CN117061232B - Early warning method for message security in network communication - Google Patents

Early warning method for message security in network communication Download PDF

Info

Publication number
CN117061232B
CN117061232B CN202311206272.2A CN202311206272A CN117061232B CN 117061232 B CN117061232 B CN 117061232B CN 202311206272 A CN202311206272 A CN 202311206272A CN 117061232 B CN117061232 B CN 117061232B
Authority
CN
China
Prior art keywords
user
message
query
security
queried
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311206272.2A
Other languages
Chinese (zh)
Other versions
CN117061232A (en
Inventor
吕捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhongke Network Core Technology Co ltd
Original Assignee
Beijing Zhongke Network Core Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhongke Network Core Technology Co ltd filed Critical Beijing Zhongke Network Core Technology Co ltd
Priority to CN202311206272.2A priority Critical patent/CN117061232B/en
Publication of CN117061232A publication Critical patent/CN117061232A/en
Application granted granted Critical
Publication of CN117061232B publication Critical patent/CN117061232B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a message security early warning method in network communication, which relates to the technical field of network communication, and comprises the steps of login security verification, message information acquisition, message security analysis, message query acquisition, query security analysis and early warning prompt.

Description

Early warning method for message security in network communication
Technical Field
The invention relates to the technical field of network communication, in particular to a message security early warning method in network communication.
Background
With the continuous development of communication and computers, network communication is becoming an indispensable tool in daily life and work of people, and network viruses and phishing are also layered endlessly, so that when people use networks for message transmission, the safety of message transmission and storage is also ensured.
In the prior art, when a user receives a message on the software of network communication, the user can select whether to receive the message of the user at the transmitting end, but the safety of the user at the transmitting end and the condition of message transmission between the user and the user at the transmitting end are not monitored and analyzed, so that the safety of the account of the user at the transmitting end cannot be guaranteed, and meanwhile, the phenomenon that the account of the user at the transmitting end is stolen cannot be avoided.
Disclosure of Invention
Aiming at the technical defects, the invention aims to provide a message security early warning method in network communication.
In order to solve the technical problems, the invention adopts the following technical scheme: the invention provides a message security early warning method in network communication, which comprises the following steps: step one, login security verification: acquiring an account number, a password and an IP address corresponding to a user, verifying login security corresponding to the user, and if the user login fails, executing a step six, otherwise prompting the user that the login is successful;
step two, obtaining information: when a user receives a message, acquiring a message to be received corresponding to the user and basic information corresponding to a sender user;
step three, message security analysis: according to the basic information corresponding to the message to be received and the basic information corresponding to the sender user, analyzing the receiving safety evaluation coefficient of the message to be received corresponding to the user, judging whether the receiving of the message to be received corresponding to the user is safe or not, and executing the step six if the sending of the message to be sent corresponding to the user or the receiving of the message to be received is not safe;
step four, inquiring and acquiring the message: when a user checks a message, acquiring a date corresponding to the message to be queried and a chat party user, taking the chat party user as a target user, and acquiring query information corresponding to the user in a specified period;
fifthly, inquiring safety analysis: analyzing information inquiry safety influence factors corresponding to the user according to the inquiry information corresponding to the user in a designated period, analyzing inquiry state evaluation coefficients of the information to be inquired of the user according to the information to be inquired corresponding to the user, the date corresponding to the information to be inquired and the target user, judging whether the inquiry state of the information to be inquired of the user is normal or not, and executing a step six if the inquiry state of the information to be inquired of the user is in an abnormal state;
step six, early warning prompting: and when the user fails to log in, the sending and receiving of the message to be sent are unsafe, the receiving of the message to be received is unsafe or the inquiring state of the message to be inquired is in an abnormal state, early warning prompt is carried out.
Preferably, the verification of the login security corresponding to the user is performed, and the specific verification process is as follows:
based on the account number corresponding to the user, acquiring a preset password corresponding to the user, comparing the password corresponding to the user with the preset password, judging that the user login fails if the password corresponding to the user is not wanted to be different from the preset password, and acquiring the IP address corresponding to each historical login corresponding to the user if the password corresponding to the user is identical to the preset password;
comparing the IP address corresponding to the user with the IP address corresponding to each historical login, judging the safety of the user login if the IP address corresponding to the user is the same as the IP address corresponding to a certain historical login, calculating the change frequency of the IP address corresponding to the user if the IP address corresponding to the user is different from the IP address corresponding to each historical login, comparing the change frequency with the preset IP address change frequency, prompting the user to carry out biological verification if the change frequency of the IP address corresponding to the user is smaller than the preset IP address change frequency, and judging the login failure of the user if the change frequency of the IP address corresponding to the user is larger than the preset IP address change frequency;
and the user performs biological verification according to the biological verification prompt, if the biological verification of the user is successful, the login of the user is judged to be successful, and if the biological verification of the user is failed, the login of the user is judged to be failed.
Preferably, the basic information corresponding to the message to be received includes the content of the message to be received and the network traffic of the message to be sent;
the basic information corresponding to the sender user comprises the registration time of the sender user, the message sending quantity of the sender user, the sending times of the sender user and the user message and the time corresponding to each message sending.
Preferably, the analysis user corresponds to a receiving security evaluation coefficient of the message to be received, and the specific analysis process is as follows:
analyzing and obtaining content security assessment coefficients corresponding to the message to be received according to the basic information corresponding to the message to be received, and recording as
Analyzing and obtaining account safety evaluation coefficients corresponding to the sender user according to the basic information corresponding to the sender, and recording the account safety evaluation coefficients as
By calculation formulaObtaining a receiving security evaluation coefficient of the user corresponding to the message to be received>Wherein ε is 1 、ε 2 And respectively setting a weight factor corresponding to the content security evaluation coefficient of the message to be received and the security evaluation coefficient of the sender user account.
Preferably, the analysis obtains an account security evaluation coefficient corresponding to the sender user, and the specific analysis process is as follows:
obtaining the frequency of sending the messages of the sender user and the user according to the sending times of the messages of the sender user and the corresponding time of each message sending, and marking the frequency as f;
by calculation formulaObtaining account security evaluation coefficient corresponding to sender user>Wherein t and x respectively represent the registration duration of the sender user and the message transmission quantity of the sender user, and t ', x ' and f ' are respectively set reference registration duration, reference message transmission quantity and frequency of reference message transmission, and gamma 1 、γ 2 、γ 3 Respectively set weight factors corresponding to the registration duration, the message sending quantity and the message sending frequency.
Preferably, the query information corresponding to the user in the specified period comprises the query times, the duration of each query and the operation corresponding to each query.
Preferably, the analyzing the message query security impact factor corresponding to the user includes the following specific analysis process:
to make the user in a specified periodComparing the operation corresponding to each inquiry with the safety value corresponding to each operation stored in the database, if the operation corresponding to a certain inquiry by the user in a specified period is the same as the operation stored in the database, taking the safety value corresponding to the operation as the safety value corresponding to the inquiry operation by the user in the specified period, obtaining the safety value corresponding to each inquiry operation by the user in the specified period in this way, and marking the safety value as A i Where i represents the number corresponding to each query by the user, i=1, 2. N;
according to the calculation formulaObtaining a message query security influence factor kappa corresponding to a user, wherein T i The method and the device are characterized in that the time length of the ith query corresponding to the user in the specified period is represented, C represents the corresponding query times of the user in the specified period, C ', T ', A ' are respectively set reference query times, reference query time length and standard query operation safety values, and eta 1, eta 2 and eta 3 are respectively set query times, query time length and weight factors corresponding to the query operation safety values.
Preferably, the analyzing user evaluates the coefficient of the query state of the message to be queried, and the specific analysis process is as follows:
obtaining a message record corresponding to a user and a target user, thereby obtaining the time of last message corresponding to the user and the target user and the message sending frequency corresponding to the user and the target user, further obtaining the last message sending duration corresponding to the user and the target user, and simultaneously obtaining the sent duration corresponding to the message to be queried based on the date corresponding to the message to be queried;
obtaining the type corresponding to the message to be queried according to the message to be queried, and obtaining the permission query time length corresponding to the message to be queried according to the permission query time length corresponding to each type stored in the database, thereby according to a calculation formulaObtaining a query state evaluation coefficient of a user for a message to be queried>Wherein f1, T1, T respectively represent the frequency of message transmission corresponding to the user and the target user, the last time message transmission duration corresponding to the user and the target user, and the transmitted duration corresponding to the message to be queried, T ' represents the permissible query duration corresponding to the message to be queried, e represents a natural constant, and f1' and T1' are respectively the set frequency of message transmission corresponding to the reference user and the target user, and the last time message transmission duration corresponding to the reference user and the target user, respectively>The method comprises the steps of respectively setting message sending frequency and weight factor corresponding to last message sending duration corresponding to a user and a target user, wherein sigma is the weight factor corresponding to a set query state evaluation coefficient.
Preferably, the determining whether the query state of the message to be queried by the user is normal or not includes the following specific determining process: comparing the query state evaluation coefficient of the message to be queried by the user with a set query state evaluation coefficient threshold, and judging that the query state of the message to be queried by the user is in a normal state and judging that the query state of the message to be queried by the user is in an abnormal state if the query state evaluation coefficient of the message to be queried by the user is greater than or equal to the set query state evaluation coefficient threshold.
The invention has the beneficial effects that: the early warning method for message security in network communication provided by the invention monitors the login security of the user, judges the security of the file to be received according to the content of the file to be received, the transmission network flow and the basic information of the sender, judges whether the query state of the message to be queried is safe or not according to the query information of the user in a designated period and the message transmission condition between the user and a target user when the user queries the message, solves the defects in the prior art, realizes the intelligent monitoring of network communication, ensures the security of a user account and the security of message storage, greatly improves the flexibility and pertinence of message query time period setting, and enhances the experience sense when the user queries the message.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of the steps of the method of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a method for early warning message security in network communication includes: step one, login security verification: acquiring an account number, a password and an IP address corresponding to a user, verifying login security corresponding to the user, and if the user login fails, executing a step six, otherwise prompting the user that the login is successful;
when a user logs in, an account number and a password corresponding to the user are input, and an IP address corresponding to the user is obtained from a server.
In a specific embodiment, the verification of the login security corresponding to the user is performed, and a specific verification process is as follows: based on the account number corresponding to the user, acquiring a preset password corresponding to the user, comparing the password corresponding to the user with the preset password, judging that the user login fails if the password corresponding to the user is not wanted to be different from the preset password, and acquiring the IP address corresponding to each historical login corresponding to the user if the password corresponding to the user is identical to the preset password;
it should be noted that, the database stores preset passwords, preset fingerprints and preset facial images corresponding to the accounts, so as to obtain preset passwords corresponding to the users according to the accounts corresponding to the users.
Comparing the IP address corresponding to the user with the IP address corresponding to each historical login, judging the safety of the user login if the IP address corresponding to the user is the same as the IP address corresponding to a certain historical login, calculating the change frequency of the IP address corresponding to the user if the IP address corresponding to the user is different from the IP address corresponding to each historical login, comparing the change frequency with the preset IP address change frequency, prompting the user to carry out biological verification if the change frequency of the IP address corresponding to the user is smaller than the preset IP address change frequency, and judging the login failure of the user if the change frequency of the IP address corresponding to the user is larger than the preset IP address change frequency;
and the user performs biological verification according to the biological verification prompt, if the biological verification of the user is successful, the login of the user is judged to be successful, and if the biological verification of the user is failed, the login of the user is judged to be failed.
It should be noted that, the biometric authentication includes fingerprint authentication and facial recognition authentication, the user selects fingerprint authentication or facial recognition authentication according to the biometric authentication prompt, and inputs his own fingerprint or facial image, and extracts a preset fingerprint or a preset facial image corresponding to the user from the database, if the fingerprint of the user is the same as the preset fingerprint or the facial image of the user is the same as the preset facial image, the biometric authentication of the user is successful, and if the fingerprint of the user is different from the preset fingerprint or the facial image of the user is different from the preset facial image, the biometric authentication of the user is failed.
