Skip to main content

Applying User Signatures on Fraud Detection in Telecommunications Networks

  • Conference paper
Advances in Data Mining. Applications and Theoretical Aspects (ICDM 2011)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6870))

Included in the following conference series:

  • 1601 Accesses

Abstract

Fraud in telecommunications is increasing dramatically with the expansion of modern technology, resulting in the loss of billions of dollars worldwide each year. Although prevention technologies are the best way to reduce fraud,. Fraudsters are adaptive, searching systematically for new ways to commit fraud and, in most of the cases, will usually find some way to circumvent companies prevention measures. In this paper we expose some of the ways in which fraud is being used against organizations, evaluating the limitations of existing strategies and methods to detect and prevent it in todays telecommunications companies. Additionally, we expose a data mining profiling technique based on signatures that was developed for a real mobile telecommunications network operator and integrated into one of its Fraud Management Systems (FMS), currently under operation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Burge, P., Taylor, J., Cooke, C., Moreau, Y., Preneel, B., Stormann, C.: Fraud detection and management in mobile telecommunications networks. In: Proceedings of the European Conference on Security and Detection, ECOS 1997, pp. 91–96 (1997)

    Google Scholar 

  2. Cahill, M., Lambert, D., Pinheiro, J., Sun, D.: Detecting Fraud in the real World. Kluwer Academic Publishers, Norwell (2002)

    Book  MATH  Google Scholar 

  3. Chen, F., Lambert, D., Pinheiro, J., Sun, D.: Reducing Transaction Databases, Without Lagging Behind the Data or Losing Information. Technical memorandum, Bell Labs, Lucent Technologies (2000)

    Google Scholar 

  4. Cortes, C., Fisher, K., Pregibon, D., Rogers, A., Smith, F.: Hancock: A langauge for extracting signatures from data streams. In: Proceedings of KDD 2000, pp. 9–17. ACM Press, New York (2000)

    Google Scholar 

  5. Cortes, C., Pregibon, D.: Signature-based methods for data streams. Data Mining and Knowledge Discovery, 167–182 (2001)

    Google Scholar 

  6. Cortesão, L., Martins, F., Rosa, A., Carvalho, P.: Fraud management systems in telecommunications: A practical approach. In: 12th International Conference on Telecommunications, pp. 167–182 (2005)

    Google Scholar 

  7. Edge, M., Sampaios, P.: A survey of signature based methods for financial fraud detection. Computers & Security, 381–394 (2009)

    Google Scholar 

  8. Fawcett, T., Povost, F.: Automated design of user proling systems for fraud detection. AAAI technical Report WS-98-07 (1998)

    Google Scholar 

  9. Ferreira, P., Alves, R., Belo, O., Cortesão, L.: Establishing fraud detection patterns based on signatures. In: Perner, P. (ed.) ICDM 2006. LNCS (LNAI), vol. 4065, pp. 526–538. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Ferreira, P., Alves, R., Belo, O., Ribeiro, J.: Detecting telecommunications fraud based on signatures clustering analysis. In: Proceedings of Business Intelligence Workshop of 13th Portuguese Conference on Artificial Intelligence (2007)

    Google Scholar 

  11. Gartner Research, http://www.gartner.com/it/page.jsp?id=759312

  12. Hilas, C., Sahalos, J.: User proling for fraud detection in telecommunication networks. In: 5th International Conference on Technology and Automation (2005)

    Google Scholar 

  13. Hollmén, J.: User profiling and classification for fraud detection in mobile communications networks. PhD Thesis, Helsinki University of Technology, Department of Cognitive and Computer Science and Engineering, Espoo (2000)

    Google Scholar 

  14. Larrañaga, A.: Fraud Prevention Strategies for the Multi-Play Service Provider. Next Generation Billing & Revenue Management, Kuala Lumpur (2009)

    Google Scholar 

  15. Mohay, G., Anderson, A., Collie, B., Vel, O., Mckemmish, R.: Computer and Intrusion Forensics. Artech House, Boston (2003)

    Google Scholar 

  16. Quian, Z., Jinag, W., Tsui, K.: Churn detection via custumer profile modelling. International Journal of Production Research 44, 2913–2933 (2006)

    Article  Google Scholar 

  17. Rao, C.: Use of Hellinger distance in graphical displays. Multivariate statistics and matrices in statistics, pp. 143–146. Brill Academic Publisher, Leiden (1995)

    MATH  Google Scholar 

  18. Taylor, J., Howker, K., Burge, P.: Detection of fraud in mobile telecommunications. Information Security Technical Report 4, 16–28 (1999)

    Article  Google Scholar 

  19. The Insight Research Corporation, http://www.insight-corp.com/pr/11_13_07.asp

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lopes, J., Belo, O., Vieira, C. (2011). Applying User Signatures on Fraud Detection in Telecommunications Networks. In: Perner, P. (eds) Advances in Data Mining. Applications and Theoretical Aspects. ICDM 2011. Lecture Notes in Computer Science(), vol 6870. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23184-1_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23184-1_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23183-4

  • Online ISBN: 978-3-642-23184-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics