当前位置: X-MOL 学术Ann. Telecommun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Interconnect bypass fraud detection: a case study
Annals of Telecommunications ( IF 1.9 ) Pub Date : 2020-09-19 , DOI: 10.1007/s12243-020-00808-w
Bruno Veloso , Shazia Tabassum , Carlos Martins , Raphael Espanha , Raul Azevedo , João Gama

The high asymmetry of international termination rates is fertile ground for the appearance of fraud in telecom companies. International calls have higher values when compared with national ones, which raises the attention of fraudsters. In this paper, we present a solution for a real problem called interconnect bypass fraud, more specifically, a newly identified distributed pattern that crosses different countries and keeps fraudsters from being tracked by almost all fraud detection techniques. This problem is one of the most expressive in the telecommunication domain, and it has some abnormal behaviours like the occurrence of a burst of calls from specific numbers. Based on this assumption, we propose the adoption of a new fast forgetting technique that works together with the Lossy Counting algorithm. We apply frequent set mining to capture distributed patterns from different countries. Our goal is to detect as soon as possible items with abnormal behaviours, e.g., bursts of calls, repetitions, mirrors, distributed behaviours and a small number of calls spread by a vast set of destination numbers. The results show that the application of different techniques improves the detection ratio and not only complements the techniques used by the telecom company but also improves the performance of the Lossy Counting algorithm in terms of run-time, memory used and sensibility to detect the abnormal behaviours. Additionally, the application of frequent set mining allows us to capture distributed fraud patterns.



中文翻译:

互连绕过欺诈检测:案例研究

国际终止率的高度不对称为电信公司出现欺诈行为提供了沃土。与国内电话相比,国际电话具有更高的价值,这引起了欺诈者的注意。在本文中,我们提出了一个解决实际问题的解决方案,称为互连绕过欺诈,更具体地说,是一种新近确定的分布模式,该模式跨越不同国家,并且使欺诈者几乎不受所有欺诈检测技术的跟踪。此问题是电信领域中最具代表性的问题,并且具有某些异常行为,例如发生了来自特定号码的突发呼叫。基于此假设,我们建议采用一种新的快速遗忘技术,该技术可与有损计数算法配合使用。我们应用频繁集合挖掘来捕获来自不同国家的分布式模式。我们的目标是尽快发现异常行为的项目,例如突发的呼叫,重复,镜像,分散的行为以及由大量目的地号码散布的少量呼叫。结果表明,不同技术的应用提高了检测率,不仅补充了电信公司使用的技术,而且从运行时间,使用的内存和检测异常行为的敏感性方面提高了有损计数算法的性能。 。此外,频繁集挖掘的应用使我们能够捕获分布式欺诈模式。重复,镜像,分散的行为以及由大量目标号码散布的少量呼叫。结果表明,不同技术的应用提高了检测率,不仅补充了电信公司使用的技术,而且从运行时间,所用内存和检测异常行为的敏感性方面提高了有损计数算法的性能。 。此外,频繁集挖掘的应用使我们能够捕获分布式欺诈模式。重复,镜像,分散的行为以及由大量目标号码散布的少量呼叫。结果表明,不同技术的应用提高了检测率,不仅补充了电信公司使用的技术,而且从运行时间,使用的内存和检测异常行为的敏感性方面提高了有损计数算法的性能。 。此外,频繁集挖掘的应用使我们能够捕获分布式欺诈模式。结果表明,不同技术的应用提高了检测率,不仅补充了电信公司使用的技术,而且从运行时间,使用的内存和检测异常行为的敏感性方面提高了有损计数算法的性能。 。此外,频繁集挖掘的应用使我们能够捕获分布式欺诈模式。结果表明,不同技术的应用提高了检测率,不仅补充了电信公司使用的技术,而且从运行时间,使用的内存和检测异常行为的敏感性方面提高了有损计数算法的性能。 。此外,频繁集挖掘的应用使我们能够捕获分布式欺诈模式。

更新日期:2020-09-20
down
wechat
bug