Step two, obtaining information: when a user receives a message, acquiring a message to be received corresponding to the user and basic information corresponding to a sender user;
the basic information corresponding to the message to be received comprises the content of the message to be received and the network flow of the message to be sent;
the basic information corresponding to the sender user comprises the registration time of the sender user, the message sending quantity of the sender user, the sending times of the sender user and the user message and the time corresponding to each message sending.
It should be noted that, the content of the message to be received, the network traffic of the message to be sent, and the basic information corresponding to the sender user are obtained from the server.
Step three, message security analysis: according to the basic information corresponding to the message to be received and the basic information corresponding to the sender user, analyzing the receiving safety evaluation coefficient of the message to be received corresponding to the user, judging whether the receiving of the message to be received corresponding to the user is safe or not, and executing the step six if the sending of the message to be sent corresponding to the user or the receiving of the message to be received is not safe;
in a specific embodiment, the analysis user corresponds to the receiving security evaluation coefficient of the message to be received, and the specific analysis process is as follows: analyzing and obtaining content security assessment coefficients corresponding to the message to be received according to the basic information corresponding to the message to be received, and recording as
In the above, the content security evaluation coefficient corresponding to the message to be received is obtained by analysis, and the specific analysis process is as follows: running antivirus software on the user's equipment, and further scanning the content of the message to be received to obtain the virus amount corresponding to the message to be received, and marking as Y, thereby passing through a calculation formulaObtaining content security evaluation coefficient corresponding to the message to be received>Wherein Y 'and LY' are respectively set reference virus amount and reference network flow, LY represents network flow of message to be sent, and theta 1 and theta 2 are respectively set weight factors corresponding to the virus amount and the network flow.
Analyzing and obtaining account safety evaluation coefficients corresponding to the sender user according to the basic information corresponding to the sender, and recording the account safety evaluation coefficients as
By calculation formulaObtaining a receiving security evaluation coefficient of the user corresponding to the message to be received>Wherein ε is 1 、ε 2 And respectively setting a weight factor corresponding to the content security evaluation coefficient of the message to be received and the security evaluation coefficient of the sender user account.
In another specific embodiment, the analysis obtains the account security assessment coefficient corresponding to the sender user, and the specific analysis process is as follows:
obtaining the frequency of sending the messages of the sender user and the user according to the sending times of the messages of the sender user and the corresponding time of each message sending, and marking the frequency as f;
it should be noted that, according to the time corresponding to each message transmission of the sender user and the user, the interval duration between each message transmission and the last message transmission is obtained, and is recorded as the interval duration of each message transmission, the interval durations of each message transmission are accumulated, and divided by the number of times of user message transmission, so as to obtain the frequency of sending the sender user and the user message transmission.
By calculation formulaObtaining account security evaluation coefficient corresponding to sender user>Wherein t and x respectively represent the registration duration of the sender user and the message transmission quantity of the sender user, and t ', x ' and f ' are respectively set reference registration duration, reference message transmission quantity and frequency of reference message transmission, and gamma 1 、γ 2 、γ 3 Respectively corresponding to the set registration time length, the message sending number and the message sending frequencyWeight factor.
Step four, inquiring and acquiring the message: when a user checks a message, acquiring a date corresponding to the message to be queried and a chat party user, taking the chat party user as a target user, and acquiring query information corresponding to the user in a specified period;
it should be noted that, acquiring a date corresponding to the message to be queried, a chat party user and query information corresponding to the user in a specified period from the server;
it should also be noted that, the chat party user is the sender user sending the message to be queried to the user corresponding to the message to be queried or the receiver user sending the message to be queried to the user.
In a specific embodiment, the query information corresponding to the user in the specified period includes the number of queries, the duration of each query, and the operation corresponding to each query.
Fifthly, inquiring safety analysis: analyzing information inquiry safety influence factors corresponding to the user according to the inquiry information corresponding to the user in a designated period, analyzing inquiry state evaluation coefficients of the information to be inquired of the user according to the information to be inquired corresponding to the user, the date corresponding to the information to be inquired and the target user, judging whether the inquiry state of the information to be inquired of the user is normal or not, and executing a step six if the inquiry state of the information to be inquired of the user is in an abnormal state;
in a specific embodiment, the analyzing the message query security impact factor corresponding to the user includes the following steps: comparing the operation of the user corresponding to each inquiry in the appointed period with the security value corresponding to each operation stored in the database, if the operation of the user corresponding to a certain inquiry in the appointed period is the same as a certain operation stored in the database, taking the security value corresponding to the operation as the security value of the user corresponding to the inquiry operation in the appointed period, thus obtaining the security value of the user corresponding to each inquiry operation in the appointed period, and recording as A i Where i represents the number corresponding to each query by the user, i=1, 2. N;
according to the calculation formulaObtaining a message query security influence factor kappa corresponding to a user, wherein T i The method and the device are characterized in that the time length of the ith query corresponding to the user in the specified period is represented, C represents the corresponding query times of the user in the specified period, C ', T ', A ' are respectively set reference query times, reference query time length and standard query operation safety values, and eta 1, eta 2 and eta 3 are respectively set query times, query time length and weight factors corresponding to the query operation safety values.
In another specific embodiment, the analysis user evaluates the coefficient of the query state of the message to be queried, and the specific analysis process is as follows:
obtaining a message record corresponding to a user and a target user, thereby obtaining the time of last message corresponding to the user and the target user and the message sending frequency corresponding to the user and the target user, further obtaining the last message sending duration corresponding to the user and the target user, and simultaneously obtaining the sent duration corresponding to the message to be queried based on the date corresponding to the message to be queried;
the message sending frequency corresponding to the user and the target user is obtained through analysis according to the analysis process of the message sending frequency of the user and the user at the sender.
Obtaining the type corresponding to the message to be queried according to the message to be queried, and obtaining the permission query time length corresponding to the message to be queried according to the permission query time length corresponding to each type stored in the database, thereby according to a calculation formulaObtaining a query state evaluation coefficient of a user for a message to be queried>Wherein f1, T1, T respectively represent the message sending frequency corresponding to the target user by the user, the last message sending duration corresponding to the target user by the user, the sent duration corresponding to the message to be queried, T' represents the permissible query duration corresponding to the message to be queried, e represents a natural constant,f1 'and t1' are respectively the set message sending frequency, last message sending duration and/or the set message sending time of the reference user and the target user>The method comprises the steps of respectively setting message sending frequency and weight factor corresponding to last message sending duration corresponding to a user and a target user, wherein sigma is the weight factor corresponding to a set query state evaluation coefficient.
In still another specific embodiment, the determining whether the query status of the message to be queried by the user is normal or not includes the following specific determining process: comparing the query state evaluation coefficient of the message to be queried by the user with a set query state evaluation coefficient threshold, and judging that the query state of the message to be queried by the user is in a normal state and judging that the query state of the message to be queried by the user is in an abnormal state if the query state evaluation coefficient of the message to be queried by the user is greater than or equal to the set query state evaluation coefficient threshold.
Step six, early warning prompting: and when the user fails to log in, the sending and receiving of the message to be sent are unsafe, the receiving of the message to be received is unsafe or the inquiring state of the message to be inquired is in an abnormal state, early warning prompt is carried out.
According to the embodiment of the invention, the login security of the user is used for monitoring, the content of the file to be received, the transmission network flow and the basic information of the sender are used for judging the security of the file to be received, and meanwhile, when the user inquires the information, according to the inquiry information of the user in a designated period and the information transmission condition between the user and a target user, whether the inquiry state of the user to be inquired information is safe or not is judged, so that the defects in the prior art are overcome, the intelligent monitoring of network communication is realized, the safety of a user account and the safety of information storage are ensured, the flexibility and pertinence of the information inquiry time limit setting are greatly improved, and the experience sense of the user during information inquiry is enhanced.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (3)

