CN107193900A - A kind of identifying system and its application method of suspicious SMS - Google Patents

A kind of identifying system and its application method of suspicious SMS Download PDF

Info

Publication number
CN107193900A
CN107193900A CN201710327688.8A CN201710327688A CN107193900A CN 107193900 A CN107193900 A CN 107193900A CN 201710327688 A CN201710327688 A CN 201710327688A CN 107193900 A CN107193900 A CN 107193900A
Authority
CN
China
Prior art keywords
short message
suspicious
module
feedback
clouds
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710327688.8A
Other languages
Chinese (zh)
Inventor
邹福泰
王祺文
张成伟
俞汤达
李林森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CN201710327688.8A priority Critical patent/CN107193900A/en
Publication of CN107193900A publication Critical patent/CN107193900A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/335Filtering based on additional data, e.g. user or group profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a kind of identifying system of suspicious SMS, it is related to information security field, including receiving module, pretreatment module, comparison module and feedback module, the short message received is transferred to the pretreatment module and pre-processed by the receiving module, the pretreatment module pre-processes to short message and is transferred to the comparison module, the number of the text feature of the short message received and transmission short message is compared and sends comparative result to the feedback module by the comparison module with deep learning model, the feedback module is fed back according to the comparative result of the comparison module to user.The present invention provides a kind of algorithm reliably, and recognition speed is fast, and Sample Storehouse updates the identifying system and its application method of timely suspicious SMS, in order to which cellphone subscriber recognizes fraud text message in time, reduces cheated risk.

Description

A kind of identifying system and its application method of suspicious SMS
Technical field
The present invention relates to information security field, identifying system and its user more particularly, to a kind of suspicious SMS Method.
Background technology
Mobile phone has been the indispensable instrument of people's daily life, is unequal in this case using the thing number of short message fraud Number, and also have the impetus further expanded.
Currently for fraud text message, domestic well-known safe mobile phone manufacturer is substantially simple right using database progress Than, or only with simple machine learning recognize fraud text message.But the preventing mobile phone swindle system means list used at present One, it is impossible to be effectively protected user.Meanwhile, current preventing mobile phone swindle system can not be updated in time, it is impossible to obtain newest Fraud information.
The content of the invention
Reliable the present invention solves the technical problem of a kind of algorithm is provided, recognition speed is fast, and Sample Storehouse updates timely Suspicious SMS identifying system and its application method, in order to which cellphone subscriber recognizes fraud text message in time, reduction is taken advantage of The risk deceived.
In order to solve the above technical problems, the invention provides a kind of identifying system of suspicious SMS, it is characterised in that Including receiving module, pretreatment module, comparison module and feedback module, the short message received is transferred to described by the receiving module Pretreatment module is pre-processed, and the pretreatment module pre-processes to short message and is transferred to the comparison module, the comparison Module is by the text feature of the short message received and sends number and the deep learning model of short message and is compared and by comparative result Send to the feedback module, the feedback module is fed back according to the comparative result of the comparison module to user.
Further, the short message includes short message word and/or URL (Uniform Resource Locator, unified money Source finger URL).
Further, pretreatment of the pretreatment module to short message includes extracting the number for sending short message, extracts described Short message word and/or URL simultaneously generate characteristic vector.
Further, the comparison module includes local part and high in the clouds part, in use, first by short message and local part The suspicious sample of deep learning model be compared and judge, if it is determined that short message is suspicious short message, then further upload High in the clouds part is further detected, if it is determined that short message is normal short message, then it is normal to send short message to the feedback module As a result;The short message and the suspicious sample of high in the clouds deep learning model for uploading high in the clouds part are compared, if it is determined that short message is can Short message is doubted, then the comparison module sends the suspicious result of short message to the feedback module, if it is determined that short message is normal short message, Then the normal result of short message is sent to the feedback module;The high in the clouds part uses Spark algorithms.
Further, the feedback module receives the comparative result that the comparison module is sent, if normal short message, Then keep silent, wait next short message;If suspicious short message, then remind user that short message is labeled as into fraud text message.
There is provided a kind of application method of the identifying system of suspicious SMS in the better embodiment of the present invention, Including:Receive short message;Locally judge whether short message is suspicious short message in mobile phone, if locally judging short message as suspicious short message, High in the clouds is uploaded to determine whether and feed back to user;If being locally determined as normal short message, feedback-less, silence waits next Bar short message;The high in the clouds updates sample set according to the suspicious short message of upload, and the high in the clouds uses Spark algorithms;The short message bag Include short message word and/or URL.
Further, when the short message be short message word when, mobile phone locally judge short message whether be suspicious short message step Suddenly further comprise, extract the number and the short message word for sending short message, first compare the number and local depth for sending short message The suspicious sample of the suspicious sample of learning model, then the short message word and local deep learning model;If compared As a result it is yes, that is, judges short message as suspicious short message, and short message is uploaded into high in the clouds to determine whether;If it is judged that be it is no, Then feedback-less content, not to user feedback.
Further, what the short message uploaded to high in the clouds determines whether that step includes, relatively more described short message word and cloud The suspicious sample of deep learning model is held, if comparative result is yes, that is, short message is judged as suspicious short message, and sentenced to local feedback Disconnected result is that short message is suspicious short message, and reminds user's short message to be suspicious short message;If it is judged that being no, then in feedback-less Hold, not to user feedback.
Further, when the short message is URL, locally judge that the step of whether short message is suspicious short message enters one in mobile phone Step includes, and extracts the number and the URL for sending short message, first compares in the number and local deep learning model that send short message The suspicious sample of suspicious sample, the then URL and local deep learning model;If comparative result is yes, that is, judge Short message is suspicious short message, and short message is uploaded into high in the clouds determined whether;If it is judged that being no, then feedback-less, and i.e. not To user feedback content, keep silent and wait next short message to be received.
Further, what the short message uploaded to high in the clouds determines whether that step includes, relatively more described URL and high in the clouds depth The suspicious sample of learning model, if comparative result is yes, that is, judges short message as suspicious short message, and feeds back judged result to local It is suspicious short message for short message, and reminds user's short message to be suspicious short message;If it is judged that being no, then feedback-less content, no To user feedback.
Compared with prior art, the beneficial effects of the invention are as follows:The present invention has high expansibility, using Spark cloud meters Calculate, training pattern speed is greatly speeded up, can be by adding cheap calculate node improving performance, and expandability is strong.The module of algorithm Change, the processing of each several part neural network moduleization is easy to locally and remote interaction;Algorithm reliability, using deep learning algorithm, Automatic study sentence feature, webpage uses DBN, potential feature can be more excavated compared to shallow-layer algorithm.
The technique effect of the design of the present invention, concrete structure and generation is described further below with reference to accompanying drawing, with It is fully understood from the purpose of the present invention, feature and effect.
Brief description of the drawings
Fig. 1 is a kind of identifying system structural representation of the suspicious SMS of preferred embodiment of the invention;
Fig. 2 is a kind of identifying system application method schematic flow sheet of the suspicious SMS of preferred embodiment of the invention;
Fig. 3 is the identifying system application method flow signal of the suspicious SMS of another preferred embodiment of the invention Figure;
Fig. 4 is the identifying system application method flow signal of the suspicious SMS of another preferred embodiment of the invention Figure.
Embodiment
A kind of preferred embodiment of the identifying system of suspicious SMS of the present invention is done below in conjunction with accompanying drawing It is described in detail, but the present invention is not limited in the embodiment.Thoroughly understand in order that the public has to the present invention, in following hair Concrete details is described in detail in bright preferred embodiment.
Embodiment 1:
As shown in figure 1, a kind of identifying system of suspicious SMS, including receiving module, pretreatment module, comparison module And feedback module, the short message received is transferred to pretreatment module and pre-processed by receiving module, and pretreatment module is pre- to short message Handle and be transferred to comparison module, comparison module by the text feature of the short message received and send short message number and deep learning Model is compared and sends comparative result to feedback module, and feedback module enters according to the comparative result of comparison module to user Row feedback, wherein, short message includes short message word and/or URL.
Pretreatment of the pretreatment module to short message includes extracting the number for sending short message, extracts short message word and/or URL simultaneously Generate characteristic vector.
Comparison module includes local part and high in the clouds part, in use, first by short message and the deep learning mould of local part The suspicious sample of type is compared and judged, if it is determined that short message is suspicious short message, then further uploads to high in the clouds part and carries out Further detection, if it is determined that short message is normal short message, then sends the normal result of short message to feedback module;Upload high in the clouds part Short message and the suspicious sample of high in the clouds deep learning model be compared, if it is determined that short message is suspicious short message, then comparison module The suspicious result of short message is sent to feedback module, if it is determined that short message is normal short message, then it is normal to send short message to feedback module Result;High in the clouds part uses Spark algorithms.
Feedback module receives the comparative result of comparison module transmission, if normal short message, then keeps silent, under wait One short message;If suspicious short message, then remind user that short message is labeled as into fraud text message.
Embodiment 2:
As shown in Fig. 2 a kind of application method of the identifying system of suspicious SMS, including:
Step 100, short message is received, short message includes short message word and/or URL, into step S110;
Step S110, locally judges whether short message is suspicious short message in mobile phone, if locally judging short message as suspicious short message, Then enter step S400;If being locally determined as normal short message, into step S300;
Step S400, uploads to high in the clouds by suspicious short message and determines whether and feed back to user, wherein, high in the clouds is according to upload Suspicious short message update sample set, high in the clouds use Spark algorithms;
Step S300, feedback-less, silence waits next short message.
Embodiment 3:
As shown in figure 3, a kind of application method of the identifying system of suspicious SMS, including:
Step 100, short message is received, short message includes short message word, into step 200;
Step 200, the character features of short message are extracted and the number of short message is sent, into step 300;
Step 300, first compare the suspicious sample of the number and local deep learning model that send short message, then compare short message The suspicious sample of word and local deep learning model, if comparative result is yes, that is, judges that short message as suspicious short message, then enters Step 500;If it is judged that being no, then into step 400;
Step 400, feedback-less content, not to user feedback;
Step 500, suspicious short message is uploaded into high in the clouds, into step 600;
Step 600, the character features of short message and the suspicious sample of high in the clouds deep learning model are compared, into step 610;
Step 610, judge whether short message is suspicious according to comparative result, if yes then enter step 800, if otherwise entered Step 700;
Step 700, it is suspicious short message to remind user's short message;
Step 800, feedback-less, silence waits next short message.
Embodiment 4:
As shown in figure 4, a kind of application method of the identifying system of suspicious SMS, including:
Step 100, short message is received, short message includes URL, into step 200;
Step 200, extract the URL of short message and send the number of short message, into step 300;
Step 300, first compare the suspicious sample of the number and local deep learning model that send short message, then compare URL With the suspicious sample of local deep learning model, if comparative result is yes, that is, short message is judged as suspicious short message, then into step 500;If it is judged that being no, then into step 400;
Step 400, feedback-less content, not to user feedback;
Step 500, suspicious short message is uploaded into high in the clouds, into step 600;
Step S600, compares the URL of short message and the suspicious sample of high in the clouds deep learning model, into step 610;
Step 610, judge whether short message is suspicious according to comparative result, if yes then enter step 800, if otherwise entered Step 700;
Step 700, it is suspicious short message to remind user's short message;
Step 800, feedback-less, silence waits next short message.
In summary, the present invention has high expansibility, and using Spark cloud computings, training pattern speed is greatly speeded up, can By adding cheap calculate node improving performance, expandability is strong.The modularization of algorithm, at each several part neural network module Reason, is easy to locally and remote interaction;Algorithm reliability, using deep learning algorithm, automatic study sentence feature, webpage is used DBN, potential feature can be more excavated compared to shallow-layer algorithm.
Preferred embodiment of the invention described in detail above.It should be appreciated that one of ordinary skill in the art without Need creative work just can make many modifications and variations according to the design of the present invention.Therefore, all technologies in the art Personnel are available by logical analysis, reasoning, or a limited experiment on the basis of existing technology under this invention's idea Technical scheme, all should be in the protection domain being defined in the patent claims.

