Skip to main content

Testing the Fraud Detection Ability of Different User Profiles by Means of FF-NN Classifiers

  • Conference paper
Artificial Neural Networks – ICANN 2006 (ICANN 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4132))

Included in the following conference series:

Abstract

Telecommunications fraud has drawn the attention in research due to the huge economic burden on companies and to the interesting aspect of users’ behavior characterization. In the present paper, we deal with the issue of user characterization. Several real cases of defrauded user accounts for different user profiles were studied. Each profile’s ability to characterize user behavior in order to discriminate normal activity from fraudulent one was tested. Feed-forward neural networks were used as classifiers. It is found that summary characteristics of user’s behavior perform better than detailed ones towards this task.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gosset, P., Hyland, M.: Classification, detection and prosecution of fraud in mobile networks. In: Proceedings of ACTS Mobile Summit, Sorrento Italy (1999)

    Google Scholar 

  2. Bolton, R.J., Hand, D.J.: Statistical fraud detection: a review. Statistical Science 17(3), 235–255 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  3. ACTS ACo95, project ASPeCT: Legal aspects of fraud detection. AC095/KUL/W26/ DS/P/25/2 (1998)

    Google Scholar 

  4. Hilas, C.S., Sahalos, J.N.: User profiling for fraud detection in telecommunications networks. In: Proc. of the 5th Int. Conf. on Technology and Automation - ICTA 2005, Thessaloniki Greece, pp. 382–387 (2005)

    Google Scholar 

  5. Moreau, Y., Preneel, B., Burge, P., Shawe-Taylor, J., Stoermann, C., Cooke, C.: Novel Techniques for Fraud Detection in Mobile Telecommunication Networks. ACTS Mobile Summit. Granada Spain (1997)

    Google Scholar 

  6. Buschkes, R., Kesdogan, D., Reichl, P.: How to increase security in Mobile Networks by Anomaly Detection. In: Proc. of the 14th Annual Computer Security Applications Conference - ACSAC 1998, vol. 8 (1998)

    Google Scholar 

  7. Rosset, S., Murad, U., Neumann, E., Idan, Y., Pinkas, G.: Discovery of fraud rules for telecommunications – challenges and solutions. In: Proc. of ACM SIGKDD 1999, pp. 409–413. ACM Press, San Diego (1999)

    Google Scholar 

  8. Adomavicious, G., Tuzhilin, A.l.: User profiling in Personalization Applications through Rule Discovery and Validation. In: Proc. of ACM SIGKDD 1999, pp. 377–381. ACM Press, San Diego (1999)

    Google Scholar 

  9. Fawcett, T., Provost, F.: Adaptive Fraud Detection. Data Mining and Knowledge Discovery 1, 291–316 (1997)

    Article  Google Scholar 

  10. Oh, S.H., Lee, W.S.: An anomaly intrusion detection method by clustering normal user behavior. Computers & Security 22(7), 596–612 (2003)

    Article  Google Scholar 

  11. Cox, K.C., Eick, S.G., Wills, G.J., Brachman, R.J.: Visual data mining: Recognizing telephone calling fraud. J. Data Mining and Knowledge Discover 1(2), 225–231 (1997)

    Article  Google Scholar 

  12. Taniguchi, M., Haft, M., Hollmen, J., Tresp, V.: Fraud detection in communication networks using neural and probabilistic methods. In: Proc. of the 1998 IEEE Int. Conf. Acoustics, Speech and Signal Processing, vol. 2, pp. 1241–1244 (1998)

    Google Scholar 

  13. Manikopoulos, C., Papavassilliou, S.: Network Intrusion and Fault Detection: A Statistical Anomaly Approach. IEEE Communications Magazine, Vol 40(10), 76–82 (2002)

    Article  Google Scholar 

  14. Hollmen, J., Tresp, V.: Call-based fraud detection in mobile communication networks using a hierarchical regime switching model. In: Proc. of the 1998 Conf. on Advances in Neural Information Processing Systems II, pp. 889–895. MIT Press, Cambridge (1999)

    Google Scholar 

  15. Phua, C., Alahakoon, D., Lee, V.: Minority Report in Fraud Detection: Classification of Skewed Data. ACM SIGKDD Explorations – Special Issue on Imbalanced Data Sets 6(1), 50–58 (2004)

    Google Scholar 

  16. Fawcett, T., Phua, C.: Fraud Detection Bibliography (2005), Accessed from http://liinwww.ira.uka.de/bibliography/Ai/fraud.detection.html

  17. Hinde, S.F.: Call Record Analysis. In: IEE Colloquium on Making Life Easier - Network Design and Management Tools (Digest No: 1996/217), pp. 8/1–8/4 (1996)

    Google Scholar 

  18. Manly, B.F.J.: Multivariate Statistical Methods: A Primer, 2nd edn. Chapman & Hall, Boca Raton (1994)

    Google Scholar 

  19. Lin, C.-T., Lee, G.C.S.: Neural-Fuzzy Systems: a neuro fuzzy synergism to intelligent systems. Prentice Hall, Upper Saddle River (1996)

    Google Scholar 

  20. Riedmiller, M., Braun, H.: A direct adaptive method for faster backpropagation learning: The RPROP algorithm. In: Proc. of the IEEE Int. Conf. on Neural Networks, vol. 1, pp. 586–591 (1993)

    Google Scholar 

  21. Downey, T.J., Meyer, D.J., Price, R.K., Spitznagel, E.L.: Using the receiver operating characteristic to asses the performance of neural classifiers. In: Int. Joint Conf. Neural Networks, vol. 5, pp. 3642–3646 (1999)

    Google Scholar 

  22. Provost, F., Fawcett, T., Kohavi, R.: The case against accuracy estimation for comparing induction algorithms. In: Proc of the Fifteenth Int. Conf. on Machine Learning, pp. 43–48. Morgan Kaufmann, San Francisco (1998)

    Google Scholar 

  23. Kajitani, Y., Hipel, K.W., McLeod Ian, A.: Forecasting nonlinear time series with feed-forward neural networks: a case study of Canadian lynx data. Journal of Forecasting 24(2), 105–117 (2005)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hilas, C.S., Sahalos, J.N. (2006). Testing the Fraud Detection Ability of Different User Profiles by Means of FF-NN Classifiers. In: Kollias, S., Stafylopatis, A., Duch, W., Oja, E. (eds) Artificial Neural Networks – ICANN 2006. ICANN 2006. Lecture Notes in Computer Science, vol 4132. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11840930_91

Download citation

  • DOI: https://doi.org/10.1007/11840930_91

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38871-5

  • Online ISBN: 978-3-540-38873-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics