CN108259688A - VoIP platforms telephone fraud behavioral value method, apparatus and detecting system - Google Patents
VoIP platforms telephone fraud behavioral value method, apparatus and detecting system Download PDFInfo
- Publication number
- CN108259688A CN108259688A CN201611235140.2A CN201611235140A CN108259688A CN 108259688 A CN108259688 A CN 108259688A CN 201611235140 A CN201611235140 A CN 201611235140A CN 108259688 A CN108259688 A CN 108259688A
- Authority
- CN
- China
- Prior art keywords
- voip
- platforms
- voip platforms
- call
- telephone fraud
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/006—Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
- H04M7/0078—Security; Fraud detection; Fraud prevention
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention relates to technical field of network security, more particularly to VoIP platforms telephone fraud behavioral value method and detecting system.The VoIP platform telephone fraud behavioral value methods of the present invention can be scanned Global IP addresses, obtain the information of wherein active VoIP platforms transmission, it is analyzed to identify by the call bill data for the voip network phone initiated these VoIP platforms, so as to judge whether VoIP platforms are useful for initiating telephone fraud behavior, convenient for investigating and prosecuting telephone fraud behavior overseas.For above-mentioned VoIP platforms telephone fraud behavioral value method, it can be combined into functional module construction by establishing function module, implemented by storing computer program in a computer-readable storage medium.Simultaneously the VoIP platforms telephone fraud behavioral value method is by with functional module construction, can the typing detecting system of computer program of implementing the functional module construction realize.
Description
Technical field
The present invention relates to technical field of network security, more particularly to VoIP platforms telephone fraud behavioral value method and detection
System.For VoIP platform telephone fraud behavioral value methods, function module structure can be combined by establishing function module
Frame is implemented by storing computer program in a computer-readable storage medium.
Background technology
VoIP, that is, networking telephone or IP phone refer to after the sound signal tying-in overcompression of simulation and package, with number
The communication mode of the transmission of speech sound signal is carried out in IP network according to the form of package.Since voip network phone can be in internet
The business such as voice free or that rate are very low, fax, video and data transmission are carried out under environment, are facilitating normal communication
Meanwhile but also the behavior swindled using voip network phone is frequently occurred.Swindling gang usually sets up VoIP server
Voip network telephone voice calls platform (abbreviation VoIP platforms) is built, by soft switch technology by network in VoIP platforms
The circuit access telephone network that data are provided through telecom operators is made a phone call outward.From these voip network phones overseas squeezed into
Incoming number is not often shown or number is made to be shown as the injured parties such as " 110 ", " 10086 ", " 95533 " by the number of changing software
Community service department or government offices' phone known and fully trust have very high duplicity.
If offender initiates voip network telephone fraud by the domestic VoIP platforms in China, the police cheat to phone
When the behavior of deceiving is investigated and prosecuted, the source of IP data packets can be found from the fraudulent call source that victim is connected to, so as to obtain
VoIP server physical address used in taking swindle molecule, investigates and prosecutes criminal offence.But some large size swindles now
Clique is often erected at VoIP server overseas, and the output port of VoIP platforms is domestic around China is directly connected to behind international port
Landing port, call data through multiple conversions rear access injured party's phone.This causes the VoIP from the access of landing port
The networking telephone is difficult to obtain true address overseas.The police mostly can only be after victim's alarm be received to telephone fraud behavior at present
It is investigated and prosecuted, however carries out the method for tracing to voip network phone at this stage complicated numerous to the progress of route switching layer by layer
After trivial analysis or the networking telephone can only be tracked in the domestic landing port in China, it is impossible to its true source overseas
It is effectively traced to the source, sizable difficulty is brought to investigation evidence obtaining work.
Invention content
It is an object of the invention to:Identification VoIP server is erected at telephone fraud behavior overseas.
