1,081 research outputs found

    Empirical analysis of ensemble methods for the classification of robocalls in telecommunications

    Get PDF
    With the advent of technology, there has been an excessive use of cellular phones. Cellular phones have made life convenient in our society. However, individuals and groups have subverted the telecommunication devices to deceive unwary victims. Robocalls are quite prevalent these days and they can either be legal or used by scammers to trick one out of their money. The proposed methodology in the paper is to experiment two ensemble models on the dataset acquired from the Federal Trade Commission(DNC Dataset). It is imperative to analyze the call records and based on the patterns the calls can classify as a robocall or not a robocall. Two algorithms Random Forest and XgBoost are combined in two ways and compared in the paper in terms of accuracy, sensitivity and the time taken

    Fraud Detection in Telecommunications Industry: Bridging the Gap with Random Rough Subspace Based Neural Network Ensemble Method

    Get PDF
    Fraud has been very common in the society and it affects private enterprises as well as public entities. Telecommunication companies worldwide suffer from customers who use the provided services without paying. There are also different types of telecommunication fraud such as subscription fraud, clip on fraud, call forwarding, cloning fraud, roaming fraud and calling card fraud. Thus, detection and prevention of these frauds are the main targets of the telecommunication industry. This paper addresses the various techniques of detecting fraud, giving the limitations of each technique and proposes random rough subspace-based neural network ensemble method for effective fraud detection. Keywords: Fraud, Fraud detection, Random rough subspace, Neural network, Telecommunication

    Consumer-facing technology fraud : economics, attack methods and potential solutions

    Get PDF
    The emerging use of modern technologies has not only benefited society but also attracted fraudsters and criminals to misuse the technology for financial benefits. Fraud over the Internet has increased dramatically, resulting in an annual loss of billions of dollars to customers and service providers worldwide. Much of such fraud directly impacts individuals, both in the case of browser-based and mobile-based Internet services, as well as when using traditional telephony services, either through landline phones or mobiles. It is important that users of the technology should be both informed of fraud, as well as protected from frauds through fraud detection and prevention systems. In this paper, we present the anatomy of frauds for different consumer-facing technologies from three broad perspectives - we discuss Internet, mobile and traditional telecommunication, from the perspectives of losses through frauds over the technology, fraud attack mechanisms and systems used for detecting and preventing frauds. The paper also provides recommendations for securing emerging technologies from fraud and attacks

    Hybrid Strategy of Analysis and Control of Telecommunications Frauds

    Full text link

    A Comprehensive Survey of Data Mining-based Fraud Detection Research

    Full text link
    This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines the professional fraudster, formalises the main types and subtypes of known fraud, and presents the nature of data evidence collected within affected industries. Within the business context of mining the data to achieve higher cost savings, this research presents methods and techniques together with their problems. Compared to all related reviews on fraud detection, this survey covers much more technical articles and is the only one, to the best of our knowledge, which proposes alternative data and solutions from related domains.Comment: 14 page

    Regulatory Recommendations for Fraud Problem in The Turkish Telecommunication Sector

    Get PDF
    Fraud has been a persistent issue throughout human history. As technology continues to advance in various fields, fraudulent activities adapt and evolve accordingly. The telecommunication industry, in particular, has undergone significant transformations since the early 2000s with the advent of mobile technologies. It is evident that telecommunication fraud has seen a substantial increase during this time, leading to serious financial and reputational damage. Therefore, combating and preventing fraud has become a crucial task in the telecommunication sector, as it is in all industries. This study delves into the topic of fraud, with a particular emphasis on telecommunication fraud. It investigates the experiences and efforts made to minimize and prevent fraud globally. Additionally, the study includes a focus group analysis involving two mobile operators in Turkey, aiming to understand the current situation and industry expectations concerning telecommunication fraud within the country. After evaluating the information gathered and examining the existing efforts, the study offers a series of regulatory recommendations for reducing and preventing fraud in the Turkish telecommunication sector

    A framework for internal fraud risk reduction at it integrating business processes : the IFR² framework

    Get PDF
    Fraud is a million dollar business and it is increasing every year. Both internal and external fraud present a substantial cost to our economy worldwide. A review of the academic literature learns that the academic community only addresses external fraud and how to detect this type of fraud. Little or no effort to our knowledge has been put in investigating how to prevent ánd to detect internal fraud, which we call ‘internal fraud risk reduction’. Taking together the urge for research in internal fraud and the lack of it in academic literature, research to reduce internal fraud risk is pivotal. Only after having a framework in which to implement empirical research, this topic can further be investigated. In this paper we present the IFR² framework, deduced from both the academic literature and from current business practices, where the core of this framework suggests to use a data mining approach.El fraude es un negocio millonario y está aumentando cada año. Tanto el fraude interno como el externo presentan un coste considerable para nuestra economía en todo el mundo. Este artículo sobre la literatura académica enseña que la comunidad académica solo se dirige al fraude externo, y cómo se detecta este tipo de fraude. Que sepamos, se ha hecho poco o ningún esfuerzo en investigar cómo evitar y detectar el fraude interno, al que llamamos ‘reducción del riesgo de fraude interno’. Teniendo en cuenta la urgencia de investigar el fraude interno, y la ausencia de ello en la literatura académica, la investigación para reducir este tipo de fraude es esencial. Este tema puede ser aún investigado con mayor profundidad solo después de tener un marco, en el que implementar investigación empírica. En este artículo, presentamos el marco IFR, deducido tanto de la literatura académica como de las prácticas empresariales actuales, donde el foco del marco sugiere usar un enfoque de extracción de datos

    A Framework for Internal Fraud Risk Reduction at IT Integrating Business Processes: The IFR² Framework

    Full text link

    Encapsulation of Soft Computing Approaches within Itemset Mining a A Survey

    Get PDF
    Data Mining discovers patterns and trends by extracting knowledge from large databases. Soft Computing techniques such as fuzzy logic, neural networks, genetic algorithms, rough sets, etc. aims to reveal the tolerance for imprecision and uncertainty for achieving tractability, robustness and low-cost solutions. Fuzzy Logic and Rough sets are suitable for handling different types of uncertainty. Neural networks provide good learning and generalization. Genetic algorithms provide efficient search algorithms for selecting a model, from mixed media data. Data mining refers to information extraction while soft computing is used for information processing. For effective knowledge discovery from large databases, both Soft Computing and Data Mining can be merged. Association rule mining (ARM) and Itemset mining focus on finding most frequent item sets and corresponding association rules, extracting rare itemsets including temporal and fuzzy concepts in discovered patterns. This survey paper explores the usage of soft computing approaches in itemset utility mining
    corecore