Abstract
The high asymmetry of international termination rates is fertile ground for the appearance of fraud in telecom companies. International calls have higher values when compared with national ones, which raises the attention of fraudsters. In this paper, we present a solution for a real problem called interconnect bypass fraud, more specifically, a newly identified distributed pattern that crosses different countries and keeps fraudsters from being tracked by almost all fraud detection techniques. This problem is one of the most expressive in the telecommunication domain, and it has some abnormal behaviours like the occurrence of a burst of calls from specific numbers. Based on this assumption, we propose the adoption of a new fast forgetting technique that works together with the Lossy Counting algorithm. We apply frequent set mining to capture distributed patterns from different countries. Our goal is to detect as soon as possible items with abnormal behaviours, e.g., bursts of calls, repetitions, mirrors, distributed behaviours and a small number of calls spread by a vast set of destination numbers. The results show that the application of different techniques improves the detection ratio and not only complements the techniques used by the telecom company but also improves the performance of the Lossy Counting algorithm in terms of run-time, memory used and sensibility to detect the abnormal behaviours. Additionally, the application of frequent set mining allows us to capture distributed fraud patterns.
Similar content being viewed by others
Notes
A small sample is available online. https://drive.google.com/open?id=1NXWpQitnUKhsGC97o8KU6HjFyszwJ2P2
References
AlBougha MR (2016) Comparing data mining classification algorithms in detection of simbox fraud
Ali MA, Azad MA, Centeno MP, Hao F, van Moorsel A (2019) Consumer-facing technology fraud: economics, attack methods and potential solutions. Futur Gener Comput Syst 100:408–427
Alraouji Y, Bramantoro A (2014) International call fraud detection systems and techniques. In: Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, pp 159–166
Alsadi IS, Abuhamoud N (2018) Study to use neo4j to analysis and detection sim-box fraud. Journal of Pure and Applied Sciences 17(4)
Association CFC et al (2017) Global fraud loss survey. Press Release
Cormode G, Hadjieleftheriou M (2010) Methods for finding frequent items in data streams. VLDB J 19(1):3–20
Cormode G, Korn F, Muthukrishnan S, Srivastava D (2008) Finding hierarchical heavy hitters in streaming data. ACM Trans Knowl Discov Data 1(4):2:1–2:48. https://doi.org/10.1145/1324172.1324174
Elmi AH, Ibrahim S, Sallehuddin R (2013) Detecting sim box fraud using neural network. In: IT Convergence and security 2012. Springer, pp 575–582
Gama J (2010) Knowledge discovery from data streams. Chapman and hall / CRC data mining and knowledge discovery series. CRC Press
Jiang JYJ, Gillot D (2015) Advanced predictive intelligence for termination bypass detection and prevention. US Patent 9,002,320
Kahsu H (2018) Sim-box fraud detection using data mining techniques: the case of ethio telecom. Ph.D. thesis AAU
Kashir M, Bashir S (2019) Machine learning techniques for sim box fraud detection. In: 2019 International Conference on Communication Technologies (ComTech). IEEE, pp 4–8
Laleh N, Azgomi MA (2009) A taxonomy of frauds and fraud detection techniques. In: International Conference on Information Systems, Technology and Management. Springer, pp 256–267
Lefler AC, Plaza AG, Rios JLM (2018) Method, mobile switching centre, MSC, and a computer program product for detecting interconnect bypass. US Patent App. 15/570,014
Li CW, Jea KF (2011) An adaptive approximation method to discover frequent itemsets over sliding-window-based data streams. Expert Syst Appl 38:13,386–13,404
Manku GS, Motwani R (2002) Approximate frequency counts over data streams. In: Proceedings of the 28th International Conference on Very Large Data Bases, VLDB ’02. VLDB Endowment, pp 346–357. http://dl.acm.org/citation.cfm?id=1287369.1287400
Marah HM, Elrajubi OM, Abouda AA (2015) Fraud detection in international calls using fuzzy logic. In: International Conference on Computer Vision and Image Analysis Applications. IEEE, pp 1–6
Martino GDS, Navarin N, Sperduti A (2013) A lossy counting based approach for learning on streams of graphs on a budget. In: Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence. AAAI Press, pp 1294–1301
Metwally A, Agrawal D, El Abbadi A (2005) Efficient computation of frequent and top-k elements in data streams. In: Proceedings of the 10th International Conference on Database Theory, ICDT’05. Springer, Berlin, pp 398–412
Moreau Y, Verrelst H, Vandewalle J (1997) Detection of mobile phone fraud using supervised neural networks: a first prototype. In: International Conference on Artificial Neural Networks. Springer, pp 1065–1070
Murynets I, Zabarankin M, Jover RP, Panagia A (2014) Analysis and detection of simbox fraud in mobility networks. In: IEEE INFOCOM 2014-IEEE Conference on computer communications. IEEE, pp 1519–1526
Muthukrishnan S (2005) Data streams: algorithms and applications. Found Trends Theor Comput Sci 1(2):117–236
Nishina T, Iwanuma K (2019) Yamamoto, y.: a skipping FP-tree for incrementally intersecting closed itemsets in on-line stream mining. 2019 IEEE International Conference on Big Data and Smart Computing (BigComp), pp 1–4
Reaves B, Shernan E, Bates A, Carter H, Traynor P (2015) Boxed out: blocking cellular interconnect bypass fraud at the network edge. In: 24Th {USENIX} Security Symposium ({USENIX} security 15), pp 833–848
Rosas E, Analide C (2009) Telecommunications fraud: problem analysis-an agent-based KDD perspective. Aveiro: EPIA 2009
Sahin M, Francillon A (2016) Over-the-top bypass: study of a recent telephony fraud. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp 1106–1117
Subbulakshmi B, Nayaki AP (2018) Compact pattern stream tree algorithm
Tewodros H (2018) Network traffic classification using machine learning: a step towards over-the-top bypass fraud detection. Ph.D Thesis
Veloso B, Martins C, Espanha R, Azevedo R, Gama J (2020) Fraud detection using heavy hitters: a case study. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing, pp 482–489
Veloso B, Martins C, WEDO B, Espanha R, Azevedo R, Gama J Detecting bursts of activity from streams
Webb GI, Vreeken J (2014) Efficient discovery of the most interesting associations. ACM Trans Knowl Discov Data (TKDD) 8(3):15
Worku T (2018) Predictive modeling for international roaming fraud detection in ethio telecom. Ph.D. thesis, Addis Ababa University
Yulianto A, Bijaksana MA, Lhaksmana KM, et al. (2017) Fraud detection on international direct dial call using hybrid NBTree algorithm and Kullback Leibler divergence. In: 2017 5Th International Conference on Information and Communication Technology (ICoIC7). IEEE, pp 1–6
Acknowledgements
The authors acknowledge the project ML-ABA - Machine Learn based Adaptive Business Assurance, Individual Demonstration Projects, NUP: FCOMP-01-0202-FEDER-038204, a project co-funded by the Incentive System for Research and Technological Development, from the Thematic Operational Program Competitiveness of the national framework program - Portugal2020. We also acknowledge the support of the project FailStopper (DSAIPA / DS /0086/2018).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix A: Results
Appendix A: Results
1.1 Opus Miner Results for data set 1
1.2 Opus Miner Results for data set 2
Rights and permissions
About this article
Cite this article
Veloso, B., Tabassum, S., Martins, C. et al. Interconnect bypass fraud detection: a case study. Ann. Telecommun. 75, 583–596 (2020). https://doi.org/10.1007/s12243-020-00808-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-020-00808-w