Skip to the content.

πŸ›  Technical Plan for Simulation Data Generation

This document provides a comprehensive technical description of the data generation mechanism in FΒ²-Gen, an open-source platform for simulating scenario-based financial fraud datasets.

To learn about the underlying simulation engine, see the FΒ²-Gen Engine. For hands-on use, refer to the Usage Guide.


1. Overview

The module is designed to generate test datasets for financial fraud detection, covering both normal and abnormal transactions.


2. Technical Architecture

The system consists of four layers:

  1. Database Layer – Stores user, merchant, card, and transaction data.
  2. Data Access Layer – Interfaces with the database and serves the service layer.
  3. Service Layer – Provides services to the data generation modules.
  4. Data Generation Layer – Generates both normal and abnormal transactions.

System Architecture


3. Data Generation Pipeline

The generation process begins with creating base data (users, merchants, bank cards), followed by parallel generation of normal and abnormal transactions.

Overall Process


4. Base Data Generation

4.1 User Generation

Users are generated based on attributes like age, gender, occupation, and salary.

4.2 Merchant Generation

Merchants are generated using industry type, business hours, and spending range.

4.3 Bank Card Generation

Card properties include card number, type, brand, and product.


5. Normal Transaction Generation

5.1 Consumption Simulation

5.2 Transfer Simulation


6. Abnormal Scenario Simulation

6.1 Credit Card Cash-out

A three-stage fraud: identify suspects β†’ simulate cash-out behavior β†’ fund return via merchant transfer.

Cash-out Generation


6.2 Gambling Violation

Users act as gamblers or money mules, simulating illegal transactions through platforms.

Gambling Generation


6.3 Scalper Marketing Fraud

Airdrop exploitation by scalpers simulating multiple low-value voucher purchases.

Scalper Generation


6.4 Fake Registration Fraud

Simulates account takeover and unauthorized registrations using victim identity.

Fake Registration

Includes:


6.5 Merchant Violation Simulation

Models fraudulent merchant behavior such as terminal tampering or irregular billing.

Merchant Violation


6.6 Abnormal Transfer (Telecom Fraud)

Victims wire money to scam groups, followed by laundering and distribution.

Abnormal Transfer


βœ… Notes


πŸ“„ This technical plan is part of the official documentation of FΒ²-Gen. For more modules and case studies, please refer to Usage Guide or return to the Homepage.