A Case Study on Fraudulent User Behaviors in the Telecommunication Network

In the telecommunications industry, fraud is quite common and fraud detection is similar to looking for a needle in the haystack. In this article, the behavior types of the fraudsters are revealed through a case study and ten types of fraudulent user behaviors are identified by using examples and figures.

___

1. Communications Fraud Control Association, (2020), Global Fraud Loss Survey 2019, Available from: https://www.cfca.org/

2. Y. Wu, S. Bagchi, S. Garg, N. Singh, "SCIDIVE: A stateful and cross protocol intrusion detection architecture for Voice-over-IP environments", International Conference on Dependable Systems and Networks, Florence, Italy, 2004, pp. 433-442.

3. D. Olszewski,"A probabilistic approach to fraud detection in telecommunications", Knowledge-Based Systems, vol. 26, pp. 246- 258, February 2012. [Crossref]

4. M. H. Cahill, D. Lambert, J. C. Pinheiro, D.X. Sun, "Detecting fraud in the real world", Handbook of Massive Data Sets, Springer, Boston, USA, vol 4, pp. 911-929, 2002. [Crossref]

5. D. Hoffstadt, S. Monhof, E. Rathgeb, "SIP trace recorder: monitor and analysis tool for threats in SIP-based networks", 8th International Wireless Communications and Mobile Computing Conference (IWCMC), Limassol, Cyprus, pp. 631-635, 2012. [Crossref]

6. D. Hoffstadt, E. Rathgeb, M. Liebig, R. Meister, Y. Rebahi, T.Q. Thanh, "A comprehensive framework for detecting and preventing VoIP fraud and misuse.", The IEEE International Conference on Computing, Networking and Communications (ICNC), Honolulu, USA, pp. 807-813, 2014. [Crossref]

7. J. Guo, G. Liu, Y. Zuo, J. Wu,"Learning sequential behavior representations for fraud detection", IEEE International Conference on Data Mining (ICDM), Singapore, pp. 127-136, 2018. [Crossref]

8. H. Lin, G. Liu, J. Wu, Y. Zuo, X. Wan, H. Li, "Fraud detection in dynamic interaction network", in IEEE Transactions on Knowledge and Data Engineering, vol. 32, no. 10, pp. 1936-1950, Oct. 2020. [Crossref]

9. P. A. Estévez, C. M. Held, C. A. Perez, "Subscription fraud prevention in telecommunications using fuzzy rules and neural networks", Expert Systems with Applications, vol.31, no. 2, pp. 337-344, Aug. 2006. [Crossref]

10. C. S. Hilas, P. A. Mastorocostas, "An application of supervised and unsupervised learning approaches to telecommunications fraud detection", Knowledge-Based Systems, vol. 21, no. 7, pp. 721-726, Oct. 2008. [Crossref]

11. M. Sahin, A. Francillon, P. Gupta, M. Ahamad, "SoK: Fraud in Telephony Networks", IEEE European Symposium on Security and Privacy (EuroS&P), Paris, 2017, pp. 235-250. [Crossref]

12. E. Herrell, "Resolving security risks for IP Telephony; what companies need to consider when deploying voice on data networks", Forrester Research Inc., Cambridge, MA, USA, 2004.

13. M. D. Collier, "Enterprise telecom security threats", SecureLogix, San Antonio, TX, USA, 2004.

14. NOVA Cyber Security Solutions, (2020), Nova V-Gate, Available from: http://novacybersecurity.com/en/products/nova_vgate

15. M. M. Breunig, H. P. Kriegel, R. T. Ng, J. Sander, "Lof: Identifying density-based local outliers", ACM SIGMOD Record, vol. 29, no. 2, pp. 93-104, June 2000. [Crossref]

16. L. Breiman, J. Friedman, R. Olshen, C. Stone, "Classification and Regression Trees", Taylor & Francis, Belmont, CA, 1984.

17. T. F. Chan, G. H. Golub, R. J. LeVeque, "Updating formulae and a pairwise algorithm for computing sample variances", Technical Report STANCS-79-773, Stanford University, Department of Computer Science, 1979.

18. Y. Freund, R. Schapire, "A decision-theoretic generalization of on-line learning and an application to boosting", Journal of Computer and System Sciences, vol.55, no.1, Aug. 1997. [Crossref]