{"title":"基于入侵检测数据挖掘的通信网络欺诈检测及防范对策研究","authors":"Xin Meng","doi":"10.1145/3510858.3511385","DOIUrl":null,"url":null,"abstract":"With the rapid development of information technology and the rapid popularization of Internet, the continuous innovation and upgrading of computer and interconnection technology have been brought about. Communication network fraud, as a new type of crime, usually uses mobile phones, fixed telephones, transparent transmission tools, pseudo base stations and other communication equipment, using false facts or covering up the truth to commit fraud. At present, communication network fraud is characterized by diversification of means, modernization of technology and concealment of methods. The public security organs should combine the current reality of public security work, and explore a practical investigation and prevention path in the fields of department linkage, capital investigation and control, combating upstream and downstream crimes, and technical prevention. In this paper, the network intrusion detection technology is studied, the intrusion detection process is analyzed, and the data mining algorithm and how to apply the data mining algorithm to the communication network fraud detection and prevention are studied.","PeriodicalId":6757,"journal":{"name":"2021 IEEE 3rd International Conference on Civil Aviation Safety and Information Technology (ICCASIT)","volume":"30 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Communication Network Fraud Detection and Prevention Countermeasures Based on Intrusion Detection Data Mining\",\"authors\":\"Xin Meng\",\"doi\":\"10.1145/3510858.3511385\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the rapid development of information technology and the rapid popularization of Internet, the continuous innovation and upgrading of computer and interconnection technology have been brought about. Communication network fraud, as a new type of crime, usually uses mobile phones, fixed telephones, transparent transmission tools, pseudo base stations and other communication equipment, using false facts or covering up the truth to commit fraud. At present, communication network fraud is characterized by diversification of means, modernization of technology and concealment of methods. The public security organs should combine the current reality of public security work, and explore a practical investigation and prevention path in the fields of department linkage, capital investigation and control, combating upstream and downstream crimes, and technical prevention. In this paper, the network intrusion detection technology is studied, the intrusion detection process is analyzed, and the data mining algorithm and how to apply the data mining algorithm to the communication network fraud detection and prevention are studied.\",\"PeriodicalId\":6757,\"journal\":{\"name\":\"2021 IEEE 3rd International Conference on Civil Aviation Safety and Information Technology (ICCASIT)\",\"volume\":\"30 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 3rd International Conference on Civil Aviation Safety and Information Technology (ICCASIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3510858.3511385\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 3rd International Conference on Civil Aviation Safety and Information Technology (ICCASIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3510858.3511385","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Communication Network Fraud Detection and Prevention Countermeasures Based on Intrusion Detection Data Mining
With the rapid development of information technology and the rapid popularization of Internet, the continuous innovation and upgrading of computer and interconnection technology have been brought about. Communication network fraud, as a new type of crime, usually uses mobile phones, fixed telephones, transparent transmission tools, pseudo base stations and other communication equipment, using false facts or covering up the truth to commit fraud. At present, communication network fraud is characterized by diversification of means, modernization of technology and concealment of methods. The public security organs should combine the current reality of public security work, and explore a practical investigation and prevention path in the fields of department linkage, capital investigation and control, combating upstream and downstream crimes, and technical prevention. In this paper, the network intrusion detection technology is studied, the intrusion detection process is analyzed, and the data mining algorithm and how to apply the data mining algorithm to the communication network fraud detection and prevention are studied.