Nothing Special   »   [go: up one dir, main page]

CN111325550A - Method and device for identifying fraudulent transaction behaviors - Google Patents

Method and device for identifying fraudulent transaction behaviors Download PDF

Info

Publication number
CN111325550A
CN111325550A CN201811528230.XA CN201811528230A CN111325550A CN 111325550 A CN111325550 A CN 111325550A CN 201811528230 A CN201811528230 A CN 201811528230A CN 111325550 A CN111325550 A CN 111325550A
Authority
CN
China
Prior art keywords
behavior
recognition
identification
service
classification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811528230.XA
Other languages
Chinese (zh)
Inventor
陈雪
彭文新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Guangdong Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Guangdong Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Guangdong Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201811528230.XA priority Critical patent/CN111325550A/en
Publication of CN111325550A publication Critical patent/CN111325550A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • G06F18/2411Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on the proximity to a decision surface, e.g. support vector machines
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Economics (AREA)
  • Evolutionary Computation (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Development Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Artificial Intelligence (AREA)
  • Technology Law (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the invention provides a method and a device for identifying fraudulent transaction behaviors, wherein the method comprises the following steps: aiming at any business classification, respectively inputting the characteristic behavior data of the user to be detected into a plurality of behavior recognition models corresponding to the business classification, and acquiring a candidate recognition result output by each behavior recognition model; acquiring a recognition result under the service classification based on the candidate recognition result output by each behavior recognition model; and acquiring a comprehensive identification result based on the identification result under each service type. The method and the device provided by the embodiment of the invention slow down the problems of overfitting and generalization of a single model, prolong the life cycle of the model and improve the accuracy of behavior recognition. In addition, the comprehensive identification result is obtained based on the identification results under a plurality of service types, so that the multi-industry fraud behaviors are effectively covered, the fields and behaviors which are easy to generate fraud are comprehensively excavated, and the optimization of service vulnerabilities can be guided.

