Notice: Undefined index: OS in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/const.inc.php on line 64 Notice: Undefined variable: siters in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 2414 Notice: Undefined index: User in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/const.inc.php on line 108 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3607 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3612 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 70 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 74 Notice: Undefined index: User in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 158 Notice: Undefined index: SID in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 177 Notice: Undefined index: UID in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 179 Notice: Undefined variable: UserName in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 180 Notice: Undefined variable: Mobile in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 181 Notice: Undefined variable: Email in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 182 Notice: Undefined variable: Num in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 183 Notice: Undefined variable: keyword in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 184 Notice: Undefined index: ac in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 189 Notice: Undefined index: CHtml in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 191 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/common.php on line 201 Notice: Undefined index: t in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/info_view.php on line 40 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3607 Notice: Undefined offset: 0 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3612 Notice: Undefined variable: strimg in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3612 Notice: Undefined offset: 1 in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 617 Notice: Undefined index: enseo in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/Include/function.inc.php on line 3076 Notice: Undefined variable: TPath in /usr/home/wh-as5ubll29rj6kxf8oxm/htdocs/pcen/info_view.php on line 125 The algorithm can identify potential network violators only by chat frequency-瞭望新时代网

Law

The algorithm can identify potential network violators only by chat frequency

2021-12-13   

Researchers believe that with the help of AI, system administrators can better safeguard network security and user rights. Although the current AI can not further predict the specific types of illegal events, it may be able to catch the "invisible" offenders on the network and better protect our security. With the popularity of the Internet, network violations have become a social problem that can not be ignored. The Internet eliminates the space-time distance between potential offenders and victims, so that everyone has objective conditions to break the law, and everyone is in danger of being hurt. The report on characteristics and trends of cybercrime (2016.1-2018.12) released by China judicial big data research institute points out that social platforms, especially QQ and wechat, have become the main tools of virtual crime, through which criminals plan and implement criminal acts on the network. This process does not require real contact, so it is very difficult to capture, which brings many difficulties to law enforcement. Recently, computer researchers from Tokushima University in Japan jointly published a paper on human behavior computing with cyberagent, an agent of a large Japanese network company. They used machine learning methods to analyze the usage data of a social game under cyberagent, and only based on chat times, chat objects Chat time and other basic information can more accurately identify potential network offenders and predict the approximate time of illegal acts. Theoretical basis of "suspect tracking" This is not a whimsical idea. Although we only rely on the Internet to communicate in the game, our online behavior also leaves a large amount of data, which provides rich materials for predicting network violations. The researchers developed this algorithm based on two traditional criminological theories: daily activity theory and social infection theory. The theory of daily activities puts forward that many criminal acts do not occur randomly, and the offender and the victim often intersect in daily activities. For example, in real life, thieves will go to the target site before stealing and observe the behavior law of the target character; Similarly, criminals on the Internet need to contact "prey" in advance to obtain trust. Therefore, there may be a "crime notice" hidden in the player's social activity data. In addition, the theory of social contagion also adds an important point: illegal tendencies or illegal acts can also infect. The most common example is cyber violence. Cyber violence often comes from the wide spread of some passion: under the coercion of groups, some people unconsciously lose their independent judgment ability and inadvertently become online perpetrators. Some studies have pointed out that after "witnessing" the cyber harassment of others in the group, it is also easy for bystanders to attack the same victim or try to harass others. Such infectious behavior also provides important objects and time clues for predicting network illegal events. Based on these two theories, the researchers chose a mobile game called pig party. It focuses on social functions. After logging in, users can dress up virtual rooms and personal images, and communicate with friends or strangers in private, group and public chat. Using the multi-layer nonlinear model, an algorithm good at extracting features from complex data, the researchers analyzed the chat data generated by 550000 users within 6 months, including chat frequency, chat time and message receiver of each user. The heart that wants to do bad things can't escape AI's eyes Researchers combined a variety of neural network models and algorithms to build an artificial intelligence for predicting illegal events. The performance test results show that AI can accurately predict the accounts of future offenders and victims according to user data. Enter the time, frequency and object of the user's chat within two months. The prediction accuracy of AI's illegal account in the next two months can reach 84.85%, and the prediction accuracy of the victim's account is close to 85%. In addition to having a good ability to predict the risk of individual account violations or victimization, AI can basically accurately predict the time of violations in the online community in the next week by providing user activity data within one week. The prediction accuracy of hours and dates is as high as 95.83% and 85.71%, and the results are consistent with the time given by the prediction of victimization. More interestingly, the time when AI alerts the occurrence of illegal events after analyzing the data is not necessarily in the time period of illegal events in the past. It can be seen that it grasps not only the fixed rules, but also the real "logic" in the words and deeds of offenders. AI capable of illegal prediction compresses the massive and scattered records of users' daily activities into data that can be analyzed quantitatively, extracts and understands the laws, and finally forms a strong prediction ability. Researchers believe that with the help of AI, system administrators can better safeguard network security and user rights. Although the current AI can not further predict the specific types of illegal events, it may be able to catch the "invisible" offenders on the network and better protect our security. (◎ sun Linyu, according to global science) (outlook new era)

Edit:Luo yu Responsible editor:Wang xiao jing

Source:Science and Technology Daily

Special statement: if the pictures and texts reproduced or quoted on this site infringe your legitimate rights and interests, please contact this site, and this site will correct and delete them in time. For copyright issues and website cooperation, please contact through outlook new era email:lwxsd@liaowanghn.com

Recommended Reading Change it

Links