Security management against cloning mobile phones

This work presents the development of a distributed security management system for telecommunication networks. The system consists in reducing the use of cloned mobile telephones using three main techniques: (1) an ISO formal technique (LOTOS) is used to specify and validate the system; (2) a pattern recognition technique is used to classify the telephone users into classes in order to identify if a call does not correspond to the patterns of a specific user; and (3) a distributed object technique is used for the implementation of this distributed system (i.e., manager and agents).