1. The early warning method for message security in network communication is characterized by comprising the following steps:
step one, login security verification: acquiring an account number, a password and an IP address corresponding to a user, verifying login security corresponding to the user, and if the user login fails, executing a step six, otherwise prompting the user that the login is successful;
step two, obtaining information: when a user receives a message, acquiring a message to be received corresponding to the user and basic information corresponding to a sender user;
the basic information corresponding to the message to be received comprises the content of the message to be received and the network flow of the message to be sent; the basic information corresponding to the sender user comprises the registration time of the sender user, the message sending quantity of the sender user, the sending times of the sender user and the user message and the time corresponding to each message sending;
step three, message security analysis: according to the basic information corresponding to the message to be received and the basic information corresponding to the sender user, analyzing the receiving safety evaluation coefficient of the message to be received corresponding to the user, judging whether the receiving of the message to be received corresponding to the user is safe or not, and executing the step six if the sending of the message to be sent corresponding to the user or the receiving of the message to be received is not safe;
the receiving safety evaluation coefficient of the analysis user corresponding to the message to be received comprises the following specific analysis processes: analyzing and obtaining content security assessment coefficients corresponding to the message to be received according to the basic information corresponding to the message to be received, and recording as
Analyzing and obtaining account safety evaluation coefficients corresponding to the sender user according to the basic information corresponding to the sender, and recording the account safety evaluation coefficients as
By calculation formulaObtaining a receiving security evaluation coefficient of the user corresponding to the message to be received>Wherein ε is 1 、ε 2 Respectively setting a weight factor corresponding to the content security evaluation coefficient of the message to be received and the security evaluation coefficient of the sender user account;
the analysis obtains the account safety evaluation coefficient corresponding to the sender user, and the specific analysis process is as follows: obtaining the frequency of sending the messages of the sender user and the user according to the sending times of the messages of the sender user and the corresponding time of each message sending, and marking the frequency as f;
by calculation formulaObtaining account security evaluation coefficient corresponding to sender user>Wherein t and x respectively represent the registration duration of the sender user and the message transmission quantity of the sender user, and t ', x ' and f ' are respectively set reference registration duration, reference message transmission quantity and frequency of reference message transmission, and gamma 1 、γ 2 、γ 3 Respectively setting weight factors corresponding to the registration duration, the message sending quantity and the message sending frequency;
step four, inquiring and acquiring the message: when a user checks a message, acquiring a date corresponding to the message to be queried and a chat party user, taking the chat party user as a target user, and acquiring query information corresponding to the user in a specified period;
the corresponding inquiry information of the user in the appointed period comprises inquiry times, duration of each inquiry and operation corresponding to each inquiry;
fifthly, inquiring safety analysis: analyzing information inquiry safety influence factors corresponding to the user according to the inquiry information corresponding to the user in a designated period, analyzing inquiry state evaluation coefficients of the information to be inquired of the user according to the information to be inquired corresponding to the user, the date corresponding to the information to be inquired and the target user, judging whether the inquiry state of the information to be inquired of the user is normal or not, and executing a step six if the inquiry state of the information to be inquired of the user is in an abnormal state;
the message corresponding to the analysis user is inquired about the security influence factor, and the specific analysis process is as follows: comparing the operation of the user corresponding to each inquiry in the appointed period with the security value corresponding to each operation stored in the database, if the operation of the user corresponding to a certain inquiry in the appointed period is the same as a certain operation stored in the database, taking the security value corresponding to the operation as the security value of the user corresponding to the inquiry operation in the appointed period, thus obtaining the security value of the user corresponding to each inquiry operation in the appointed period, and recording as A i Where i represents the number corresponding to each query by the user, i=1, 2. N;
according to the calculation formulaObtaining a message query security influence factor kappa corresponding to a user, wherein T i The method comprises the steps that the time length of the ith query corresponding to a user in a specified period is represented, C represents the corresponding query times of the user in the specified period, C ', T ', A ' are respectively set reference query times, reference query time length and standard query operation safety values, and eta 1, eta 2 and eta 3 are respectively set query times, query time length and weight factors corresponding to the query operation safety values;
