skip to main content
10.1145/3558819.3558820acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccsieConference Proceedingsconference-collections
research-article

Application of Association Rules in Telecommunication Network Fraud Cases

Published:26 October 2022Publication History

ABSTRACT

As a new form of fraud, telecom network fraud is characterized by remoteness and contactless. After collecting reports of telecom network fraud cases through the Internet and simulating the case datasets based on the report findings, this paper selects the datasets related to characteristics of the suspects for pre-processing and transformation, applies the association rule algorithm to telecom network fraud cases, and uses Apriori algorithm and FP-Growth algorithm to mine the valuable information of the characteristics of the suspects involved in telecom network fraud cases. By doing so, this paper discovers the association relationship between the characteristics of the suspects, and proposes relevant prevention suggestions on this basis to help combat telecom network fraud crimes.

CCS concept •Computing methodologies∼Machine learning∼Machine learning approaches∼Rule learning

References

  1. Agrawal R, Imielinski T, Swami A (1993) Mining association rules between sets of items in large databases. In: Proceedings of the 1993 ACM-SIGMODinternational conference on management of data (SIGMOD’93), Washington, DC, pp 207–216Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. DI Ting. Research of Telecommunication Network Fraud Cases Characteristics and Control Countermeasures: Data Mining based on Python. Shanxi Normal University,2020Google ScholarGoogle Scholar
  3. Li Xiaobing. Research on mining association rules of fraud cases based on Apriori algorithm. Management informatization in China, 2015, 18(13):219-222.Google ScholarGoogle Scholar
  4. Bolimos I A, Choo K. Online fraud offending within an Australian jurisdiction. Journal of Financial Crime, 2017, 24(2):277-308.Google ScholarGoogle ScholarCross RefCross Ref
  5. Lu Pengwu, Han Chunmei, Liu Guijiang. Application of big data mining in public security management system. New industrialization, 2021, 11(06):249-250+252.DOI:10.19335/j.cnki.2095-6649.2021.6.110.Google ScholarGoogle ScholarCross RefCross Ref
  6. Bai Jingjing, Zhang Lihong. Identification and management of fraud calls based on big data mining technology. Changjiang information and communication, 2021, 34(05):126-128.Google ScholarGoogle Scholar
  7. Subudhi S, Panigrahi S. Quarter-Sphere Support Vector Machine for Fraud Detection in Mobile Telecommunication Networks. Procedia Computer Science, 2015, 48:353-359.Google ScholarGoogle ScholarCross RefCross Ref
  8. Zuhe Huang. Causes and Prevention of Telecommunication Network Fraud. Proceedings of the 2nd International Conference on Humanities Science and Society Development (ICHSSD 2017), 2017.Google ScholarGoogle Scholar
  9. Lai Yunlong. On the Countermeasures of preventing and controlling the crime of telecommunication fraud. Jilin: Jilin University, 2019: 18-20.Google ScholarGoogle Scholar
  10. CAICT. Research Report on the Governance of Telecom Network Fraud under the New Situation (2020) published by CAICT.(2020-12-18)[2022-2-21] https://weibo.com/ttarticle/p/show?id=2309404583516829516058&sudaref=www.baidu.comGoogle ScholarGoogle Scholar
  11. Xiaobaogong. General Trend Big Data Analysis of the Telecom Fraud Crime in 2011-2021 (the first volume).(2021-5-31)[2022-2-24]https://mp.weixin.qq.com/s?__biz=MzU2OTY1OTg3MQ==&mid=2247494063&idx=1&sn=5071884b45e0dcb697f5bf450acc27fb&chksm=fcf9f11fcb8e7809d846443bbf6c41f0f1629a643e7f1adfbf6a1dc9a4709c407bf150098982&scene=21#wechat_redirectGoogle ScholarGoogle Scholar
  12. 360 browser. China Mobile Security Report for the First Half of 2021.(2021-8-24)[2022-2-21]https://www.360.cn/n/12015.htmlGoogle ScholarGoogle Scholar

Index Terms

  1. Application of Association Rules in Telecommunication Network Fraud Cases
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICCSIE '22: Proceedings of the 7th International Conference on Cyber Security and Information Engineering
          September 2022
          1094 pages
          ISBN:9781450397414
          DOI:10.1145/3558819

          Copyright © 2022 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 26 October 2022

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited
        • Article Metrics

          • Downloads (Last 12 months)43
          • Downloads (Last 6 weeks)3

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format