Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network fraud number detection method and system, storage medium and terminal equipment

A number detection and network technology, applied in surveillance/monitoring/test arrangement, automatic exchange, telephone communication, etc., can solve the problems of inflexibility, low prediction accuracy, limited effect, etc., to improve accuracy and robustness Effect

Pending Publication Date: 2021-11-02
中山大学新华学院
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the rule-based detection method is not conducive to the changing situation of fraudulent behavior, and based on artificially designed specific rules, it is not flexible enough and the effect is relatively limited; the prediction accuracy of the random forest algorithm is low, so it is in the detection of fraud risk users. rate is relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network fraud number detection method and system, storage medium and terminal equipment
  • Network fraud number detection method and system, storage medium and terminal equipment
  • Network fraud number detection method and system, storage medium and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0050] It should be noted that the numbering of the steps in the text is only for the convenience of explanation of the specific embodiments, and does not serve as a function of limiting the execution order of the steps. The method provided in this embodiment may be executed by a relevant server, and the description below takes the server as an execution subject as an example.

[0051] Such as Figure 1 to Figure 5 As shown, the network fraud number detection meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network fraud number detection method, and the method comprises the steps: firstly designing corresponding features for information fraud behaviors, carrying out the feature extraction of a user behavior log, constructing an original feature matrix, and carrying out the data preprocessing; then, according to the unbalance degree of the proportion of normal users and risk users in the original feature matrix after data preprocessing, carrying out minority class sample oversampling by adopting a self-adjusting oversampling algorithm, and reconstructing a training set; then carrying out pre-training, feature importance evaluation and feature screening through an XGBoost model; then, carrying out model training on the reconstructed feature matrix by using an XGBoost model and a LightGBM model; and finally, improving the model performance through a Stacking multi-model fusion mode, obtaining a two-layer model Logistic, and completing a mobile network risk user identification model. According to the invention, the accuracy and robustness of fraud number identification in network communication can be improved, and the actual application requirements are met.

Description

technical field [0001] The present application relates to the fields of machine learning and network security, in particular to a method, system, storage medium and terminal equipment for detecting network fraudulent numbers. Background technique [0002] With the continuous development of information technology and communication technology, network risk behaviors such as information and communication fraud are becoming more and more frequent, and technologies are becoming more and more advanced and diverse, seriously affecting people's life and work. Using big data and artificial intelligence to identify fraudulent numbers is an important direction to improve the technical ability to prevent and combat communication fraud. [0003] At present, the detection of fraudulent numbers is usually based on specific constraints, or using random forest algorithms. However, the rule-based detection method is not conducive to the changing situation of fraudulent behavior, and based on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/62H04M3/22
CPCH04M3/2281G06F18/214G06F18/25G06F18/254
Inventor 杨伟志衣杨赵小蕾张海曾青青刘少江黎丹雨王玉娟
Owner 中山大学新华学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products