the analysis user evaluates the coefficient of the query state of the message to be queried, and the specific analysis process is as follows: obtaining a message record corresponding to a user and a target user, thereby obtaining the time of last message corresponding to the user and the target user and the message sending frequency corresponding to the user and the target user, further obtaining the last message sending duration corresponding to the user and the target user, and simultaneously obtaining the sent duration corresponding to the message to be queried based on the date corresponding to the message to be queried;
obtaining the type corresponding to the message to be queried according to the message to be queried, and obtaining the permission query time length corresponding to the message to be queried according to the permission query time length corresponding to each type stored in the database, thereby according to a calculation formulaObtaining a query state evaluation coefficient of a user for a message to be queried>Wherein f1, T1, T respectively represent the frequency of message transmission corresponding to the user and the target user, the last time message transmission duration corresponding to the user and the target user, and the transmitted duration corresponding to the message to be queried, T ' represents the permissible query duration corresponding to the message to be queried, e represents a natural constant, and f1' and T1' are respectively the set frequency of message transmission corresponding to the reference user and the target user, and the last time message transmission duration corresponding to the reference user and the target user, respectively>Respectively setting a message sending frequency corresponding to a user and a target user and a weight factor corresponding to the last message sending duration, wherein sigma is a weight factor corresponding to a set query state evaluation coefficient;
step six, early warning prompting: and when the user fails to log in, the sending and receiving of the message to be sent are unsafe, the receiving of the message to be received is unsafe or the inquiring state of the message to be inquired is in an abnormal state, early warning prompt is carried out.
2. The method for pre-warning message security in network communication according to claim 1, wherein the verification of the login security corresponding to the user comprises the following specific verification process:
based on the account number corresponding to the user, acquiring a preset password corresponding to the user, comparing the password corresponding to the user with the preset password, judging that the user login fails if the password corresponding to the user is not wanted to be different from the preset password, and acquiring the IP address corresponding to each historical login corresponding to the user if the password corresponding to the user is identical to the preset password;
comparing the IP address corresponding to the user with the IP address corresponding to each historical login, judging the safety of the user login if the IP address corresponding to the user is the same as the IP address corresponding to a certain historical login, calculating the change frequency of the IP address corresponding to the user if the IP address corresponding to the user is different from the IP address corresponding to each historical login, comparing the change frequency with the preset IP address change frequency, prompting the user to carry out biological verification if the change frequency of the IP address corresponding to the user is smaller than the preset IP address change frequency, and judging the login failure of the user if the change frequency of the IP address corresponding to the user is larger than the preset IP address change frequency;
and the user performs biological verification according to the biological verification prompt, if the biological verification of the user is successful, the login of the user is judged to be successful, and if the biological verification of the user is failed, the login of the user is judged to be failed.
3. The method for pre-warning message security in network communication according to claim 1, wherein the determining whether the query status of the message to be queried is normal or not is performed by the user comprises the following specific determining process: comparing the query state evaluation coefficient of the message to be queried by the user with a set query state evaluation coefficient threshold, and judging that the query state of the message to be queried by the user is in a normal state and judging that the query state of the message to be queried by the user is in an abnormal state if the query state evaluation coefficient of the message to be queried by the user is greater than or equal to the set query state evaluation coefficient threshold.
CN202311206272.2A 2023-09-18 2023-09-18 Early warning method for message security in network communication Active CN117061232B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311206272.2A CN117061232B (en) 2023-09-18 2023-09-18 Early warning method for message security in network communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311206272.2A CN117061232B (en) 2023-09-18 2023-09-18 Early warning method for message security in network communication

