Quarter-Sphere Support Vector Machine for Fraud Detection in Mobile Telecommunication Networks

Abstract This paper addresses the problem of finding out fraudulent calls of mobile phone users by comparing the most recent call patterns with their past usage patterns. We have modeled the user's profile based on the most relevant fraud detection features like call duration, call type, call frequency along with location and time data. The Reality Mining dataset has been used for testing the efficiency of the proposed methodology. In this work, we discriminate the malicious behavior of users from the normal behavior by training on Support Vector Machine (SVM) classifier. An anomaly is detected when the current pattern of a user (subject) does not match with any of the individual's normal patterns. We have also focused on the improvement of the classifier by applying the concept of Quarter-Sphere SVM. The Quarter Sphere-SVM is a formulation of One-Class SVM, supported by Support Vector Data Description which helps the SVM in unsupervised learning. Our experiments show promising results in terms of detecting fraudulent calls without raising too many false alarms.

[1]  Volker Tresp,et al.  Fraud detection in communication networks using neural and probabilistic methods , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[2]  John Shawe-Taylor,et al.  An Unsupervised Neural Network Approach to Profiling the Behavior of Mobile Phone Users for Use in Fraud Detection , 2001, J. Parallel Distributed Comput..

[3]  Shamik Sural,et al.  Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks , 2007, ACISP.

[4]  Klaus-Robert Müller,et al.  Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines , 2004 .

[5]  I. Jolliffe Principal Component Analysis , 2002 .

[6]  Peter Hoath Telecoms fraud, the gory details , 1998 .

[7]  Nan Jiang,et al.  Isolating and analyzing fraud activities in a large cellular network via voice call graph analysis , 2012, MobiSys '12.

[8]  Ronald J. Brachman,et al.  Brief Application Description; Visual Data Mining: Recognizing Telephone Calling Fraud , 2004, Data Mining and Knowledge Discovery.

[9]  Zhi Xu,et al.  A Specification Based Intrusion Detection Framework for Mobile Phones , 2011, ACNS.

[10]  Defeng Wang,et al.  Structured One-Class Classification , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[11]  Saman A. Zonouz,et al.  A cloud-based intrusion detection and response system for mobile phones , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

[12]  Ruoming Jin,et al.  Efficient location aware intrusion detection to protect mobile devices , 2012, Personal and Ubiquitous Computing.

[13]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[14]  Robert P. W. Duin,et al.  Support Vector Data Description , 2004, Machine Learning.

[15]  Corinna Cortes,et al.  Support-Vector Networks , 1995, Machine Learning.

[16]  Joos Vandewalle,et al.  Detection of Mobile Phone Fraud Using Supervised Neural Networks: A First Prototype , 1997, ICANN.