透過您的圖書館登入
IP:3.144.134.107
  • 學位論文

透過分類法與社會網路分析研究惡意電話之行為

Spam Calls Analysis Using Classification and Social Network Analysis

指導教授 : 王俊程

摘要


惡意電話在現實世界中層出不窮,根據調查就台灣而言,平均每月台灣人浪費 15 萬小時講惡意電話,主要包含了詐騙電話、騷擾電話與行銷電話,而每年因為詐騙電話所造成的損失就超過了37億台幣。然而過去的研究都只針對偵測惡意電話,不去探究其是否為嚴重的詐騙或一般的行銷電話。 本篇論文中,我們分析知名電話偵測APP的惡意電話資料,其中包含了這些惡意電話的種類、通話時間、通話日期等,這些資料經過前置處理後將其合併成適合分析的階段。之後利用過採樣來消除資料不平衡的問題,並透過多重邏輯迴歸分析解決多類別的分類目的,得出一個可以分類三種惡意電話的模型。另一方面也透過社會網路分析,找出不同種類惡意電話中的交集,更有利於我們區別其是否為惡意電話。 透過本篇論文除了能對惡意電話的行為有進一步的了解之外,也可以透過分析結果發現不同類別內的相似性。而我們新的檢測方法相較於過去而言,也能夠進一步將惡意電話區分成三個類別。

並列摘要


Spam calls are everywhere. According to a research study, Taiwanese wastes almost 150,000 hours on spam calls per month. Spam calls include Fraud, Harassed and Marketing. Moreover, we lost 3.7 billion NTD every year because of the Fraud call. Although there are many studies talking about spam calls detection, few of them try to classify the category of spam calls. In this research, we obtain a huge dataset about spam calls’ call logs that include the category, duration and date. First, we run data preprocess and data aggregation, then use oversampling to overcome the problem of imbalanced data. In addition, we implement multiple models of logistic regression to solve the multi-class classification, and then build models that can classify spam calls into three categories. We also use social network analysis to find out the social relationship of calls within some subgroups. In conclusion, different spam calls have exactly different behaviors. It is possible to identify them by using classification and social network analysis. However, spammers’ behavior may change as the time goes by, doing analysis once and for all is impossible. It is necessary to train new model routinely to overcome the changing behavior.

參考文獻


Bokharaei, H. K., Sahraei, A., Ganjali, Y., Keralapura, R., & Nucci, A. (2011). You can SPIT, but you cannot hide: Spammer Identification in Telephony Networks. 2011 Proceedings Ieee Infocom, 41-45.
Catanese, S., Ferrara, E., & Fiumara, G. (2012). Forensic analysis of phone call networks. Social Network Analysis and Mining, 3(1), 15-33.
Chaisamran, N., Okuda, T., Blanc, G., & Yamaguchi, S. (2011). Trust-Based VoIP Spam Detection Based on Call Duration and Human Relationships.
Dev, P., Singh, K., & Dhawan, S. (2015). Classification of malicious and legitimate nodes for analysing the users' behaviour in heterogeneous online social networks. 359-363.
Dongwook, S., Jinyoung, A., & Choon, S. (2006). Progressive multi gray-leveling: a voice spam protection algorithm. IEEE Network, 20(5), 18-24.

延伸閱讀