Abstract
Fraud in telecommunications is increasing dramatically with the expansion of modern technology, resulting in the loss of billions of dollars worldwide each year. Although prevention technologies are the best way to reduce fraud,. Fraudsters are adaptive, searching systematically for new ways to commit fraud and, in most of the cases, will usually find some way to circumvent companies prevention measures. In this paper we expose some of the ways in which fraud is being used against organizations, evaluating the limitations of existing strategies and methods to detect and prevent it in todays telecommunications companies. Additionally, we expose a data mining profiling technique based on signatures that was developed for a real mobile telecommunications network operator and integrated into one of its Fraud Management Systems (FMS), currently under operation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Burge, P., Taylor, J., Cooke, C., Moreau, Y., Preneel, B., Stormann, C.: Fraud detection and management in mobile telecommunications networks. In: Proceedings of the European Conference on Security and Detection, ECOS 1997, pp. 91–96 (1997)
Cahill, M., Lambert, D., Pinheiro, J., Sun, D.: Detecting Fraud in the real World. Kluwer Academic Publishers, Norwell (2002)
Chen, F., Lambert, D., Pinheiro, J., Sun, D.: Reducing Transaction Databases, Without Lagging Behind the Data or Losing Information. Technical memorandum, Bell Labs, Lucent Technologies (2000)
Cortes, C., Fisher, K., Pregibon, D., Rogers, A., Smith, F.: Hancock: A langauge for extracting signatures from data streams. In: Proceedings of KDD 2000, pp. 9–17. ACM Press, New York (2000)
Cortes, C., Pregibon, D.: Signature-based methods for data streams. Data Mining and Knowledge Discovery, 167–182 (2001)
Cortesão, L., Martins, F., Rosa, A., Carvalho, P.: Fraud management systems in telecommunications: A practical approach. In: 12th International Conference on Telecommunications, pp. 167–182 (2005)
Edge, M., Sampaios, P.: A survey of signature based methods for financial fraud detection. Computers & Security, 381–394 (2009)
Fawcett, T., Povost, F.: Automated design of user proling systems for fraud detection. AAAI technical Report WS-98-07 (1998)
Ferreira, P., Alves, R., Belo, O., Cortesão, L.: Establishing fraud detection patterns based on signatures. In: Perner, P. (ed.) ICDM 2006. LNCS (LNAI), vol. 4065, pp. 526–538. Springer, Heidelberg (2006)
Ferreira, P., Alves, R., Belo, O., Ribeiro, J.: Detecting telecommunications fraud based on signatures clustering analysis. In: Proceedings of Business Intelligence Workshop of 13th Portuguese Conference on Artificial Intelligence (2007)
Gartner Research, http://www.gartner.com/it/page.jsp?id=759312
Hilas, C., Sahalos, J.: User proling for fraud detection in telecommunication networks. In: 5th International Conference on Technology and Automation (2005)
Hollmén, J.: User profiling and classification for fraud detection in mobile communications networks. PhD Thesis, Helsinki University of Technology, Department of Cognitive and Computer Science and Engineering, Espoo (2000)
Larrañaga, A.: Fraud Prevention Strategies for the Multi-Play Service Provider. Next Generation Billing & Revenue Management, Kuala Lumpur (2009)
Mohay, G., Anderson, A., Collie, B., Vel, O., Mckemmish, R.: Computer and Intrusion Forensics. Artech House, Boston (2003)
Quian, Z., Jinag, W., Tsui, K.: Churn detection via custumer profile modelling. International Journal of Production Research 44, 2913–2933 (2006)
Rao, C.: Use of Hellinger distance in graphical displays. Multivariate statistics and matrices in statistics, pp. 143–146. Brill Academic Publisher, Leiden (1995)
Taylor, J., Howker, K., Burge, P.: Detection of fraud in mobile telecommunications. Information Security Technical Report 4, 16–28 (1999)
The Insight Research Corporation, http://www.insight-corp.com/pr/11_13_07.asp
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lopes, J., Belo, O., Vieira, C. (2011). Applying User Signatures on Fraud Detection in Telecommunications Networks. In: Perner, P. (eds) Advances in Data Mining. Applications and Theoretical Aspects. ICDM 2011. Lecture Notes in Computer Science(), vol 6870. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23184-1_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-23184-1_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23183-4
Online ISBN: 978-3-642-23184-1
eBook Packages: Computer ScienceComputer Science (R0)