Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3477314.3507322acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

A federated machine learning approach to detect international revenue share fraud on the 5G edge

Published: 06 May 2022 Publication History

Abstract

The fifth-generation (5G) of broadband cellular networks is giving rise to new paradigms of distributed computing, such as Edge Computing and Multi-access Edge Computing (MEC). The possibility of hosting Machine Learning (ML) applications close to the end-users presents advantages, such as better privacy (e.g., sensitive data is not shared to other systems), the reduction of communication latency, improvement of application performance, and more efficient energy consumption. However, the Edge Computing and MEC paradigms also pose challenges to ML. For instance, the data can be distributed among distinct edges and might not be shared (e.g., due to privacy issues). Also, the ML models might be trained on edge devices with limited computational resources. In this paper, we propose a Federated ML architecture to train ML models on the 5G Edge, using decentralized data and light ML training algorithms. Our architecture includes edge nodes to train models with local data and a centralized node to aggregate the resulting models. As a case study, we address an International Revenue Share Fraud (IRSF) task, assuming a real-world dataset collected from a leading provider of analytics solutions for the Telecom industry. We evaluate our architecture during two iterations of a Federated ML procedure and then we compare it with a centralized baseline ML model that is currently adopted by the software company. Overall, the experimental results show that the proposed Federated ML approach outperforms the baseline ML model, thus supporting its potential usage to detect IRSF on the 5G mobile network edge.

References

[1]
Martín Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S. Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian Goodfellow, Andrew Harp, Geoffrey Irving, Michael Isard, Yangqing Jia, Rafal Jozefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh Levenberg, Dandelion Mané, Rajat Monga, Sherry Moore, Derek Murray, Chris Olah, Mike Schuster, Jonathon Shlens, Benoit Steiner, Ilya Sutskever, Kunal Talwar, Paul Tucker, Vincent Vanhoucke, Vijay Vasudevan, Fernanda Viégas, Oriol Vinyals, Pete Warden, Martin Wattenberg, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https://www.tensorflow.org/ Software available from tensorflow.org.
[2]
Nasir Abbas, Yan Zhang, Amir Taherkordi, and Tor Skeie. 2018. Mobile Edge Computing: A Survey. IEEE INTERNET OF THINGS JOURNAL 5, 1 (FEB 2018), 450--465.
[3]
Yuan Ai, Mugen Peng, and Kecheng Zhang. 2018. Edge computing technologies for Internet of Things: a primer. Digital Communications and Networks 4, 2 (2018), 77--86.
[4]
Anupam Das, Martin Degeling, Xiaoyou Wang, Junjue Wang, Norman Sadeh, and Mahadev Satyanarayanan. 2017. Assisting Users in a World Full of Cameras: A Privacy-Aware Infrastructure for Computer Vision Applications. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, CVPR Workshops 2017, Honolulu, HI, USA, July 21--26, 2017. IEEE Computer Society, 1387--1396.
[5]
ETSI. 2019. Multi-access edge computing (MEC) framework and reference architecture. ETSI GS MEC 3 (2019).
[6]
Romano Fantacci and Benedetta Picano. 2020. Federated learning framework for mobile edge computing networks. CAAI Trans. Intell. Technol. 5, 1 (2020), 15--21.
[7]
Ahmed Ghoneim, Ghulam Muhammad, Syed Umar Amin, and Brij B. Gupta. 2018. Medical Image Forgery Detection for Smart Healthcare. IEEE Commun. Mag. 56, 4 (2018), 33--37.
[8]
Najmul Hassan, Kok-Lim Alvin Yau, and Celimuge Wu. 2019. Edge Computing in 5G: A Review. IEEE ACCESS 7 (2019), 127276--127289.
[9]
Ying He, F. Richard Yu, Nan Zhao, Victor C. M. Leung, and Hongxi Yin. 2017. Software-Defined Networks with Mobile Edge Computing and Caching for Smart Cities: A Big Data Deep Reinforcement Learning Approach. IEEE Commun. Mag. 55, 12 (2017), 31--37.
[10]
Shin-Yuan Hung, David C. Yen, and Hsiu-Yu Wang. 2006. Applying data mining to telecom churn management. Expert Syst. Appl. 31, 3 (2006), 515--524.
[11]
IEEE. 2017. IEEE 5G and Beyond Technology Roadmap [White Paper]. (2017). https://futurenetworks.ieee.org/images/files/pdf/ieee-5g-roadmap-white-paper.pdf
[12]
Black Swan Telecom Journal. 2012. International Revenue Share Fraud: Are we winning the battle against telecom pirates? http://bswan.org/revenue_share_fraud.asp. [Online; accessed 06-October-2021].
[13]
Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research), Aarti Singh and Jerry Zhu (Eds.), Vol. 54. PMLR, 1273--1282. https://proceedings.mlr.press/v54/mcmahan17a.html
[14]
Seyed Ali Ossia, Ali Shahin Shamsabadi, Ali Taheri, Hamid R. Rabiee, and Hamed Haddadi. 2018. Private and Scalable Personal Data Analytics Using Hybrid Edge-to-Cloud Deep Learning. Computer 51, 5 (2018), 42--49.
[15]
Hamed Haddad Pajouh, Reza Javidan, Raouf Khayami, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2019. A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks. IEEE Trans. Emerg. Top. Comput. 7, 2 (2019), 314--323.
[16]
Shailendra Rathore, Pradip Kumar Sharma, Arun Kumar Sangaiah, and James J. Park. 2018. A Hesitant Fuzzy Based Security Approach for Fog and Mobile-Edge Computing. IEEE Access 6 (2018), 688--701.
[17]
Jianji Ren, Haichao Wang, Tingting Hou, Shuai Zheng, and Chaosheng Tang. 2019. Federated Learning-Based Computation Offloading Optimization in Edge Computing-Supported Internet of Things. IEEE Access 7 (2019), 69194--69201.
[18]
Tiago Gama Rodrigues, Katsuya Suto, Hiroki Nishiyama, and Nei Kato. 2017. A PSO model with VM migration and transmission power control for low Service Delay in the multiple cloudlets ECC scenario. In IEEE International Conference on Communications, ICC 2017, Paris, France, May 21--25, 2017. IEEE, 1--6.
[19]
Merve Sahin and Aurelien Francillon. 2021. Understanding and Detecting International Revenue Share Fraud. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21--25, 2021.
[20]
TensorFlow. 2021. TensorFlow. https://www.tensorflow.org/
[21]
TensorFlow. 2021. TensorFlow Federated. https://www.tensorflow.org/federated
[22]
TensorFlow. 2021. TensorFlow Lite | ML for Mobile and Edge Devices. https://www.tensorflow.org/lite
[23]
Shiqiang Wang, Tiffany Tuor, Theodoros Salonidis, Kin K. Leung, Christian Makaya, Ting He, and Kevin Chan. 2019. Adaptive Federated Learning in Resource Constrained Edge Computing Systems. IEEE J. Sel. Areas Commun. 37, 6 (2019), 1205--1221.
[24]
Xiaofei Wang, Yiwen Han, Chenyang Wang, Qiyang Zhao, Xu Chen, and Min Chen. 2019. In-Edge AI: Intelligentizing Mobile Edge Computing, Caching and Communication by Federated Learning. IEEE Netw. 33, 5 (2019), 156--165.
[25]
Dongdong Ye, Rong Yu, Miao Pan, and Zhu Han. 2020. Federated Learning in Vehicular Edge Computing: A Selective Model Aggregation Approach. IEEE Access 8 (2020), 23920--23935.
[26]
Yunfan Ye, Shen Li, Fang Liu, Yonghao Tang, and Wanting Hu. 2020. EdgeFed: Optimized Federated Learning Based on Edge Computing. IEEE Access 8 (2020), 209191--209198.
[27]
Mark Yelland. 2013. Fraud in mobile networks. Computer Fraud & Security (2013).
[28]
Shuai Yu, Xu Chen, Zhi Zhou, Xiaowen Gong, and Di Wu. 2021. When Deep Reinforcement Learning Meets Federated Learning: Intelligent Multitimescale Resource Management for Multiaccess Edge Computing in 5G Ultradense Network. IEEE Internet Things J. 8, 4 (2021), 2238--2251.
[29]
Zhengxin Yu, Jia Hu, Geyong Min, Haochuan Lu, Zhiwei Zhao, Haozhe Wang, and Nektarios Georgalas. 2018. Federated Learning Based Proactive Content Caching in Edge Computing. In IEEE Global Communications Conference, GLOBECOM 2018, Abu Dhabi, United Arab Emirates, December 9--13, 2018. IEEE, 1--6.

Cited By

View all
  • (2023)Telecommunications Fraud Machine Learning-based Detection2023 4th International Conference on Data Analytics for Business and Industry (ICDABI)10.1109/ICDABI60145.2023.10629612(656-661)Online publication date: 25-Oct-2023
  • (2023)International revenue share fraud prediction on the 5G edge using federated learningComputing10.1007/s00607-023-01174-w105:9(1907-1932)Online publication date: 31-Mar-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing
April 2022
2099 pages
ISBN:9781450387132
DOI:10.1145/3477314
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 May 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. 5G networks
  2. edge computing
  3. federated learning
  4. machine learning
  5. multi-access edge computing

Qualifiers

  • Research-article

Conference

SAC '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)38
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Telecommunications Fraud Machine Learning-based Detection2023 4th International Conference on Data Analytics for Business and Industry (ICDABI)10.1109/ICDABI60145.2023.10629612(656-661)Online publication date: 25-Oct-2023
  • (2023)International revenue share fraud prediction on the 5G edge using federated learningComputing10.1007/s00607-023-01174-w105:9(1907-1932)Online publication date: 31-Mar-2023

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media