in a telephone network
CN115378711A (en) Industrial control network intrusion detection method and system
CN114169438A (en) Telecommunication network fraud identification method, device, equipment and storage medium
US11115455B2 (en) Technique for monitoring activity in a content delivery network utilizing geohashing indexes
CN109963292B (en) Complaint prediction method, complaint prediction device, electronic apparatus, and storage medium
CN112084239B (en) Signaling network security mining analysis method based on big data feature model identification
CN116192520A (en) Secure communication management method and system based on big data
CN113055333B (en) Network flow clustering method and device capable of adaptively and dynamically adjusting density grid
CN115442133A (en) SOAR-based defense automation process arrangement method
Swarnkar et al. SpamDetector: Detecting spam callers in Voice over Internet Protocol with graph anomalies
CN114205462A (en) Fraud telephone identification method, device, system and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant