CN113688389A - Data mining system and method based on computer network security - Google Patents

Data mining system and method based on computer network security Download PDF

Info

Publication number
CN113688389A
CN113688389A CN202110959235.3A CN202110959235A CN113688389A CN 113688389 A CN113688389 A CN 113688389A CN 202110959235 A CN202110959235 A CN 202110959235A CN 113688389 A CN113688389 A CN 113688389A
Authority
CN
China
Prior art keywords
client
risk
clients
session
conversation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110959235.3A
Other languages
Chinese (zh)
Inventor
冯朝一
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuchang University
Original Assignee
Xuchang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuchang University filed Critical Xuchang University
Priority to CN202110959235.3A priority Critical patent/CN113688389A/en
Publication of CN113688389A publication Critical patent/CN113688389A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2465Query processing support for facilitating data mining operations in structured databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a data mining system and method based on computer network security, and the method specifically comprises the following steps: after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk prejudgment on the clients; if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client; when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time; if the collected sensitive content has security risk, the server sends confirmation information to the client; if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off; the invention collects the sensitive content related to the conversation, judges whether the risk exists or not, and informs the risk to the client side to achieve better precaution effect and prevent the client from being cheated.

Description

Data mining system and method based on computer network security
Technical Field
The invention relates to the technical field of computer network security, in particular to a data mining system and method based on computer network security.
Background
With the rapid development of computer networks, in the last decade, various data mining technologies have been developed, such as discovery patterns, clustering, and various classified data types, however, existing computer network security-based sessions generally do not perform early warning processing on accounts of clients, do not consider contents of sessions, and do not perform good prevention processing on information related to fraud and the like, so that fraud is easy to achieve.
Disclosure of Invention
The present invention is directed to a data mining system and method based on computer network security, so as to solve the problems set forth in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
a data mining method based on computer network security specifically comprises the following steps:
after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk prejudgment on the clients;
if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client;
when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time;
if the collected sensitive content has security risk, the server sends confirmation information to the client;
if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off;
and collecting the session records of the client with the risk to derive the client account number which is contacted with the client before, and sending the risk message to the client connected before.
As a further scheme of the invention: the risk pre-judgment specifically comprises the following steps: and checking the credit value of the personal information data, and if the credit value is lower, warning the opposite client.
As a further scheme of the invention: the sensitive content includes a request for transfer, remittance, and bad information.
A computer network security based data mining system, the system comprising:
an invitation module: after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk prejudgment on the clients;
a request module: if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client;
an information collection module: when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time;
a judging module: if the collected sensitive content has security risk, the server sends confirmation information to the client;
an operation module: if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off;
the early warning message sending module: and collecting the session records of the client with the risk to derive the client account number which is contacted with the client before, and sending the risk message to the client connected before.
Compared with the prior art, the invention has the beneficial effects that: after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk pre-judgment on the clients, and an account of the client who invites is early warned in advance; the invention collects the sensitive content related to the conversation, judges whether the risk exists or not, and informs the risk to the client side to achieve better precaution effect and prevent the client from being cheated.
Drawings
FIG. 1 is a schematic diagram of a data mining method based on computer network security;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, in an embodiment of the present invention, a data mining method based on computer network security specifically includes the following steps:
after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk prejudgment on the clients;
if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client;
when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time;
if the collected sensitive content has security risk, the server sends confirmation information to the client;
if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off;
and collecting the session records of the client with the risk to derive the client account number which is contacted with the client before, and sending the risk message to the client connected before.
The risk pre-judgment specifically comprises the following steps: and checking the credit value of the personal information data, and if the credit value is lower, warning the opposite client.
Sensitive content includes requests for transfers, remittances, and bad information.
A computer network security based data mining system, the system comprising:
an invitation module: after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk prejudgment on the clients;
a request module: if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client;
an information collection module: when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time;
a judging module: if the collected sensitive content has security risk, the server sends confirmation information to the client;
an operation module: if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off;
the early warning message sending module: and collecting the session records of the client with the risk to derive the client account number which is contacted with the client before, and sending the risk message to the client connected before.
When the invention is used, the water-saving agent is added,
after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk pre-judgment on the clients;
if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client;
when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time;
if the collected sensitive content has security risk, the server sends confirmation information to the client;
if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off;
and collecting the session records of the client with the risk to derive the client account number which is contacted with the client before, and sending the risk message to the client connected before.
Although the present description is described in terms of embodiments, not every embodiment includes only a single embodiment, and such description is for clarity only, and those skilled in the art should be able to integrate the description as a whole, and the embodiments can be appropriately combined to form other embodiments as will be understood by those skilled in the art.
Therefore, the above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application; all changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.

Claims (4)

1. A data mining method based on computer network security is characterized by comprising the following steps:
after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk prejudgment on the clients;
if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client;
when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time;
if the collected sensitive content has security risk, the server sends confirmation information to the client;
if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off;
and collecting the session records of the client with the risk to derive the client account number which is contacted with the client before, and sending the risk message to the client connected before.
2. The data mining method based on computer network security according to claim 1, wherein the risk prediction specifically comprises: and checking the credit value of the personal information data, and if the credit value is lower, warning the opposite client.
3. The computer network security-based data mining method of claim 1, wherein the sensitive content comprises requirements for transfer of money, remittance of money, and bad information.
4. The computer network security based data mining system of claim 1, comprising:
an invitation module: after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk prejudgment on the clients;
a request module: if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client;
an information collection module: when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time;
a judging module: if the collected sensitive content has security risk, the server sends confirmation information to the client;
an operation module: if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off;
the early warning message sending module: and collecting the session records of the client with the risk to derive the client account number which is contacted with the client before, and sending the risk message to the client connected before.
CN202110959235.3A 2021-08-20 2021-08-20 Data mining system and method based on computer network security Pending CN113688389A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110959235.3A CN113688389A (en) 2021-08-20 2021-08-20 Data mining system and method based on computer network security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110959235.3A CN113688389A (en) 2021-08-20 2021-08-20 Data mining system and method based on computer network security

Publications (1)

Publication Number Publication Date
CN113688389A true CN113688389A (en) 2021-11-23

Family

ID=78580958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110959235.3A Pending CN113688389A (en) 2021-08-20 2021-08-20 Data mining system and method based on computer network security

Country Status (1)

Country Link
CN (1) CN113688389A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242588A (en) * 2007-02-09 2008-08-13 华为技术有限公司 Control method for session invitation, multi-party communication system, its server and originating terminal
CN109525484A (en) * 2018-11-20 2019-03-26 阿里巴巴集团控股有限公司 Risk identification treating method and apparatus
CN110798427A (en) * 2018-08-01 2020-02-14 深信服科技股份有限公司 Anomaly detection method, device and equipment in network security defense
CN111770011A (en) * 2019-04-01 2020-10-13 钉钉控股(开曼)有限公司 Risk prompting method and device, electronic equipment and computer readable storage medium
CN113240269A (en) * 2021-05-11 2021-08-10 许昌学院 Data risk management method and system for enterprise management system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242588A (en) * 2007-02-09 2008-08-13 华为技术有限公司 Control method for session invitation, multi-party communication system, its server and originating terminal
CN110798427A (en) * 2018-08-01 2020-02-14 深信服科技股份有限公司 Anomaly detection method, device and equipment in network security defense
CN109525484A (en) * 2018-11-20 2019-03-26 阿里巴巴集团控股有限公司 Risk identification treating method and apparatus
CN111770011A (en) * 2019-04-01 2020-10-13 钉钉控股(开曼)有限公司 Risk prompting method and device, electronic equipment and computer readable storage medium
CN113240269A (en) * 2021-05-11 2021-08-10 许昌学院 Data risk management method and system for enterprise management system

Similar Documents

Publication Publication Date Title
CN109214617A (en) A kind of internet financial risks qualitative assessment auditing system
EP1026644A1 (en) Method and apparatus for performing electronic transactions
CN101770669A (en) Bank automatic warning system and method thereof
CN103035078A (en) Payment security monitoring method based on position
US20230006910A1 (en) Apparatus, computer program and method
CN106127463B (en) Transfer control method and terminal equipment
US20040039691A1 (en) Electronic funds transaction system
CN105389488A (en) Identity authentication method and apparatus
CN105429948A (en) Risk account identification method and device
US10719825B2 (en) Method and system for secure protocol exchange
CN113052594A (en) Multi-card cooperative payment method and device based on block chain
CN110533522A (en) Resource allocation checking method, electronic device and computer readable storage medium
US20100036774A1 (en) Method for User Registration with a Proxy for Further Work with One of the Server Units
CN113688389A (en) Data mining system and method based on computer network security
CN111127030A (en) Transaction early warning method, device and equipment
CA3139451A1 (en) Payment anti-transfer method, device and system
CN110719195B (en) Group cooperation sharing system based on digital service community and working method
WO2021262073A1 (en) Method and system for controlling a bidding process
CN113011962A (en) Resource allocation method and device
TWI778271B (en) Method for electronic trading examination and system for electronic trading
KR20140147303A (en) Money shift monitoring method and server performing the same
EP3907691A1 (en) An apparatus, computer program and method
CN110648240A (en) Intelligent insurance system and method based on block chain
TWM645836U (en) Exclusive reporting system for client service
CN106462855A (en) Online funds management method, data interaction processing method, and device and system therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination