Agent-Based Behavioural Modelling for Anomaly Detection in Call Data from Telecommunication Networks

Anomaly detection in telecommunications data tries to discover deviant behaviour of individual subscribers, including for example: detection of inconsistencies in call data, such as customer churn or attrition, potential fraud, deliberate or unintended expensive mistakes in call data, and so on. These have consequently led to unquantifiable loss of revenue to many telecommunication networks world-wide. Although the intentions of most subscribers to these networks are unknown when making phone calls, their service consumption pattern is reflected in their call data. Recent studies have investigated the challenges of anomaly detection but have not given conclusive solutions to address this problem holistically. In this work, we infer that if appropriate anomaly indicators for individual subscribers are used for detection, the true positive rates of the approaches can be maximized, while the false alarms can be minimized. The challenge addressed in this research is to find a technique of efficiently identifying the indicators that facilitate anomaly detection methods, providing qualitative knowledge. This knowledge will assist analysts and managers in explanatory, exploratory and decision making activities. We address this challenge by using an Agent-Based Behavioural Bayesian Network (BBN). This BBN models an individual subscriber by using an evolutionary algorithm, and anomaly indicators are identified through emergent behaviour. Hence, our implementation results for land-line subscribers provide a general approach of improving the detection qualities of existing anomaly detection methods in telecommunication networks.

[1]  G. Mann The Quark and the Jaguar: adventures in the simple and the complex , 1994 .

[2]  J. Sutherland The Quark and the Jaguar , 1994 .

[3]  M. Zwick Wholes and Parts in General Systems Methodology , 2001 .

[4]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[5]  Volker Tresp,et al.  Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model , 1998, NIPS.

[6]  Tom Fawcett,et al.  Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.

[7]  Catherine Bounsaythip,et al.  Overview of Data Mining for Customer Behavior Modeling , 2001 .

[8]  Karlton David Sequeira,et al.  ANOMALY-BASED DATA MINING OF INTRUSIONS , 2002 .

[9]  Diane Lambert,et al.  Detecting fraud in the real world , 2002 .

[10]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[11]  Judea Pearl,et al.  Probabilistic reasoning in intelligent systems , 1988 .

[12]  Judea Pearl,et al.  Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.

[13]  Iqbal Adjali,et al.  Agent Based Customer Modelling , 1999 .

[14]  Stephen D. Bay,et al.  Mining distance-based outliers in near linear time with randomization and a simple pruning rule , 2003, KDD '03.

[15]  David J. C. MacKay,et al.  Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.

[16]  Wander Jager,et al.  An integrated approach of simulating behavioral processes , 1999 .

[17]  Szymon Jaroszewicz,et al.  Interestingness of frequent itemsets using Bayesian networks as background knowledge , 2004, KDD.

[18]  L. Goddard Information Theory , 1962, Nature.

[19]  Nils J. Nilsson,et al.  Artificial Intelligence , 1974, IFIP Congress.

[20]  Yizhak Idan,et al.  Discovery of fraud rules for telecommunications—challenges and solutions , 1999, KDD '99.

[21]  John Shawe-Taylor,et al.  Fraud detection and management in mobile telecommunications networks , 1997 .