CN113779569A - Risk behavior analysis method and system based on big data - Google Patents

Risk behavior analysis method and system based on big data Download PDF

Info

Publication number
CN113779569A
CN113779569A CN202111097462.6A CN202111097462A CN113779569A CN 113779569 A CN113779569 A CN 113779569A CN 202111097462 A CN202111097462 A CN 202111097462A CN 113779569 A CN113779569 A CN 113779569A
Authority
CN
China
Prior art keywords
fraud
risk
vector
node data
interception
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202111097462.6A
Other languages
Chinese (zh)
Inventor
杨建国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taicang Taoxin Information Technology Co ltd
Original Assignee
Taicang Taoxin Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taicang Taoxin Information Technology Co ltd filed Critical Taicang Taoxin Information Technology Co ltd
Priority to CN202111097462.6A priority Critical patent/CN113779569A/en
Publication of CN113779569A publication Critical patent/CN113779569A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

According to the risk behavior analysis method and system based on big data provided by the embodiment of the invention, firstly, a plurality of fraud behavior node data with correlation are extracted based on fraud event data which is obtained in a service flow of a service application and covers fraud risk vectors, then, fraud positioning vectors corresponding to the fraud behavior node data are determined, then, if the fraud positioning vectors are matched with target requirements, fraud risk behaviors corresponding to the fraud behavior node data with correlation are determined, and finally, based on the fraud risk behaviors and the fraud event data of the service application flow, risk interception instruction sets related to the fraud risk behaviors and the fraud risk vectors are called, and the fraud positioning vectors are intercepted through an interception rule corresponding to the service application flow. Therefore, the intelligent prediction analysis can be carried out aiming at the fraud risk, the interception processing is carried out, and the reliability of the service operation can be improved.

Description

Risk behavior analysis method and system based on big data
Technical Field
The invention relates to the technical field of big data, in particular to a risk behavior analysis method and system based on big data.
Background
How to carry out intelligent prediction analysis aiming at fraud risks and carry out interception processing, which can improve the reliability of service operation, is a technical problem to be solved urgently.
Disclosure of Invention
Based on the above problems, an embodiment of the present invention provides a risk behavior analysis method based on big data, including:
extracting a plurality of associated fraud behavior node data based on fraud event data which is obtained in a service flow of a service application and covers fraud risk vectors;
determining a fraud positioning vector corresponding to the fraud node data based on the associated fraud node data, wherein the fraud positioning vector represents the relationship characteristics between the fraud risk vector and a plurality of set fraud positioning nodes;
determining fraud risk behaviors corresponding to the plurality of fraud behavior node data associated with the existence if the fraud positioning vector matches a target requirement; and calling a risk interception instruction set related to the fraud risk behaviors and the fraud risk vectors based on the fraud risk behaviors and the fraud event data of the service application flow, and intercepting the fraud positioning vectors through an interception rule corresponding to the service application flow.
Determining a fraud positioning vector corresponding to the fraud node data based on the plurality of fraud node data associated with the existence, including:
and inputting the fraudulent conduct node data into an AI prediction model, and predicting a fraudulent positioning vector corresponding to the fraudulent conduct node data through the AI prediction model.
Wherein determining fraud risk behavior corresponding to the plurality of fraud node data associated with the presence if the fraud positioning vector matches a target requirement comprises:
if the fraud positioning vector is matched with the target requirement, determining a fraud migration segment matrix corresponding to the fraud positioning vector;
and matching fraud risk behaviors corresponding to the fraud migration segment matrix from a preset configured feature matching library based on the fraud migration segment matrix.
Matching fraud risk behaviors corresponding to the fraud migration segment matrix from a preset configured feature matching library based on the fraud migration segment matrix, wherein the fraud risk behaviors comprise:
determining a plurality of risk behavior components corresponding to the fraud migration segment matrix from the feature matching library based on the fraud migration segment matrix;
confirming the fraud positioning vector by the target business server through the plurality of risk behavior components;
and determining the target fraud risk behavior based on the confirmation indication information of the target business server aiming at the plurality of risk behavior components.
Wherein the method further comprises:
and generating interception execution information corresponding to the risk interception instruction set based on the risk interception instruction set, and activating and executing the interception execution information and the risk interception instruction set.
The invention also provides a risk behavior analysis system based on big data, which comprises:
the extraction module is used for extracting a plurality of fraud behavior node data with correlation based on the fraud event data which is obtained in the service flow of the service application and covers the fraud risk vector;
the determining module is used for determining a fraud positioning vector corresponding to the fraud node data based on the associated fraud node data, wherein the fraud positioning vector represents the relationship characteristics between the fraud risk vector and a plurality of set fraud positioning nodes;
an interception module, configured to determine a fraud risk behavior corresponding to the plurality of fraud behavior node data associated with the existence if the fraud positioning vector matches a target requirement; and calling a risk interception instruction set related to the fraud risk behaviors and the fraud risk vectors based on the fraud risk behaviors and the fraud event data of the service application flow, and intercepting the fraud positioning vectors through an interception rule corresponding to the service application flow.
Wherein the determining module is specifically configured to:
and inputting the fraudulent conduct node data into an AI prediction model, and predicting a fraudulent positioning vector corresponding to the fraudulent conduct node data through the AI prediction model.
Wherein the intercepting module is specifically configured to:
if the fraud positioning vector is matched with the target requirement, determining a fraud migration segment matrix corresponding to the fraud positioning vector; and matching fraud risk behaviors corresponding to the fraud migration segment matrix from a preset configured feature matching library based on the fraud migration segment matrix.
Wherein the intercepting module is further specifically configured to:
determining a plurality of risk behavior components corresponding to the fraud migration segment matrix from the feature matching library based on the fraud migration segment matrix;
confirming the fraud positioning vector by the target business server through the plurality of risk behavior components;
and determining the target fraud risk behavior based on the confirmation indication information of the target business server aiming at the plurality of risk behavior components.
The system further comprises:
and the execution module is used for generating interception execution information corresponding to the risk interception instruction set based on the risk interception instruction set, and activating and executing the interception execution information and the risk interception instruction set.
To sum up, in the risk analysis method and system based on big data provided in the embodiments of the present invention, first, based on the fraud event data covering the fraud risk vector obtained in the service flow of the service application, a plurality of relevant fraud node data are extracted, then, based on the plurality of relevant fraud node data, a fraud positioning vector corresponding to the fraud node data is determined, where the fraud positioning vector represents a relationship characteristic between the fraud risk vector and a plurality of set fraud positioning nodes, then, if the fraud positioning vector matches a target requirement, a fraud risk behavior corresponding to the plurality of relevant fraud node data is determined, and finally, based on the fraud risk behavior and the fraud event data of the service application flow, a risk interception instruction set associated with the fraud risk behavior and the fraud risk vector is retrieved, and intercepting the fraud positioning vector through an interception rule corresponding to the business application flow. Therefore, the reliability of service operation can be improved by carrying out intelligent prediction analysis on the fraud risk vector and carrying out interception processing on the fraud risk vector.
In order to make the aforementioned objects, features and advantages of the embodiments of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings are only some embodiments of the present invention, and therefore should not be considered as limiting the scope, and it is obvious for those skilled in the art that other related drawings can be obtained based on these drawings without inventive efforts.
FIG. 1 is a schematic flow chart of a big data-based risk behavior analysis method according to an embodiment of the present invention;
fig. 2 is a functional block diagram of a big data-based risk behavior analysis system according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood by the scholars in the technical field, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow diagram of a risk behavior analysis method based on big data according to an embodiment of the present invention, where the abnormal behavior intercepting method may be executed by a monitoring server for providing a business application flow service, and executed by a background server for providing the business application flow service.
A server may include one or more processors, such as one or more Central Processing Units (CPUs), each of which may implement one or more hardware threads. A server may also include any storage medium for storing any kind of information, such as code, settings, data, etc. For example, and without limitation, the storage medium may include any one or more of the following in combination: any type of RAM, any type of ROM, flash memory devices, hard disks, optical disks, etc. More generally, any storage medium may use any technology to store information. Further, any storage medium may provide volatile or non-volatile retention of information. Further, any storage medium may represent a fixed or removable component of a server. In one case, the server may perform any of the operations of the associated instructions when the processor executes the corresponding instructions stored in any storage medium or combination of storage media. The server also comprises one or more drive units for interacting with any storage medium, such as a hard disk drive unit, an optical disk drive unit, etc.
The server also includes input/output (I/O) for receiving various inputs (via the input unit) and for providing various outputs (via the output unit)). One particular output mechanism may include a presentation device and a corresponding Graphical User Interface (GUI). The server may also include one or more network interfaces for exchanging data with other devices via one or more communication units. One or more communication buses couple the above-described components together.
The communication unit may be implemented in any manner, e.g., over a local area network, a wide area network (e.g., the internet), a point-to-point connection, etc., or any combination thereof. The communication units may comprise any combination of hardwired links, wireless links, routers, gateway functions, etc., governed by any protocol or combination of protocols.
The detailed steps of the big data based risk behavior analysis method are introduced as follows.
Step 100, extracting a plurality of fraud node data associated with the fraud event based on the fraud event data covering the fraud risk vector obtained in the service application flow.
Step 200, determining a fraud positioning vector corresponding to the fraud node data based on the associated fraud node data, wherein the fraud positioning vector represents the relationship characteristics between the fraud risk vector and a plurality of set fraud positioning nodes.
Step 300, if the fraud positioning vector matches the target requirement, determining fraud risk behaviors corresponding to the plurality of fraud behavior node data associated with the existence; and calling a risk interception instruction set related to the fraud risk behaviors and the fraud risk vectors based on the fraud risk behaviors and the fraud event data of the service application flow, and intercepting the fraud positioning vectors through an interception rule corresponding to the service application flow.
In one possible implementation manner, for step 200, the determining, based on the plurality of fraud node data associated with the existence, a fraud positioning vector corresponding to the fraud node data includes:
and inputting the fraudulent conduct node data into an AI prediction model, and predicting a fraudulent positioning vector corresponding to the fraudulent conduct node data through the AI prediction model.
In one possible implementation, for step 300, if the fraud location vector matches a target requirement, determining fraud risk behaviors corresponding to the plurality of fraud node data associated with the presence includes:
if the fraud positioning vector is matched with the target requirement, determining a fraud migration segment matrix corresponding to the fraud positioning vector; and matching fraud risk behaviors corresponding to the fraud migration segment matrix from a preset configured feature matching library based on the fraud migration segment matrix.
In one possible implementation, for step 300, matching fraud risk behaviors corresponding to the fraud migration segment matrix from a feature matching library based on the fraud migration segment matrix includes:
determining a plurality of risk behavior components corresponding to the fraud migration segment matrix from the feature matching library based on the fraud migration segment matrix;
confirming the fraud positioning vector by the target business server through the plurality of risk behavior components;
and determining the target fraud risk behavior based on the confirmation indication information of the target business server aiming at the plurality of risk behavior components.
In a possible implementation manner, the method according to this embodiment further includes:
and generating interception execution information corresponding to the risk interception instruction set based on the risk interception instruction set, and activating and executing the interception execution information and the risk interception instruction set.
Fig. 2 is a functional block diagram of an abnormal behavior intercepting system according to an embodiment of the present invention, where functions implemented by the abnormal behavior intercepting system may correspond to steps executed by the foregoing method. The abnormal behavior intercepting system may be understood as the server or a processor of the server, or may be understood as a component that is independent from the server or the processor and implements the functions of the present invention under the control of the server, as shown in fig. 2, and the functions of each functional module of the abnormal behavior intercepting system are described in detail below.
An extraction module 210, configured to extract, based on fraud event data that covers a fraud risk vector and is obtained in a service flow of a service application, a plurality of relevant fraud behavior node data;
a determining module 220, configured to determine, based on the associated multiple fraudulent conduct node data, a fraudulent location vector corresponding to the fraudulent conduct node data, where the fraudulent location vector represents a relationship feature between the fraud risk vector and multiple set fraudulent location nodes;
an intercepting module 230, configured to determine a fraud risk behavior corresponding to the plurality of fraud node data associated with the existence if the fraud positioning vector matches a target requirement; and calling a risk interception instruction set related to the fraud risk behaviors and the fraud risk vectors based on the fraud risk behaviors and the fraud event data of the service application flow, and intercepting the fraud positioning vectors through an interception rule corresponding to the service application flow.
In a possible implementation manner, the determining module is specifically configured to:
and inputting the fraudulent conduct node data into an AI prediction model, and predicting a fraudulent positioning vector corresponding to the fraudulent conduct node data through the AI prediction model.
In a possible implementation manner, the intercepting module is specifically configured to:
if the fraud positioning vector is matched with the target requirement, determining a fraud migration segment matrix corresponding to the fraud positioning vector; and matching fraud risk behaviors corresponding to the fraud migration segment matrix from a preset configured feature matching library based on the fraud migration segment matrix.
In a possible implementation manner, the intercepting module is specifically further configured to:
determining a plurality of risk behavior components corresponding to the fraud migration segment matrix from the feature matching library based on the fraud migration segment matrix;
confirming the fraud positioning vector by the target business server through the plurality of risk behavior components;
and determining the target fraud risk behavior based on the confirmation indication information of the target business server aiming at the plurality of risk behavior components.
In one possible embodiment, the system further comprises:
and the execution module 240 is configured to generate interception execution information corresponding to the risk interception instruction set based on the risk interception instruction set, and activate and execute the interception execution information and the risk interception instruction set.
To sum up, in the risk analysis method and system based on big data provided in the embodiments of the present invention, first, based on the fraud event data covering the fraud risk vector obtained in the service flow of the service application, a plurality of relevant fraud node data are extracted, then, based on the plurality of relevant fraud node data, a fraud positioning vector corresponding to the fraud node data is determined, where the fraud positioning vector represents a relationship characteristic between the fraud risk vector and a plurality of set fraud positioning nodes, then, if the fraud positioning vector matches a target requirement, a fraud risk behavior corresponding to the plurality of relevant fraud node data is determined, and finally, based on the fraud risk behavior and the fraud event data of the service application flow, a risk interception instruction set associated with the fraud risk behavior and the fraud risk vector is retrieved, and intercepting the fraud positioning vector through an interception rule corresponding to the business application flow. Therefore, the reliability of service operation can be improved by carrying out intelligent prediction analysis on the fraud risk vector and carrying out interception processing on the fraud risk vector. It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
Alternatively, all or part of the implementation may be in software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website site, computer, or data center to another website site, computer, or data center by wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that is integrated over one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any drawing credit or debit acknowledgement in the claims should not be construed as limiting the claim concerned.

Claims (10)

1. A risk behavior analysis method based on big data is characterized by comprising the following steps:
extracting a plurality of associated fraud behavior node data based on fraud event data which is obtained in a service flow of a service application and covers fraud risk vectors;
determining a fraud positioning vector corresponding to the fraud node data based on the associated fraud node data, wherein the fraud positioning vector represents the relationship characteristics between the fraud risk vector and a plurality of set fraud positioning nodes;
and if the fraud positioning vector is matched with a target requirement, determining fraud risk behaviors corresponding to the plurality of fraud behavior node data with the association, calling risk interception instruction sets associated with the fraud risk behaviors and the fraud risk vector based on the fraud risk behaviors and fraud event data of the business application flow, and intercepting the fraud positioning vector through an interception rule corresponding to the business application flow.
2. The method according to claim 1, wherein the determining a fraud location vector corresponding to the fraud node data based on the plurality of fraud node data associated with the presence comprises:
and inputting the fraudulent conduct node data into an AI prediction model, and predicting a fraudulent positioning vector corresponding to the fraudulent conduct node data through the AI prediction model.
3. The method of claim 1, wherein determining fraud risk behavior corresponding to the plurality of fraud node data associated with the presence if the fraud positioning vector matches a target requirement comprises:
if the fraud positioning vector is matched with the target requirement, determining a fraud migration segment matrix corresponding to the fraud positioning vector;
and matching fraud risk behaviors corresponding to the fraud migration segment matrix from a preset configured feature matching library based on the fraud migration segment matrix.
4. The method according to claim 3, wherein matching fraud risk behavior corresponding to the fraud migration segment matrix from a pre-configured feature matching library based on the fraud migration segment matrix comprises:
determining a plurality of risk behavior components corresponding to the fraud migration segment matrix from the feature matching library based on the fraud migration segment matrix;
confirming the fraud positioning vector by the target business server through the plurality of risk behavior components;
and determining the target fraud risk behavior based on the confirmation indication information of the target business server aiming at the plurality of risk behavior components.
5. The method of claim 1, further comprising:
and generating interception execution information corresponding to the risk interception instruction set based on the risk interception instruction set, and activating and executing the interception execution information and the risk interception instruction set.
6. A big-data-based risk behavior analysis system, comprising:
the extraction module is used for extracting a plurality of fraud behavior node data with correlation based on the fraud event data which is obtained in the service flow of the service application and covers the fraud risk vector;
the determining module is used for determining a fraud positioning vector corresponding to the fraud node data based on the associated fraud node data, wherein the fraud positioning vector represents the relationship characteristics between the fraud risk vector and a plurality of set fraud positioning nodes;
and the interception module is used for determining fraud risk behaviors corresponding to the associated fraud behavior node data if the fraud positioning vector is matched with a target requirement, calling a risk interception instruction set associated with the fraud risk behaviors and the fraud risk vector based on the fraud risk behaviors and fraud event data of the service application flow, and intercepting the fraud positioning vector through an interception rule corresponding to the service application flow.
7. The system of claim 6, wherein the determination module is specifically configured to:
and inputting the fraudulent conduct node data into an AI prediction model, and predicting a fraudulent positioning vector corresponding to the fraudulent conduct node data through the AI prediction model.
8. The system of claim 6, wherein the interception module is specifically configured to:
if the fraud positioning vector is matched with the target requirement, determining a fraud migration segment matrix corresponding to the fraud positioning vector; and matching fraud risk behaviors corresponding to the fraud migration segment matrix from a preset configured feature matching library based on the fraud migration segment matrix.
9. The system of claim 8, wherein the interception module is further specifically configured to:
determining a plurality of risk behavior components corresponding to the fraud migration segment matrix from the feature matching library based on the fraud migration segment matrix;
confirming the fraud positioning vector by the target business server through the plurality of risk behavior components;
and determining the target fraud risk behavior based on the confirmation indication information of the target business server aiming at the plurality of risk behavior components.
10. The system of claim 6, further comprising:
and the execution module is used for generating interception execution information corresponding to the risk interception instruction set based on the risk interception instruction set, and activating and executing the interception execution information and the risk interception instruction set.
CN202111097462.6A 2021-09-18 2021-09-18 Risk behavior analysis method and system based on big data Withdrawn CN113779569A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111097462.6A CN113779569A (en) 2021-09-18 2021-09-18 Risk behavior analysis method and system based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111097462.6A CN113779569A (en) 2021-09-18 2021-09-18 Risk behavior analysis method and system based on big data

Publications (1)

Publication Number Publication Date
CN113779569A true CN113779569A (en) 2021-12-10

Family

ID=78852313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111097462.6A Withdrawn CN113779569A (en) 2021-09-18 2021-09-18 Risk behavior analysis method and system based on big data

Country Status (1)

Country Link
CN (1) CN113779569A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115174231A (en) * 2022-07-08 2022-10-11 哈尔滨悦道科技开发有限公司 AI-Knowledge-Base-based network fraud analysis method and server

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115174231A (en) * 2022-07-08 2022-10-11 哈尔滨悦道科技开发有限公司 AI-Knowledge-Base-based network fraud analysis method and server
CN115174231B (en) * 2022-07-08 2024-01-02 北京基智科技有限公司 Network fraud analysis method and server based on AI Knowledge Base

Similar Documents

Publication Publication Date Title
JP6689283B2 (en) Method and apparatus for assigning device fingerprints to internet devices
CN109992473B (en) Application system monitoring method, device, equipment and storage medium
US10630399B2 (en) Testing distributed applications that have an established exchange in an advanced message queuing protocol (AMQP) message broker
CN111598575A (en) Business process control method and device, electronic equipment and readable storage medium
US10628210B2 (en) System and method for enabling API interoperability
CN113779569A (en) Risk behavior analysis method and system based on big data
CN113761526A (en) Attack intention analysis method and system based on big data
CN113360210A (en) Data reconciliation method and device, computer equipment and storage medium
CN108647284A (en) Record method and device, medium and the computing device of user behavior
CN110704273A (en) Configuration information processing method and device, electronic equipment and storage medium
CN112732547A (en) Service testing method and device, storage medium and electronic equipment
CN113032647B (en) Data analysis system
CN113301054A (en) Network security monitoring method and network security monitoring system
CN115358873A (en) Business scene configuration system, method, electronic equipment and storage medium
CN115037653A (en) Service flow monitoring method and device, electronic equipment and storage medium
CN113297491A (en) Service subscription information pushing method and system based on social network
CN113298622A (en) Method and system for processing e-commerce business orders based on machine learning
US11321481B1 (en) Method for determining to grant or deny a permission request based on empirical data aggregation
CN114002247A (en) Three-dimensional electron diffraction data acquisition method and system for electron beam sensitive crystal
CN114474150A (en) Stability testing method and system for seven-axis robot
CN114444119A (en) Security protection method and system based on electronic commerce
CN114448676A (en) Information interception method and system applied to electronic commerce live broadcast
CN114465773A (en) Threat identification method and system based on electronic commerce
CN113434404B (en) Automatic service verification method and device for verifying reliability of disaster recovery system
CN115454697B (en) Information processing method and device for service exception, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20211210

WW01 Invention patent application withdrawn after publication