信息网络安全 ›› 2024, Vol. 24 ›› Issue (11): 1696-1709.doi: 10.3969/j.issn.1671-1122.2024.11.009
收稿日期:
2024-06-17
出版日期:
2024-11-10
发布日期:
2024-11-21
通讯作者:
周胜利 作者简介:
周胜利(1982—),男,浙江,副教授,博士,主要研究方向为网络安全、网络空间治理|徐睿(2000—),男,四川,硕士研究生,主要研究方向为网络安全、机器学习|陈庭贵(1979—),男,湖北,教授,博士,主要研究方向为网络舆情演化分析|蒋可怡(2002—),女,浙江,本科,主要研究方向为网络安全
基金资助:
ZHOU Shengli1,2(), XU Rui1, CHEN Tinggui3, JIANG Keyi2
Received:
2024-06-17
Online:
2024-11-10
Published:
2024-11-21
摘要:
基于真实案件数据,从电信网络诈骗受害人的网络行为视角对受骗网络行为风险进行研究,能有效提升电信网络诈骗的防治能力。为此,文章首先利用LTP工具对相关数据进行处理。其次,通过模板匹配的方法从相关的语料数据中抽取受骗网络行为风险事件及事件之间的事理逻辑关系,并构建受骗网络行为风险的具体事理图谱。然后,文章构建了基于自编码器的深度聚类模型,对提取的风险事件进行泛化聚类,并根据泛化结果构建了受骗网络行为风险的抽象事理图谱。最后,基于所构建的具体和抽象事理图谱,利用案件流程分析模型与复杂网络分析技术,剖析受骗网络行为风险的构成与规律。文章将电信网络诈骗的受骗网络行为风险划分为接触风险、信任欺骗风险、心理漏洞利用风险和行为控制风险4个环节,并总结了各风险环节的时序、构成等规律。
中图分类号:
周胜利, 徐睿, 陈庭贵, 蒋可怡. 基于事理图谱的受骗网络行为风险演进研究[J]. 信息网络安全, 2024, 24(11): 1696-1709.
ZHOU Shengli, XU Rui, CHEN Tinggui, JIANG Keyi. Research on the Evolution of Defrauded Network Behavior Risk Based on Eventic Graph[J]. Netinfo Security, 2024, 24(11): 1696-1709.
表2
部分顺承关系抽取规则模板
模式 | 匹配模板 | 正则表达式(部分) |
---|---|---|
由因到果 | <Conj>{Cause}, <Conj>{Effect} | (因为|由于)([^,。;!?]*)(,|。|;|!|?)([^,。;!?]*)(所以|因此|导致|致使)([^,。;!?]*) |
由果溯因 | <Conj>{Effect}, <Conj>{Cause} | (所以|因此|导致|致使)([^,。;!?]*)(,|。|;|!|?)([^,。;!?]*)(因为|由于)([^,。;!?]*) |
顺承词完整 | <Conj>{Eventl}, <Conj>{Event2} | (首先|第一)([^,。;!?]+)(然后|接着|之后)([^,。;!?]+) |
顺承词居中 | {Eventl},<Conj> {Event2} | ([^,。;!?]+)(就|才|之后)([^,。;!?]+) |
[1] | LACUSKA M, PERACEK T. Trends in Global Telecommunication Fraud and Its Impact on Business[J]. Developments in Information & Knowledge Management for Business Applications, 2021(1): 459-485. |
[2] | LIU Weijun. Ecological Governance of Telecommunications and Online Fraud: Taking the Anti-Telecom and Online Fraud Law as an Example[J]. Legal Forum, 2023, 38(4): 94-105. |
刘为军. 论电信网络诈骗的生态治理——以《反电信网络诈骗法》为主要研究样本[J]. 法学论坛, 2023, 38(4):94-105. | |
[3] | TIAN Ling, ZHOU Xue, WU Yanping, et al. Knowledge Graph and Knowledge Reasoning: A Systematic Review[J]. Journal of Electronic Science and Technology, 2022, 20(2): 159-168. |
[4] | MAN Na, WANG Kechao, LIU Lin. Using Computer Cognitive Atlas to Improve Students’ Divergent Thinking Ability[J]. Journal of Organizational and End User Computing (JOEUC), 2021, 33(6): 1-16. |
[5] | ZHANG Bin, SUN Ximin, LI Xiaoming, et al. Construction and Application of Event Logic Graph: A Survey[C]// Springer. International Conference on Database Systems for Advanced Applications. Heidelberg: Springer, 2022: 160-174. |
[6] | WEI Jianxiang, LIANG Shuai, ZHU Yunxia, et al. Progress in the Study of Event Evolution Graph[J]. Information and Documentation Services, 2023, 44(6): 35-43. |
魏建香, 梁帅, 朱云霞, 等. 事理图谱研究进展[J]. 情报资料工作, 2023, 44(6):35-43. | |
[7] | DING Xiao, LI Zhongyang. Event-Reasoning Graph: Patterns and Models of Event Evolution[EB/OL]. (2019-07-22)[2024-06-02]. https://www.leiphone.com/category/ai/rz7I2kfM7VIkNPSM.html. |
丁效, 李忠阳. 事理图谱:事件演化的规律和模式[EB/OL]. (2019-07-22)[2024-06-02]. https://www.leiphone.com/category/ai/rz7I2kfM7VIkNPSM.html. | |
[8] | CUI Ying. Event Extraction in Political Diplomacy Based on Similar Semantics and Dependency Syntax[J]. Computer Engineering & Science, 2020, 42(9): 1632-1639. |
崔莹. 基于相似义原和依存句法的政外领域事件抽取方法[J]. 计算机工程与科学, 2020, 42(9):1632-1639. | |
[9] | LI Qian, PENG Hao, LI Jianxin, et al. Reinforcement Learning-Based Dialogue Guided Event Extraction to Exploit Argument Relations[J]. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 2021, 21(5): 520-533. |
[10] | ZHOU Yang, CHEN Yubo, ZHAO Jun, et al. What the Role is vs. What Plays the Role: Semi-Supervised Event Argument Extraction via Dual Question Answering[C]// AAAI. Proceedings of the AAAI Conference on Artificial Intelligence. New York: AAAI, 2021: 14638-14646. |
[11] |
ZHAI Lizhi, LI Ruixiang, YANG Jiabei, et al. Overview about Composite Semantic-Based Event Graph Construction[J]. Computer Science, 2023, 50(9): 242-259.
doi: 10.11896/jsjkx.230400046 |
翟利志, 李睿祥, 杨佳贝, 等. 基于复合语义特征的事件图谱构建技术研究进展[J]. 计算机科学, 2023, 50(9):242-259.
doi: 10.11896/jsjkx.230400046 |
|
[12] | SU Qi, ZHAO Xiaozhe, SUN Dongpu, et al. Event Knowledge Graph Extracted from Intelligence Text[C]// IEEE. 2022 8th International Symposium on System Security, Safety, and Reliability (ISSSR). New York: IEEE, 2022: 139-145. |
[13] |
LIU Yashu, LUAN Yu, ZHOU Honglei, et al. Research on the Dynamic Evolution of Major Emergencies Based on Event Knowledge Graph[J]. Library and Information Service, 2022, 66(10): 143-151.
doi: 10.13266/j.issn.0252-3116.2022.10.013 |
刘雅姝, 栾宇, 周红磊, 等. 基于事理图谱的重大突发事件动态演变研究[J]. 图书情报工作, 2022, 66(10):143-151.
doi: 10.13266/j.issn.0252-3116.2022.10.013 |
|
[14] | WU Jiang, HUANG Qian, HE Chaocheng, et al. Propagation and Evolution of Public Opinion in the Outbreak of AlGC Based on the Theory of Tipping Point[J]. Journal of Modern Information, 2023, 43(7): 145-161. |
吴江, 黄茜, 贺超城, 等. 基于引爆点理论的人工智能生成内容微博网络舆情传播与演化分析[J]. 现代情报, 2023, 43(7):145-161.
doi: 10.3969/j.issn.1008-0821.2023.07.014 |
|
[15] |
ZHOU Linxing, WANG Shuai. Research on the Triggering and Mitigating Mechanisms of Network Public Opinion in Major Emergencies under the Event Evolutionary Graph Model[J]. Library and Information Service, 2023, 67(12): 58-69.
doi: 10.13266/j.issn.0252-3116.2023.12.006 |
周林兴, 王帅. 事理图谱模型下的重大突发事件网络舆情诱发与缓释机理研究[J]. 图书情报工作, 2023, 67(12):58-69.
doi: 10.13266/j.issn.0252-3116.2023.12.006 |
|
[16] | ZENG Ziming, LI Qingqing, SUN Shouqiang, et al. Construction of the Event Evolution Graph and Analysis of Evolutionary Situation of Network Public Opinion for Public Health Emergencies[J]. Information Studies: Theory & Application, 2023, 46(8): 147-155. |
曾子明, 李青青, 孙守强, 等. 面向突发公共卫生事件网络舆情的事理图谱构建及演化分析[J]. 情报理论与实践, 2023, 46(8):147-155. | |
[17] | TIAN Yilin, LI Xing. Analysis on the Evolution Path of COVID-19 Network Public Opinion Based on the Event Evolutionary Graph[J]. Information Studies: Theory & Application, 2021, 44(3): 76-83. |
田依林, 李星. 基于事理图谱的新冠肺炎疫情网络舆情演化路径分析[J]. 情报理论与实践, 2021, 44(3):76-83.
doi: 10.16353/j.cnki.1000-7490.2021.03.011 |
|
[18] | SUN Chuanming, CHEN Xi, WANG Ping. The Construction of Audience Needs Event Logic Graph of Intangible Cultural Heritage Documentary Based on Online Reviews[J]. Information Science, 2023, 41(9): 107-114. |
孙传明, 陈熙, 王萍. 基于在线评论的非遗纪录片受众需求事理图谱构建研究[J]. 情报科学, 2023, 41(9):107-114. | |
[19] |
DENG Jianfeng, WANG Tao, CHENG Lianglun. Research on Construction of Event Logic Knowledge Graph of Robot Fault Diagnosis[J]. Computer Engineering and Applications, 2023, 59(13): 139-148.
doi: 10.3778/j.issn.1002-8331.2203-0398 |
邓健峰, 王涛, 程良伦. 机器人故障诊断事理逻辑知识图谱构建研究[J]. 计算机工程与应用, 2023, 59(13):139-148.
doi: 10.3778/j.issn.1002-8331.2203-0398 |
|
[20] | XIANG Jing, LIU Yalan. Analysis on the Mechanism of Psychological Control about the Telecommunications Fraud of “Pig Killing Plate”[J]. Journal of People’s Public Security University of China(Social Sciences Edition), 2021, 37(4): 1-10. |
向静, 刘亚岚. “杀猪盘”电信诈骗犯罪的心理控制机制剖析[J]. 中国人民公安大学学报(社会科学版), 2021, 37(4):1-10. | |
[21] | ZHANG Yaowen, LUO Wenhua. On Characteristics of Victims in Telecommunication Network Frauds: Comparative Analysis Based on Data from Different Regions[J]. Journal of Shanxi Police College, 2023, 31(10): 80-87. |
张耀文, 罗文华. 电信网络诈骗受害人特征研究——基于不同地区数据对比分析[J]. 山西警察学院学报, 2023, 31(10):80-87. | |
[22] | WU Hequn, WANG Qiang, ZHENG Ziwan. Spatial Characteristics and Influencing Factors of the Origin of Telecommunication Network Fraud Criminals[J]. Geographical Research, 2023, 42(12): 3219-3234. |
吴鹤群, 王强, 郑滋椀. 电信网络诈骗犯罪人来源地的空间分布特征及影响因素[J]. 地理研究, 2023, 42(12):3219-3234.
doi: 10.11821/dlyj020230154 |
|
[23] | LIU Xinyue, FAN Chaoyun, LI Hui. Characteristics and Preventive Countermeasures of Telecom and Network Fraud Victims[J]. The Journal of Yunnan Police College, 2022(4): 111-122. |
刘鑫悦, 范超云, 李辉. 电信网络诈骗被害人群体特征及防范对策[J]. 云南警官学院学报, 2022(4):111-122. | |
[24] | CHEN Shyh-wei, CHEN Po-hsiang, TSAI Ching-tsorng, et al. Development of Machine Learning Based Fraudulent Website Detection Scheme[C]// IEEE. 2022 IEEE 5th International Conference on Knowledge Innovation and Invention (ICKII). New York: IEEE, 2022: 108-110. |
[25] | ZHANG Penghui, OEST A, CHO H, et al. Crawlphish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing[C]// IEEE. 2021 IEEE Symposium on Security and Privacy (SP). New York: IEEE, 2021: 1109-1124. |
[26] | JIANG Yan, LIU Guannan, WU Junjie, et al. Telecom Fraud Detection via Hawkes-Enhanced Sequence Model[J]. IEEE Transactions on Knowledge and Data Engineering, 2022, 35(5): 5311-5324. |
[27] | PRIYA G J, SARADHA S. Fraud Detection and Prevention Using Machine Learning Algorithms: A Review[C]// IEEE. 2021 7th International Conference on Electrical Energy Systems (ICEES). New York: IEEE, 2021: 564-568. |
[28] | CHE Wanxiang, FENG Yunlong, QIN Libo, et al. N-LTP: An Open-Source Neural Language Technology Platform for Chinese[C]// ACL. Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing. New York: ACL, 2021: 42-49. |
[29] | CHANG Chao, TANG Yong, LONG Yongxu, et al. Multi-Information Preprocessing Event Extraction with BiLSTM-CRF Attention for Academic Knowledge Graph Construction[J]. IEEE Transactions on Computational Social Systems, 2022, 10(5): 2713-2724. |
[1] | 贾凡, 康舒雅, 江为强, 王光涛. 基于NLP及特征融合的漏洞相似性算法评估[J]. 信息网络安全, 2023, 23(1): 18-27. |
[2] | 丁家伟, 刘晓栋. 基于ELECTRA-CRF的电信网络诈骗案件文本命名实体识别模型[J]. 信息网络安全, 2021, 21(6): 63-69. |
[3] | 罗文华, 张耀文. 基于贝叶斯网络的电信网络诈骗受害人特征分析[J]. 信息网络安全, 2021, 21(12): 25-30. |
[4] | 仝鑫, 王罗娜, 王润正, 王靖亚. 面向中文文本分类的词级对抗样本生成方法[J]. 信息网络安全, 2020, 20(9): 12-16. |
[5] | 郝文江, 徐丽萍, 姜劲蕾, 李翠翠. 电信网络诈骗犯罪治理技术研究[J]. 信息网络安全, 2016, 16(9): 213-217. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||