For the voip network telephone fraud behavior initiated by VoIP platforms overseas, inventor expects to carry out reversely
Detection, is directly scanned the port for overseas sending out communication request within the border to China, VoIP platforms may wherein be connected by finding out
Port, then pass through the safety for the voip network phone that the acquired IP data packet analysis VoIP platforms are initiated.Therefore,
The present invention provides following VoIP platforms telephone fraud behavioral value method, including the following steps carried out successively:
Step S1:Global IP addresses are scanned, acquisition wherein enlivens IP address as VoIP platforms connectivity port;
Step S2:Pick takes the absolute address that the file of the VoIP platforms is stored;
Step S3:The absolute address stored from the file of the VoIP platforms downloads the call bill data of VoIP platforms;
Step S4:Whether the calling number for judging to breathe out in acquired call bill data is fraudulent call, if being judged as YES
Fraudulent call then judges that the VoIP platforms have and initiates telephone fraud behavior.
Global IP addresses can be scanned, obtained wherein by above-mentioned VoIP platforms telephone fraud behavioral value method
The information of active VoIP platforms transmission, is divided by the call bill data for the voip network phone initiated these VoIP platforms
Analysis confirms, so as to judge whether VoIP platforms are useful for initiating telephone fraud behavior, convenient for being carried out to telephone fraud behavior overseas
It investigates and prosecutes.
For above-mentioned VoIP platforms telephone fraud behavioral value method, function can be combined by establishing function module
Module frame is implemented by storing computer program in a computer-readable storage medium.
The VoIP platforms telephone fraud behavioral value method by with functional module construction, can typing implement the function
The detecting system of the computer program of module frame is realized.
Specific embodiment
The detecting system for VoIP platform telephone fraud behavioral values of the present embodiment includes scanning system, pick takes and is
System, download system and analysis system.Scanning system is in real time scanned Global IP addresses, provides and is wherein put down possibly as VoIP
The IP address of enlivening of platform connectivity port is given to pick and takes system, and pick takes system to realize data by establishing http protocol with VoIP platforms
Transmission be stably connected with, dig system is taken transmit these VoIP platforms information carry out pick take inspection after, positioning VoIP server
The absolute address of file storage is simultaneously sent to download system, and the transmitting data file that download system obtains download is to analysis system
Subsequent analysis is carried out, so as to identify the port for being connected with the VoIP platforms for initiating telephone fraud behavior, details are as follows.
Scanning system is in real time scanned Global IP addresses, sends out detection packet and communicates with from overseas being sent out within the border to China
The possibility of request does the IP address port communication of switching landing, then analyze the Meta data elements returned by IP address port,
Whether containing the information for being useful for identification VoIP platforms in the banner information such as intext, robots.txt file.Meta data elements
Refer to the label of entitled " meta " that is located in the html of website in head labels, be connected with the IP address port of VoIP platforms
Include the copyright information of VoIP platforms in Meta data elements, swindle molecule rents VoIP server and is intended merely to largely mass-send swindleness
Information is deceived, usually will not all carry out delete operation, therefore can be included in the information by Meta data elements to Meta data elements
The copyright informations of VoIP platforms judge that port is connected with VoIP platforms.To the situation that Intext information is analyzed and Meta numbers
It is similar according to member, in webpage html texts, it is understood that there may be some character strings about VoIP platform copyright informations, such as " Powered
By xxxx ", by identifying that intext can obtain these character strings, so as to identify whether port is connected with VoIP platforms.Net
The reptile for convenience that stands preferably captures web site contents, the Robots agreements of oneself can be all set, to the text of Robots agreements
File robots.txt is identified, if it find that wherein have " VOS " etc. for identifying the printed words of the release type of VoIP platforms,
It may determine that the port is connected with VoIP platforms.After as above identifying operation, it can filter out substantially and be connected with VoIP and put down
The port of platform, H.323 SIP further according to VoIP platforms, communication protocol carry out agreement to the VoIP platforms that these ports connect and lead to
Believe the confirmation of identification, the information such as server fields returned to VoIP platforms are analyzed, if the information returned includes
The version information of VOS2009V2.1.2.0 etc, it is possible to confirm that the port is connected with VoIP platforms.
After pick takes system to realize stable data transmission with VoIP platforms, pair database docked with VoIP platforms is tied
Structure query language sql sentences guess solution, database are made to occur another sentence of operation when parsing by " ..%c0%af " sentence
Behavior, so as to obtain the permission of database, then to VoIP platforms, distinctive structured query language sql libraries carry out technology note
Enter to attempt, so as to confirm traversal file permission sentence:http://url/..%c0%af..%c0%af..%c0%af..%
C0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..% c0%
Af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%afetc/passwd, so as to position VoIP clothes
The address that positioning obtains simultaneously is sent to download system by business device file storage absolute address.For above-mentioned traversal file can not be used
Rights statement carries out the VoIP platform databases that pick takes inspection, and pick takes system that can directly be dripped by the heart based on OpenSSL
Blood tracking OpenSSL distributed 64KB caching, will beyond the byte information of necessary range copy to caching in return again to it is slow
Content is deposited, so the information of VoIP platform internal memories content will be revealed with the speed of each 64KB, and pick takes system handle
The absolute address of VoIP server file storage positioned from the information of acquisition is supplied to download system.
If the absolute address that download system is stored according to VoIP server file obtains the VoIP platforms from database
Forms data is simultaneously sent to analysis system, and information of the analysis system in call bill data judges the network electricity that the VoIP platforms are initiated
Whether words communication is used for telephone fraud behavior.It is previously stored in the phone library of analysis system and is confirmed as being normal communication number
It white list and is confirmed as being the blacklist for pretending to be public security organs' fraudulent call.The call bill data that analysis system judgement currently obtains
In by the VoIP platforms exhalation calling number whether in white list or blacklist, if the calling number through the number of changing, it is right
Calling number after the number of changing is judged, if the calling number is not dealt in white list;If the calling number category
It is answered in blacklist number and by the user of called number, i.e., user has cheated risk, then sends out vigilant fraudulent call
It reminds, is reminded by short message, the modes such as call-on back by phone contact the user, the user is reminded to be vigilant the swindle row for pretending to be public security organs
For.
If the calling number is answered by user, and not in white and black list, then analysis system comparison should
Calling number and the similarity of each public security organs' division communication number, then according to the criterion of risk:Similarity is less than 60%
Then the calling number is low for the risk of fraudulent call, and higher than 80% calling number of similarity is high for the risk of fraudulent call,
Similarity exist for 60%~80% calling number be fraudulent call risk, need further to the calling number whether
Fraudulent call number to pretend to be public security organs is judged.If judge to obtain the calling number and all public affairs of analysis system storage
The similarity of inspection method division communication number is below 60%, then it is right number to judge the calling number, is not dealt with.If judge
It obtains the calling number and the similarity of one of public security organs' division communication number of analysis system storage reaches 60%, then sentence
The calling number of breaking is likely to be the fraudulent call number for pretending to be public security organs, further analyzes the call bill data of the calling number:
If the calling behavior of the calling number meets the characteristic rule of fraudulent call, as the time existing for the calling number is short and in short-term
Interior frequent exhalation, without or rare incoming call record, be judged as the calling number and belong to the fraudulent call number for pretending to be public security organs,
It is added into the blacklist in analysis system phone library;If can't judge whether the calling number belongs to the swindleness for pretending to be public security organs
Telephone number is deceived, then also needs to further judge by subsequent analysis method the safety of calling number call, so as to judge
Whether the VoIP platforms have the behavior for initiating fraudulent call.
In subsequent analysis, for calling number of the similarity more than 80%, it can be determined that the calling number is used for
It is higher to carry out the possibility that public security organs is pretended to be to swindle, therefore public security department directly carries out the calling number manual confirmation, and
The fraudulent call number of public security organs is pretended to be to be added in the blacklist in analysis system phone library being confirmed as being belonging to.For similar
The presence spent for 60%~80% is the calling number of the risk of fraudulent call, then need in the call bill data to called subscriber with
In the neighbouring period T of the calling number incoming call, for example, the same day, if having the number of changing for the number incoming call of public service number come into
Row judges.Two kinds of concrete analysis judgment methods are provided in the present embodiment:1. if in the neighbour called from user by the calling number
In the nearly time, for example there is the phone of calling number incoming call user that the other number of changing is local public security organs number on the same day, then can be with
Judgement be swindle molecule during public security organs is pretended to be to be swindled, victim to be replaced to transfer local police or other are related
The means of department gain the trust of victim by cheating, therefore may determine that the calling number belongs to the fraudulent call number for pretending to be public security organs
Code, is added into the blacklist in analysis system phone library;2. if in the neighbouring time called from user by the calling number
It is interior, for example, the same day have the number of changing be bank's customer service number calling number incoming call user phone, then may determine that be swindle molecule
Its bank account of deception victim goes wrong that victim is inveigled to carry out property transfer or victim is required to remit money
It Deng operation, therefore may determine that the calling number belongs to the fraudulent call number for pretending to be public security organs, be added into analysis system electricity
In the blacklist for talking about library.It is being in the similar time section of fraudulent call number incoming call for pretending to be public security organs by doubtful by user,
Whether there is the number of changing for public service number such as local public security organs number, the electricity of the calling number incoming call user of bank's customer service number
Words more accurately can identify telephone fraud behavior, so as to fulfill electricity overseas is erected to VoIP server for public security organ
Words fraudulent act more accurately identifies so that public security organ is more targeted to the investigation of fraudulent call.
For the user of the fraudulent call number incoming call of spoofed public security organs, analysis system sends disappearing comprising warning content
It ceases to client.Wherein, for mobile phone user, analysis system sends preset reminding short message automatically;For by fixed telephone user, analysis
The concurrent sending voice information of the automatic clawback of system.Warning content is mainly used for informing its phone for answering of user there are fraud risk,
Remind user:1) public security organs can adhere to principle written and face to face and case is handled, will not guide thing when handling case
Instigator is operated with banking terminal, more without so-called " secured account ";2) every public security organs of calling oneself will handle a case in the phone
And it is required that it is all swindle that citizen, which remit money to " secured account ", be connected to suspicious call not divulge any personal account to other side
It remits money with blindness, reports a case to the security authorities or dial 110 to local police station nearby rapidly.
If user and being judged as being the duration of call of the calling number for pretending to be public security organs' fraudulent call more than two minutes,
I.e. the user has probably had believed that swindle molecule, then analysis system sends out processing request signal, notify local police or
The department that person is responsible for carrying out fraudulent call investigation is handled.Be processed as can making relevant departments prevent in time user to
The behaviors such as molecule remittance are swindled, avoid user by financial losses, and actively swindle molecule can be investigated and prosecuted, raising is done
Case efficiency and accuracy.
By above-mentioned VoIP platforms telephone fraud behavioral value method, Global IP addresses can be scanned in real time, obtained
The information that wherein active VoIP platforms is taken to transmit passes through the ticket for the networking telephone that analysis system initiates these VoIP platforms
Data are analyzed to identify, so as to judge whether VoIP platforms are useful for initiating telephone fraud behavior, convenient for being cheated to phone overseas
The behavior of deceiving is investigated and prosecuted.For above-mentioned VoIP platforms telephone fraud behavioral value method, can be combined by establishing function module
Into functional module construction, implemented by storing computer program in a computer-readable storage medium.
Claims (10)
1.VoIP platform telephone fraud behavioral value methods, which is characterized in that including the following steps carried out successively:
Step S1:Global IP addresses are scanned, acquisition wherein enlivens IP address as VoIP platforms connectivity port;
Step S2:Pick takes the absolute address that the file of the VoIP platforms is stored;
Step S3:The absolute address stored from the file of the VoIP platforms downloads the call bill data of VoIP platforms;
Step S4:Whether the calling number for judging to breathe out in acquired call bill data is fraudulent call, if being judged as YES swindle
Phone then judges that the VoIP platforms have and initiates telephone fraud behavior.
2. VoIP platforms telephone fraud behavioral value method according to claim 1, which is characterized in that the step S1
In, detection packet and IP address port communication are sent out, mark VoIP platforms are useful for if containing in the information that IP address port returns
Information, then it is assumed that the IP address port is VoIP platforms connectivity port.
3. VoIP platforms telephone fraud behavioral value method according to claim 1, which is characterized in that the step S2
In, it is to pass through to dig the absolute address that the file of the VoIP platforms is taken to store:Pair database docked with voIP platforms is tied
Structure query language sql sentences guess that solution or the heart based on OpenSSL bleed and track the 64KB cachings that OpenSSL is distributed
It realizes.
4. VoIP platforms telephone fraud behavioral value method according to claim 1, which is characterized in that the step S4
In, judge the calling number breathed out in acquired call bill data whether be fraudulent call specifically:It is exhaled in assessment call bill data
The calling number gone out is the risk of fraudulent call, if risk reaches preset degree, in the time of the calling number incoming call
In neighbouring period T, the number incoming call that the number of changing is public service number, the caller of the incoming call if being judged as YES are judged whether there is
Number is fraudulent call.
5.VoIP platform telephone fraud behavioral values, which is characterized in that including following module:
Scan module:It scans Global IP addresses, and acquisition wherein enlivens IP address as VoIP platforms connectivity port;
Dig modulus block:Its pick takes the absolute address that the file of the VoIP platforms is stored;
Call bill data download module:The absolute address of its storage of file from the VoIP platforms downloads odd number if VoIP platforms
According to;
Judgment module:Whether its calling number for judging to breathe out in acquired call bill data is fraudulent call, if being judged as YES
Fraudulent call then judges that the VoIP platforms have and initiates telephone fraud behavior.
6. VoIP platforms telephone fraud behavioral value device according to claim 5, which is characterized in that the scan module
Confirm module including VoIP platforms, send out detection packet and IP address port communication, if containing in the information that IP address port returns
It is useful for the information of mark VoIP platforms, then it is assumed that the IP address port is VoIP platforms connectivity port.
7. VoIP platforms telephone fraud behavioral value device according to claim 5, which is characterized in that the pick modulus block
Including absolute address acquisition module, pair database docked with voIP platforms carries out structured query language sql sentences and guesses solution,
Or the heart based on OpenSSL bleeds and tracks the 64KB cachings that OpenSSL is distributed, to realize that pick takes the VoIP platforms
The absolute address of file storage.
8. VoIP platforms telephone fraud behavioral value device according to claim 5, which is characterized in that the judgment module
Including fraudulent call identification module, whether the calling number for judging to breathe out in acquired call bill data is fraudulent call, is commented
The risk that the calling number breathed out in call bill data is fraudulent call is estimated, if risk reaches preset degree, in the caller number
In the neighbouring period T of the time of code incoming call, the number incoming call that the number of changing is public service number is judged whether there is, if being judged as YES
Then the calling number of the incoming call is fraudulent call.
9.VoIP platform telephone fraud behavioral value systems, which is characterized in that the detecting system perform claim requirement 1~4 is worked as
Any one of described in VoIP platforms telephone fraud behavioral value method or the detecting system with claim 5~8 work as
Any one of described in VoIP platform telephone fraud behavioral value devices.
10. VoIP platforms telephone fraud behavioral value device according to claim 9, which is characterized in that the detection system
System includes scanning system, pick takes system, download system and analysis system, and the scanning system scans Global IP addresses, obtains it
The middle IP address of enlivening as VoIP platforms connectivity port is given to pick and takes system, the pick take system according to acquisition with enlivening IP
Location pick takes the absolute address of the file storage of the VoIP platforms for enlivening IP address connection to be given to download system, described to download system
The call bill data that the absolute address stored according to the file of the VoIP platforms of uniting downloads VoIP platforms is given to analysis system, described
Analysis system identifies the port for being connected with the VoIP platforms for initiating telephone fraud behavior according to the call bill data received.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611235140.2A CN108259688A (en) | 2016-12-28 | 2016-12-28 | VoIP platforms telephone fraud behavioral value method, apparatus and detecting system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611235140.2A CN108259688A (en) | 2016-12-28 | 2016-12-28 | VoIP platforms telephone fraud behavioral value method, apparatus and detecting system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108259688A true CN108259688A (en) | 2018-07-06 |
Family
ID=62720037
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611235140.2A Pending CN108259688A (en) | 2016-12-28 | 2016-12-28 | VoIP platforms telephone fraud behavioral value method, apparatus and detecting system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108259688A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111565253A (en) * | 2019-12-13 | 2020-08-21 | 成都无糖信息技术有限公司 | Early warning method and system for fraud data of cat pool |
CN111813811A (en) * | 2020-06-30 | 2020-10-23 | 杭州科度科技有限公司 | Telecommunication fraud early warning method, device, electronic equipment and medium |
CN115396900A (en) * | 2022-09-02 | 2022-11-25 | 南京信息工程大学 | Telecommunication early warning monitoring system based on big data |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247406A (en) * | 2007-08-30 | 2008-08-20 | 飞塔信息科技(北京)有限公司 | Method for local information classification using global information and junk mail detection system |
CN101426203A (en) * | 2007-11-02 | 2009-05-06 | 华为技术有限公司 | Method and equipment for recognizing vicious disturbance call |
CN101873618A (en) * | 2010-06-21 | 2010-10-27 | 中兴通讯股份有限公司 | Communication monitoring method and device |
CN102075639A (en) * | 2009-11-24 | 2011-05-25 | 中国移动通信集团上海有限公司 | Method and device for intercepting malicious call in international service communication network |
CN102546298A (en) * | 2012-01-06 | 2012-07-04 | 北京大学 | Botnet family detection method based on active probing |
CN102868833A (en) * | 2012-08-17 | 2013-01-09 | 广东世纪网通信设备有限公司 | Method, device and system for successively calling fraud telephone number |
CN103167091A (en) * | 2011-12-14 | 2013-06-19 | 中国电信股份有限公司 | Countering device and method of malicious group phone calls |
US8605715B2 (en) * | 2005-11-02 | 2013-12-10 | Panayiotis Thermos | System and method for detecting vulnerabilities in voice over IP networks |
CN103442008A (en) * | 2013-08-29 | 2013-12-11 | 中国科学院计算技术研究所 | System and method for detecting routing security |
CN103634450A (en) * | 2012-08-23 | 2014-03-12 | 中国电信股份有限公司 | False caller number identification method, apparatus and system |
CN104469025A (en) * | 2014-11-26 | 2015-03-25 | 杭州东信北邮信息技术有限公司 | Clustering-algorithm-based method and system for intercepting fraud phone in real time |
CN104486514A (en) * | 2014-12-05 | 2015-04-01 | 中国联合网络通信集团有限公司 | Method and device for recognizing dubious calls |
CN104883428A (en) * | 2015-05-05 | 2015-09-02 | 中国联合网络通信集团有限公司 | Method and device for identifying VOIP calls |
CN105429957A (en) * | 2015-11-02 | 2016-03-23 | 芦斌 | IP address jump safety communication method based on SDN framework |
CN105636047A (en) * | 2014-10-29 | 2016-06-01 | 中兴通讯股份有限公司 | Fraud user detecting method, fraud user detecting device and fraud user detecting system |
-
2016
- 2016-12-28 CN CN201611235140.2A patent/CN108259688A/en active Pending
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8605715B2 (en) * | 2005-11-02 | 2013-12-10 | Panayiotis Thermos | System and method for detecting vulnerabilities in voice over IP networks |
CN101247406A (en) * | 2007-08-30 | 2008-08-20 | 飞塔信息科技(北京)有限公司 | Method for local information classification using global information and junk mail detection system |
CN101426203A (en) * | 2007-11-02 | 2009-05-06 | 华为技术有限公司 | Method and equipment for recognizing vicious disturbance call |
CN102075639A (en) * | 2009-11-24 | 2011-05-25 | 中国移动通信集团上海有限公司 | Method and device for intercepting malicious call in international service communication network |
CN101873618A (en) * | 2010-06-21 | 2010-10-27 | 中兴通讯股份有限公司 | Communication monitoring method and device |
CN103167091A (en) * | 2011-12-14 | 2013-06-19 | 中国电信股份有限公司 | Countering device and method of malicious group phone calls |
CN102546298A (en) * | 2012-01-06 | 2012-07-04 | 北京大学 | Botnet family detection method based on active probing |
CN102868833A (en) * | 2012-08-17 | 2013-01-09 | 广东世纪网通信设备有限公司 | Method, device and system for successively calling fraud telephone number |
CN103634450A (en) * | 2012-08-23 | 2014-03-12 | 中国电信股份有限公司 | False caller number identification method, apparatus and system |
CN103442008A (en) * | 2013-08-29 | 2013-12-11 | 中国科学院计算技术研究所 | System and method for detecting routing security |
CN105636047A (en) * | 2014-10-29 | 2016-06-01 | 中兴通讯股份有限公司 | Fraud user detecting method, fraud user detecting device and fraud user detecting system |
CN104469025A (en) * | 2014-11-26 | 2015-03-25 | 杭州东信北邮信息技术有限公司 | Clustering-algorithm-based method and system for intercepting fraud phone in real time |
CN104486514A (en) * | 2014-12-05 | 2015-04-01 | 中国联合网络通信集团有限公司 | Method and device for recognizing dubious calls |
CN104883428A (en) * | 2015-05-05 | 2015-09-02 | 中国联合网络通信集团有限公司 | Method and device for identifying VOIP calls |
CN105429957A (en) * | 2015-11-02 | 2016-03-23 | 芦斌 | IP address jump safety communication method based on SDN framework |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111565253A (en) * | 2019-12-13 | 2020-08-21 | 成都无糖信息技术有限公司 | Early warning method and system for fraud data of cat pool |
CN111813811A (en) * | 2020-06-30 | 2020-10-23 | 杭州科度科技有限公司 | Telecommunication fraud early warning method, device, electronic equipment and medium |
CN115396900A (en) * | 2022-09-02 | 2022-11-25 | 南京信息工程大学 | Telecommunication early warning monitoring system based on big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109429230B (en) | Communication fraud identification method and system | |
CN102546621B (en) | The system and method for the VoIP honey jar of serving for the VoIP merging | |
US20210014355A1 (en) | System and method for determining unwanted call origination in communications networks | |
CN108243049B (en) | Telecommunication fraud identification method and device | |
CN103518366A (en) | Verification method and system for screening internet caller id spoofs and malicious phone calls | |
CN107770777B (en) | Method for identifying recorded fraud calls | |
CN108259680B (en) | Fraud call identification method and device and server for identifying fraud calls | |
CN109348037A (en) | A kind of anti-harassing and wrecking fixed telephone of anti-swindle based on intelligent answer | |
CN111741472B (en) | GoIP fraud telephone identification method, system, medium and equipment | |
CN110072019A (en) | A kind of method and device shielding harassing call | |
CN110839216B (en) | Method and device for identifying communication information fraud | |
CN101674557B (en) | Method and device for detecting whether missed calls are valid or not | |
EP2426907B1 (en) | Malicious call detection apparatus, malicious call detecting method and computer program for detecting malicious calls | |
JP2013005205A (en) | Ill-motivated telephone call prevention device and ill-motivated telephone call prevention system | |
CN108134998A (en) | Information fraud method for early warning and system based on mobile big data | |
CN108259688A (en) | VoIP platforms telephone fraud behavioral value method, apparatus and detecting system | |
CN111565253B (en) | Early warning method and system for fraud data of cat pool | |
CN112738807A (en) | Method, device, equipment and storage medium for discovering harmful GOIP equipment | |
US20140120885A1 (en) | System and method for handling undesired phone calls | |
Lacuška et al. | Trends in global telecommunication fraud and its impact on business | |
KR100946983B1 (en) | Method and apparatus for processing spam | |
CN101127777A (en) | Method, device and system for processing security threat information of voice communication | |
KR20150014797A (en) | Caller authentication system for preventing a financial fishing and method of the same | |
CN107342986B (en) | A kind of fraudulent call early warning system and method for early warning | |
CN115396900A (en) | Telecommunication early warning monitoring system based on big data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180706 |