CN108259688A - VoIP platforms telephone fraud behavioral value method, apparatus and detecting system - Google Patents

VoIP platforms telephone fraud behavioral value method, apparatus and detecting system Download PDF

Info

Publication number
CN108259688A
CN108259688A CN201611235140.2A CN201611235140A CN108259688A CN 108259688 A CN108259688 A CN 108259688A CN 201611235140 A CN201611235140 A CN 201611235140A CN 108259688 A CN108259688 A CN 108259688A
Authority
CN
China
Prior art keywords
voip
platforms
voip platforms
call
telephone fraud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611235140.2A
Other languages
Chinese (zh)
Inventor
李涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Shiji Wangtong Communications Equipment Co Ltd
Original Assignee
Guangdong Shiji Wangtong Communications Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Shiji Wangtong Communications Equipment Co Ltd filed Critical Guangdong Shiji Wangtong Communications Equipment Co Ltd
Priority to CN201611235140.2A priority Critical patent/CN108259688A/en
Publication of CN108259688A publication Critical patent/CN108259688A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • H04M7/0078Security; Fraud detection; Fraud prevention

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to technical field of network security, more particularly to VoIP platforms telephone fraud behavioral value method and detecting system.The VoIP platform telephone fraud behavioral value methods of the present invention can be scanned Global IP addresses, obtain the information of wherein active VoIP platforms transmission, it is analyzed to identify by the call bill data for the voip network phone initiated these VoIP platforms, so as to judge whether VoIP platforms are useful for initiating telephone fraud behavior, convenient for investigating and prosecuting telephone fraud behavior overseas.For above-mentioned VoIP platforms telephone fraud behavioral value method, it can be combined into functional module construction by establishing function module, implemented by storing computer program in a computer-readable storage medium.Simultaneously the VoIP platforms telephone fraud behavioral value method is by with functional module construction, can the typing detecting system of computer program of implementing the functional module construction realize.

Description

VoIP platforms telephone fraud behavioral value method, apparatus and detecting system
Technical field
The present invention relates to technical field of network security, more particularly to VoIP platforms telephone fraud behavioral value method and detection System.For VoIP platform telephone fraud behavioral value methods, function module structure can be combined by establishing function module Frame is implemented by storing computer program in a computer-readable storage medium.
Background technology
VoIP, that is, networking telephone or IP phone refer to after the sound signal tying-in overcompression of simulation and package, with number The communication mode of the transmission of speech sound signal is carried out in IP network according to the form of package.Since voip network phone can be in internet The business such as voice free or that rate are very low, fax, video and data transmission are carried out under environment, are facilitating normal communication Meanwhile but also the behavior swindled using voip network phone is frequently occurred.Swindling gang usually sets up VoIP server Voip network telephone voice calls platform (abbreviation VoIP platforms) is built, by soft switch technology by network in VoIP platforms The circuit access telephone network that data are provided through telecom operators is made a phone call outward.From these voip network phones overseas squeezed into Incoming number is not often shown or number is made to be shown as the injured parties such as " 110 ", " 10086 ", " 95533 " by the number of changing software Community service department or government offices' phone known and fully trust have very high duplicity.
If offender initiates voip network telephone fraud by the domestic VoIP platforms in China, the police cheat to phone When the behavior of deceiving is investigated and prosecuted, the source of IP data packets can be found from the fraudulent call source that victim is connected to, so as to obtain VoIP server physical address used in taking swindle molecule, investigates and prosecutes criminal offence.But some large size swindles now Clique is often erected at VoIP server overseas, and the output port of VoIP platforms is domestic around China is directly connected to behind international port Landing port, call data through multiple conversions rear access injured party's phone.This causes the VoIP from the access of landing port The networking telephone is difficult to obtain true address overseas.The police mostly can only be after victim's alarm be received to telephone fraud behavior at present It is investigated and prosecuted, however carries out the method for tracing to voip network phone at this stage complicated numerous to the progress of route switching layer by layer After trivial analysis or the networking telephone can only be tracked in the domestic landing port in China, it is impossible to its true source overseas It is effectively traced to the source, sizable difficulty is brought to investigation evidence obtaining work.
Invention content
It is an object of the invention to:Identification VoIP server is erected at telephone fraud behavior overseas.
For the voip network telephone fraud behavior initiated by VoIP platforms overseas, inventor expects to carry out reversely Detection, is directly scanned the port for overseas sending out communication request within the border to China, VoIP platforms may wherein be connected by finding out Port, then pass through the safety for the voip network phone that the acquired IP data packet analysis VoIP platforms are initiated.Therefore, The present invention provides following VoIP platforms telephone fraud behavioral value method, including the following steps carried out successively:
Step S1:Global IP addresses are scanned, acquisition wherein enlivens IP address as VoIP platforms connectivity port;
Step S2:Pick takes the absolute address that the file of the VoIP platforms is stored;
Step S3:The absolute address stored from the file of the VoIP platforms downloads the call bill data of VoIP platforms;
Step S4:Whether the calling number for judging to breathe out in acquired call bill data is fraudulent call, if being judged as YES Fraudulent call then judges that the VoIP platforms have and initiates telephone fraud behavior.
Global IP addresses can be scanned, obtained wherein by above-mentioned VoIP platforms telephone fraud behavioral value method The information of active VoIP platforms transmission, is divided by the call bill data for the voip network phone initiated these VoIP platforms Analysis confirms, so as to judge whether VoIP platforms are useful for initiating telephone fraud behavior, convenient for being carried out to telephone fraud behavior overseas It investigates and prosecutes.
For above-mentioned VoIP platforms telephone fraud behavioral value method, function can be combined by establishing function module Module frame is implemented by storing computer program in a computer-readable storage medium.
The VoIP platforms telephone fraud behavioral value method by with functional module construction, can typing implement the function The detecting system of the computer program of module frame is realized.
Specific embodiment
The detecting system for VoIP platform telephone fraud behavioral values of the present embodiment includes scanning system, pick takes and is System, download system and analysis system.Scanning system is in real time scanned Global IP addresses, provides and is wherein put down possibly as VoIP The IP address of enlivening of platform connectivity port is given to pick and takes system, and pick takes system to realize data by establishing http protocol with VoIP platforms Transmission be stably connected with, dig system is taken transmit these VoIP platforms information carry out pick take inspection after, positioning VoIP server The absolute address of file storage is simultaneously sent to download system, and the transmitting data file that download system obtains download is to analysis system Subsequent analysis is carried out, so as to identify the port for being connected with the VoIP platforms for initiating telephone fraud behavior, details are as follows.
Scanning system is in real time scanned Global IP addresses, sends out detection packet and communicates with from overseas being sent out within the border to China The possibility of request does the IP address port communication of switching landing, then analyze the Meta data elements returned by IP address port, Whether containing the information for being useful for identification VoIP platforms in the banner information such as intext, robots.txt file.Meta data elements Refer to the label of entitled " meta " that is located in the html of website in head labels, be connected with the IP address port of VoIP platforms Include the copyright information of VoIP platforms in Meta data elements, swindle molecule rents VoIP server and is intended merely to largely mass-send swindleness Information is deceived, usually will not all carry out delete operation, therefore can be included in the information by Meta data elements to Meta data elements The copyright informations of VoIP platforms judge that port is connected with VoIP platforms.To the situation that Intext information is analyzed and Meta numbers It is similar according to member, in webpage html texts, it is understood that there may be some character strings about VoIP platform copyright informations, such as " Powered By xxxx ", by identifying that intext can obtain these character strings, so as to identify whether port is connected with VoIP platforms.Net The reptile for convenience that stands preferably captures web site contents, the Robots agreements of oneself can be all set, to the text of Robots agreements File robots.txt is identified, if it find that wherein have " VOS " etc. for identifying the printed words of the release type of VoIP platforms, It may determine that the port is connected with VoIP platforms.After as above identifying operation, it can filter out substantially and be connected with VoIP and put down The port of platform, H.323 SIP further according to VoIP platforms, communication protocol carry out agreement to the VoIP platforms that these ports connect and lead to Believe the confirmation of identification, the information such as server fields returned to VoIP platforms are analyzed, if the information returned includes The version information of VOS2009V2.1.2.0 etc, it is possible to confirm that the port is connected with VoIP platforms.
After pick takes system to realize stable data transmission with VoIP platforms, pair database docked with VoIP platforms is tied Structure query language sql sentences guess solution, database are made to occur another sentence of operation when parsing by " ..%c0%af " sentence Behavior, so as to obtain the permission of database, then to VoIP platforms, distinctive structured query language sql libraries carry out technology note Enter to attempt, so as to confirm traversal file permission sentence:http://url/..%c0%af..%c0%af..%c0%af..% C0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%af..% c0% Af..%c0%af..%c0%af..%c0%af..%c0%af..%c0%afetc/passwd, so as to position VoIP clothes The address that positioning obtains simultaneously is sent to download system by business device file storage absolute address.For above-mentioned traversal file can not be used Rights statement carries out the VoIP platform databases that pick takes inspection, and pick takes system that can directly be dripped by the heart based on OpenSSL Blood tracking OpenSSL distributed 64KB caching, will beyond the byte information of necessary range copy to caching in return again to it is slow Content is deposited, so the information of VoIP platform internal memories content will be revealed with the speed of each 64KB, and pick takes system handle The absolute address of VoIP server file storage positioned from the information of acquisition is supplied to download system.
If the absolute address that download system is stored according to VoIP server file obtains the VoIP platforms from database Forms data is simultaneously sent to analysis system, and information of the analysis system in call bill data judges the network electricity that the VoIP platforms are initiated Whether words communication is used for telephone fraud behavior.It is previously stored in the phone library of analysis system and is confirmed as being normal communication number It white list and is confirmed as being the blacklist for pretending to be public security organs' fraudulent call.The call bill data that analysis system judgement currently obtains In by the VoIP platforms exhalation calling number whether in white list or blacklist, if the calling number through the number of changing, it is right Calling number after the number of changing is judged, if the calling number is not dealt in white list;If the calling number category It is answered in blacklist number and by the user of called number, i.e., user has cheated risk, then sends out vigilant fraudulent call It reminds, is reminded by short message, the modes such as call-on back by phone contact the user, the user is reminded to be vigilant the swindle row for pretending to be public security organs For.
If the calling number is answered by user, and not in white and black list, then analysis system comparison should Calling number and the similarity of each public security organs' division communication number, then according to the criterion of risk:Similarity is less than 60% Then the calling number is low for the risk of fraudulent call, and higher than 80% calling number of similarity is high for the risk of fraudulent call, Similarity exist for 60%~80% calling number be fraudulent call risk, need further to the calling number whether Fraudulent call number to pretend to be public security organs is judged.If judge to obtain the calling number and all public affairs of analysis system storage The similarity of inspection method division communication number is below 60%, then it is right number to judge the calling number, is not dealt with.If judge It obtains the calling number and the similarity of one of public security organs' division communication number of analysis system storage reaches 60%, then sentence The calling number of breaking is likely to be the fraudulent call number for pretending to be public security organs, further analyzes the call bill data of the calling number: If the calling behavior of the calling number meets the characteristic rule of fraudulent call, as the time existing for the calling number is short and in short-term Interior frequent exhalation, without or rare incoming call record, be judged as the calling number and belong to the fraudulent call number for pretending to be public security organs, It is added into the blacklist in analysis system phone library;If can't judge whether the calling number belongs to the swindleness for pretending to be public security organs Telephone number is deceived, then also needs to further judge by subsequent analysis method the safety of calling number call, so as to judge Whether the VoIP platforms have the behavior for initiating fraudulent call.
In subsequent analysis, for calling number of the similarity more than 80%, it can be determined that the calling number is used for It is higher to carry out the possibility that public security organs is pretended to be to swindle, therefore public security department directly carries out the calling number manual confirmation, and The fraudulent call number of public security organs is pretended to be to be added in the blacklist in analysis system phone library being confirmed as being belonging to.For similar The presence spent for 60%~80% is the calling number of the risk of fraudulent call, then need in the call bill data to called subscriber with In the neighbouring period T of the calling number incoming call, for example, the same day, if having the number of changing for the number incoming call of public service number come into Row judges.Two kinds of concrete analysis judgment methods are provided in the present embodiment:1. if in the neighbour called from user by the calling number In the nearly time, for example there is the phone of calling number incoming call user that the other number of changing is local public security organs number on the same day, then can be with Judgement be swindle molecule during public security organs is pretended to be to be swindled, victim to be replaced to transfer local police or other are related The means of department gain the trust of victim by cheating, therefore may determine that the calling number belongs to the fraudulent call number for pretending to be public security organs Code, is added into the blacklist in analysis system phone library;2. if in the neighbouring time called from user by the calling number It is interior, for example, the same day have the number of changing be bank's customer service number calling number incoming call user phone, then may determine that be swindle molecule Its bank account of deception victim goes wrong that victim is inveigled to carry out property transfer or victim is required to remit money It Deng operation, therefore may determine that the calling number belongs to the fraudulent call number for pretending to be public security organs, be added into analysis system electricity In the blacklist for talking about library.It is being in the similar time section of fraudulent call number incoming call for pretending to be public security organs by doubtful by user, Whether there is the number of changing for public service number such as local public security organs number, the electricity of the calling number incoming call user of bank's customer service number Words more accurately can identify telephone fraud behavior, so as to fulfill electricity overseas is erected to VoIP server for public security organ Words fraudulent act more accurately identifies so that public security organ is more targeted to the investigation of fraudulent call.
For the user of the fraudulent call number incoming call of spoofed public security organs, analysis system sends disappearing comprising warning content It ceases to client.Wherein, for mobile phone user, analysis system sends preset reminding short message automatically;For by fixed telephone user, analysis The concurrent sending voice information of the automatic clawback of system.Warning content is mainly used for informing its phone for answering of user there are fraud risk, Remind user:1) public security organs can adhere to principle written and face to face and case is handled, will not guide thing when handling case Instigator is operated with banking terminal, more without so-called " secured account ";2) every public security organs of calling oneself will handle a case in the phone And it is required that it is all swindle that citizen, which remit money to " secured account ", be connected to suspicious call not divulge any personal account to other side It remits money with blindness, reports a case to the security authorities or dial 110 to local police station nearby rapidly.
If user and being judged as being the duration of call of the calling number for pretending to be public security organs' fraudulent call more than two minutes, I.e. the user has probably had believed that swindle molecule, then analysis system sends out processing request signal, notify local police or The department that person is responsible for carrying out fraudulent call investigation is handled.Be processed as can making relevant departments prevent in time user to The behaviors such as molecule remittance are swindled, avoid user by financial losses, and actively swindle molecule can be investigated and prosecuted, raising is done Case efficiency and accuracy.
By above-mentioned VoIP platforms telephone fraud behavioral value method, Global IP addresses can be scanned in real time, obtained The information that wherein active VoIP platforms is taken to transmit passes through the ticket for the networking telephone that analysis system initiates these VoIP platforms Data are analyzed to identify, so as to judge whether VoIP platforms are useful for initiating telephone fraud behavior, convenient for being cheated to phone overseas The behavior of deceiving is investigated and prosecuted.For above-mentioned VoIP platforms telephone fraud behavioral value method, can be combined by establishing function module Into functional module construction, implemented by storing computer program in a computer-readable storage medium.

Claims (10)

1.VoIP platform telephone fraud behavioral value methods, which is characterized in that including the following steps carried out successively:
Step S1:Global IP addresses are scanned, acquisition wherein enlivens IP address as VoIP platforms connectivity port;
Step S2:Pick takes the absolute address that the file of the VoIP platforms is stored;
Step S3:The absolute address stored from the file of the VoIP platforms downloads the call bill data of VoIP platforms;
Step S4:Whether the calling number for judging to breathe out in acquired call bill data is fraudulent call, if being judged as YES swindle Phone then judges that the VoIP platforms have and initiates telephone fraud behavior.
2. VoIP platforms telephone fraud behavioral value method according to claim 1, which is characterized in that the step S1 In, detection packet and IP address port communication are sent out, mark VoIP platforms are useful for if containing in the information that IP address port returns Information, then it is assumed that the IP address port is VoIP platforms connectivity port.
3. VoIP platforms telephone fraud behavioral value method according to claim 1, which is characterized in that the step S2 In, it is to pass through to dig the absolute address that the file of the VoIP platforms is taken to store:Pair database docked with voIP platforms is tied Structure query language sql sentences guess that solution or the heart based on OpenSSL bleed and track the 64KB cachings that OpenSSL is distributed It realizes.
4. VoIP platforms telephone fraud behavioral value method according to claim 1, which is characterized in that the step S4 In, judge the calling number breathed out in acquired call bill data whether be fraudulent call specifically:It is exhaled in assessment call bill data The calling number gone out is the risk of fraudulent call, if risk reaches preset degree, in the time of the calling number incoming call In neighbouring period T, the number incoming call that the number of changing is public service number, the caller of the incoming call if being judged as YES are judged whether there is Number is fraudulent call.
5.VoIP platform telephone fraud behavioral values, which is characterized in that including following module:
Scan module:It scans Global IP addresses, and acquisition wherein enlivens IP address as VoIP platforms connectivity port;
Dig modulus block:Its pick takes the absolute address that the file of the VoIP platforms is stored;
Call bill data download module:The absolute address of its storage of file from the VoIP platforms downloads odd number if VoIP platforms According to;
Judgment module:Whether its calling number for judging to breathe out in acquired call bill data is fraudulent call, if being judged as YES Fraudulent call then judges that the VoIP platforms have and initiates telephone fraud behavior.
6. VoIP platforms telephone fraud behavioral value device according to claim 5, which is characterized in that the scan module Confirm module including VoIP platforms, send out detection packet and IP address port communication, if containing in the information that IP address port returns It is useful for the information of mark VoIP platforms, then it is assumed that the IP address port is VoIP platforms connectivity port.
7. VoIP platforms telephone fraud behavioral value device according to claim 5, which is characterized in that the pick modulus block Including absolute address acquisition module, pair database docked with voIP platforms carries out structured query language sql sentences and guesses solution, Or the heart based on OpenSSL bleeds and tracks the 64KB cachings that OpenSSL is distributed, to realize that pick takes the VoIP platforms The absolute address of file storage.
8. VoIP platforms telephone fraud behavioral value device according to claim 5, which is characterized in that the judgment module Including fraudulent call identification module, whether the calling number for judging to breathe out in acquired call bill data is fraudulent call, is commented The risk that the calling number breathed out in call bill data is fraudulent call is estimated, if risk reaches preset degree, in the caller number In the neighbouring period T of the time of code incoming call, the number incoming call that the number of changing is public service number is judged whether there is, if being judged as YES Then the calling number of the incoming call is fraudulent call.
9.VoIP platform telephone fraud behavioral value systems, which is characterized in that the detecting system perform claim requirement 1~4 is worked as Any one of described in VoIP platforms telephone fraud behavioral value method or the detecting system with claim 5~8 work as Any one of described in VoIP platform telephone fraud behavioral value devices.
10. VoIP platforms telephone fraud behavioral value device according to claim 9, which is characterized in that the detection system System includes scanning system, pick takes system, download system and analysis system, and the scanning system scans Global IP addresses, obtains it The middle IP address of enlivening as VoIP platforms connectivity port is given to pick and takes system, the pick take system according to acquisition with enlivening IP Location pick takes the absolute address of the file storage of the VoIP platforms for enlivening IP address connection to be given to download system, described to download system The call bill data that the absolute address stored according to the file of the VoIP platforms of uniting downloads VoIP platforms is given to analysis system, described Analysis system identifies the port for being connected with the VoIP platforms for initiating telephone fraud behavior according to the call bill data received.
CN201611235140.2A 2016-12-28 2016-12-28 VoIP platforms telephone fraud behavioral value method, apparatus and detecting system Pending CN108259688A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611235140.2A CN108259688A (en) 2016-12-28 2016-12-28 VoIP platforms telephone fraud behavioral value method, apparatus and detecting system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611235140.2A CN108259688A (en) 2016-12-28 2016-12-28 VoIP platforms telephone fraud behavioral value method, apparatus and detecting system

Publications (1)

Publication Number Publication Date
CN108259688A true CN108259688A (en) 2018-07-06

Family

ID=62720037

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611235140.2A Pending CN108259688A (en) 2016-12-28 2016-12-28 VoIP platforms telephone fraud behavioral value method, apparatus and detecting system

Country Status (1)

Country Link
CN (1) CN108259688A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111565253A (en) * 2019-12-13 2020-08-21 成都无糖信息技术有限公司 Early warning method and system for fraud data of cat pool
CN111813811A (en) * 2020-06-30 2020-10-23 杭州科度科技有限公司 Telecommunication fraud early warning method, device, electronic equipment and medium
CN115396900A (en) * 2022-09-02 2022-11-25 南京信息工程大学 Telecommunication early warning monitoring system based on big data

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247406A (en) * 2007-08-30 2008-08-20 飞塔信息科技(北京)有限公司 Method for local information classification using global information and junk mail detection system
CN101426203A (en) * 2007-11-02 2009-05-06 华为技术有限公司 Method and equipment for recognizing vicious disturbance call
CN101873618A (en) * 2010-06-21 2010-10-27 中兴通讯股份有限公司 Communication monitoring method and device
CN102075639A (en) * 2009-11-24 2011-05-25 中国移动通信集团上海有限公司 Method and device for intercepting malicious call in international service communication network
CN102546298A (en) * 2012-01-06 2012-07-04 北京大学 Botnet family detection method based on active probing
CN102868833A (en) * 2012-08-17 2013-01-09 广东世纪网通信设备有限公司 Method, device and system for successively calling fraud telephone number
CN103167091A (en) * 2011-12-14 2013-06-19 中国电信股份有限公司 Countering device and method of malicious group phone calls
US8605715B2 (en) * 2005-11-02 2013-12-10 Panayiotis Thermos System and method for detecting vulnerabilities in voice over IP networks
CN103442008A (en) * 2013-08-29 2013-12-11 中国科学院计算技术研究所 System and method for detecting routing security
CN103634450A (en) * 2012-08-23 2014-03-12 中国电信股份有限公司 False caller number identification method, apparatus and system
CN104469025A (en) * 2014-11-26 2015-03-25 杭州东信北邮信息技术有限公司 Clustering-algorithm-based method and system for intercepting fraud phone in real time
CN104486514A (en) * 2014-12-05 2015-04-01 中国联合网络通信集团有限公司 Method and device for recognizing dubious calls
CN104883428A (en) * 2015-05-05 2015-09-02 中国联合网络通信集团有限公司 Method and device for identifying VOIP calls
CN105429957A (en) * 2015-11-02 2016-03-23 芦斌 IP address jump safety communication method based on SDN framework
CN105636047A (en) * 2014-10-29 2016-06-01 中兴通讯股份有限公司 Fraud user detecting method, fraud user detecting device and fraud user detecting system

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8605715B2 (en) * 2005-11-02 2013-12-10 Panayiotis Thermos System and method for detecting vulnerabilities in voice over IP networks
CN101247406A (en) * 2007-08-30 2008-08-20 飞塔信息科技(北京)有限公司 Method for local information classification using global information and junk mail detection system
CN101426203A (en) * 2007-11-02 2009-05-06 华为技术有限公司 Method and equipment for recognizing vicious disturbance call
CN102075639A (en) * 2009-11-24 2011-05-25 中国移动通信集团上海有限公司 Method and device for intercepting malicious call in international service communication network
CN101873618A (en) * 2010-06-21 2010-10-27 中兴通讯股份有限公司 Communication monitoring method and device
CN103167091A (en) * 2011-12-14 2013-06-19 中国电信股份有限公司 Countering device and method of malicious group phone calls
CN102546298A (en) * 2012-01-06 2012-07-04 北京大学 Botnet family detection method based on active probing
CN102868833A (en) * 2012-08-17 2013-01-09 广东世纪网通信设备有限公司 Method, device and system for successively calling fraud telephone number
CN103634450A (en) * 2012-08-23 2014-03-12 中国电信股份有限公司 False caller number identification method, apparatus and system
CN103442008A (en) * 2013-08-29 2013-12-11 中国科学院计算技术研究所 System and method for detecting routing security
CN105636047A (en) * 2014-10-29 2016-06-01 中兴通讯股份有限公司 Fraud user detecting method, fraud user detecting device and fraud user detecting system
CN104469025A (en) * 2014-11-26 2015-03-25 杭州东信北邮信息技术有限公司 Clustering-algorithm-based method and system for intercepting fraud phone in real time
CN104486514A (en) * 2014-12-05 2015-04-01 中国联合网络通信集团有限公司 Method and device for recognizing dubious calls
CN104883428A (en) * 2015-05-05 2015-09-02 中国联合网络通信集团有限公司 Method and device for identifying VOIP calls
CN105429957A (en) * 2015-11-02 2016-03-23 芦斌 IP address jump safety communication method based on SDN framework

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111565253A (en) * 2019-12-13 2020-08-21 成都无糖信息技术有限公司 Early warning method and system for fraud data of cat pool
CN111813811A (en) * 2020-06-30 2020-10-23 杭州科度科技有限公司 Telecommunication fraud early warning method, device, electronic equipment and medium
CN115396900A (en) * 2022-09-02 2022-11-25 南京信息工程大学 Telecommunication early warning monitoring system based on big data

Similar Documents

Publication Publication Date Title
CN109429230B (en) Communication fraud identification method and system
CN102546621B (en) The system and method for the VoIP honey jar of serving for the VoIP merging
US20210014355A1 (en) System and method for determining unwanted call origination in communications networks
CN108243049B (en) Telecommunication fraud identification method and device
CN103518366A (en) Verification method and system for screening internet caller id spoofs and malicious phone calls
CN107770777B (en) Method for identifying recorded fraud calls
CN108259680B (en) Fraud call identification method and device and server for identifying fraud calls
CN109348037A (en) A kind of anti-harassing and wrecking fixed telephone of anti-swindle based on intelligent answer
CN111741472B (en) GoIP fraud telephone identification method, system, medium and equipment
CN110072019A (en) A kind of method and device shielding harassing call
CN110839216B (en) Method and device for identifying communication information fraud
CN101674557B (en) Method and device for detecting whether missed calls are valid or not
EP2426907B1 (en) Malicious call detection apparatus, malicious call detecting method and computer program for detecting malicious calls
JP2013005205A (en) Ill-motivated telephone call prevention device and ill-motivated telephone call prevention system
CN108134998A (en) Information fraud method for early warning and system based on mobile big data
CN108259688A (en) VoIP platforms telephone fraud behavioral value method, apparatus and detecting system
CN111565253B (en) Early warning method and system for fraud data of cat pool
CN112738807A (en) Method, device, equipment and storage medium for discovering harmful GOIP equipment
US20140120885A1 (en) System and method for handling undesired phone calls
Lacuška et al. Trends in global telecommunication fraud and its impact on business
KR100946983B1 (en) Method and apparatus for processing spam
CN101127777A (en) Method, device and system for processing security threat information of voice communication
KR20150014797A (en) Caller authentication system for preventing a financial fishing and method of the same
CN107342986B (en) A kind of fraudulent call early warning system and method for early warning
CN115396900A (en) Telecommunication early warning monitoring system based on big data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180706