Skip to main content

Red Light/Green Light: A Lightweight Algorithm for, Possibly, Fraudulent Online Behavior Change Detection

  • Conference paper
  • First Online:
Advances in Computational Intelligence (MICAI 2022)

Abstract

Telecommunications services have become a constant in people’s lives. This has inspired fraudsters to carry out malicious activities causing economic losses to people and companies. Early detection of signs that suggest the possible occurrence of malicious activity would allow analysts to act in time and avoid unintended consequences. Modeling the behavior of users could identify when a significant change takes place. Following this idea, an algorithm for online behavior change detection in telecommunication services is proposed in this paper. The experimental results show that the new algorithm can identify behavioral changes related to unforeseen events.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Due to privacy and commercial policies of the telecommunication company, names, data, and other information that could lead to a personal or commercial information leakage are not offered. This was guaranteed by a Statement of Confidentiality signed between the research authors and TC.

References

  1. Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)

    Article  Google Scholar 

  2. Faghihi, F., Abadi, M., Tajoddin, A.: Smsbothunter: a novel anomaly detection technique to detect SMS botnets. In: 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), pp. 1–6. IEEE (2018)

    Google Scholar 

  3. Kilinc, H.H.: A case study on fraudulent user behaviors in the telecommunication network. Electrica 21(1), 74–85 (2021)

    Article  Google Scholar 

  4. McDiarmid, A., Bell, S., Irvine, J., Banford, J.: Nodobo: detailed mobile phone usage dataset (2013). Unpublished paper, accessed http://nodobo.com/papers/iet-el.pdf on pp. 9–21

  5. Nakamura, T., Munekata, N., Nakamura, F., Ono, T., Matsubara, H.: Universal game based on traditional children’s outdoor games. In: Anacleto, J.C., Fels, S., Graham, N., Kapralos, B., Saif El-Nasr, M., Stanley, K. (eds.) ICEC 2011. LNCS, vol. 6972, pp. 59–64. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24500-8_7

    Chapter  Google Scholar 

  6. Peng, L., Lin, R.: Fraud phone calls analysis based on label propagation community detection algorithm. In: 2018 IEEE World Congress on Services (SERVICES), pp. 23–24. IEEE (2018)

    Google Scholar 

  7. Sahin, M., Francillon, A.: Understanding and detecting international revenue share fraud. In: Proceeding of the Network and Distributed System Security Symposium (NDSS 2021), Reston, VA. The Internet Society (2021)

    Google Scholar 

  8. Shaeiri, Z., Kazemitabar, J., Bijani, S., Talebi, M.: Behavior-based online anomaly detection for a nationwide short message service. J. AI Data Mining 7(2), 239–247 (2019)

    Google Scholar 

  9. Sonowal, G.: Introduction to Phishing. In: Phishing and Communication Channels, pp. 1–24. Apress, Berkeley, CA (2022). https://doi.org/10.1007/978-1-4842-7744-7_1

    Chapter  Google Scholar 

  10. Stolfo, S.J., Hershkop, S., Hu, C.W., Li, W.J., Nimeskern, O., Wang, K.: Behavior-based modeling and its application to email analysis. ACM Trans. Internet Technol. (TOIT) 6(2), 187–221 (2006)

    Article  Google Scholar 

  11. Thudumu, S., Branch, P., Jin, J., Singh, J.J.: A comprehensive survey of anomaly detection techniques for high dimensional big data. J. Big Data 7(1), 1–30 (2020). https://doi.org/10.1186/s40537-020-00320-x

    Article  Google Scholar 

  12. Ullah, F., Naeem, M.R., Mostarda, L., Shah, S.A.: Clone detection in 5g-enabled social IoT system using graph semantics and deep learning model. Int J. Mach. Learn. Cybernet. 12, 3115–3127 (2021)

    Article  Google Scholar 

  13. Yu, B., Fang, Y., Yang, Q., Tang, Y., Liu, L.: A survey of malware behavior description and analysis. Front. Inf. Technol. Electron. Eng. 19(5), 583–603 (2018). https://doi.org/10.1631/FITEE.1601745

    Article  Google Scholar 

Download references

Acknowledgement

This research was supported by the Universidad Iberoamericana (Ibero) and the Institute of Applied Research and Technology (InIAT) by the project “Detection of phishing attacks in electronic messages using Artificial Intelligence techniques.”

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lázaro Bustio-Martínez .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Herrera-Semenets, V., Hernández-León, R., Bustio-Martínez, L., van den Berg, J. (2022). Red Light/Green Light: A Lightweight Algorithm for, Possibly, Fraudulent Online Behavior Change Detection. In: Pichardo Lagunas, O., Martínez-Miranda, J., Martínez Seis, B. (eds) Advances in Computational Intelligence. MICAI 2022. Lecture Notes in Computer Science(), vol 13613. Springer, Cham. https://doi.org/10.1007/978-3-031-19496-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-19496-2_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-19495-5

  • Online ISBN: 978-3-031-19496-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics