[go: up one dir, main page]

Ye et al., 2022 - Google Patents

Modeling access environment and behavior sequence for financial identity theft detection in E-commerce services

Ye et al., 2022

View PDF
Document ID
9740212198744663384
Author
Ye Q
Gao Y
Zhang Z
Chen Y
Li Y
Gao M
Chen S
Wang X
Chen Y
Publication year
Publication venue
2022 international joint conference on neural networks (IJCNN)

External Links

Snippet

Online-to-Offline (O2O) e-commerce service platforms and their users are faced with various fraud risks. Among them, financial identity theft is a widely existing challenge. However, existing methods are insufficient to detect this type of fraud. In this paper, we address the …
Continue reading at chenyang03.wordpress.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/12Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents characterised by the data terminal contains provisionally no documents
    • H04L29/12009Arrangements for addressing and naming in data networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • G06Q30/0185Product, service or business identity fraud

Similar Documents

Publication Publication Date Title
Dou et al. Enhancing graph neural network-based fraud detectors against camouflaged fraudsters
US11928245B2 (en) Systems and methods of determining compromised identity information
Qian et al. De-anonymizing social networks and inferring private attributes using knowledge graphs
US10268840B2 (en) Systems and methods of determining compromised identity information
US20190266355A1 (en) Systems and methods of determining compromised identity information
Shamsi et al. Chartalist: Labeled graph datasets for utxo and account-based blockchains
Ye et al. Modeling access environment and behavior sequence for financial identity theft detection in E-commerce services
Fan et al. A practical framework for privacy-preserving data analytics
Ramachandran et al. Exploring re-identification risks in public domains
Powar et al. SoK: Managing risks of linkage attacks on data privacy
Qi et al. Blockchain data mining with graph learning: A survey
US20230385451A1 (en) Systems and methods of determining compromised identity information
Shen et al. Finding mnemon: Reviving memories of node embeddings
He et al. A topic community‐based method for friend recommendation in large‐scale online social networks
Paracha et al. Sus you’re sus!—identifying influencer hackers on dark web social networks
Singh et al. Social networks privacy preservation: A novel framework
Mustafa et al. Feature selection for phishing website by using naive bayes classifier
WO2023172352A1 (en) Systems and methods for monitoring decentralized data storage
Won et al. Secure principal component analysis in multiple distributed nodes
Xian et al. Multi-view low-rank coding-based network data de-anonymization
Sekgoka et al. Privacy-preserving data mining of cross-border financial flows
Ji et al. Feature driven learning framework for cybersecurity event detection
CN117453793A (en) A high-quality threat data mining method, system, electronic device and medium
Zhang et al. A bitcoin address multi-classification mechanism based on bipartite graph-based maximization consensus
Ye et al. Deep learning-based user privacy settings recommendation in online social networks