A Victim-Based Framework for Telecom Fraud Analysis: A Bayesian Network Model

被引:4
|
作者
Ni, Peifeng [1 ]
Yu, Wei [2 ]
机构
[1] Univ Chinese Acad Sci, Sch Econ & Management, Beijing 100190, Peoples R China
[2] RichAI Technol Inc, Beijing 100013, Peoples R China
关键词
D O I
10.1155/2022/7937355
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
The increasingly rampant telecom network fraud crime will cause serious harm to people's property safety. The way to reduce telecom fraud has shifted from passive combat to active prevention. This paper proposes a victim analysis and prediction method based on Bayesian network (BN), which models victims from age, gender, occupation, marriage, knowledge level, etc. We describe the fraud process in terms of whether to report to the police, property loss, and realizing the reasoning of the whole process of telecom fraud. This paper uses expert experience to obtain a Bayesian network structure. 533 real telecom fraud cases are used to learn Bayesian network parameters. The model is capable of quantifying uncertainty and dealing with nonlinear complex relationships among multiple factors, analyzing the factors most sensitive to property damage. According to the characteristics of victims, we conduct situational reasoning in the Bayesian network to evaluate property damage and alarm situations in different scenarios and provide decision support for police and community prevention and control. The experimental results show that male staff in government agencies are the most vulnerable to shopping fraud and women in schools are the most vulnerable to phishing and virus fraud and have the greatest property loss after being deceived; victim characteristics have very limited influence on whether to report to the police.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Establishment of a food fraud database and analysis of fraud information based on network data in China
    Heli Li
    Yaqing Cheng
    Jiyang Luo
    Li Li
    Yongning Wu
    Journal of Consumer Protection and Food Safety, 2022, 17 : 177 - 181
  • [22] Security Analysis of Large Power Grid Based on Complex Network Theory and Bayesian Network Model
    Liu, Li-min
    Liu, Junyong
    Wei, Zhen-bo
    Shang, Chang-ning
    Zhu, Guo-jun
    Dai, Song-ling
    2014 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2014,
  • [23] A Bayesian Network Model for Seismic Risk Analysis
    Zhang, Y.
    Weng, W. G.
    RISK ANALYSIS, 2021, 41 (10) : 1809 - 1822
  • [24] Ontological Reasoning Model Based on Bayesian Network
    Hu, Xiao
    Pan, Shouhui
    PROCEEDINGS OF INTERNATIONAL FORUM OF KNOWLEDGE AS A SERVICE, 2010, : 136 - 139
  • [25] A Framework for Analyzing Fraud Risk Warning and Interference Effects by Fusing Multivariate Heterogeneous Data: A Bayesian Belief Network
    Hu, Mianning
    Li, Xin
    Li, Mingfeng
    Zhu, Rongchen
    Si, Binzhou
    ENTROPY, 2023, 25 (06)
  • [26] Bayesian Network based Information Retrieval Model
    Garrouch, Kamel
    Omri, Mohamed Nazih
    2017 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2017, : 193 - 200
  • [27] Research of student model based on Bayesian network
    Yang, Qing
    Wang, Xiuping
    Huang, Zhufeng
    Zheng, Shijue
    PROCEEDINGS OF THE 2007 1ST INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGIES AND APPLICATIONS IN EDUCATION (ISITAE 2007), 2007, : 514 - 519
  • [28] Bayesian model-based outlier detection in network meta-analysis
    Metelli, Silvia
    Mavridis, Dimitris
    Crequit, Perrine
    Chaimani, Anna
    JOURNAL OF THE ROYAL STATISTICAL SOCIETY SERIES A-STATISTICS IN SOCIETY, 2023, 186 (04) : 754 - 771
  • [29] Risk Quantification and Analysis of Coupled Factors Based on the DEMATEL Model and a Bayesian Network
    Jiao, Jian
    Wei, Mengwei
    Yuan, Yuan
    Zhao, Tingdi
    APPLIED SCIENCES-BASEL, 2020, 10 (01):
  • [30] Combined multiple neural network model for function approximation based on a Bayesian analysis
    Cai, Jun
    Li, Tong
    Feng, Shan
    Huazhong Ligong Daxue Xuebao/Journal Huazhong (Central China) University of Science and Technology, 1996, 24 (08):