Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2668260.2668272acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
tutorial

International Call Fraud Detection Systems and Techniques

Published: 15 September 2014 Publication History

Abstract

In recent years, fraud in telecommunication industry becomes one of encumbrance for a telecommunication operator which is growing dramatically. It is befall a serious international problem for GSM and PSTN network service providers. It has undoubtedly become a significant source of revenue losses and bad debts to the telecommunication industry, and with the expected continuing growth in revenue it can be expected that fraud will increase proportionally. It has become a mainreason of revenue losses in the industry of telecommunications. This study focuses on International call fraud detection system and its techniques. It proposes a new technique to detect fraud in international call by classifying the CDRs for roaming subscribers. SIM Boxes (also known as GSM Gateways) causes significant interconnect revenue losses for mobile operators by bypassing official interconnections which makes the operators lose millions of wholesale minutes. This research provides an algorithm to determine suspected fraud number. Even if ordinal CLI is unavailable, the solution can successfully track calls path. The proposed algorithm enables telecommunication operators apply fraud detection solution at minimum cost of operation. There are two main parts of study. The first one is the theory of fraud in telecommunication operators, fraud management system and its techniques. The second one is the implemented solution to detect fraud in international call by utilizing homework data.

References

[1]
F. Li, N. Clarke, M. Papadaki, and P. Dowland, "Misuse detection for mobile devices using behaviour profiling," International Journal of Cyber Warfare and Terrorism (IJCWT), vol. 1, no. 1, 2011, pp. 41--53.
[2]
R. Shelton, "The Global Battle Against Telecom Fraud," 2003.
[3]
OFCOM, "Communications Market Report 2012 Visted in 2014/2/23 http://stakeholders.ofcom.org.uk/binaries/research/cmr/cmr12/CMR_UK_2012.pdf," Ofcom's ninth annual Communications Market Report., 2012.
[4]
S. Brown, "TELECOMMUNICATION FRAUD MANAGEMENT," White Paper, 2005.
[5]
P.R. Bhandary, and S.S. Bhat, "Finanacial performance of top {4} Indian telecom companies: A comparative study," EXCEL International Journal of Multidisciplinary Management Studies, vol. 3, no. 5, 2013, pp. 137--144.
[6]
J. Hollmton, User profiling and classification for fraud detection in mobile communications networks, Helsinki University of Technology, 2000.
[7]
C.W. Davia, kastintin, "Accountant's Guide to Fraud Detection and Control," Johwiley&son, 2000.
[8]
C.S. Hilas, and P.A. Mastorocostas, "An application of supervised and unsupervised learning approaches to telecommunications fraud detection," Knowledge-Based Systems, vol. 21, no. 7, 2008, pp. 721--726.
[9]
B.a. Lindquist, "Fraud Auditing and Forensic Accounting: New Tools and Techniques.second edition" Wiley & Sons, 1995.
[10]
P. Barson, S. Field, N. Davey, G. McAskie, and R. Frank, "The detection of fraud in mobile phone networks," Neural Network World, vol. 6, no. 4, 1996, pp. 477--484.
[11]
J.R. Dorronsoro, F. Ginel, C. Sgnchez, and C.S. Cruz, "Neural fraud detection in credit card operations," Neural Networks, IEEE Transactions on, vol. 8, no. 4, 1997, pp. 827--834.
[12]
K.M. Fanning, and K.O. Cogger, "Neural network detection of management fraud using published financial data," International Journal of Intelligent Systems in Accounting, Finance & Management, vol. 7, no. 1, 1998, pp. 21--41.
[13]
E. Kirkos, C. Spathis, and Y. Manolopoulos, "Data mining techniques for the detection of fraudulent financial statements," Expert Systems with Applications, vol. 32, no. 4, 2007, pp. 995--1003.
[14]
A.H. Elmi, S. Ibrahim, and R. Sallehuddin, "Detecting SIM Box Fraud Using Neural Network," IT Convergence and Security 2012, Springer, 2013, pp. 575--582.
[15]
D.-A. Chiang, Y.-F. Wang, S.-L. Lee, and C.-J. Lin, "Goal-oriented sequential pattern for network banking churn analysis," Expert Systems with Applications, vol. 25, no. 3, 2003, pp. 293--302.
[16]
R. Brause, T. Langsdorf, and M. Hepp, "Neural data mining for credit card fraud detection," Tools with Artificial Intelligence, 1999. Proceedings. 11th IEEE International Conference on, IEEE, pp. 103--106.
[17]
P.A. Estevez, C.M. Held, and C.A. Perez, "Subscription fraud prevention in telecommunications using fuzzy rules and neural networks," Expert Systems with Applications, vol. 31, no. 2, 2006, pp. 337--344.
[18]
H. He, J. Wang, W. Graco, and S. Hawkins, "Application of neural networks to detection of medical fraud," Expert Systems with Applications, vol. 13, no. 4, 1997, pp. 329--336.
[19]
T. Kohonen, "The self-organizing map," Proceedings of the IEEE, vol. 78, no. 9, 1990, pp. 1464--1480.
[20]
P.L. Brockett, X. Xia, and R.A. Derrig, "Using Kohonen's self-organizing feature map to uncover automobile bodily injury claims fraud," Journal of Risk and Insurance, 1998, pp. 245--274.
[21]
L. Bermudez, J.M. Perez, M. Ayuso, and E. Gomez, "A Bayesian dichotomous model with asymmetric link for fraud in insurance," Insurance: Mathematics and Economics, vol. 42, no. 2, 2008, pp. 779--786.
[22]
J.A. Major, and D.R. Riedinger, "EFD: A Hybrid Knowledge/Statistical-Based System for the Detection of Fraud," Journal of Risk and Insurance, vol. 69, no. 3, 2002, pp. 309--324.
[23]
T. Fawcett, and F. Provost, "Adaptive fraud detection," Data mining and knowledge discovery, vol. 1, no. 3, 1997, pp. 291--316.
[24]
H. Farvaresh, and M.M. Sepehri, "A data mining framework for detecting subscription fraud in telecommunication," Engineering Applications of Artificial Intelligence, vol. 24, no. 1, 2011, pp. 182--194.
[25]
T. Fawcett, and F. Provost, "Activity monitoring: Noticing interesting changes in behavior," Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, pp. 53--62.

Cited By

View all
  • (2023)Predictive modeling of marine fish production in Brunei Darussalam's aquaculture sector: A comparative analysis of machine learning and statistical techniquesInternational Journal of ADVANCED AND APPLIED SCIENCES10.21833/ijaas.2023.07.01310:7(109-126)Online publication date: Jul-2023
  • (2023)Telecommunications Fraud Machine Learning-based Detection2023 4th International Conference on Data Analytics for Business and Industry (ICDABI)10.1109/ICDABI60145.2023.10629612(656-661)Online publication date: 25-Oct-2023
  • (2022)Premium Rate Services Fraud Detection2022 24th International Conference on Advanced Communication Technology (ICACT)10.23919/ICACT53585.2022.9728971(380-386)Online publication date: 13-Feb-2022
  • Show More Cited By

Index Terms

  1. International Call Fraud Detection Systems and Techniques

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    MEDES '14: Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems
    September 2014
    225 pages
    ISBN:9781450327671
    DOI:10.1145/2668260
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 September 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Fraud
    2. Fraud detection
    3. SIMbox
    4. algorithm
    5. telecommunication

    Qualifiers

    • Tutorial
    • Research
    • Refereed limited

    Conference

    MEDES '14

    Acceptance Rates

    Overall Acceptance Rate 267 of 682 submissions, 39%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)18
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Predictive modeling of marine fish production in Brunei Darussalam's aquaculture sector: A comparative analysis of machine learning and statistical techniquesInternational Journal of ADVANCED AND APPLIED SCIENCES10.21833/ijaas.2023.07.01310:7(109-126)Online publication date: Jul-2023
    • (2023)Telecommunications Fraud Machine Learning-based Detection2023 4th International Conference on Data Analytics for Business and Industry (ICDABI)10.1109/ICDABI60145.2023.10629612(656-661)Online publication date: 25-Oct-2023
    • (2022)Premium Rate Services Fraud Detection2022 24th International Conference on Advanced Communication Technology (ICACT)10.23919/ICACT53585.2022.9728971(380-386)Online publication date: 13-Feb-2022
    • (2021) SIMBox Bypass Frauds in Cellular Networks: Strategies, Evolution, Detection, and Future Directions IEEE Communications Surveys & Tutorials10.1109/COMST.2021.310091623:4(2295-2323)Online publication date: Dec-2022
    • (2020)Interconnect bypass fraud detection: a case studyAnnals of Telecommunications10.1007/s12243-020-00808-wOnline publication date: 19-Sep-2020
    • (2016)Detection of Mobile Phone Fraud Using Possibilistic Fuzzy C-Means Clustering and Hidden Markov ModelInternational Journal of Synthetic Emotions10.4018/IJSE.20160701027:2(23-44)Online publication date: 1-Jul-2016

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media