WO2008127422A3 - Detecting and interdicting fraudulent activity on a network - Google Patents

Detecting and interdicting fraudulent activity on a network Download PDF

Info

Publication number
WO2008127422A3
WO2008127422A3 PCT/US2007/084540 US2007084540W WO2008127422A3 WO 2008127422 A3 WO2008127422 A3 WO 2008127422A3 US 2007084540 W US2007084540 W US 2007084540W WO 2008127422 A3 WO2008127422 A3 WO 2008127422A3
Authority
WO
WIPO (PCT)
Prior art keywords
network
fraudulent activity
user
data
detecting
Prior art date
Application number
PCT/US2007/084540
Other languages
French (fr)
Other versions
WO2008127422A2 (en
WO2008127422A9 (en
Inventor
Stephen Singh
Rajandra Laxman Kulkarni
Vijay C Bhatt
Dan Tonelli
Adam Greenberg
Original Assignee
Fmr Llc
Stephen Singh
Rajandra Laxman Kulkarni
Vijay C Bhatt
Dan Tonelli
Adam Greenberg
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/559,762 external-priority patent/US20080114858A1/en
Priority claimed from US11/559,784 external-priority patent/US8180873B2/en
Priority claimed from US11/559,767 external-priority patent/US8145560B2/en
Priority claimed from US11/559,764 external-priority patent/US20080114883A1/en
Priority claimed from US11/559,771 external-priority patent/US20080115213A1/en
Priority claimed from US11/559,775 external-priority patent/US7856494B2/en
Priority to AU2007351385A priority Critical patent/AU2007351385B2/en
Priority to JP2009537316A priority patent/JP5166432B2/en
Application filed by Fmr Llc, Stephen Singh, Rajandra Laxman Kulkarni, Vijay C Bhatt, Dan Tonelli, Adam Greenberg filed Critical Fmr Llc
Priority to CA002669546A priority patent/CA2669546A1/en
Priority to EP07873613A priority patent/EP2090065A2/en
Publication of WO2008127422A2 publication Critical patent/WO2008127422A2/en
Publication of WO2008127422A9 publication Critical patent/WO2008127422A9/en
Publication of WO2008127422A3 publication Critical patent/WO2008127422A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Described are computer-based methods and apparatuses, including computer program products, for detecting and interdicting fraudulent activity on a network, reconstructing data on a network, unifying user sessions on a network, detecting fraudulent activity on a network, detecting fraudulent activity on a network using stored information, and subscribing to data feeds on a network. In an aspect, an user utilizes a transmitting device to transmit data packets that are split between a plurality of data centers for processing. The data packets are captured at the data centers. The data packets are recombined. The recombined data can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity. In another aspect, an user utilizes a transmitting device to transmit user requests that are split between a plurality of data centers for processing. The user requests are captured at the data centers. The user requests are unified into an user session. The user session can be analyzed for fraud detection, marketing analysis, network intrusion detection, customer service analysis, and/or performance analysis. If fraudulent activity is detected, then the user can be interdicted to prevent further fraudulent activity.
PCT/US2007/084540 2006-11-14 2007-11-13 Detecting and interdicting fraudulent activity on a network WO2008127422A2 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP07873613A EP2090065A2 (en) 2006-11-14 2007-11-13 Detecting and interdicting fraudulent activity on a network
CA002669546A CA2669546A1 (en) 2006-11-14 2007-11-13 Detecting and interdicting fraudulent activity on a network
AU2007351385A AU2007351385B2 (en) 2006-11-14 2007-11-13 Detecting and interdicting fraudulent activity on a network
JP2009537316A JP5166432B2 (en) 2006-11-14 2007-11-13 Detection and prohibition of fraud in the network

Applications Claiming Priority (12)

Application Number Priority Date Filing Date Title
US11/559,767 2006-11-14
US11/559,762 US20080114858A1 (en) 2006-11-14 2006-11-14 Reconstructing Data on a Network
US11/559,775 US7856494B2 (en) 2006-11-14 2006-11-14 Detecting and interdicting fraudulent activity on a network
US11/559,771 US20080115213A1 (en) 2006-11-14 2006-11-14 Detecting Fraudulent Activity on a Network Using Stored Information
US11/559,764 US20080114883A1 (en) 2006-11-14 2006-11-14 Unifying User Sessions on a Network
US11/559,762 2006-11-14
US11/559,764 2006-11-14
US11/559,767 US8145560B2 (en) 2006-11-14 2006-11-14 Detecting fraudulent activity on a network
US11/559,771 2006-11-14
US11/559,775 2006-11-14
US11/559,784 US8180873B2 (en) 2006-11-14 2006-11-14 Detecting fraudulent activity
US11/559,784 2006-11-14

Publications (3)

Publication Number Publication Date
WO2008127422A2 WO2008127422A2 (en) 2008-10-23
WO2008127422A9 WO2008127422A9 (en) 2008-12-04
WO2008127422A3 true WO2008127422A3 (en) 2009-04-23

Family

ID=39864546

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/084540 WO2008127422A2 (en) 2006-11-14 2007-11-13 Detecting and interdicting fraudulent activity on a network

