Font Size: a A A

Telecom Anti-Fraud Related Technical Research

Posted on:2015-11-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q ZhangFull Text:PDF
GTID:2298330467463111Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Nowadays, the communication network develops very rapidly, the numberof users increases faster and faster, the scale of business grows steadily. At the same time, frequent fraud incidents have shown up. Operators’deficiency in the aspects of network control and billing system were caught by scammers, they try to make exorbitant profits, which lead to operator’s devastating loss and reduce the users’satisfaction to the network, also affect the users’normal life, and even threaten social stability.Due to the worsening status of the fraud, telecom operators attaches great importance to the management and prevention of different types of fraud. How to prevent and control various types of telecom fraud effectively has become a hot topic in telecom operators. This subject is to study the typical telecom fraud, mainly the nested dial, copy card, crank call and spam message, faliy excavate the characteristics of each fraud, and then summary and develop a relatively set of accurate and effective detection and control methods, which provide theoretical reference for telecom operators’establishing anti-fraud systems and make contributions to protect the legitimate rights and interests of telecom operators and users.In this paper, on the basis of fully research, the anti-fraud technology of four kinds of telecom fraud have been thoroughly studied. Against the nested dial fraud, each scenario has been studied and related solution has been analyzed; against copy card fraud, the background and principle of its creation have been studied, and solutions have been provides by scenarios; ngainst crank call fraud, data mining theory has been brought in, the prediction of harassing phone calls has been achieved by using bayesian classification algorithm; against spam message fraud, various kinds of the current common detection algorithm have been researched, and a prototype of preventing spam messages and the methods to adapt have been put forward in view of the reality.
Keywords/Search Tags:Telecom fraud, Data mining, Nested dail, Copy card, Crank call, Spam message
PDF Full Text Request
Related items