FRAUD DETECTION IN MOBILE COMMUNICATIONS NETWORKS USING USER PROFILING AND CLASSIFICATION TECHNIQUES

Fraud detection is an important application, since network operators lose a relevant portion of their revenue to fraud. The intentions of mobile phone users cannot be well observed except through the call data. The call data is used in describing behavioural patterns of users. Neural networks and probabilistic models are employed in learning these usage patterns from call data by detecting changes in established usage patterns or to recognize typical usage patterns of fraud. The methods are shown to be effective in detecting fraudulent behaviour by empirically testing the methods with data from real mobile communications networks. Keywords: Call data, fraud detection, neural networks, probabilistic models, user profiling

[1]  Huseyin Cavusoglu,et al.  Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches , 2004, Decis. Anal..

[2]  Jaakko Hollmén,et al.  User profiling and classification for fraud detection in mobile communications networks , 2000 .

[3]  李幼升,et al.  Ph , 1989 .

[4]  John Shawe-Taylor,et al.  Detecting Cellular Fraud Using Adaptive Prototypes. , 1997, AAAI 1997.

[5]  R. Shortland,et al.  Data mining applications in BT , 1995 .

[6]  Sandeep Kumar,et al.  Classification and detection of computer intrusions , 1996 .

[7]  Volker Tresp,et al.  Fraud detection in communication networks using neural and probabilistic methods , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[8]  Samuel Kaski,et al.  Bibliography of Self-Organizing Map (SOM) Papers: 1981-1997 , 1998 .

[9]  M. V. Velzen,et al.  Self-organizing maps , 2007 .

[10]  G. McLachlan,et al.  The EM algorithm and extensions , 1996 .

[11]  Ray J. Frank,et al.  The detection of fraud in mobile phone networks , 1996 .

[12]  Lynne Pearce Beating the bugs. , 2004, Nursing standard (Royal College of Nursing (Great Britain) : 1987).

[13]  Michael I. Jordan,et al.  On Convergence Properties of the EM Algorithm for Gaussian Mixtures , 1996, Neural Computation.

[14]  Olli Simula,et al.  Process Monitoring and Modeling Using the Self-Organizing Map , 1999, Integr. Comput. Aided Eng..

[15]  Wang Da-zhen,et al.  Fraud Detection in Mobile Communication Networks , 2004 .

[16]  Tom Fawcett,et al.  Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.

[17]  Volker Tresp,et al.  Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model , 1998, NIPS.

[18]  David J. Spiegelhalter,et al.  Probabilistic Networks and Expert Systems , 1999, Information Science and Statistics.

[19]  Harry L. Van Trees,et al.  Detection, Estimation, and Modulation Theory, Part I , 1968 .

[20]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .