CN110399705A - Judge the method, apparatus, equipment and storage medium of fraudulent user - Google Patents

Judge the method, apparatus, equipment and storage medium of fraudulent user Download PDF

Info

Publication number
CN110399705A
CN110399705A CN201910594702.XA CN201910594702A CN110399705A CN 110399705 A CN110399705 A CN 110399705A CN 201910594702 A CN201910594702 A CN 201910594702A CN 110399705 A CN110399705 A CN 110399705A
Authority
CN
China
Prior art keywords
user
feature
timing
index
browsing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910594702.XA
Other languages
Chinese (zh)
Inventor
严锐
顾少丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lake Information Technology Co Ltd
Original Assignee
Shanghai Lake Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Lake Information Technology Co Ltd filed Critical Shanghai Lake Information Technology Co Ltd
Priority to CN201910594702.XA priority Critical patent/CN110399705A/en
Publication of CN110399705A publication Critical patent/CN110399705A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/049Temporal neural networks, e.g. delay elements, oscillating neurons or pulsed inputs

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Evolutionary Computation (AREA)
  • Computational Linguistics (AREA)
  • Molecular Biology (AREA)
  • Computing Systems (AREA)
  • Biophysics (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Physics (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A kind of method, apparatus, equipment and storage medium judging fraudulent user, the method for judging fraudulent user includes: construction feature matrix, eigenmatrix includes timing category feature, timing category feature is feature relevant to fraudulent user, and timing category feature is extracted based on the collected data of an operation are buried;The timing neural network based on attention mechanism is built, eigenmatrix is input to timing neural network, and using the weight of each timing category feature of attention mechanism training, to define fraudulent user;The data of user to be tested are input to be completed it is trained, judge whether user to be tested is fraudulent user based on the timing neural network of attention mechanism.Technical solution of the present invention can be relatively accurate and judges fraudulent user in time.

Description

Judge the method, apparatus, equipment and storage medium of fraudulent user
Technical field
The present invention relates to internet financial technology fields, more particularly to judge the method, apparatus of fraudulent user, equipment and Storage medium.
Background technique
With the development of internet finance, diversification, such as fishing website, trojan horse, puppet is presented in financial fraud means Base station etc..Currently, internet financial field uses kinds of risks preventing control method, for example, killing at the user terminal that timely updates Malicious software is with checking and killing Trojan virus;Authentication is carried out to user by means such as real-name management, recognition of face, fingerprint recognitions; Real-time guard is carried out to account by digital certificate and dynamic password.
But existing risk prevention system method is still difficult to the various financial fraud users for judging to emerge one after another.
Summary of the invention
The technical issues of embodiment of the present invention solves is how effectively to judge fraudulent user.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of method for judging fraudulent user, this method comprises: Construction feature matrix, eigenmatrix include timing category feature, and timing category feature is feature relevant to fraudulent user, and timing class is special Sign is extracted based on the collected data of an operation are buried;The timing neural network based on attention mechanism is built, by feature square Battle array is input to timing neural network, and using the weight of each timing category feature of attention mechanism training, to define Fraudulent user;The data of user to be tested are input to, timing neural network trained, based on attention mechanism is completed To judge whether user to be tested is fraudulent user.
Optionally, timing category feature include operating characteristics and browsing feature at least one of, operating characteristics be and input The relevant feature of operational order, operating characteristics include click help button number, input text box needed for duration, browsing Feature is feature relevant to page browsing, and browsing feature includes the number for browsing rate related pages, browsing rate related pages The duration in face, the number for browsing loaning bill related pages, the duration for browsing loaning bill related pages.
Optionally, timing category feature includes at least one in user information feature, position feature and equipment feature, user Information characteristics include that whether user appears in reference information blacklist library, whether user occurs in Crime Information database, position Whether the geographical location of the change frequency, user of setting the IP address that feature includes user terminal appear in black address base, user Whether cell room rate abnormal, whether the IP address of user terminal corresponding with the geographical location of user, equipment feature includes user Whether terminal issues whether abnormal data packet, user terminal use proxy server.
Optionally, operation is buried to include classification indicators, determine event, bury a little and collect data, classification indicators be classification and The associated index of timing category feature, determine event be based on preset parameter determine triggering with the associated event of index, bury a little with Collecting data is by burying a setting event and collecting the data with event correlation based on event.
Optionally, classification and the associated index of timing category feature include sort operation index, browse index, user information and refer to Mark, positioning index and equipment index, operation index be with the associated index of operating characteristics, browsing index is the finger with browsing feature Mark, user information index are the index with user information feature association, and positioning index is and the associated index of position feature, equipment Index is the index with equipment feature association.
Optionally, preset parameter is selected from one or more of following item: clicking help within preset first period Duration needed for the number of button, input text box is the multiple, clear within preset second period of duration needed for normal input Look at rate related pages number, browse rate related pages duration be normal browsing needed for duration multiple, preset The number that loaning bill related pages are browsed in the third period, the duration for browsing loaning bill related pages are times of duration needed for normal browsing Number, whether user appears in reference information blacklist library, whether user occurs in Crime Information database, the preset 4th The change frequency of user terminal IP address in period, user geographical location whether appear in black address base, the cell of user Whether whether, user terminal corresponding with the geographical location of user issues abnormal number to whether abnormal, user terminal the IP address of room rate Whether proxy server is used according to packet, user terminal.
The embodiment of the present invention also provides a kind of device for judging fraudulent user, comprising: constructing module is suitable for construction feature Matrix, eigenmatrix include timing category feature, and timing category feature is feature relevant to fraudulent user, and timing category feature is based on burying Point operates collected data to extract;It builds and training module, is suitable for building the timing class nerve based on attention mechanism Eigenmatrix is input to timing neural network by network, and using the power of each timing category feature of attention mechanism training Weight, to define fraudulent user;Judgment module is suitable for for the data of user to be tested being input to that trained, base is completed Judge whether the user to be tested is fraudulent user in the timing neural network of attention mechanism.
Optionally, the device of the judgement fraudulent user include bury point module, bury point module include classification indicators submodule, really Determine event submodule, bury a little and collect data submodule, classification indicators submodule is suitable for classification and the associated finger of timing category feature Mark determines that event submodule is suitable for determining triggering and the associated event of index based on preset parameter, buries a little and collect data Module is suitable for by burying a setting event and being collected the data with event correlation based on event.
The embodiment of the present invention also provides a kind of equipment for judging fraudulent user, including memory and processor, on memory It is stored with the computer instruction that can be run on a processor, processor executes above-mentioned judgement fraudulent user when running computer instruction The step of method.
The embodiment of the present invention also provides a kind of storage medium, computer instruction is stored thereon with, when computer instruction is run The step of executing above-mentioned judgement fraudulent user method.
Compared with prior art, the technical solution of the embodiment of the present invention has the advantages that
Construction and the closely related timing category feature of fraudulent user, build the timing class nerve net based on attention mechanism Network, and from time dimension and characteristic dimension training these timing category features, so as to by be completed it is trained, based on note The timing neural network of meaning power mechanism comes relatively accurate and judges whether user to be tested is fraudulent user in time.For example, These timing category features of training, so that some features closer on time dimension have higher weight, in characteristic dimension Specific some features (such as the operating characteristics for the number for clicking help button) have higher weight, so that the timing class mind It can more accurately judge whether user to be tested is fraudulent user through network.
Detailed description of the invention
Fig. 1 is a kind of flow chart for judging fraudulent user method in the embodiment of the present invention;
Fig. 2 is the schematic diagram of eigenmatrix in the embodiment of the present invention;
Fig. 3 is the schematic diagram of the timing neural network in the embodiment of the present invention based on attention mechanism;
Fig. 4 is a kind of structural schematic diagram for judging fraudulent user device in the embodiment of the present invention;
Fig. 5 is the structural schematic diagram that point module is buried in the embodiment of the present invention.
Specific embodiment
With the development of information technology, various financial fraud means also emerge one after another, this is constantly proposed newly for risk prevention system Challenge;Wherein, the scene of financial fraud is related to network marketing, Mobile banking, the consumer finance, network loan, network payment etc..
A kind of means to cope with challenges be user behavior data tracking (User Behavior Tracking, referred to as UBT).UBT the relevant technologies can recorde user's data relevant to APP (application software) at mobile terminal (such as mobile phone), Also data relevant to browser software at fixed terminal (such as computer) be can recorde.But UBT the amount of data recorded is non- Chang great, shows as that data content is mixed and disorderly and noise is more, data dimension is high and very sparse, this makes the difficulty of data mining It is bigger.
Another means to cope with challenges are to build timing neural network.Timing neural network includes circulation nerve net Network (Recurrent Neural Network, referred to as RNN), RNN include shot and long term memory (Long Short Term Memory, referred to as LSTM) network and gating cycle unit (Gated Recurrent Unit, referred to as GRU);These timing Neural network can obtain specific operation behavior.But in face of the record data of magnanimity, it is difficult to construct the feature square of fining Battle array.
The prior art does not consider that arriving above-mentioned technical problem relevant to UBT and timing neural network.And the present invention recognizes Know, solving these problems, which will be helpful to, more accurately judges fraudulent user;Also, the embodiment provides corresponding skills Art scheme.
Specifically, the embodiment of the present invention construction and the closely related timing category feature of fraudulent user, these timing classes The weight of feature can train so that timing category feature more focuses, such as in focus on time closer some features, Or history judges the more effectively some features of effect.
It is understandable to enable the above-mentioned purpose, feature and beneficial effect of the embodiment of the present invention to become apparent, below with reference to attached Figure is described in detail specific embodiments of the present invention.
Fig. 1 is a kind of flow chart for judging fraudulent user method 100 in the embodiment of the present invention.The flow chart includes following step Suddenly.
Step S110: construction feature matrix, this feature matrix include timing category feature, and timing category feature is and fraudulent user Relevant feature, timing category feature are extracted based on the collected data of an operation are buried.
Step S120: building the timing neural network based on attention mechanism, and eigenmatrix is input to timing class mind Through network, and using the weight of each timing category feature of attention mechanism training, to define fraudulent user;
Step S130: the data of user to be tested are input to, timing class trained, based on attention mechanism is completed Neural network judges whether user to be tested is fraudulent user.
In the execution of step S110, construction includes the eigenmatrix of timing category feature, which is and fraud The relevant feature of user.
As shown in Fig. 2, eigenmatrix 200 includes time dimension W and characteristic dimension X, wherein W=[W1, W2, W3 ..., Wm], m is the number of time slice, and X=[X1, X2, X3 ..., Xn], n are the number of the feature counted.In eigenmatrix 200 In, feature Xj (wherein, j is 1 to any integer between n) is related to time series, and therefore, it is special that this feature Xj is known as timing class Sign;The element of eigenmatrix indicates (wherein, i is 1 to any integer between m, and j is 1 to any integer between n) by Aij.
The embodiment of the present invention carries out quantitative analysis to the scene of financial fraud.Specifically, timing category feature is classified At operating characteristics, browsing feature, user information feature, position feature and equipment feature etc., and further these are classified Timing category feature decompose, construct the specific timing category feature closely related with fraudulent user;Also, this is obtained by training The weight distribution of a little timing category features, so that having completed trained, based on attention mechanism timing neural network Can the data based on user to be tested and effectively and in time judge whether user to be tested is fraudulent user.
In specific implementation, timing category feature includes at least one in operating characteristics and browsing feature, and operating characteristics are Feature relevant to the operational order of input, when operating characteristics include needed for the number for clicking help button, input text box Long, browsing feature is feature relevant to page browsing, and browsing feature includes the number for browsing rate related pages, browsing rate The duration of related pages, the number for browsing loaning bill related pages, the duration for browsing loaning bill related pages.
In specific implementation, timing category feature further include in user information feature, position feature and equipment feature at least One, user information feature includes that whether user appears in reference information blacklist library, whether user Crime Information number occurs According in library, position feature includes the geographical position of the change frequency of address IP (Internet Protocol) of user terminal, user Set whether (geographical location can be positioned by positioning systems such as GPS (Global Position System)) appears in unregistered land In the library of location, whether the room rate of user's cell (cell can be positioned by positioning systems such as GPS) abnormal, IP of user terminal Whether location is corresponding with the geographical location of user, and equipment feature includes that whether user terminal issues abnormal data packet, user terminal is It is no to use proxy server.
The embodiment of the present invention extracts timing category feature based on the collected data of an operation are buried.
In specific implementation, an operation is buried to include classification indicators, determine event, bury a little and collect data.
Classification indicators classification indicators, the index of the classification and timing of classification for scene and theme based on financial fraud Category feature association, the index of the classification include operation index, browsing index, user information index, positioning index and equipment index; And can be by the index decomposition of classification to the specific targets that can be implemented, the specific targets of the decomposition and specific timing class are special Sign association, the specific targets of the decomposition include: duration, browsing rate needed for clicking the number of help button, input text box The number of related pages, the duration for browsing rate related pages, the number for browsing loaning bill related pages, browsing loaning bill related pages Duration, whether user appears in reference information blacklist library, whether user occurs in Crime Information database, user terminal The change frequency of IP address, whether the geographical location of user appears in black address base, whether the cell room rate of user abnormal, Whether whether, user terminal corresponding with the geographical location of user issues abnormal data packet, user terminal to the IP address of user terminal Whether proxy server is used.
Determine that event is to determine trigger event based on preset parameter, which is associated with above-mentioned specific targets.Wherein, in advance If parameter include: that the number of help button is clicked within preset first period, i.e., frequently click help whithin a period of time Button then belongs to fraudulent user or the probability of fraud is higher, and in one embodiment, parameter value was the first period for partly A hour, number be three times, in another embodiment, parameter value be a hour, number the first period be five times, again In one embodiment, parameter value be one day the first period, number is eight times;Duration needed for inputting text box is normal input The multiple of required duration, i.e., whithin a period of time input text box time too short then user behavior may for duplication and paste, Too long, user behavior may be usurped for account, and the probability for being consequently belonging to fraudulent user or fraud is higher, at one In embodiment, parameter value is three times that duration needed for inputting text box is duration needed for normal input, in another embodiment In, parameter value is five times that duration needed for inputting text box is duration needed for normal input, In yet another embodiment, parameter Value is 1/5th times that duration needed for inputting text box is duration needed for normal input;It is browsed within preset second period The number of rate related pages, i.e., frequently browsing rate related pages then belong to fraudulent user or fraud row whithin a period of time For probability it is higher, in one embodiment, parameter value be the second period be half an hour, number be three times, in another reality Apply in example, parameter value be a hour, number the second period be five times, In yet another embodiment, when parameter value is second Duan Weiyi days, number be eight times;The duration for browsing rate related pages is the multiple of duration needed for normal browsing, i.e. browsing rate The duration of related pages is too long, and the probability for belonging to fraudulent user or fraud is higher, and in one embodiment, browsing is taken The duration of rate related pages is three times of duration needed for normal browsing, in another embodiment, browsing rate related pages Duration is five times of duration needed for normal browsing;The number that loaning bill related pages are browsed within the preset third period, i.e., one Frequently browse that loaning bill related pages then belong to fraudulent user or the probability of fraud is higher in the section time, in one embodiment In, parameter value is to be half an hour, number the third period for three times, in another embodiment, parameter value is the third period to be One hour, number are five times, In yet another embodiment, parameter value be one day the third period, number is eight times;Browsing is borrowed The duration of money related pages is the multiple of duration needed for normal browsing, i.e. the duration of browsing loaning bill related pages is too long, belongs to and takes advantage of The probability for cheating user or fraud is higher, and in one embodiment, the duration of browsing loaning bill related pages is normal browsing Three times of required duration, in another embodiment, the duration of browsing loaning bill related pages are five of duration needed for normal browsing Times;Whether user appears in reference information blacklist library, i.e., user, which appears in reference information blacklist library, then belongs to fraud The probability of user or fraud is higher, and in one embodiment, parameter value is that user appears in reference information blacklist library In;Whether user appears in Crime Information database, i.e., user, which appears in Crime Information database, then belongs to fraudulent user Or the probability of fraud is higher, in one embodiment, parameter value is that user appears in Crime Information database;Pre- If the 4th period in user terminal IP address change frequency, i.e., user terminal IP address frequently changes then whithin a period of time The probability for belonging to fraudulent user or fraud is higher, in one embodiment, parameter value be the 4th period be half an hour, Change frequency be three times, in another embodiment, parameter value be a hour, change frequency the 4th period be five times, In In another embodiment, parameter value be the 4th period be one day, change frequency is eight times;Whether the geographical location of user appears in In black address base, i.e. the geographical location of user, which appears in reference information blacklist library, then belongs to fraudulent user or fraud Probability it is higher, in one embodiment, parameter value be user geographical location appear in black address base;The cell room of user Whether valence abnormal, i.e. the cell room rate of user have it is abnormal then belong to fraudulent user or the probability of fraud is higher, at one In embodiment, parameter value is that the cell room rate of user has exception;The IP address of user terminal whether the geographical location pair with user Answer, i.e., the IP address of user terminal is not corresponding with the geographical location of user, belong to the probability of fraudulent user or fraud compared with Height, in one embodiment, parameter value are that the IP address of user terminal is not corresponding with the geographical location of user;Whether user terminal Issuing abnormal data packet, (abnormal data packet includes that the flow of data packet is excessive, data packet length is too long, it is abnormal to occur in data packet Field etc.), i.e., user terminal sending abnormal data Bao Ze belongs to fraudulent user or the probability of fraud is higher, in a reality It applies in example, user terminal issues abnormal data packet;Whether user terminal uses proxy server, i.e. user terminal uses agency's clothes Business device then belongs to fraudulent user or the probability of fraud is higher, and in one embodiment, parameter value is user terminal use Proxy server.Each parameter value and fraudulent user through a large amount of data statistics of inventor, arrangement and analysis, in above-described embodiment Or fraud has the association of high probability.Above-mentioned parameter can be individually or in any combination for training fraud User and/or test whether that is fraudulent user.
Bury a little and collect data be by burying a setting event and collecting the data with event correlation based on event, Burying a little includes that client buries point (also referred to as front end is buried a little) and server buries point (also referred to as rear end is buried a little), and collection data include net Page data is collected and APP data collection.
In the execution of step S120, when building the timing neural network 300 based on attention mechanism, and training this Sequence neural network 300, to define fraudulent user.
As shown in figure 3, the timing neural network 300 based on attention mechanism includes input layer 310, hidden layer 320, note Meaning power layer 330 and output layer 340.Build and train the process of the timing neural network based on attention mechanism as follows.Firstly, Input layer 310 inputs relevant to fraudulent user timing category feature (X=[X1, X2, X3 ..., Xn]) to hidden layer 320;Then, By each timing category feature be input to hidden layer 320 (including Hidden unit h1, h2, h3 ..., hn), hidden layer 320 calculates To the output of hidden layer (including α 1, α 2, α 3 ..., α n);Then, a hidden layer is input to attention layer 330, infused Power layer 330 of anticipating matches a hidden layer output and initial vector z0, and secondary vector z is obtained by calculation1;Then, hidden layer 320 Secondary hidden layer is calculated based on timing category feature and exports and be input to attention layer 330, attention layer 330 matches secondary hidden layer Output and secondary vector z1, and vector z three times is obtained by calculation2, the above-mentioned calculating of circulating repetition, training obtain each timing class The weight of feature;Finally, the weight definition of updated based on this, each timing category feature goes out learning objective Y, the learning objective It is under financial fraud scene " fraudulent user ".Wherein, this, which is built, is related to timing class nerve known in the art with training process Principles of Network and attention mechanism, the timing neural network can be RNN, LSTM network or GRU.
In the execution of step S130, by the data of user to be tested be input to trained completion, based on attention The timing neural network of mechanism analyzes the data of user to be tested;And user to be tested is judged by weighted calculation is No is fraudulent user.
Fig. 4 is a kind of structural schematic diagram for judging fraudulent user device 400 in the embodiment of the present invention.
Judge that fraudulent user device 400 includes constructing module 410, builds and training module 420, judgment module 430.Its In, constructing module 410 is suitable for construction feature matrix, and eigenmatrix includes timing category feature, and timing category feature is and fraudulent user Relevant feature, timing category feature are extracted based on the collected data of an operation are buried;It builds and is suitable for building with training module 420 Eigenmatrix is input to timing neural network, and uses attention by the timing neural network based on attention mechanism The weight of each timing category feature of mechanism training, to define fraudulent user;Judgment module 430 is suitable for user's to be tested Data be input to be completed it is trained, judge whether user to be tested is to take advantage of based on the timing neural network of attention mechanism Cheat user.
Moreover, it is judged that fraudulent user device 400 may include burying point module 500, Fig. 5 is that a mould is buried in the embodiment of the present invention The structural schematic diagram of block 500.
Point module 500 is buried to include classification indicators submodule 510, determine event submodule 520, bury a little and collect data submodule Block 530.Wherein, classification indicators submodule 510 is suitable for classification and the associated index of timing category feature;Determine event submodule 520 Suitable for determining triggering and the associated event of index based on preset parameter;Data submodule 530 is buried a little and collects to be suitable for by burying It puts setting event and collects the data with event correlation based on event.
In specific implementation, judge the relationship between the module in fraudulent user device 400 and each module, bury point module The relationship between submodule and each submodule in 500 can be used with reference to above-mentioned in the embodiment of the present invention about judgement fraud The description of family method, details are not described herein again.
The embodiment of the present invention also provides a kind of equipment for judging fraudulent user, including memory and processor, memory On be stored with the computer instruction that can be run on a processor, when processor operation computer instruction, executes above-mentioned judgement fraud and uses The step of family method.
The embodiments of the present invention also provide a kind of storage mediums, are stored thereon with computer instruction, computer instruction fortune The step of above-mentioned judgement fraudulent user method is executed when row.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can store in any computer readable storage medium storing program for executing, deposit Storage media may include: read-only memory (Read-Only Memory, referred to as ROM), random access memory (Random Access Memory, referred to as RAM), disk or CD etc..
Although present disclosure is as above, present invention is not limited to this.Anyone skilled in the art are not departing from this It in the spirit and scope of invention, can make various changes or modifications, therefore protection scope of the present invention should be with claim institute Subject to the range of restriction.

Claims (10)

1. a kind of method for judging fraudulent user characterized by comprising
Construction feature matrix, the eigenmatrix include timing category feature, and the timing category feature is and the fraudulent user phase The feature of pass, the timing category feature are extracted based on the collected data of an operation are buried;
The timing neural network based on attention mechanism is built, the eigenmatrix is input to the timing class nerve net Network, and using the weight of each timing category feature of attention mechanism training, to define the fraudulent user;
The data of user to be tested are input to be completed it is trained, described based on the timing neural network of attention mechanism come Judge whether the user to be tested is the fraudulent user.
2. the method according to claim 1, wherein the timing category feature includes operating characteristics and browsing feature At least one of in, the operating characteristics are feature relevant to the operational order of input, and the operating characteristics include clicking side Duration needed for helping the number of button, inputting text box, the browsing feature are feature relevant to page browsing, the browsing Feature include browse rate related pages number, browse rate related pages duration, browse loaning bill related pages number, Browse the duration of loaning bill related pages.
3. method according to claim 1 or 2, which is characterized in that the timing category feature includes user information feature, position At least one in feature and equipment feature is set, the user information feature includes whether user appears in reference information blacklist In library, user whether occur in Crime Information database, the position feature include the IP address of user terminal change frequency, Whether the geographical location of user appears in black address base, whether abnormal, user terminal the IP address of the cell room rate of user is No corresponding with the geographical location of user, the equipment feature includes that whether user terminal issues abnormal data packet, user terminal is It is no to use proxy server.
4. according to the method described in claim 3, it is characterized in that, described bury operation and include classification indicators, determine event, bury Point and collect data, the classification indicators be classification with the associated index of timing category feature, the determining event be based on Preset parameter determines triggering and the associated event of the index, described to bury a little and collect data as by burying a setting thing Part and data with the event correlation are collected based on the event.
5. according to the method described in claim 4, it is characterized in that, classification is with the associated index of timing category feature including dividing Generic operation index, browsing index, user information index, positioning index and equipment index, the operation index are and the operation The index of feature association, the browsing index are the index with the browsing feature, and the user information index is and the use The associated index of family information characteristics, the positioning index be with the associated index of the position feature, the equipment index be with The index of the equipment feature association.
6. according to the method described in claim 4, it is characterized in that, one or more in following item of the preset parameter A: duration needed for clicking the number of the help button within preset first period, inputting text box is normal input institute Take long multiple, the number for browsing within preset second period rate related pages, the browsing rate related pages The duration in face is the multiple of duration needed for normal browsing, browses the secondary of the loaning bill related pages within the preset third period It counts, browse the duration of the loaning bill related pages and whether appear in reference information for the multiple of duration needed for normal browsing, user In blacklist library, user whether occur in Crime Information database, within preset 4th period user terminal IP address change Change number, whether the geographical location of user appears in black address base, whether abnormal, user terminal the IP of the cell room rate of user Whether whether, user terminal corresponding with the geographical location of user issue abnormal data packet, user terminal using agency for address Server.
7. a kind of device for judging fraudulent user characterized by comprising
Constructing module, be suitable for construction feature matrix, the eigenmatrix includes timing category feature, the timing category feature for institute The relevant feature of fraudulent user is stated, the timing category feature is extracted based on the collected data of an operation are buried;
It builds and training module inputs the eigenmatrix suitable for building the timing neural network based on attention mechanism To the timing neural network, and using the weight of each timing category feature of attention mechanism training, to define The fraudulent user out;
Judgment module, suitable for the data of user to be tested are input to be completed it is trained, described based on attention mechanism when Sequence neural network judges whether the user to be tested is the fraudulent user.
8. device according to claim 7, which is characterized in that described device includes burying point module, described to bury point module packet Classification indicators submodule is included, event submodule is determined, buries a little and collect data submodule, the classification indicators submodule is suitable for dividing Class and the associated index of timing category feature, the determining event submodule are suitable for determining triggering and institute based on preset parameter The associated event of index is stated, it is described to bury a little and collect data submodule suitable for by burying a setting event and based on institute Event is stated to collect the data with the event correlation.
9. a kind of equipment for judging fraudulent user, including memory and processor, being stored on the memory can be at the place The computer instruction run on reason device, which is characterized in that perform claim requires 1 when the processor runs the computer instruction To described in any one of 6 the step of judgement fraudulent user method.
10. a kind of storage medium, is stored thereon with computer instruction, which is characterized in that the computer instruction executes when running The step of judgement fraudulent user method described in any one of claims 1 to 6.
CN201910594702.XA 2019-07-03 2019-07-03 Judge the method, apparatus, equipment and storage medium of fraudulent user Pending CN110399705A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910594702.XA CN110399705A (en) 2019-07-03 2019-07-03 Judge the method, apparatus, equipment and storage medium of fraudulent user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910594702.XA CN110399705A (en) 2019-07-03 2019-07-03 Judge the method, apparatus, equipment and storage medium of fraudulent user

Publications (1)

Publication Number Publication Date
CN110399705A true CN110399705A (en) 2019-11-01

Family

ID=68322774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910594702.XA Pending CN110399705A (en) 2019-07-03 2019-07-03 Judge the method, apparatus, equipment and storage medium of fraudulent user

Country Status (1)

Country Link
CN (1) CN110399705A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111340112A (en) * 2020-02-26 2020-06-26 腾讯科技(深圳)有限公司 Classification method, classification device and server

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108428132A (en) * 2018-03-15 2018-08-21 阿里巴巴集团控股有限公司 Fraudulent trading recognition methods, device, server and storage medium
CN108510280A (en) * 2018-03-23 2018-09-07 上海氪信信息技术有限公司 A kind of financial fraud behavior prediction method based on mobile device behavioral data
CN109101896A (en) * 2018-07-19 2018-12-28 电子科技大学 A kind of video behavior recognition methods based on temporal-spatial fusion feature and attention mechanism
CN109389494A (en) * 2018-10-25 2019-02-26 北京芯盾时代科技有限公司 Borrow or lend money fraud detection model training method, debt-credit fraud detection method and device
CN109409896A (en) * 2018-10-17 2019-03-01 北京芯盾时代科技有限公司 Identification model training method, bank's fraud recognition methods and device are cheated by bank

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108428132A (en) * 2018-03-15 2018-08-21 阿里巴巴集团控股有限公司 Fraudulent trading recognition methods, device, server and storage medium
CN108510280A (en) * 2018-03-23 2018-09-07 上海氪信信息技术有限公司 A kind of financial fraud behavior prediction method based on mobile device behavioral data
CN109101896A (en) * 2018-07-19 2018-12-28 电子科技大学 A kind of video behavior recognition methods based on temporal-spatial fusion feature and attention mechanism
CN109409896A (en) * 2018-10-17 2019-03-01 北京芯盾时代科技有限公司 Identification model training method, bank's fraud recognition methods and device are cheated by bank
CN109389494A (en) * 2018-10-25 2019-02-26 北京芯盾时代科技有限公司 Borrow or lend money fraud detection model training method, debt-credit fraud detection method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111340112A (en) * 2020-02-26 2020-06-26 腾讯科技(深圳)有限公司 Classification method, classification device and server
CN111340112B (en) * 2020-02-26 2023-09-26 腾讯科技(深圳)有限公司 Classification method, classification device and classification server

Similar Documents

Publication Publication Date Title
CN111428231B (en) Safety processing method, device and equipment based on user behaviors
CN110598016B (en) Method, device, equipment and medium for recommending multimedia information
Pacheco et al. Uncovering coordinated networks on social media
CN104836781B (en) Distinguish the method and device for accessing user identity
CN106453061B (en) A kind of method and system identifying network fraudulent act
CN110781308B (en) Anti-fraud system for constructing knowledge graph based on big data
CN113344562B (en) Method and device for detecting Etheng phishing accounts based on deep neural network
CN108491714A (en) The man-machine recognition methods of identifying code
CN106355405A (en) Method and device for identifying risks and system for preventing and controlling same
CN112231570B (en) Recommendation system support attack detection method, device, equipment and storage medium
CN110348528A (en) Method is determined based on the user credit of multidimensional data mining
Weng et al. Towards understanding the security of modern image captchas and underground captcha-solving services
CN110598982B (en) Active wind control method and system based on intelligent interaction
CN109413023A (en) The training of machine recognition model and machine identification method, device, electronic equipment
CN109831459A (en) Method, apparatus, storage medium and the terminal device of secure access
CN105337987A (en) Network user identity authentication method and system
CN107888606A (en) A kind of domain name credit assessment and system
CN116996325B (en) Network security detection method and system based on cloud computing
CN110675252A (en) Risk assessment method and device, electronic equipment and storage medium
CN110457601B (en) Social account identification method and device, storage medium and electronic device
CN109948339A (en) A kind of malicious script detection method based on machine learning
CN110399705A (en) Judge the method, apparatus, equipment and storage medium of fraudulent user
CN113609394A (en) Information flow-oriented safety recommendation system
CN111125747B (en) Commodity browsing privacy protection method and system for commercial website user
CN116319065A (en) Threat situation analysis method and system applied to business operation and maintenance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191101