A Method for Identifying Telecom Fraud Risks in Large-Scale Data Streams
A technology of risk identification and data flow, applied in telephone communication, electrical components, wireless communication, etc., can solve problems such as telephone fraud with inconspicuous concealment features
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] The present invention will be further described in detail below in conjunction with accompanying drawings and examples.
[0031] The invention discloses a telecommunications fraud risk identification method in a large-scale data flow, based on heterogeneous calling and called user behavior information, to realize high-risk telecommunications called user risk modeling. Specifically, the method includes: first, initially screening the original called set: screening out a certain number of high-risk calling and called user records from the original call record database according to the rules; and constructing a fraudulent called index database; then, preprocess the call record data of high-risk called parties, and extract salient features as the input of the subsequent risk model; adopt the two-level cascade classification model, according to the call record data and historical feature data of the calling end, the The maximum value of the attack risk among the L callers wh...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

