ABSTRACT
As a new form of fraud, telecom network fraud is characterized by remoteness and contactless. After collecting reports of telecom network fraud cases through the Internet and simulating the case datasets based on the report findings, this paper selects the datasets related to characteristics of the suspects for pre-processing and transformation, applies the association rule algorithm to telecom network fraud cases, and uses Apriori algorithm and FP-Growth algorithm to mine the valuable information of the characteristics of the suspects involved in telecom network fraud cases. By doing so, this paper discovers the association relationship between the characteristics of the suspects, and proposes relevant prevention suggestions on this basis to help combat telecom network fraud crimes.
CCS concept •Computing methodologies∼Machine learning∼Machine learning approaches∼Rule learning
- Agrawal R, Imielinski T, Swami A (1993) Mining association rules between sets of items in large databases. In: Proceedings of the 1993 ACM-SIGMODinternational conference on management of data (SIGMOD’93), Washington, DC, pp 207–216Google ScholarDigital Library
- DI Ting. Research of Telecommunication Network Fraud Cases Characteristics and Control Countermeasures: Data Mining based on Python. Shanxi Normal University,2020Google Scholar
- Li Xiaobing. Research on mining association rules of fraud cases based on Apriori algorithm. Management informatization in China, 2015, 18(13):219-222.Google Scholar
- Bolimos I A, Choo K. Online fraud offending within an Australian jurisdiction. Journal of Financial Crime, 2017, 24(2):277-308.Google ScholarCross Ref
- Lu Pengwu, Han Chunmei, Liu Guijiang. Application of big data mining in public security management system. New industrialization, 2021, 11(06):249-250+252.DOI:10.19335/j.cnki.2095-6649.2021.6.110.Google ScholarCross Ref
- Bai Jingjing, Zhang Lihong. Identification and management of fraud calls based on big data mining technology. Changjiang information and communication, 2021, 34(05):126-128.Google Scholar
- Subudhi S, Panigrahi S. Quarter-Sphere Support Vector Machine for Fraud Detection in Mobile Telecommunication Networks. Procedia Computer Science, 2015, 48:353-359.Google ScholarCross Ref
- Zuhe Huang. Causes and Prevention of Telecommunication Network Fraud. Proceedings of the 2nd International Conference on Humanities Science and Society Development (ICHSSD 2017), 2017.Google Scholar
- Lai Yunlong. On the Countermeasures of preventing and controlling the crime of telecommunication fraud. Jilin: Jilin University, 2019: 18-20.Google Scholar
- CAICT. Research Report on the Governance of Telecom Network Fraud under the New Situation (2020) published by CAICT.(2020-12-18)[2022-2-21] https://weibo.com/ttarticle/p/show?id=2309404583516829516058&sudaref=www.baidu.comGoogle Scholar
- Xiaobaogong. General Trend Big Data Analysis of the Telecom Fraud Crime in 2011-2021 (the first volume).(2021-5-31)[2022-2-24]https://mp.weixin.qq.com/s?__biz=MzU2OTY1OTg3MQ==&mid=2247494063&idx=1&sn=5071884b45e0dcb697f5bf450acc27fb&chksm=fcf9f11fcb8e7809d846443bbf6c41f0f1629a643e7f1adfbf6a1dc9a4709c407bf150098982&scene=21#wechat_redirectGoogle Scholar
- 360 browser. China Mobile Security Report for the First Half of 2021.(2021-8-24)[2022-2-21]https://www.360.cn/n/12015.htmlGoogle Scholar
Index Terms
- Application of Association Rules in Telecommunication Network Fraud Cases
Recommendations
Research and improvement on association rule algorithm based on FP-Growth
WISM'12: Proceedings of the 2012 international conference on Web Information Systems and MiningAssociation rules mining (ARM) is one of the most useful techniques in the field of knowledge discovery and data mining and so on. Frequent item sets mining plays an important role in association rules mining. Apriori algorithm and FP-growth algorithm ...
Mining Association Rules Based on Apriori Algorithm and Application
IFCSTA '09: Proceedings of the 2009 International Forum on Computer Science-Technology and Applications - Volume 01In the data mining research, mining association rules is an important topic. Apriori algorithm submitted by Agrawal and R. Srikant in 1994 is the most effective algorithm. Aimed at two problems of discovering frequent itemsets in a large database and ...
Mining Association Rules Based on Deep Pruning Strategies
Today mobile network and various smart devices flourish rapidly. Data collected from the mobile devices and network can bring us huge opportunities to understand some significant characteristics of the users which traditional data cannot. Association ...
Comments