Description

Method and device for identifying fraudulent transaction behaviors
Technical Field
The embodiment of the invention relates to the technical field of internet fraud behavior identification, in particular to a method and a device for identifying fraudulent transaction behaviors.
Background
With the development of technology and the intervention of capital, the internet and mobile internet have been rapidly developed. While the business is rapidly developed, the business loophole also induces the wool party to carry out fraudulent trading behaviors. Various anti-fraud techniques have also been developed vigorously to strike a woolen party and maintain market order.
In terms of business dimension, the anti-fraud technology can be subdivided into credit card application anti-fraud, credit application anti-fraud, payment anti-fraud, transaction anti-fraud, bill-swiping anti-fraud, merchant anti-fraud, insider anti-fraud and other subdivided products. In terms of institution dimensions, anti-fraud techniques are distributed in financial institutions such as large and small banks, third-party payment institutions, various consumer financial companies, small credit institutions, insurance, securities and the like, and non-financial institutions such as large e-commerce platforms, express companies, game platforms, live broadcast platforms, small video platforms, taxi taking platforms, take-out platforms and the like.
The current fraud transaction behavior identification technology generally adopts a list of determined fraud as a guide, collectable characteristic behavior data as input, and utilizes a data mining algorithm (such as a decision tree, logistic regression, naive Bayesian algorithm, and the like) to construct a prediction fraud model, and scores all users according to a model rule to obtain a fraud list. However, because the service level is single, the cheating behaviors of other services cannot be covered, and the mining algorithm has the problems of fitting degree and generalization capability, and is not enough to deal with the cheating behaviors of various ends of the wool party, and the 'accidental injury' to normal users is serious in some cases.
Disclosure of Invention
The embodiment of the invention provides a method and a device for identifying fraudulent transaction behaviors, which are used for solving the problems of insufficient comprehensiveness and accuracy caused by single service level and poor generalization capability of the conventional anti-fraudulent technology.
In a first aspect, an embodiment of the present invention provides a method for identifying fraudulent transaction behaviors, including:
aiming at any business classification, respectively inputting the characteristic behavior data of a user to be tested into a plurality of behavior recognition models corresponding to the business classification, and acquiring a candidate recognition result output by each behavior recognition model; the behavior recognition model is obtained by training based on sample user characteristic behavior data and a sample recognition result;
acquiring an identification result under any service classification based on the candidate identification result output by each behavior identification model;
and acquiring a comprehensive identification result based on the identification result under each service type.
In a second aspect, an embodiment of the present invention provides a fraudulent transaction behavior identification device, including:
the model identification unit is used for respectively inputting the characteristic behavior data of the user to be detected into a plurality of behavior identification models corresponding to any business classification aiming at any business classification and acquiring a candidate identification result output by each behavior identification model; the behavior recognition model is obtained by training based on sample user characteristic behavior data and a sample recognition result;
a service identification unit, configured to obtain an identification result in any service classification based on the candidate identification result output by each behavior identification model;
and the comprehensive identification unit is used for acquiring a comprehensive identification result based on the identification result under each service type.
In a third aspect, an embodiment of the present invention provides an electronic device, including a processor, a communication interface, a memory, and a bus, where the processor and the communication interface, the memory complete communication with each other through the bus, and the processor may call a logic instruction in the memory to perform the steps of the method provided in the first aspect.
In a fourth aspect, an embodiment of the present invention provides a non-transitory computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the steps of the method as provided in the first aspect.
According to the fraud transaction behavior identification method and device provided by the embodiment of the invention, the identification result under single service classification is obtained based on the candidate identification result output by each behavior identification model, so that the problems of overfitting and generalization of the single model are solved, the life cycle of the model is prolonged, and the accuracy of behavior identification is improved. In addition, the comprehensive identification result is obtained based on the identification results under a plurality of service types, so that the multi-industry fraud behaviors are effectively covered, the fields and behaviors which are easy to generate fraud are comprehensively excavated, and the optimization of service vulnerabilities can be guided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a fraudulent transaction behavior identification method according to an embodiment of the present invention;
fig. 2 is a flow chart illustrating a method for identifying fraudulent transaction activities according to another embodiment of the present invention;
fig. 3 is a schematic structural diagram of a fraudulent transaction behavior identification device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Aiming at the problems of single service level and poor generalization capability of the existing anti-fraud technology, which cause insufficient comprehensiveness and accuracy, the embodiment of the invention provides a fraud transaction behavior identification method. Fig. 1 is a schematic flow chart of a fraudulent transaction behavior identification method according to an embodiment of the present invention, as shown in fig. 1, the method includes:
110, aiming at any business classification, respectively inputting the characteristic behavior data of the user to be detected into a plurality of behavior recognition models corresponding to the business classification, and acquiring a candidate recognition result output by each behavior recognition model; the behavior recognition model is obtained by training based on the sample user characteristic behavior data and the sample recognition result.
Specifically, the service classification is a classification obtained by classifying fraudulent behaviors based on different service dimensions, and the service classification may be various. Such as e-commerce fraud, internet financial fraud, operator fraud, credit fraud, express fraud, and gaming fraud, embodiments of the present invention do not specifically limit the specific types and amounts of traffic classifications. The characteristic behavior data of the user to be tested is the characteristic behavior data of the user to be tested and is used as a recognition basis for carrying out fraud transaction recognition, and the characteristic behavior data can be a call condition, a flow using behavior or an internet surfing behavior and the like. The candidate recognition result is a recognition result obtained by the behavior recognition model based on the characteristic behavior data of the user to be detected, the candidate recognition result is used for identifying whether the user to be detected has the fraudulent transaction behavior, the candidate recognition result can be a normal behavior or the fraudulent behavior, and can also be the probability that the user to be detected has the fraudulent transaction behavior.
Here, there are a plurality of service classifications, each corresponding to a plurality of behavior recognition models, and each behavior recognition model outputs a candidate recognition result based on input characteristic behavior data of the user to be tested. For any service classification, the multiple behavior recognition models under the service classification may be obtained by training based on different sample user characteristic behavior data, may also be obtained by training based on different neural network models or machine learning algorithms, and may also be obtained by training based on different sample user characteristic behavior data and different neural network models or machine learning algorithms, which is not specifically limited in this embodiment of the present invention.
In addition, before step 110 is executed, the behavior recognition model may be obtained by training in advance, and specifically, the behavior recognition model may be obtained by training in the following manner: firstly, collecting a large amount of sample user characteristic behavior data and sample identification results; the sample user characteristic behavior data correspond to the sample identification results one by one, and the sample identification results are preset and used for representing whether the sample user obtained by analyzing the corresponding sample user characteristic behavior data has fraud transaction behaviors or not. And training the initial model based on the sample user characteristic behavior data and the sample recognition result, thereby obtaining a behavior recognition model. The initial model may be a single neural network model or a combination of a plurality of neural network models, and the embodiment of the present invention does not specifically limit the type and structure of the initial model.
And 120, aiming at any business classification, acquiring a recognition result under the business classification based on the candidate recognition result output by each behavior recognition model.
Specifically, for any service classification, based on a plurality of candidate recognition results output by a plurality of behavior recognition models corresponding to the service classification, a recognition result under the service classification is obtained. Here, the recognition result in the service classification is obtained by summarizing and analyzing a plurality of candidate recognition results, and the recognition result in the service classification may be obtained by weighting the plurality of candidate recognition results, or by using a method of voting by voting, or by comparing an average of the plurality of candidate recognition results with a preset threshold, which is not specifically limited in the embodiment of the present invention.
And 130, acquiring a comprehensive identification result based on the identification result under each service type.
Specifically, steps 110 and 120 are performed for each traffic class to obtain the recognition result for each traffic type. After the recognition result under each service type is obtained, the recognition results under each service type are summarized and analyzed to obtain a comprehensive recognition result, namely a comprehensive recognition result, which integrates all the service types. Here, the comprehensive identification result may be obtained by weighting the identification result under each service type, or by using a method of voting for majority, or by averaging the identification results under each service type and comparing the result with a preset threshold, which is not specifically limited in the embodiment of the present invention.
