Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3110025.3119396acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
short-paper

Mining the Networks of Telecommunication Fraud Groups using Social Network Analysis

Published: 31 July 2017 Publication History

Abstract

Telecommunication fraud is one of the most prevalent crimes nowadays, and causes most property loss of victims. The criminals of telecommunication fraud are highly organized, concealed and transnational, making investigators difficult to track and capture the suspects. In this paper, we propose a Telecom Fraud Analysis Model (TFAM) which can unveil the underlying structure of fraud groups and identify the roles of the fraudsters. The links between suspects are built using flight information, and co-offending records. Social network analysis techniques are applied to analyze group structures as well as influences of each member. We collect a real telecom fraud dataset with 113 fraudsters whose fraudulent activities spread across four countries and 17 cities. Experimental results demonstrate that our method can successfully identify the key roles and discover the hidden structure of the fraud groups.

References

[1]
Communications Fraud Control Association, "CFCA 2015 Global fraud loss survey," September 2015.
[2]
S. H. Li, et al., "Identifying the signs of fraudulent accounts using data mining techniques," Computers in Human Behavior, 2012.
[3]
E. Otte and R. Rousseau, "Social network analysis: a powerful strategy, also for the information science," Journal of information Science, 28(6):, pp. 441--453, 2002.
[4]
J. Xu and H. Chen, "CrimeNet explorer: a framework for criminal network knowledge discovery," ACM Transactions on Information Systems, vol. 23, no. 2, pp. 201--226, April 2005.
[5]
K. Taha and P. D. Yoo, "A system for analyzing criminal social networks," ASONAM, 2015.
[6]
F. Ozgul and Z. Erdem, "Which crime features are important for criminal network members," ASONAM, 2013.
[7]
H. Chen et al., "COPLINK: Managing law enforcement data and knowledge," Commun. ACM, January 2003.
[8]
U. K. Wiil, J. Gniadek, and N. Memon. "Measuring link importance in terrorist networks," ASONAM, 2010.
[9]
D. Xuan, H. Yu, and J. Wang, "A novel method of centrality in terrorist network," ISCID, 2014.
[10]
S. Ressler, "Social network analysis as an approach to combat terrorism: Past, present, and future research," Homeland Security Affairs, 2006.
[11]
T. Moore, R. Clayton, and R. Anderson, "The economics of online crime," The Journal of Economic Perspectives, vol. 23, no. 3, pp. 3--20, 2009.
[12]
M. Aston et al., "A preliminary profiling of Internet money mules: An Australian perspective," UIC-ATC, 2009.
[13]
P. Klerks, "The network paradigm applied to criminal organizations: Theoretical nitpicking or a relevant doctrine for investigators? Recent developments in the Netherlands," Connections, 24(3), pp. 53--65, 2001.
[14]
IBM, "i2 Analyst's Notebook", May 2015.
[15]
Duijn, Paul AC, Victor Kashirin, and Peter MA Sloot. "The relative ineffectiveness of criminal network disruption." Scientific reports, 2014.
[16]
J. Xu and H. Chen, "Criminal network analysis and visualization," Communications of the ACM, vol. 48, no. 6, pp. 100--107, June 2005.
[17]
J. Xu, et al.," Analyzing and visualizing criminal network dynamics: a case study," Intelligence and Security Informatics (ISI), 2004.
[18]
Z. Xia, and Z. Bu, "Community detection based on a semantic network," Knowledge-Based Systems, 26: pp. 30--39, 2012.
[19]
Liu, Xiaodong, et al. "Criminal networks: Who is the key player?," 2012.
[20]
Tayebi, Mohammad A., et al. "Locating central actors in co-offending networks." ASONAM, 2011.
[21]
F. Ozgul and Z. Erdem, "Which crime features are important for criminal network members," ASONAM, 2013.
[22]
S. H. Li et al., "Identifying the signs of fraudulent accounts using data mining techniques," Computers in Human Behavior, 2012.
[23]
L. K. Branting et al., " Graph analytics for healthcare fraud risk estimation," ASONAM, 2016.
[24]
R. S. Burt, "Structural holes: The social structure of competition," Harvard university press, 2009.
[25]
S. P. Borgatti et al., "Ucinet for Windows: Software for social network analysis," Harvard, MA: Analytic Technologies, 2002.

Cited By

View all
  • (2022)Boosting Nonnegative Matrix Factorization Based Community Detection With Graph Attention Auto-EncoderIEEE Transactions on Big Data10.1109/TBDATA.2021.31032138:4(968-981)Online publication date: 1-Aug-2022
  • (2021)Cyber Insurance Ratemaking: A Graph Mining ApproachRisks10.3390/risks91202249:12(224)Online publication date: 6-Dec-2021
  • (2021)Towards Spark-Based Deep Learning Approach for Fraud Detection AnalysisProceedings of Sixth International Congress on Information and Communication Technology10.1007/978-981-16-1781-2_2(15-22)Online publication date: 10-Sep-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASONAM '17: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017
July 2017
698 pages
ISBN:9781450349932
DOI:10.1145/3110025
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 July 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. crime network analysis
  2. social network analysis
  3. telecommunication fraud

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

ASONAM '17
Sponsor:

Acceptance Rates

Overall Acceptance Rate 116 of 549 submissions, 21%

Upcoming Conference

KDD '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)60
  • Downloads (Last 6 weeks)10
Reflects downloads up to 09 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Boosting Nonnegative Matrix Factorization Based Community Detection With Graph Attention Auto-EncoderIEEE Transactions on Big Data10.1109/TBDATA.2021.31032138:4(968-981)Online publication date: 1-Aug-2022
  • (2021)Cyber Insurance Ratemaking: A Graph Mining ApproachRisks10.3390/risks91202249:12(224)Online publication date: 6-Dec-2021
  • (2021)Towards Spark-Based Deep Learning Approach for Fraud Detection AnalysisProceedings of Sixth International Congress on Information and Communication Technology10.1007/978-981-16-1781-2_2(15-22)Online publication date: 10-Sep-2021
  • (2020)Fraud Detection in Dynamic Interaction NetworkIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2019.291281732:10(1936-1950)Online publication date: 1-Oct-2020
  • (2018)ConvNets for Fraud Detection analysisProcedia Computer Science10.1016/j.procs.2018.01.107127:C(133-138)Online publication date: 1-May-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media