摘要 |
Methods and systems for processing fraud notifications allow an organization to classify, monitor, and shut down fraudulent websites. A system may receive reports of suspicious network sites via electronic mail, and parse such reports in order to obtain one or more attributes (e.g., an address) corresponding to the suspicious network sites. In addition, information related to these suspicious network sites may be stored in a database, and algorithms may be used in order to classify, monitor, and respond to a particular suspicious network site. Before responding to a suspicious network site, such a website may first be classified as legitimate, fraudulent or ignore. If the suspicious network site is classified as legitimate or ignore, further action might not be needed. If, however, the suspicious network site is classified as fraudulent, the fraudulent website may be monitored and further action may be taken.
|