According to the method provided by the embodiment of the invention, the recognition result under the single service classification is obtained based on the candidate recognition result output by each behavior recognition model, so that the problems of overfitting and generalization of the single model are solved, the life cycle of the model is prolonged, and the accuracy of behavior recognition is improved. In addition, the comprehensive identification result is obtained based on the identification results under a plurality of service types, so that the multi-industry fraud behaviors are effectively covered, the fields and behaviors which are easy to generate fraud are comprehensively excavated, and the optimization of service vulnerabilities can be guided.
Based on any of the above embodiments, the service classification includes at least one of e-commerce fraud, internet financial fraud, operator fraud, and credit loan fraud; the characteristic behavior data of the user to be tested comprises at least one of basic information, conversation conditions, traffic using behaviors and internet surfing behaviors of the user to be tested. Here, the basic information may be account information such as a mobile phone number of the user to be tested, and is used as an identifier of the characteristic behavior data of the user to be tested.
Correspondingly, when the behavior recognition model is trained, the sample user characteristic behavior data also comprises at least one of basic information, call condition, flow use behavior and internet access behavior of the sample user. Here, the basic information may be account information such as a cell phone number of the sample user, and is used as an identifier of the sample user characteristic behavior data.
Based on any of the above embodiments, step 110 further includes: aiming at any business classification, training initial models respectively through multiple algorithms based on sample user characteristic behavior data and sample recognition results to obtain multiple behavior recognition models; wherein the algorithm comprises at least one of a logistic regression algorithm, a support vector machine algorithm and a classification regression tree algorithm.
Specifically, for any service classification, before the characteristic behavior data of the user to be tested is respectively input to the plurality of behavior recognition models corresponding to the service classification, a plurality of behavior recognition models obtained based on the characteristic behavior data of the sample user and the sample recognition result need to be trained. In the model training process, the initial model is trained through different algorithms, so that different behavior recognition models are obtained, the algorithms correspond to the behavior recognition models one by one, for example, a logistic regression model for behavior recognition is obtained through a logistic regression algorithm, a support vector machine model for behavior recognition is obtained through a support vector machine algorithm, and a classification regression tree model for behavior recognition is obtained through a classification regression tree algorithm.
Here, a Logistic Regression (LR) algorithm is used to process a Regression problem in which a dependent variable is a classification variable, and is commonly used in the fields of data mining, automatic disease diagnosis, economic prediction, and the like. Support Vector Machines (SVMs) are supervised learning models associated with associated learning algorithms that analyze data, recognize patterns, and perform classification and regression analysis. The Classification and Regression Tree (CART) algorithm is a learning method that outputs a conditional probability distribution of a random variable Y given an input random variable X, and can be used for Classification or Regression.
The method provided by the embodiment of the invention obtains various recognition classification models aiming at each business classification training, and fully utilizes the data dimension, thereby slowing down the problems of overfitting and generalization of a single model, prolonging the life cycle of the model and improving the accuracy of behavior recognition.
Based on any of the above embodiments, step 120 specifically includes: counting the number of models of which the candidate recognition result is fraudulent transaction and the number of models of which the candidate recognition result is normal transaction based on the candidate recognition result output by each behavior recognition model; if the number of the models of the fraud transaction is larger than the number of the models of the normal transaction, the identification result under the service classification is set as the fraud transaction; otherwise, setting the identification result under the service classification as normal transaction.
Specifically, the candidate identification result is a fraud transaction or a normal transaction, the fraud transaction indicates that the to-be-detected user has a fraud transaction behavior, and the normal transaction indicates that the to-be-detected user does not have the fraud transaction behavior. And aiming at any business classification, obtaining a candidate recognition result output by each behavior recognition model under the business classification, and obtaining a recognition result under the comprehensive business classification based on a majority voting function. Further, the candidate recognition results are counted, the number of behavior recognition models of which the output candidate recognition results are fraudulent transactions and the number of behavior recognition models of which the output candidate recognition results are normal transactions are obtained, and comparison is performed. And if the number of the models of the fraud transaction is larger than the number of the models of the normal transaction, namely the number of votes of the fraud transaction is larger than the number of votes of the normal transaction, according to a majority voting principle, determining that the identification result under the service classification is the fraud transaction. And if the number of the models of the fraud transaction as the candidate identification result is less than or equal to the number of the models of the normal transaction as the candidate identification result, namely the number of votes of the fraud transaction is less than or equal to the number of votes of the normal transaction, confirming that the identification result under the service classification is the normal transaction according to a majority voting principle.
For example, any traffic class includes three behavior recognition models, namely an LR behavior recognition model, an SVM behavior recognition model and a CART behavior recognition model. Assuming that the LR behavior recognition model and the SVM behavior recognition model consider that the user to be detected has a fraud behavior, namely the output candidate recognition result is a fraud transaction, and the CART behavior recognition model gives an opposite result, namely the output candidate recognition result is a normal transaction, confirming that the user has the fraud behavior based on the principle of majority voting, and setting the recognition result under the service classification as the fraud transaction.
Based on any of the above embodiments, step 130 specifically includes: and weighting the recognition result under each service type based on the preset weight corresponding to each service type to obtain a comprehensive recognition result.
Here, each service type corresponds to a preset weight, and the preset weight is a preset weight of a boundary result of the service type.
Based on any of the above embodiments, step 130 further includes: obtaining a recall rate corresponding to each service type; and acquiring a preset weight corresponding to each service type based on the recall rate corresponding to each service type.
Specifically, the recall rate corresponding to any service type is obtained by verifying the predicted identification result of the service type after training of each behavior identification model of the service type is completed, and the higher the recall rate is, the more important the identification result of the service type is, and the higher the preset weight value corresponding to the service type is.
R1, r2, … and rn are defined as the recalls rate of the service type 1, the service type 2, … and the service type n respectively, and the weight α corresponding to each service type is defined as follows:
Figure BDA0001905008410000071
α 1, α 2, …, α n respectively correspond to the weights of traffic type 1, traffic type 2, …, traffic type n based on the weights, the integrated recognition result F is as follows:
F=α1·f1+α2·f2+…+αn·fn;
in the formula, F is the probability of fraudulent transaction behavior of the user to be tested, and F1, F2, … and fn respectively correspond to the identification results of the service type 1, the service type 2, the service type … and the service type n.
Based on any of the above embodiments, fig. 2 is a schematic flow chart of a fraudulent transaction behavior identification method according to another embodiment of the present invention, as shown in fig. 2, the fraudulent transaction behavior identification method is a matrix type hybrid algorithm, and is multi-service in the horizontal direction and multi-algorithm in the vertical direction, that is, the fraudulent transaction behavior identification method includes a plurality of service classes, and each service class includes a plurality of behavior identification models constructed based on different algorithms. For example, the business classification 1 includes a behavior recognition model LR1 constructed based on a logistic regression algorithm, a behavior recognition model SVM1 constructed based on a support vector machine, and a behavior recognition model CART1 constructed based on a classification regression tree.
And respectively inputting the characteristic behavior data of the user to be detected into each behavior recognition model corresponding to each service classification, and acquiring a candidate recognition result output by each behavior recognition model. And then, counting candidate recognition results output by each behavior recognition model corresponding to any business classification based on a majority voting principle, and further obtaining recognition results corresponding to the task classification. For example, the candidate recognition results output by each behavior recognition model in the business classification 1 are counted, and the recognition result of the business classification 1, that is, the recognition result 1, is obtained.
Weighting is performed based on the preset weight value corresponding to each service type, i.e., α 1, α 2, …, α n in fig. 2, and the recognition result of each service type, i.e., recognition result 1, recognition result 2, …, and recognition result n, so as to obtain a comprehensive recognition result.
The method provided by the embodiment of the invention covers the fraud behaviors of multiple industries, can increase the industry classification according to the requirements, and has the advantages of wide identification range and strong expansibility. In addition, behavior recognition is carried out based on multiple algorithm dimensions, the recognition accuracy rate is high, the fraudulent users can be effectively recognized, the probability that common users are wrongly judged as the fraudulent users is reduced, the user experience is optimized, and the marketing cost caused by wrong judgment is saved.
Based on any of the above method embodiments, fig. 3 is a schematic structural diagram of a fraudulent transaction behavior identification apparatus provided by an embodiment of the present invention, where the apparatus includes a model identification unit 310, a service identification unit 320, and a comprehensive identification unit 330;
the model identification unit 310 is configured to, for any service class, respectively input characteristic behavior data of a user to be detected to a plurality of behavior identification models corresponding to the service class, and obtain a candidate identification result output by each behavior identification model; the behavior recognition model is obtained by training based on sample user characteristic behavior data and a sample recognition result;
the service identification unit 320 is configured to obtain an identification result under any service classification based on the candidate identification result output by each behavior identification model;
the comprehensive identification unit 330 is configured to obtain a comprehensive identification result based on the identification result of each service type.
The device provided by the embodiment of the invention obtains the recognition result under the single service classification based on the candidate recognition result output by each behavior recognition model, thereby slowing down the problems of overfitting and generalization of the single model, prolonging the life cycle of the model and improving the accuracy of behavior recognition. In addition, the comprehensive identification result is obtained based on the identification results under a plurality of service types, so that the multi-industry fraud behaviors are effectively covered, the fields and behaviors which are easy to generate fraud are comprehensively excavated, and the optimization of service vulnerabilities can be guided.
In any of the above embodiments, the service classification includes at least one of e-commerce fraud, internet financial fraud, operator fraud, and credit loan fraud; the characteristic behavior data of the user to be tested comprises at least one of basic information, conversation conditions, traffic using behaviors and internet surfing behaviors of the user to be tested.
According to any of the above embodiments, the apparatus further comprises a training unit;
the training unit is used for training initial models through various algorithms respectively based on the sample user characteristic behavior data and the sample recognition results aiming at any business classification to obtain a plurality of behavior recognition models; wherein the algorithm comprises at least one of a logistic regression algorithm, a support vector machine algorithm, and a classification regression tree algorithm.
Based on any of the above embodiments, the service identification unit 320 is specifically configured to:
counting the number of models of which the candidate recognition result is fraudulent transaction and the number of models of which the candidate recognition result is normal transaction based on the candidate recognition result output by each behavior recognition model;
if the model number of the fraud transaction as the candidate identification result is larger than the model number of the normal transaction as the candidate identification result, setting the identification result under any service classification as the fraud transaction; otherwise, setting the identification result under any service classification as normal transaction.
Based on any of the above embodiments, the comprehensive identification unit 330 is specifically configured to: and weighting the identification result under each service type based on the preset weight corresponding to each service type to obtain a comprehensive identification result.
Based on any of the above embodiments, the apparatus further includes a weight obtaining unit;
the weight value obtaining unit is used for obtaining the recall rate corresponding to each service type; and acquiring a preset weight corresponding to each service type based on the recall rate corresponding to each service type.
Fig. 4 is a schematic entity structure diagram of an electronic device according to an embodiment of the present invention, and as shown in fig. 4, the electronic device may include: a processor (processor)401, a communication Interface (communication Interface)402, a memory (memory)403 and a communication bus 404, wherein the processor 401, the communication Interface 402 and the memory 403 complete communication with each other through the communication bus 404. The processor 401 may invoke a computer program stored in the memory 403 and operable on the processor 401 to perform the fraudulent transaction behavior identification method provided by the above embodiments, including, for example: aiming at any business classification, respectively inputting the characteristic behavior data of a user to be tested into a plurality of behavior recognition models corresponding to the business classification, and acquiring a candidate recognition result output by each behavior recognition model; the behavior recognition model is obtained by training based on sample user characteristic behavior data and a sample recognition result; acquiring an identification result under any service classification based on the candidate identification result output by each behavior identification model; and acquiring a comprehensive identification result based on the identification result under each service type.
In addition, the logic instructions in the memory 403 may be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or make a contribution to the prior art, or may be implemented in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Embodiments of the present invention further provide a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is implemented to perform the method for identifying fraudulent transaction behaviors provided in the foregoing embodiments, for example, the method includes: aiming at any business classification, respectively inputting the characteristic behavior data of a user to be tested into a plurality of behavior recognition models corresponding to the business classification, and acquiring a candidate recognition result output by each behavior recognition model; the behavior recognition model is obtained by training based on sample user characteristic behavior data and a sample recognition result; acquiring an identification result under any service classification based on the candidate identification result output by each behavior identification model; and acquiring a comprehensive identification result based on the identification result under each service type.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A method of identifying fraudulent transaction activity, comprising:
aiming at any business classification, respectively inputting the characteristic behavior data of a user to be tested into a plurality of behavior recognition models corresponding to the business classification, and acquiring a candidate recognition result output by each behavior recognition model; the behavior recognition model is obtained by training based on sample user characteristic behavior data and a sample recognition result;
acquiring an identification result under any service classification based on the candidate identification result output by each behavior identification model;
and acquiring a comprehensive identification result based on the identification result under each service type.
2. The method of claim 1, wherein the service classification includes at least one of e-commerce fraud, internet financial fraud, operator fraud, and credit fraud;
the characteristic behavior data of the user to be tested comprises at least one of basic information, conversation conditions, traffic using behaviors and internet surfing behaviors of the user to be tested.
3. The method according to claim 1, wherein for any service class, the step of inputting the characteristic behavior data of the user to be tested into the plurality of behavior recognition models corresponding to the service class respectively to obtain the candidate recognition result output by each behavior recognition model further comprises:
aiming at any business classification, training initial models respectively through multiple algorithms based on the sample user characteristic behavior data and the sample recognition result to obtain multiple behavior recognition models;
wherein the algorithm comprises at least one of a logistic regression algorithm, a support vector machine algorithm, and a classification regression tree algorithm.
4. The method according to claim 1, wherein the obtaining the recognition result under any service classification based on the candidate recognition result output by each behavior recognition model specifically includes:
counting the number of models of which the candidate recognition result is fraudulent transaction and the number of models of which the candidate recognition result is normal transaction based on the candidate recognition result output by each behavior recognition model;
if the model number of the fraud transaction as the candidate identification result is larger than the model number of the normal transaction as the candidate identification result, setting the identification result under any service classification as the fraud transaction; otherwise, setting the identification result under any service classification as normal transaction.
5. The method according to claim 1, wherein the obtaining a comprehensive identification result based on the identification result under each service type specifically includes:
and weighting the identification result under each service type based on the preset weight corresponding to each service type to obtain a comprehensive identification result.
6. The method according to claim 5, wherein the weighting is performed on the recognition result under each service type based on a preset weight corresponding to each service type to obtain a comprehensive recognition result, and the method further comprises:
obtaining a recall rate corresponding to each service type;
and acquiring a preset weight corresponding to each service type based on the recall rate corresponding to each service type.
7. An apparatus for identifying fraudulent transaction activity, comprising:
the model identification unit is used for respectively inputting the characteristic behavior data of the user to be detected into a plurality of behavior identification models corresponding to any business classification aiming at any business classification and acquiring a candidate identification result output by each behavior identification model; the behavior recognition model is obtained by training based on sample user characteristic behavior data and a sample recognition result;
a service identification unit, configured to obtain an identification result in any service classification based on the candidate identification result output by each behavior identification model;
and the comprehensive identification unit is used for acquiring a comprehensive identification result based on the identification result under each service type.
8. The apparatus of claim 7, further comprising a training unit;
the training unit is used for training initial models through various algorithms respectively based on the sample user characteristic behavior data and the sample recognition results aiming at any business classification to obtain a plurality of behavior recognition models; wherein the algorithm comprises at least one of a logistic regression algorithm, a support vector machine algorithm, and a classification regression tree algorithm.
9. An electronic device, comprising a processor, a communication interface, a memory and a bus, wherein the processor, the communication interface and the memory communicate with each other via the bus, and the processor can call logic instructions in the memory to execute the method according to any one of claims 1 to 6.
10. A non-transitory computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1 to 6.
CN201811528230.XA 2018-12-13 2018-12-13 Method and device for identifying fraudulent transaction behaviors Pending CN111325550A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811528230.XA CN111325550A (en) 2018-12-13 2018-12-13 Method and device for identifying fraudulent transaction behaviors

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811528230.XA CN111325550A (en) 2018-12-13 2018-12-13 Method and device for identifying fraudulent transaction behaviors

Publications (1)

Publication Number Publication Date
CN111325550A true CN111325550A (en) 2020-06-23

Family

ID=71172275

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811528230.XA Pending CN111325550A (en) 2018-12-13 2018-12-13 Method and device for identifying fraudulent transaction behaviors

Country Status (1)

Country Link
CN (1) CN111325550A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112116358A (en) * 2020-09-29 2020-12-22 中国银行股份有限公司 Transaction fraud prediction method and device and electronic equipment
CN112348519A (en) * 2020-10-21 2021-02-09 上海淇玥信息技术有限公司 Method and device for identifying fraudulent user and electronic equipment
CN112350956A (en) * 2020-10-23 2021-02-09 新华三大数据技术有限公司 Network traffic identification method, device, equipment and machine readable storage medium
CN112422576A (en) * 2020-11-24 2021-02-26 北京数美时代科技有限公司 Layered online architecture device and equipment supporting real-time anti-fraud service
CN112926990A (en) * 2021-03-25 2021-06-08 支付宝(杭州)信息技术有限公司 Method and device for fraud identification
CN113115311A (en) * 2021-04-12 2021-07-13 江苏通付盾科技有限公司 Support vector machine model-based fraud behavior identification method and system
CN113688870A (en) * 2021-07-22 2021-11-23 国网江苏省电力有限公司营销服务中心 Group renting house identification method based on user electricity utilization behavior by adopting hybrid algorithm
CN114301711A (en) * 2021-12-31 2022-04-08 招商银行股份有限公司 Anti-riot brushing method, device, equipment, storage medium and computer program product
WO2022195630A1 (en) * 2021-03-18 2022-09-22 Abhishek Gupta Fraud detection system and method thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106506454A (en) * 2016-10-10 2017-03-15 江苏通付盾科技有限公司 Fraud business recognition method and device
CN106600423A (en) * 2016-11-18 2017-04-26 云数信息科技(深圳)有限公司 Machine learning-based car insurance data processing method and device and car insurance fraud identification method and device
CN108717638A (en) * 2018-05-18 2018-10-30 深圳壹账通智能科技有限公司 Fraudulent trading judgment method, device, computer equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106506454A (en) * 2016-10-10 2017-03-15 江苏通付盾科技有限公司 Fraud business recognition method and device
CN106600423A (en) * 2016-11-18 2017-04-26 云数信息科技(深圳)有限公司 Machine learning-based car insurance data processing method and device and car insurance fraud identification method and device
CN108717638A (en) * 2018-05-18 2018-10-30 深圳壹账通智能科技有限公司 Fraudulent trading judgment method, device, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
程光 等: "《互联网大数据挖掘与分类》", 南京:东南大学出版社, pages: 187 - 190 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112116358A (en) * 2020-09-29 2020-12-22 中国银行股份有限公司 Transaction fraud prediction method and device and electronic equipment
CN112348519A (en) * 2020-10-21 2021-02-09 上海淇玥信息技术有限公司 Method and device for identifying fraudulent user and electronic equipment
CN112350956A (en) * 2020-10-23 2021-02-09 新华三大数据技术有限公司 Network traffic identification method, device, equipment and machine readable storage medium
CN112350956B (en) * 2020-10-23 2022-07-01 新华三大数据技术有限公司 Network traffic identification method, device, equipment and machine readable storage medium
CN112422576A (en) * 2020-11-24 2021-02-26 北京数美时代科技有限公司 Layered online architecture device and equipment supporting real-time anti-fraud service
WO2022195630A1 (en) * 2021-03-18 2022-09-22 Abhishek Gupta Fraud detection system and method thereof
CN112926990A (en) * 2021-03-25 2021-06-08 支付宝(杭州)信息技术有限公司 Method and device for fraud identification
CN113115311A (en) * 2021-04-12 2021-07-13 江苏通付盾科技有限公司 Support vector machine model-based fraud behavior identification method and system
CN113688870A (en) * 2021-07-22 2021-11-23 国网江苏省电力有限公司营销服务中心 Group renting house identification method based on user electricity utilization behavior by adopting hybrid algorithm
CN113688870B (en) * 2021-07-22 2023-09-26 国网江苏省电力有限公司营销服务中心 Group renting room identification method based on user electricity behavior by adopting hybrid algorithm
CN114301711A (en) * 2021-12-31 2022-04-08 招商银行股份有限公司 Anti-riot brushing method, device, equipment, storage medium and computer program product

Similar Documents

Publication Publication Date Title
CN111325550A (en) Method and device for identifying fraudulent transaction behaviors
US8355896B2 (en) Co-occurrence consistency analysis method and apparatus for finding predictive variable groups
CN111127178A (en) Data processing method and device, storage medium and electronic equipment
Zhou et al. Fraud detection within bankcard enrollment on mobile device based payment using machine learning
US11250368B1 (en) Business prediction method and apparatus
CN111882420A (en) Generation method of response rate, marketing method, model training method and device
CN112232950A (en) Loan risk assessment method and device, equipment and computer-readable storage medium
CN110930218A (en) Method and device for identifying fraudulent customer and electronic equipment
Zabkowski RFM approach for telecom insolvency modeling
CN111144899A (en) Method and device for identifying false transactions and electronic equipment
CN117114689A (en) Fraud detection model construction method, fraud detection model construction device, fraud detection model construction equipment and storage medium
CN118134652A (en) Asset configuration scheme generation method and device, electronic equipment and medium
CN117437001A (en) Target object index data processing method and device and computer equipment
CN117575666A (en) Data processing method and device
CN113743619A (en) Cheating user identification method and device based on associated network behaviors
Akbar et al. Machine learning predictive models analysis on telecommunications service churn rate
Xiao et al. Explainable fraud detection for few labeled time series data
CN110909753A (en) Data classification method, system and equipment
KR102409019B1 (en) System and method for risk assessment of financial transactions and computer program for the same
CN110570301B (en) Risk identification method, device, equipment and medium
CN115482084A (en) Method and device for generating wind control rule set
CN114022712A (en) User classification method and device, computer equipment and storage medium
Yang et al. A study on analysis methods of latent customer purchase behavior focused on membership stage growth
Jamil et al. SUSTAINABLE FRAUD DETECTION IN GREEN FINANCE EMPOWERED WITH MACHINE LEARNING APPROACH
US11915313B2 (en) Using email history to estimate creditworthiness for applicants having insufficient credit history

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200623