期刊文献+

基于恶意短信的伪基站行为可视分析 被引量:2

Visual Analysis of Pseudo Base Station Behavior Based on Malicious SMS
下载PDF
导出
摘要 由于移动通讯机制存在的认证漏洞,不法分子利用可趁之机,使用伪基站大肆散布恶意短信。这不仅打扰到人们的日常生活,更严重地损害了公民的财产权益,造成了极其恶劣的影响。伪基站行为模式的分析为打击伪基站提供了有效依据。然而,现有的研究伪基站行为的方法无法更好地认识伪基站活动的宏观态势,更难以针对伪基站发送的不同类别恶意短信来探索其行为规律,把握其运动模式。针对这些问题,提出基于恶意短信数据进行可视分析的方法。通过设计基于地图的热力视图、散点视图、日历热力视图、时间堆栈视图,开发可视分析系统FBSVA来探求伪基站的行为规律。最后,使用ChinaVis2017公开数据集进行实验,验证了该方法的可行性和有效性。 Due to the authentication loopholes in the mobile communication mechanism,criminals use the opportunity to use malicious base stations to spread malicious text messages.This not only disturbs people’s daily lives,but also seriously damages citizens’property rights and interests,resulting in extremely bad impact.The analysis of the pseudo base station behavior mode provides an effective basis for combating pseudo base stations.However,the existing methods for studying the behavior of pseudo base stations can not better understand the macroscopic situation of pseudo base station activity,and it is more difficult to explore the behavior patterns of different types of malicious short messages sent by pseudo base stations and grasp their motion patterns.In response to these problems,this paper proposes a method for visual analysis based on malicious SMS data.By designing a map-based thermal view,scatter view,calendar thermal view,and time stack view,the visual analysis system FBSVA is developed to explore the behavior of pseudo base stations.Finally,using the ChinaVis2017 public data set to conduct experiments,the feasibility and effectiveness of the method are verified.
作者 徐江阳 张慧军 张小龙 XU Jiangyang;ZHANG Huijun;ZHANG Xiaolong(School of Information and Computer,Taiyuan University of Technology,Jinzhong,Shanxi 030600,China;Department of Media Engineering,Communication University of Shanxi,Jinzhong,Shanxi 030619,China)
出处 《计算机工程与应用》 CSCD 北大核心 2019年第18期95-102,共8页 Computer Engineering and Applications
基金 国家自然科学基金(No.61572344)
关键词 恶意短信 伪基站 可视分析 交互设计 malicious messages pseudo base station visual analysis interaction design
  • 相关文献

参考文献7

二级参考文献35

  • 1Gorr W, Olligschlaeger A, Thompson Y. Short-Term Time Series Forecasting of Crime [J]. International Journal of Forecasting (S0169- 2070), 2003, 19(4): 579-594.
  • 2Liu H, Brown D E. Criminal Incident Prediction Using a Point-Pattern-Based Density Model [J]. International Journal of Forecasting (SO 169-2070), 2003, 19(4): 603-622.
  • 3Ceccato V. Homicide in S-o Paulo, Brazil: Assessing Spatial- Temporal and Weather Variations [J]. Journal of Environmental Psychology (S0272-4944), 2005, 25(3): 307-321.
  • 4Cohn E G, Rotton J. Even Criminals Take a Holiday: Instrumental and Expressive Crimes on Major and Minor Holidays [J]. Journal of Criminal Justice (S0047-2352), 2003, 31(4): 351-360.
  • 5Decker S H, Varano S P, Greene J R. Routine Crime in Exceptional Times: the Impact of the 2002 Winter Olympics on Citizen Demand for Police Services [J]. Journal of Criminal Justice (S0047-2352), 2007, 35(1): 89-101.
  • 6Brantingham P L, Glasser U, Kinney B, Singh K, Vajihollahi M. A Computational Model for Simulating Spatial Aspects of Crime in Urban Environment [C]//2005 IEEE International Conference on Systems, Man and Cybernetics (S1062-922X). USA: IEEE, 2005, 4: 3667-3674.
  • 7Groff E R. Adding the Temporal and Spatial Aspects of Routine Activities: a Further Test of Routine Activity Theory [J]. Security Journal (S0955-1622), 2008, 21 ( 1 ): 95-116.
  • 8G-roff E R. Simulation for Theory Testing and Experimentation: an Example Using Routine Activity Theory and Street Robbery [J]. Journal of Quantitative of Criminology (S 1573-7799), 2007, 23(2): 75-103.
  • 9Groff E R. Situating' Simulation to Model Human Spatio -Temporal Interactions: An Example Using Crime Events [J]. Transactions in GIS (S1361-1382), 2007, 11(4): 507-530.
  • 10.叶炳基,董事.垃圾型伪基站和排查方法的探索[C]//中国通信学会无线及移动通信委员会.2014全国无线电及移动通信学术会议论文集.2014:484-487.

共引文献67

同被引文献22

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部