Claims (10)

1. a kind of identifying system of suspicious SMS, it is characterised in that including receiving module, pretreatment module, comparison module And feedback module, the short message received is transferred to the pretreatment module and pre-processed by the receiving module, the pretreatment Module pre-processes to short message and is transferred to the comparison module, and the comparison module is by the text feature of the short message received and transmission The number of short message is compared with deep learning model and sends comparative result to the feedback module, the feedback module root Fed back according to the comparative result of the comparison module to user.
2. the identifying system of suspicious SMS as claimed in claim 1, it is characterised in that the short message includes short message word And/or URL.
3. the identifying system of suspicious SMS as claimed in claim 2, it is characterised in that the pretreatment module is to short message Pretreatment include extracting the number for sending short message, extract the short message word and/or URL and generate characteristic vector.
4. the identifying system of suspicious SMS as claimed in claim 3, it is characterised in that the comparison module includes local Part and high in the clouds part, in use, first the suspicious sample of short message and the deep learning model of local part is compared and sentenced It is disconnected, if it is determined that short message is suspicious short message, then further uploads to high in the clouds part and further detected, if it is determined that short message is Normal short message, then send the normal result of short message to the feedback module;Upload the short message and high in the clouds deep learning of high in the clouds part The suspicious sample of model is compared, if it is determined that short message is suspicious short message, then the comparison module is sent out to the feedback module The result that short message is suspicious is sent, if it is determined that short message is normal short message, then the normal result of short message is sent to the feedback module;Institute State high in the clouds part and use Spark algorithms.
5. the identifying system of suspicious SMS as claimed in claim 4, it is characterised in that the feedback module receives institute The comparative result of comparison module transmission is stated, if normal short message, then keeps silent, waits next short message;If suspicious Short message, then remind user that short message is labeled as into fraud text message.
6. a kind of application method of the identifying system of suspicious SMS as any one of claim 1-5, its feature It is, including:
Receive short message;
Locally judge whether short message is suspicious short message in mobile phone;
If locally judging short message as suspicious short message, upload to high in the clouds and determine whether and feed back to user;
If being locally determined as normal short message, feedback-less, silence waits next short message;
The high in the clouds updates sample set according to the suspicious short message of upload, and the high in the clouds uses Spark algorithms;
The short message includes short message word and/or URL.
7. the application method of the identifying system of suspicious SMS as claimed in claim 6, it is characterised in that when the short message During for short message word, locally judge that the step of whether short message is suspicious short message further comprises in mobile phone, extract and send short message Number and the short message word, first compare the suspicious sample of the number and local deep learning model that send short message, then compare The suspicious sample of the short message word and local deep learning model;If comparative result is yes, that is, judge short message to be suspicious short Believe, and short message is uploaded into high in the clouds and determine whether;If it is judged that being no, then feedback-less content, not to user feedback.
8. the application method of the identifying system of suspicious SMS as claimed in claim 7, it is characterised in that in the short message That passes to high in the clouds determines whether that step includes, the suspicious sample of relatively more described short message word and high in the clouds deep learning model, such as Fruit comparative result is yes, that is, judges short message as suspicious short message, and is suspicious short message for short message to local feedback judged result, and is carried User's short message wake up for suspicious short message;If it is judged that being no, then feedback-less content, not to user feedback.
9. the application method of the identifying system of suspicious SMS as claimed in claim 6, it is characterised in that when the short message During for URL, locally judge that the step of whether short message is suspicious short message further comprises in mobile phone, extract send short message number and The URL, first compare send short message number and local deep learning model in suspicious sample, then the URL with The suspicious sample of local deep learning model;If comparative result is yes, that is, short message is judged as suspicious short message, and short message is uploaded Determined whether to high in the clouds;If it is judged that being no, then feedback-less, and i.e. not to user feedback content, keep silent and wait Next short message to be received.
10. the application method of the identifying system of suspicious SMS as claimed in claim 9, it is characterised in that the short message Upload to high in the clouds determines whether that step includes, relatively more described URL and high in the clouds deep learning model suspicious sample, if than Relatively result is yes, that is, judges short message as suspicious short message, and is suspicious short message for short message to local feedback judged result, and reminds use The family short message is suspicious short message;If it is judged that being no, then feedback-less content, not to user feedback.
CN201710327688.8A 2017-05-10 2017-05-10 A kind of identifying system and its application method of suspicious SMS Pending CN107193900A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710327688.8A CN107193900A (en) 2017-05-10 2017-05-10 A kind of identifying system and its application method of suspicious SMS

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710327688.8A CN107193900A (en) 2017-05-10 2017-05-10 A kind of identifying system and its application method of suspicious SMS

Publications (1)

Publication Number Publication Date
CN107193900A true CN107193900A (en) 2017-09-22

Family

ID=59872989

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710327688.8A Pending CN107193900A (en) 2017-05-10 2017-05-10 A kind of identifying system and its application method of suspicious SMS

Country Status (1)

Country Link
CN (1) CN107193900A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109982272A (en) * 2019-02-13 2019-07-05 北京航空航天大学 A kind of fraud text message recognition methods and device
CN110913353A (en) * 2018-09-17 2020-03-24 阿里巴巴集团控股有限公司 Short message classification method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104168548A (en) * 2014-08-21 2014-11-26 北京奇虎科技有限公司 Short message intercepting method and device and cloud server
CN104640092A (en) * 2015-01-27 2015-05-20 北京奇虎科技有限公司 Spam short message identifying method, client end, cloud server and system
CN105550374A (en) * 2016-01-29 2016-05-04 湖南大学 Random forest parallelization machine studying method for big data in Spark cloud service environment
CN105608512A (en) * 2016-03-24 2016-05-25 东南大学 Short-term load forecasting method
CN105740424A (en) * 2016-01-29 2016-07-06 湖南大学 Spark platform based high efficiency text classification method
CN106161209A (en) * 2016-07-21 2016-11-23 康佳集团股份有限公司 A kind of method for filtering spam short messages based on degree of depth self study and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104168548A (en) * 2014-08-21 2014-11-26 北京奇虎科技有限公司 Short message intercepting method and device and cloud server
CN104640092A (en) * 2015-01-27 2015-05-20 北京奇虎科技有限公司 Spam short message identifying method, client end, cloud server and system
CN105550374A (en) * 2016-01-29 2016-05-04 湖南大学 Random forest parallelization machine studying method for big data in Spark cloud service environment
CN105740424A (en) * 2016-01-29 2016-07-06 湖南大学 Spark platform based high efficiency text classification method
CN105608512A (en) * 2016-03-24 2016-05-25 东南大学 Short-term load forecasting method
CN106161209A (en) * 2016-07-21 2016-11-23 康佳集团股份有限公司 A kind of method for filtering spam short messages based on degree of depth self study and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110913353A (en) * 2018-09-17 2020-03-24 阿里巴巴集团控股有限公司 Short message classification method and device
CN110913353B (en) * 2018-09-17 2022-01-18 阿里巴巴集团控股有限公司 Short message classification method and device
CN109982272A (en) * 2019-02-13 2019-07-05 北京航空航天大学 A kind of fraud text message recognition methods and device
CN109982272B (en) * 2019-02-13 2020-08-28 北京航空航天大学 Fraud short message identification method and device

Similar Documents

Publication Publication Date Title
CN103634473B (en) Based on mobile phone method for filtering spam short messages and the system of Naive Bayes Classification
CN109005145B (en) Malicious URL detection system and method based on automatic feature extraction
CN103037339B (en) One kind is based on the short message filter method of " user's credit worthiness and short message spam degree "
CN110309304A (en) A kind of file classification method, device, equipment and storage medium
CN110727766B (en) Sensitive word detection method
CN107395352A (en) Personal identification method and device based on vocal print
CN103024746A (en) System and method for processing spam short messages for telecommunication operator
CN108111478A (en) A kind of phishing recognition methods and device based on semantic understanding
CN101257671A (en) Method for real time filtering large scale rubbish SMS based on content
CN106446877B (en) A kind of radio-frequency fingerprint feature extraction and recognition methods based on signal amplitude sequence
CN101150756A (en) A spam filtering method
CN103795612A (en) Method for detecting junk and illegal messages in instant messaging
CN107609103A (en) It is a kind of based on push away spy event detecting method
CN106713579A (en) Telephone number identification method and device
CN102170447A (en) Method for detecting phishing webpage based on nearest neighbour and similarity measurement
CN104284306A (en) Junk message filter method and system, mobile terminal and cloud server
CN107193900A (en) A kind of identifying system and its application method of suspicious SMS
Sahmoud et al. Spam detection using BERT
Hosseinpour et al. An ensemble learning approach for sms spam detection
CN107533574A (en) Email relationship finger system based on random index pattern match
CN107239504A (en) A kind of deep learning algorithm for being used to recognize fraud text message
CN113965377A (en) Attack behavior detection method and device
CN102946400A (en) Safety filtering method and system for mass short message content based on behavioural analysis
CN106899947A (en) Short message method for cleaning and device
CN116596274A (en) Police dispatch method, police dispatch equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170922

RJ01 Rejection of invention patent application after publication