Country Status (5)

Country Link
EP (1) EP2090065A2 (en)
JP (1) JP5166432B2 (en)
AU (1) AU2007351385B2 (en)
CA (1) CA2669546A1 (en)
WO (1) WO2008127422A2 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8041592B2 (en) * 2007-11-30 2011-10-18 Bank Of America Corporation Collection and analysis of multiple data sources
US9378345B2 (en) 2014-04-29 2016-06-28 Bank Of America Corporation Authentication using device ID

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002045380A2 (en) * 2000-11-30 2002-06-06 Lancope, Inc. Flow-based detection of network intrusions
WO2002096028A1 (en) * 2001-05-22 2002-11-28 Inzen Co., Ltd. Network based intrusion detection system
US20060236395A1 (en) * 2004-09-30 2006-10-19 David Barker System and method for conducting surveillance on a distributed network

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07262135A (en) * 1994-03-17 1995-10-13 Hitachi Ltd Security management devices
US7228350B2 (en) * 2000-08-04 2007-06-05 Avaya Technology Corp. Intelligent demand driven recognition of URL objects in connection oriented transactions
JP2003085006A (en) * 2001-09-07 2003-03-20 Hitachi Information Systems Ltd Ip address walk back system and its ip address walk back method and program stored in its log collection server
JP2004064694A (en) * 2002-07-31 2004-02-26 Nec Corp Load distribution method for packet collection in communication network, and its device
JP2005117100A (en) * 2003-10-02 2005-04-28 Oki Electric Ind Co Ltd Intrusion detection system and traffic aggregating apparatus
JP2006025096A (en) * 2004-07-07 2006-01-26 Japan Telecom Co Ltd Network system
JP2006120130A (en) * 2004-09-21 2006-05-11 Software Partner:Kk System and method for managing access log
JP4479459B2 (en) * 2004-10-19 2010-06-09 横河電機株式会社 Packet analysis system
JP4421462B2 (en) * 2004-12-06 2010-02-24 三菱電機株式会社 Intrusion detection system and management device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002045380A2 (en) * 2000-11-30 2002-06-06 Lancope, Inc. Flow-based detection of network intrusions
WO2002096028A1 (en) * 2001-05-22 2002-11-28 Inzen Co., Ltd. Network based intrusion detection system
US20060236395A1 (en) * 2004-09-30 2006-10-19 David Barker System and method for conducting surveillance on a distributed network

Also Published As

Publication number Publication date
AU2007351385A2 (en) 2009-09-03
WO2008127422A2 (en) 2008-10-23
AU2007351385A1 (en) 2008-10-23
WO2008127422A9 (en) 2008-12-04
JP5166432B2 (en) 2013-03-21
AU2007351385B2 (en) 2013-05-16
JP2010512035A (en) 2010-04-15
EP2090065A2 (en) 2009-08-19
CA2669546A1 (en) 2008-10-23

Similar Documents

Publication Publication Date Title
US10771497B1 (en) Using IP address data to detect malicious activities
WO2007133799A3 (en) Comprehensive online fraud detection system and method
CN104519032B (en) A kind of security strategy and system of internet account number
Stinson et al. Towards systematic evaluation of the evadability of bot/botnet detection methods.
US8433785B2 (en) System and method for detecting internet bots
US20090094311A1 (en) System and Method for Detecting Internet Bots
WO2010107626A3 (en) Flexible logging, such as for a web server
EP1806658A4 (en) Analyzing method and device
TW200703058A (en) Computer security intrusion detection system for remote, on-demand users
WO2008008729A3 (en) Mobile personal services platform for providing feedback
WO2008124515A3 (en) A system and method for binding a subscription-based computing system to an internet service provider
WO2013003493A3 (en) System and method for protocol fingerprinting and reputation correlation
MX2011005945A (en) System and method for gathering and analyzing objective motion data.
WO2012087954A3 (en) Methods and apparatus to determine media impressions using distributed demographic information
WO2009066217A3 (en) Performing secure electronic transactions
WO2008005264A3 (en) Detecting and preventing bots and cheating in online gaming
GB0705329D0 (en) Method of transmitting data in a communication system
WO2007038761A3 (en) Systems and methods of network operation and information processing, including data acquisition, processing and provision and/or interoperability features
WO2009132148A3 (en) Systems and methods for security management based on cursor events
WO2007002838A8 (en) Whole-network anomaly diagnosis
US20100095215A1 (en) System and method for analyzing internet usage
WO2012018411A1 (en) Optimized data stream upload
WO2007140326A3 (en) Methods and apparatus for sampling usage information from a pool of terminals in a data network
CN103327016B (en) A kind of computing network Streaming Media exception playback volume the method and system to its correction
WO2008144339A3 (en) Method and apparatus for sharing common interest links between communication devices

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 2669546

Country of ref document: CA

Ref document number: 2007351385

Country of ref document: AU

ENP Entry into the national phase

Ref document number: 2009537316

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2007873613

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2007351385

Country of ref document: AU

Date of ref document: 20071113

Kind code of ref document: A