Publications (2)

Publication Number Publication Date
CN117061232A CN117061232A (en) 2023-11-14
CN117061232B true CN117061232B (en) 2024-03-15

Family

ID=88653748

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311206272.2A Active CN117061232B (en) 2023-09-18 2023-09-18 Early warning method for message security in network communication

Country Status (1)

Country Link
CN (1) CN117061232B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112257048A (en) * 2020-12-21 2021-01-22 南京韦科韬信息技术有限公司 Information security protection method and device
CN113254994A (en) * 2021-05-27 2021-08-13 平安普惠企业管理有限公司 Database access method and device, storage medium and computer equipment
CN116389094A (en) * 2023-03-28 2023-07-04 江西百晟利科技集团有限公司 Network information user safety detection management system based on Internet of things

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104518876B (en) * 2013-09-29 2019-01-04 腾讯科技(深圳)有限公司 Service login method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112257048A (en) * 2020-12-21 2021-01-22 南京韦科韬信息技术有限公司 Information security protection method and device
CN113254994A (en) * 2021-05-27 2021-08-13 平安普惠企业管理有限公司 Database access method and device, storage medium and computer equipment
CN116389094A (en) * 2023-03-28 2023-07-04 江西百晟利科技集团有限公司 Network information user safety detection management system based on Internet of things

Also Published As

Publication number Publication date
CN117061232A (en) 2023-11-14

Similar Documents

Publication Publication Date Title
CN104518876B (en) Service login method and device
CN107276982B (en) Abnormal login detection method and device
WO2019228004A1 (en) Identity verification method and apparatus
CN112613020B (en) Identity verification method and device
CN103379099B (en) Hostile attack identification method and system
CN103095672A (en) Multidimensional reputation scoring
CN106470204A (en) User identification method based on request behavior characteristicss, device, equipment and system
CN109698809A (en) A kind of recognition methods of account abnormal login and device
CN106549902A (en) A kind of recognition methods of suspicious user and equipment
US10148649B2 (en) Automated scalable identity-proofing and authentication process
CN111953635B (en) Interface request processing method and computer-readable storage medium
KR101762615B1 (en) Identification system and user terminal using usage pattern analysis
CA2830360C (en) Information monitoring apparatus and information monitoring method
US20220070166A1 (en) Enhanced authentication techniques using virtual persona
WO2016048129A2 (en) A system and method for authenticating a user based on user behaviour and environmental factors
US9754209B1 (en) Managing knowledge-based authentication systems
CN117527430A (en) Zero-trust network security dynamic evaluation system and method
CN118075017A (en) Network information security protection detection method and system
CN110445790A (en) A kind of account method for detecting abnormality logging in behavior based on user
CN117061232B (en) Early warning method for message security in network communication
CN108282443A (en) A kind of reptile Activity recognition method and apparatus
CN114666164B (en) Computer network user identity login verification system and method
CN115118517B (en) Application authentication method based on application access
CN112235317B (en) Third-party application login system and method based on big data
CN114301711B (en) Anti-riot brushing method, device, equipment, storage medium and computer program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant