An Application of Decision Trees for Rule Extraction Towards Telecommunications Fraud Detection

Telecommunications fraud has drawn the attention in research due to the huge economic burden on companies and to the interesting aspect of users' behavior modeling. In the present paper, an application of decision trees to fraud detection is presented. The appropriate user behavior modeling is, also, discussed. The trees are used for rule extraction in order to distinguish between normal and fraudulent activities in a telecommunications network. Several real cases of defrauded user accounts are modeled by means of selected usage features. Decision trees are applied in order to identify the critical values that separate fraud from legal use. These thresholds are expressed in the form of rules that will be used in a rule based expert system.

[1]  J. Rissanen,et al.  Modeling By Shortest Data Description* , 1978, Autom..

[2]  Constantinos S. Hilas,et al.  Testing the Fraud Detection Ability of Different User Profiles by Means of FF-NN Classifiers , 2006, ICANN.

[3]  Wulfram Gerstner,et al.  Artificial Neural Networks — ICANN'97 , 1997, Lecture Notes in Computer Science.

[4]  David G. Stork,et al.  Pattern Classification , 1973 .

[5]  Ron Kohavi,et al.  A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.

[6]  Ron Kohavi,et al.  Irrelevant Features and the Subset Selection Problem , 1994, ICML.

[7]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[8]  Volker Tresp,et al.  Fraud detection in communication networks using neural and probabilistic methods , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[9]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.

[10]  David G. Stork,et al.  Pattern Classification (2nd ed.) , 1999 .

[11]  S. F. Hinde Call record analysis , 1996 .

[12]  Alberto Maria Segre,et al.  Programs for Machine Learning , 1994 .

[13]  Marc Toussaint,et al.  Extracting Motion Primitives from Natural Handwriting Data , 2006, ICANN.

[14]  Daniel A. Keim,et al.  On Knowledge Discovery and Data Mining , 1997 .

[15]  Larry A. Rendell,et al.  A Practical Approach to Feature Selection , 1992, ML.

[16]  Joos Vandewalle,et al.  Detection of Mobile Phone Fraud Using Supervised Neural Networks: A First Prototype , 1997, ICANN.

[17]  Peter Hoath Telecoms fraud, the gory details , 1998 .

[18]  Ronnie Alves,et al.  Discovering telecom fraud situations through mining anomalous behavior patterns , 2006 .

[19]  George H. John Enhancements to the data mining process , 1997 .

[20]  Wang Dong,et al.  A feature extraction method for fraud detection in mobile communication networks , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).

[21]  Tom Fawcett,et al.  Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.

[22]  Yizhak Idan,et al.  Discovery of fraud rules for telecommunications—challenges and solutions , 1999, KDD '99.