13 research outputs found

    An Approach to Rules based Fraud Management in Emerging Converged Networks

    Get PDF
    This paper examines the problem of managing fraud in emerging converged networks and presents work in progress on implementing a rules based fraud detection system for deployment in a testbed environment. This is done by examining the state of the art in telecoms fraud management and adapting this to emerging IP-based networks and services. Features of this fraud detection implementation include the use of flexible data formats and spreadsheet/workbookbased rules specification with the capability to apply arbitrarily complex rules

    A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam

    Get PDF
    The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to new filtering techniques and the lack of incentive for mail domains to filter outgoing spam. This paper describes a new approach to spam protection based on distributed trust management. This is motivated by the fact that the SMTP mail infrastructure is managed in a distributed way by a community of mail domain administrators. A trust overlay architecture and a new protocol are presented. The TOPAS protocol specifies how experiences and recommendations are communicated between a spam filter at each mail domain and its associated trust manager, and between trust managers of different mail servers. A technique for improving mail filtering using these trust measures is also described. Initial simulations indicate the potential of this approach to improve rates of false positives and false negatives in anti-spam systems

    Flexible Multi-Service Telecommunications Accounting System

    Get PDF
    Due to market deregulation and technological advances, a multi-service broadband environment is emerging, generating a requirement for a new approach to pricing systems. This paper presents such an approach and describes a working implementation of an innovative and flexible multi-service accounting system. The system is based on a mature understanding of the nature of charging algorithms, and is implemented as a set of interoperating distributed components. At the heart of the system is a rating engine built around a service portfolio, tying together spreadsheet specification of arbitrarily complex services, charging algorithms and tariff tables. The very wide range of service delivery technologies in existence motivates the design of a system that is independent of proprietary formats and based on a dynamic service portfolio structure and a generic service detail record definition

    A Trust Based System for Enhanced Spam Filtering

    Full text link

    Integrating Players, Reputation and Ranking to Manage Cheating in MMOGs

    Get PDF
    In this paper, we propose an approach that uses in-game reputation as a solution to the problem of cheating in massively multiplayer online games. What constitutes cheating is however quite context-specific and subjective, and there is no universal view. Thus our approach aims to adjust to the particular forms of cheating to which players object rather than deciding a priori which forms of cheating should be controlled. The main feature of our approach is an architecture and model for maintaining player-based and context-appropriate trust and reputation measures, with the integration of these into the game’s ranking system. When an avatar loses reputation, our approach intervenes to reduce its ranking. It is envisaged that players will come to attach value to reputation in its own right. We also present the results of relatively large-scale simulations of various scenarios involving sequences of encounters between players, with an initial implementation of our reputation and ranking model in place, to observe the impact on cheaters (and non-cheaters)

    Securing mobile services

    Get PDF
    This paper reports on some initial findings of the EU IST SEINIT project with respect to the security of end-to-end services over the wireless access and fixed network and captures the state of the art in secure mobile services infrastructures

    A service-centric approach to access control and monitoring based on distributed trust

    No full text
    A service-oriented approach to dynamic refinement of security enforcement is described in this paper. This is based on a closed loop feedback system where live distributed trust measures are used to adapt access control settings in a changing threat environment. A general trust overlay architecture and model are presented. Some specific application scenarios are discussed, in particular spam filtering and distributed intrusion detection in mobile ad hoc networks. It is shown using simulations of some specific scenarios that this dynamic system is robust and has the potential to enhance security and access control efficiency

    Flexible Multi-Service Telecommunications Accounting System

    Get PDF
    Due to market deregulation and technological advances, a multi-service broadband environment is emerging, generating a requirement for a new approach to pricing systems. This paper presents such an approach and describes a working implementation of an innovative and flexible multi-service accounting system. The system is based on a mature understanding of the nature of charging algorithms, and is implemented as a set of interoperating distributed components. At the heart of the system is a rating engine built around a service portfolio, tying together spreadsheet specification of arbitrarily complex services, charging algorithms and tariff tables. The very wide range of service delivery technologies in existence motivates the design of a system that is independent of proprietary formats and based on a dynamic service portfolio structure and a generic service detail record definition

    Addressing Fraud Detection and Management in Next-Generation Telecommunications Networks

    No full text
    This paper examines the problem of detecting and managing fraud in next-generation telecommunications networks and presents work in progress on implementing a rules-based fraud detection system. The motivations for committing fraud and the different types of fraud that can be perpetrated in next generation networks are examined. The fraud detection system provides an interface that allows users to enter rules that describe possible fraud scenarios. If a rule proves true, an alert is raised indicating that the analyzed record warrants more attention. Features of the system include the use of flexible data formats, spreadsheet based rules specification and the deployment of data reduction techniques to efficiently profile user behavior
    corecore