A Case Study on Fraudulent User Behaviors in the Telecommunication Network

In the telecommunications industry, fraud is quite common and fraud detection is similar to looking for a needle in the haystack. In this article, the behavior types of the fraudsters are revealed through a case study and ten types of fraudulent user behaviors are identified by using examples and figures.

___

1. Communications Fraud Control Association, (2020), Global Fraud Loss Survey 2019, Available from: https://www.cfca.org/

2. Y. Wu, S. Bagchi, S. Garg, N. Singh, "SCIDIVE: A stateful and cross protocol intrusion detection architecture for Voice-over-IP environments", International Conference on Dependable Systems and Networks, Florence, Italy, 2004, pp. 433-442.

3. D. Olszewski,"A probabilistic approach to fraud detection in telecommunications", Knowledge-Based Systems, vol. 26, pp. 246- 258, February 2012. [Crossref]

4. M. H. Cahill, D. Lambert, J. C. Pinheiro, D.X. Sun, "Detecting fraud in the real world", Handbook of Massive Data Sets, Springer, Boston, USA, vol 4, pp. 911-929, 2002. [Crossref]

5. D. Hoffstadt, S. Monhof, E. Rathgeb, "SIP trace recorder: monitor and analysis tool for threats in SIP-based networks", 8th International Wireless Communications and Mobile Computing Conference (IWCMC), Limassol, Cyprus, pp. 631-635, 2012. [Crossref]

6. D. Hoffstadt, E. Rathgeb, M. Liebig, R. Meister, Y. Rebahi, T.Q. Thanh, "A comprehensive framework for detecting and preventing VoIP fraud and misuse.", The IEEE International Conference on Computing, Networking and Communications (ICNC), Honolulu, USA, pp. 807-813, 2014. [Crossref]

7. J. Guo, G. Liu, Y. Zuo, J. Wu,"Learning sequential behavior representations for fraud detection", IEEE International Conference on Data Mining (ICDM), Singapore, pp. 127-136, 2018. [Crossref]

8. H. Lin, G. Liu, J. Wu, Y. Zuo, X. Wan, H. Li, "Fraud detection in dynamic interaction network", in IEEE Transactions on Knowledge and Data Engineering, vol. 32, no. 10, pp. 1936-1950, Oct. 2020. [Crossref]

9. P. A. Estévez, C. M. Held, C. A. Perez, "Subscription fraud prevention in telecommunications using fuzzy rules and neural networks", Expert Systems with Applications, vol.31, no. 2, pp. 337-344, Aug. 2006. [Crossref]

10. C. S. Hilas, P. A. Mastorocostas, "An application of supervised and unsupervised learning approaches to telecommunications fraud detection", Knowledge-Based Systems, vol. 21, no. 7, pp. 721-726, Oct. 2008. [Crossref]

11. M. Sahin, A. Francillon, P. Gupta, M. Ahamad, "SoK: Fraud in Telephony Networks", IEEE European Symposium on Security and Privacy (EuroS&P), Paris, 2017, pp. 235-250. [Crossref]

12. E. Herrell, "Resolving security risks for IP Telephony; what companies need to consider when deploying voice on data networks", Forrester Research Inc., Cambridge, MA, USA, 2004.

13. M. D. Collier, "Enterprise telecom security threats", SecureLogix, San Antonio, TX, USA, 2004.

14. NOVA Cyber Security Solutions, (2020), Nova V-Gate, Available from: http://novacybersecurity.com/en/products/nova_vgate

15. M. M. Breunig, H. P. Kriegel, R. T. Ng, J. Sander, "Lof: Identifying density-based local outliers", ACM SIGMOD Record, vol. 29, no. 2, pp. 93-104, June 2000. [Crossref]

16. L. Breiman, J. Friedman, R. Olshen, C. Stone, "Classification and Regression Trees", Taylor & Francis, Belmont, CA, 1984.

17. T. F. Chan, G. H. Golub, R. J. LeVeque, "Updating formulae and a pairwise algorithm for computing sample variances", Technical Report STANCS-79-773, Stanford University, Department of Computer Science, 1979.

18. Y. Freund, R. Schapire, "A decision-theoretic generalization of on-line learning and an application to boosting", Journal of Computer and System Sciences, vol.55, no.1, Aug. 1997. [Crossref]
Electrica-Cover
  • ISSN: 2619-9831
  • Yayın Aralığı: 3
  • Başlangıç: 2001
  • Yayıncı: İstanbul Üniversitesi-Cerrahpaşa
Sayıdaki Diğer Makaleler

Energy-Efficient Clustering-Based Mobile Routing Algorithm For Wireless Sensor Networks

Baybars KARABEKİR, M. Ali AYDIN, Abdul Halim ZAİM

The Radical Impact of Spatially Nonuniform Illumination on Giant Splash in the Photoelectric Gain of a Photoconductor

Viacheslav Aleksandrovich KHOLODNOV, Mikhail Stepanovich NİKİTİN

BER Analysis For 2×2 Mimo High-Efficiency DCSK System

Nguyen Xuan QUYEN

Installation of a Sen Transformer in a Loop Distribution System for Line Loss Minimization by Loop Current Elimination

Dhrupa PATEL, Anandita CHOWDHURY

Reconfigurable Low-Pass Filter for Analog Baseband of Bluetooth Low Energy and Biomedical Applications

Ersin ALAYBEYOGLU, Hakan KUNTMAN

Comparative Performance Analysis of Slime Mould Algorithm For Efficient Design of Proportional–Integral–Derivative Controller

Davut İZCİ, Serdar EKİNCİ

Secrecy Capacity Analysis of an Underlay Cognitive Radio Network in the Presence of Co-channel and Primary Network Interference

Emre BAYAT, SULTAN ALDIRMAZ ÇOLAK

Three Speed Controllers of Direct Torque Control for a Doubly Fed Induction Motor Drive–A Comparison

Mohammed El MAHFOUD, Badre BOSSOUFİ, Najib El OUANJİLİ, Said MAHFOUD, Mohammed TAOUSSİ

A Broadband, Polarization Insensitive, Wide Incidence-AngleSlotted Ring/Lumped Resistor-Based Metamaterial Absorber for K u-Band Applications

Sinan AKSİMSEK

State of Research on Effects of Cloud to Ground Lightning Transients on High Voltage Polymeric Insulated Power Cables

Mudang TARO, Saibal CHATTERJEE