CN113688389A - Data mining system and method based on computer network security - Google Patents
Data mining system and method based on computer network security Download PDFInfo
- Publication number
- CN113688389A CN113688389A CN202110959235.3A CN202110959235A CN113688389A CN 113688389 A CN113688389 A CN 113688389A CN 202110959235 A CN202110959235 A CN 202110959235A CN 113688389 A CN113688389 A CN 113688389A
- Authority
- CN
- China
- Prior art keywords
- client
- risk
- clients
- session
- conversation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
- G06F16/2465—Query processing support for facilitating data mining operations in structured databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- General Health & Medical Sciences (AREA)
- Fuzzy Systems (AREA)
- Mathematical Physics (AREA)
- Probability & Statistics with Applications (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a data mining system and method based on computer network security, and the method specifically comprises the following steps: after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk prejudgment on the clients; if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client; when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time; if the collected sensitive content has security risk, the server sends confirmation information to the client; if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off; the invention collects the sensitive content related to the conversation, judges whether the risk exists or not, and informs the risk to the client side to achieve better precaution effect and prevent the client from being cheated.
Description
Technical Field
The invention relates to the technical field of computer network security, in particular to a data mining system and method based on computer network security.
Background
With the rapid development of computer networks, in the last decade, various data mining technologies have been developed, such as discovery patterns, clustering, and various classified data types, however, existing computer network security-based sessions generally do not perform early warning processing on accounts of clients, do not consider contents of sessions, and do not perform good prevention processing on information related to fraud and the like, so that fraud is easy to achieve.
Disclosure of Invention
The present invention is directed to a data mining system and method based on computer network security, so as to solve the problems set forth in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
a data mining method based on computer network security specifically comprises the following steps:
after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk prejudgment on the clients;
if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client;
when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time;
if the collected sensitive content has security risk, the server sends confirmation information to the client;
if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off;
and collecting the session records of the client with the risk to derive the client account number which is contacted with the client before, and sending the risk message to the client connected before.
As a further scheme of the invention: the risk pre-judgment specifically comprises the following steps: and checking the credit value of the personal information data, and if the credit value is lower, warning the opposite client.
As a further scheme of the invention: the sensitive content includes a request for transfer, remittance, and bad information.
A computer network security based data mining system, the system comprising:
an invitation module: after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk prejudgment on the clients;
a request module: if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client;
an information collection module: when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time;
a judging module: if the collected sensitive content has security risk, the server sends confirmation information to the client;
an operation module: if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off;
the early warning message sending module: and collecting the session records of the client with the risk to derive the client account number which is contacted with the client before, and sending the risk message to the client connected before.
Compared with the prior art, the invention has the beneficial effects that: after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk pre-judgment on the clients, and an account of the client who invites is early warned in advance; the invention collects the sensitive content related to the conversation, judges whether the risk exists or not, and informs the risk to the client side to achieve better precaution effect and prevent the client from being cheated.
Drawings
FIG. 1 is a schematic diagram of a data mining method based on computer network security;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, in an embodiment of the present invention, a data mining method based on computer network security specifically includes the following steps:
after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk prejudgment on the clients;
if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client;
when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time;
if the collected sensitive content has security risk, the server sends confirmation information to the client;
if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off;
and collecting the session records of the client with the risk to derive the client account number which is contacted with the client before, and sending the risk message to the client connected before.
The risk pre-judgment specifically comprises the following steps: and checking the credit value of the personal information data, and if the credit value is lower, warning the opposite client.
Sensitive content includes requests for transfers, remittances, and bad information.
A computer network security based data mining system, the system comprising:
an invitation module: after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk prejudgment on the clients;
a request module: if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client;
an information collection module: when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time;
a judging module: if the collected sensitive content has security risk, the server sends confirmation information to the client;
an operation module: if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off;
the early warning message sending module: and collecting the session records of the client with the risk to derive the client account number which is contacted with the client before, and sending the risk message to the client connected before.
When the invention is used, the water-saving agent is added,
after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk pre-judgment on the clients;
if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client;
when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time;
if the collected sensitive content has security risk, the server sends confirmation information to the client;
if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off;
and collecting the session records of the client with the risk to derive the client account number which is contacted with the client before, and sending the risk message to the client connected before.
Although the present description is described in terms of embodiments, not every embodiment includes only a single embodiment, and such description is for clarity only, and those skilled in the art should be able to integrate the description as a whole, and the embodiments can be appropriately combined to form other embodiments as will be understood by those skilled in the art.
Therefore, the above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the present application; all changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Claims (4)
1. A data mining method based on computer network security is characterized by comprising the following steps:
after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk prejudgment on the clients;
if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client;
when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time;
if the collected sensitive content has security risk, the server sends confirmation information to the client;
if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off;
and collecting the session records of the client with the risk to derive the client account number which is contacted with the client before, and sending the risk message to the client connected before.
2. The data mining method based on computer network security according to claim 1, wherein the risk prediction specifically comprises: and checking the credit value of the personal information data, and if the credit value is lower, warning the opposite client.
3. The computer network security-based data mining method of claim 1, wherein the sensitive content comprises requirements for transfer of money, remittance of money, and bad information.
4. The computer network security based data mining system of claim 1, comprising:
an invitation module: after one client initiates a session invitation to the other client, the server collects personal information data of the clients and carries out risk prejudgment on the clients;
a request module: if the risk pre-judgment shows that the client does not have risk pre-warning, the other client responds to the session request of one client;
an information collection module: when a conversation is carried out between clients, sensitive contents related to the conversation are collected in real time;
a judging module: if the collected sensitive content has security risk, the server sends confirmation information to the client;
an operation module: if the client determines that the client is correct, eliminating the risk; if the client determines that the session has risks, the client accounts with the risks are logged off;
the early warning message sending module: and collecting the session records of the client with the risk to derive the client account number which is contacted with the client before, and sending the risk message to the client connected before.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110959235.3A CN113688389A (en) | 2021-08-20 | 2021-08-20 | Data mining system and method based on computer network security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110959235.3A CN113688389A (en) | 2021-08-20 | 2021-08-20 | Data mining system and method based on computer network security |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113688389A true CN113688389A (en) | 2021-11-23 |
Family
ID=78580958
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110959235.3A Pending CN113688389A (en) | 2021-08-20 | 2021-08-20 | Data mining system and method based on computer network security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113688389A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101242588A (en) * | 2007-02-09 | 2008-08-13 | 华为技术有限公司 | Control method for session invitation, multi-party communication system, its server and originating terminal |
CN109525484A (en) * | 2018-11-20 | 2019-03-26 | 阿里巴巴集团控股有限公司 | Risk identification treating method and apparatus |
CN110798427A (en) * | 2018-08-01 | 2020-02-14 | 深信服科技股份有限公司 | Anomaly detection method, device and equipment in network security defense |
CN111770011A (en) * | 2019-04-01 | 2020-10-13 | 钉钉控股(开曼)有限公司 | Risk prompting method and device, electronic equipment and computer readable storage medium |
CN113240269A (en) * | 2021-05-11 | 2021-08-10 | 许昌学院 | Data risk management method and system for enterprise management system |
-
2021
- 2021-08-20 CN CN202110959235.3A patent/CN113688389A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101242588A (en) * | 2007-02-09 | 2008-08-13 | 华为技术有限公司 | Control method for session invitation, multi-party communication system, its server and originating terminal |
CN110798427A (en) * | 2018-08-01 | 2020-02-14 | 深信服科技股份有限公司 | Anomaly detection method, device and equipment in network security defense |
CN109525484A (en) * | 2018-11-20 | 2019-03-26 | 阿里巴巴集团控股有限公司 | Risk identification treating method and apparatus |
CN111770011A (en) * | 2019-04-01 | 2020-10-13 | 钉钉控股(开曼)有限公司 | Risk prompting method and device, electronic equipment and computer readable storage medium |
CN113240269A (en) * | 2021-05-11 | 2021-08-10 | 许昌学院 | Data risk management method and system for enterprise management system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109214617A (en) | A kind of internet financial risks qualitative assessment auditing system | |
EP1026644A1 (en) | Method and apparatus for performing electronic transactions | |
CN101770669A (en) | Bank automatic warning system and method thereof | |
CN103035078A (en) | Payment security monitoring method based on position | |
US20230006910A1 (en) | Apparatus, computer program and method | |
CN106127463B (en) | Transfer control method and terminal equipment | |
US20040039691A1 (en) | Electronic funds transaction system | |
CN105389488A (en) | Identity authentication method and apparatus | |
CN105429948A (en) | Risk account identification method and device | |
US10719825B2 (en) | Method and system for secure protocol exchange | |
CN113052594A (en) | Multi-card cooperative payment method and device based on block chain | |
CN110533522A (en) | Resource allocation checking method, electronic device and computer readable storage medium | |
US20100036774A1 (en) | Method for User Registration with a Proxy for Further Work with One of the Server Units | |
CN113688389A (en) | Data mining system and method based on computer network security | |
CN111127030A (en) | Transaction early warning method, device and equipment | |
CA3139451A1 (en) | Payment anti-transfer method, device and system | |
CN110719195B (en) | Group cooperation sharing system based on digital service community and working method | |
WO2021262073A1 (en) | Method and system for controlling a bidding process | |
CN113011962A (en) | Resource allocation method and device | |
TWI778271B (en) | Method for electronic trading examination and system for electronic trading | |
KR20140147303A (en) | Money shift monitoring method and server performing the same | |
EP3907691A1 (en) | An apparatus, computer program and method | |
CN110648240A (en) | Intelligent insurance system and method based on block chain | |
TWM645836U (en) | Exclusive reporting system for client service | |
CN106462855A (en) | Online funds management method, data interaction processing method, and device and system therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |