Internet Fraud and Defense System Research

Zhang Zhenling,Li Jianhua
DOI: https://doi.org/10.3969/j.issn.1009-8054.2007.01.067
2007-01-01
Abstract:This files based on the analysis of the model and typical Internet fraud attacks process. Summed up the Fraud Attack Mode, this Fraud Attack model always uses the vulnerability of networks and major websites. In this file we also discuss the model of Fraud Defense System and the core of Fraud Defense System--the Fraud Tracking System.
What problem does this paper attempt to address?