A Study of Fraud Types, Challenges and Detection Approaches in Telecommunication
Subject Areas : Machine learningKasra Babaei 1 , ZhiYuan Chen 2 , Tomas Maul 3
1 - University of Nottingham Malaysia
2 - University of Nottingham Malaysia
3 - University of Nottingham Malaysia
Keywords: Fraud Detection, , Machine Learning, , Telecommunication, ,
Abstract :
Fraudulent activities have been rising globally resulting companies losing billions of dollars that can cause severe financial damages. Various approaches have been proposed by researchers in different applications. Studying these approaches can help us obtain a better understanding of the problem. The aim of this paper is to investigate different aspects of fraud prevention and detection in telecommunication. This study presents a review of different fraud categories in telecommunication, the challenges that hinder the detection process, and some proposed solutions to overcome them. Also, the performance of some of the state-of-the-art approaches is reported followed by our guideline and recommendation in choosing the best metrics.
[1] W. Henecka and M. Roughan, “Privacy-Preserving Fraud Detection Across Multiple Phone Record Databases,” Dependable Secur. Comput. IEEE Trans., vol. 12, no. 6, pp. 640–651, Nov. 2015.
[2] E. I. Tarmazakov and D. S. Silnov, “Modern approaches to prevent fraud in mobile communications networks,” in Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018, 2018, vol. 2018-Janua, pp. 379–381.
[3] M. Pejic-Bach, “Invited Paper: Profiling Intelligent Systems Applications in Fraud Detection and Prevention: Survey of Research Articles,” in 2010 International Conference on Intelligent Systems, Modelling and Simulation, 2010, pp. 80–85.
[4] Y.-J. Zheng, X.-H. Zhou, W.-G. Sheng, Y. Xue, and S.-Y. Chen, “Generative adversarial network based telecom fraud detection at the receiving bank,” Neural Networks, vol. 102, pp. 78–86, 2018.
[5] M. Behdad, L. Barone, M. Bennamoun, and T. French, “Nature-Inspired Techniques in the Context of Fraud Detection,” IEEE Trans. Syst. Man, Cybern. Part C (Applications Rev., vol. 42, no. 6, pp. 1273–1290, Nov. 2012.
[6] A. Abdallah, M. A. Maarof, and A. Zainal, “Fraud detection system: A survey,” J. Netw. Comput. Appl., vol. 68, pp. 90–113, 2016.
[7] J. West and M. Bhattacharya, “Intelligent financial fraud detection: A comprehensive review,” Comput. Secur., vol. 57, pp. 47–66, 2016.
[8] R. J. Bolton and D. J. Hand, “Statistical Fraud Detection: A Review,” Stat. Sci., vol. 17, no. 3, pp. 235–255, 2002.
[9] Y. Kou, C.-T. Lu, S. Sirwongwattana, and Y.-P. Huang, “Survey of fraud detection techniques,” in Networking, Sensing and Control, 2004 IEEE International Conference on, 2004, vol. 2, pp. 749-754 Vol.2.
[10] S. Wang, “A comprehensive survey of data mining-based accounting-fraud detection research,” in 2010 International Conference on Intelligent Computation Technology and Automation, ICICTA 2010, 2010, vol. 1, pp. 50–53.
[11] A. H. Elmi, S. Ibrahim, and R. Sallehuddin, “Detecting SIM Box Fraud Using Neural Network,” in IT Convergence and Security 2012, J. K. Kim and K.-Y. Chung, Eds. Dordrecht: Springer Netherlands, 2013, pp. 575–582.
[12] P. Gosset and M. Hyland, “Classification, detection and prosecution of fraud in mobile networks,” Proc. ACTS Mob. summit, Sorrento, Italy, 1999.
[13] V. Jain, “Perspective analysis of telecommunication fraud detection using data stream analytics and neural network classification based data mining,” Int. J. Inf. Technol., vol. 9, no. 3, pp. 303–310, 2017.
[14] H. M. Marah, O. M. Elrajubi, and A. A. Abouda, “Fraud detection in international calls using fuzzy logic,” in Proceedings - International Conference on Computer Vision and Image Analysis Applications, ICCVIA 2015, 2015.
[15] L. Cortesão, F. Martins, A. Rosa, and P. Carvalho, “Fraud management systems in telecommunications: a practical approach,” in 12th International Conference on Telecommunications, 2005, pp. 167–182.
[16] T. Fawcett and F. Provost, “Adaptive Fraud Detection,” Data Min. Knowl. Discov., vol. 1, no. 3, pp. 291–316, 1997.
[17] C. S. Hilas and J. N. Sahalos, “An Application of Decision Trees for Rule Extraction Towards Telecommunications Fraud Detection,” in Knowledge-Based Intelligent Information and Engineering Systems: 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part II, B. Apolloni, R. J. Howlett, and L. Jain, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007, pp. 1112–1121.
[18] J. Lopes, O. Belo, and C. Vieira, “Applying User Signatures on Fraud Detection in Telecommunications Networks,” in Advances in Data Mining. Applications and Theoretical Aspects: 11th Industrial Conference, ICDM 2011, New York, NY, USA, August 30 -- September 3, 2011.
Proceedings, P. Perner, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 286–299.
[19] P. Saravanan, V. Subramaniyaswamy, N. Sivaramakrishnan, M. Arun Prakash, and T. Arunkumar, “Data mining approach for subscription-fraud detection in telecommunication sector,” Contemp. Eng. Sci., vol. 7, no. 9–12, pp. 515–522, 2014.
[20] P. A. Estévez, C. M. Held, and C. A. Perez, “Subscription fraud prevention in telecommunications using fuzzy rules and neural networks,” Expert Syst. Appl., vol. 31, no. 2, pp. 337–344, 2006.
[21] F. M. Kau and O. P. Kogeda, “Impact of Subscription Fraud in Mobile Telecommunication Companies,” in 2019 Open Innovations (OI), 2019, pp. 42–47.
[22] S. Patnaik, S. Subudhi, and S. Panigrahi, “Quarter-Sphere Support Vector Machine for Fraud Detection in Mobile Telecommunication Networks,” Procedia Comput. Sci., vol. 48, pp. 353–359, 2015.
[23] M. I. M. Yusoff, I. Mohamed, and M. R. A. Bakar, “Fraud detection in telecommunication industry using Gaussian mixed model,” in 2013 International Conference on Research and Innovation in Information Systems (ICRIIS), 2013, pp. 27–32.
[24] M. Arafat, A. Qusef, and G. Sammour, “Detection of Wangiri Telecommunication Fraud Using Ensemble Learning,” in 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), 2019, pp. 330–335.
[25] G. Phil and H. Mark, “Classification Detection and Prosecution of Fraud on Mobile Networks,” in Proceedings of ACTS Mobile Summit, Sorrento Italy, 1999.
[26] S. Kamas and M. A. Aydin, “SPIT detection and prevention,” Istanbul Univ. - J. Electr. Electron. Eng., vol. 17, pp. 3213–3218, 2017.
[27] L. Carvajal, L. Chen, C. Varol, and D. Rawat, “Detecting unprotected SIP-based Voice over IP traffic,” in 4th International Symposium on Digital Forensics and Security, ISDFS 2016 - Proceeding, 2016, pp. 44–48.
[28] G. Cho, J. Cho, Y. Song, D. Choi, and H. Kim, “Combating online fraud attacks in mobile-based advertising,” Eurasip J. Inf. Secur., vol. 2016, no. 1, pp. 1–9, 2016.
[29] M. Yelland, “Fraud in mobile networks,” Comput. Fraud Secur., vol. 2013, no. 3, pp. 5–9, 2013.
[30] H. Farvaresh and M. M. Sepehri, “A data mining framework for detecting subscription fraud in telecommunication,” Eng. Appl. Artif. Intell., vol. 24, no. 1, pp. 182–194, 2011.
[31] L. P. Mendes, J. Dias, and P. Godinho, “Bi-level clustering in telecommunication fraud,” in ICORES 2012 - Proceedings of the 1st International Conference on Operations Research and Enterprise Systems, 2012, pp. 126–131.
[32] D. Olszewski, “Fraud detection using self-organizing map visualizing the user profiles,” Knowledge-Based Syst., vol. 70, pp. 324–334, 2014.
[33] D. Olszewski, “A probabilistic approach to fraud detection in telecommunications,” Knowledge-Based Syst., vol. 26, pp. 246–258, 2012.
[34] C. S. Hilas and J. N. Sahalos, “User profiling for fraud detection in telecommunication networks,” in In: 5th Int. Conf. technology and automation, 2005, pp. 382–387.
[35] R. Sallehuddin, S. Ibrahim, A. M. Zain, and A. H. Elmi, “Detecting SIM box fraud by using support vector machine and artificial neural network,” J. Teknol., vol. 74, no. 1, pp. 137–149, 2015.
[36] J. Gama, I. Zliobaite, A. Bifet, M. Pechenizkiy, and A. Bouchachia, “A survey on concept drift adaptation,” ACM Comput. Surv., vol. 46, no. 4, pp. 44:1--44:37, Mar. 2014.
[37] Z. Shaeiri, J. Kazemitabar, S. Bijani, and M. Talebi, “Behavior-Based Online Anomaly Detection for a Nationwide Short Message Service,” J. AI Data Min., vol. 7, no. 2, pp. 239–247, 2019.
[38] L. Manunza, S. Marseglia, and S. P. Romano, “Kerberos: A real-time fraud detection system for IMS-enabled VoIP networks,” J. Netw. Comput. Appl., vol. 80, pp. 22–34, 2017.
[39] K.-I. Kim, T. Kim, N.-W. Cho, and M. Kim, “Toll Fraud Detection of VoIP Service Networks in Ubiquitous Computing Environments,” Int. J. Distrib. Sens. Networks, vol. 2015, 2015.
[40] J. Li, K.-Y. Huang, J. Jin, and J. Shi, “A survey on statistical methods for health care fraud detection,” Health Care Manag. Sci., vol. 11, no. 3, pp. 275–287, 2008.
[41] C. S. Hilas, “Designing an expert system for fraud detection in private telecommunications networks,” Expert Syst. Appl., vol. 36, no. 9, pp. 11559–11569, 2009.
[42] K. C. Cox, S. G. Eick, G. J. Wills, and R. J. Brachman, “Brief Application Description; Visual Data Mining: Recognizing Telephone Calling Fraud,” Data Min. Knowl. Discov., vol. 1, no. 2, pp. 225–231, 1997.
[43] W. N. Dilla and R. L. Raschke, “Data visualization for fraud detection: Practice implications and a call for future research,” Int. J. Account. Inf. Syst., vol. 16, pp. 1–22, 2015.
[44] J. A. Lasserre, C. M. Bishop, and T. P. Minka, “Principled Hybrids of Generative and Discriminative Models,” in 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’06), 2006, vol. 1, pp. 87–94.
[45] C. S. Hilas and J. N. Sahalos, “Testing the fraud detection ability of different user profiles by means of FF-NN classifiers,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 4132 LNCS, pp. 872–883, 2006.
[46] C. S. Hilas and P. A. Mastorocostas, “An application of supervised and unsupervised learning approaches to telecommunications fraud detection,” Knowledge-Based Syst., vol. 21, no. 7, pp. 721–726, 2008.
[47] S. S. Rajani and M. Padmavathamma, “A Model for Rule Based Fraud Detection in Telecommunications,” in International Journal of Engineering Research and Technology, 2012, vol. 1, no. 5 (July-2012).
[48] V. Chandola, A. Banerjee, and V. Kumar, “Anomaly Detection: A Survey,” ACM Comput. Surv., vol. 41, no. 3, pp. 15:1--15:58, Jul. 2009.
[49] J. Tamboli and M. Shukla, “A survey of outlier detection algorithms for data streams,” in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016, pp. 3535–3540.
[50] C. Hilas, P. Mastorocostas, and I. Rekanos, “Clustering of telecommunications user profiles for fraud detection and security enhancement in large corporate networks: a case study,” Appl. Math. Inf. Sci., vol. 9, pp. 1709–1718, 2015.
[51] J. Hollmén and V. Tresp, “Call-based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-switching Model,” in Proceedings of the 1998 Conference on Advances in Neural Information Processing Systems II, 1999, pp. 889–895.
[52] X. Zhu and A. B. Goldberg, “Introduction to semi-supervised learning,” Synth. Lect. Artif. Intell. Mach. Learn., vol. 3, no. 1, pp. 1–130, 2009.
[53] A. Daneshpazhouh and A. Sami, “Semi-Supervised Outlier Detection with Only Positive and Unlabeled Data Based on Fuzzy Clustering,” Int. J. Artif. Intell. Tools, vol. 24, no. 03, p. 1550003, 2015.
[54] D. Olszewski, “Fraud Detection in Telecommunications Using Kullback-Leibler Divergence and Latent Dirichlet Allocation,” in Adaptive and Natural Computing Algorithms, 2011, pp. 71–80.
[55] A. Chouiekh and E. L. H. I. E. L. Haj, “ConvNets for Fraud Detection analysis,” Procedia Comput. Sci., vol. 127, pp. 133–138, 2018.
[56] A. Tsymbal, “The Problem of Concept Drift: Definitions and Related Work,” 2004.
[57] J. L. Lobo, J. Del Ser, M. N. Bilbao, I. Laña, and S. Salcedo-Sanz, “A probabilistic sample matchmaking strategy for imbalanced data streams with concept drift,” Stud. Comput. Intell., vol. 678, pp. 237–246, 2017.
[58] S. Augustin et al., “Telephony fraud detection in next generation networks,” in AICT 2012 - 8th Advanced International Conference on Telecommunications, 2012, pp. 203–207.
[59] Y. Alraouji and A. Bramantoro, “International call fraud detection systems and techniques,” in MEDES 2014 - 6th International Conference on Management of Emergent Digital EcoSystems, Proceedings, 2014, pp. 159–166.
[60] X. Liu and X. Wang, “A Network Embedding Based Approach for Telecommunications Fraud Detection,” in Cooperative Design, Visualization, and Engineering, 2018, pp. 229–236.
[61] G. Kaiafas, C. Hammerschmidt, R. State, C. D. Nguyen, T. Ries, and M. Ourdane, “An Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier Ensembles,” in 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2019, pp. 37–42.
[62] N. Ruan, Z. Wei, and J. Liu, “Cooperative Fraud Detection Model With Privacy-Preserving in Real CDR Datasets,” IEEE Access, vol. 7, pp. 115261–115272, 2019.
[63] R. Klinkenberg, “Learning drifting concepts: Example selection vs. example weighting,” Intell. Data Anal., vol. 8, no. 3, pp. 281–300, 2004.
[64] A. D. Pozzolo, G. Boracchi, O. Caelen, C. Alippi, and G. Bontempi, “Credit card fraud detection and concept-drift adaptation with delayed supervised information,” in 2015 International Joint Conference on Neural Networks (IJCNN), 2015, pp. 1–8.
[65] Y. Yan, M. Chen, M.-L. Shyu, and S.-C. Chen, “Deep Learning for Imbalanced Multimedia Data Classification,” in Proceedings - 2015 IEEE International Symposium on Multimedia, ISM 2015, 2015, pp. 483–488.
[66] S. Al-Stouhi and C. K. Reddy, “Transfer learning for class imbalance problems with inadequate data,” Knowl. Inf. Syst., vol. 48, no. 1, pp. 201–228, 2016.
[67] N. V Chawla, N. Japkowicz, and A. Kotcz, “Editorial: Special Issue on Learning from Imbalanced Data Sets,” SIGKDD Explor. Newsl., vol. 6, no. 1, pp. 1–6, Jun. 2004.
[68] C. Phua, D. Alahakoon, and V. Lee, “Minority Report in Fraud Detection: Classification of Skewed Data,” SIGKDD Explor. Newsl., vol. 6, no. 1, pp. 50–59, Jun. 2004.
[69] R.-C. CHEN, T.-S. CHEN, and C.-C. LIN, “A new binary support vector system for increasing detection rate of credit card fraud,” Int. J. Pattern Recognit. Artif. Intell., vol. 20, no. 02, pp. 227–239, 2006.
[70] S.-C. Lin, Y. I. Chang, and W.-N. Yang, “Meta-learning for Imbalanced Data and Classification Ensemble in Binary Classification,” Neurocomput., vol. 73, no. 1–3, pp. 484–494, Dec. 2009.
[71] V. J. Hodge and J. Austin, “A Survey of Outlier Detection Methodologies,” Artif. Intell. Rev., vol. 22, no. 2, pp. 85–126, 2004.
[72] L.-A. Gottlieb, A. Kontorovich, and R. Krauthgamer, “Adaptive metric dimensionality reduction,” Theor. Comput. Sci., vol. 620, pp. 105–118, 2016.
[73] M. Sugiyama, “Local Fisher Discriminant Analysis for Supervised Dimensionality Reduction,” in Proceedings of the 23rd International Conference on Machine Learning, 2006, pp. 905–912.
[74] J. Miao and L. Niu, “A Survey on Feature Selection,” Procedia Comput. Sci., vol. 91, pp. 919–926, 2016.
[75] S. Agarwal, P. Ranjan, and R. Rajesh, “Dimensionality reduction methods classical and recent trends: A survey,” Int. J. Control Theory Appl., vol. 9, no. 10, pp. 4801–4808, 2016.
[76] A. Bănărescu, “Detecting and Preventing Fraud with Data Analytics,” Procedia Econ. Financ., vol. 32, pp. 1827–1836, 2015.
[77] M. M. Breunig, H.-P. Kriegel, R. T. Ng, and J. Sander, “LOF: Identifying Density-based Local Outliers,” SIGMOD Rec., vol. 29, no. 2, pp. 93–104, May 2000.
[78] C. Phua, V. C. S. Lee, K. Smith-Miles, and R. W. Gayler, “A Comprehensive Survey of Data Mining-based Fraud Detection Research,” CoRR, vol. abs/1009.6, 2010.
[79] B. Barbarioli and R. M. Assuncao, “Anomaly Detection under Cost Constraint,” in Proceedings - 2016 5th Brazilian Conference on Intelligent Systems, BRACIS 2016, 2016, pp. 247–252.
[80] G. Haixiang, L. Yijing, J. Shang, G. Mingyun, H. Yuanyue, and G. Bing, “Learning from class-imbalanced data: Review of methods and applications,” Expert Syst. Appl., vol. 73, pp. 220–239, 2017.
[81] Z. Chen, L. D. Van Khoa, E. N. Teoh, A. Nazir, E. K. Karuppiah, and K. S. Lam, “Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: a review,” Knowl. Inf. Syst., vol. 57, no. 2, pp. 245–285, Nov. 2018.
[82] T. Fawcett, “An introduction to {ROC} analysis,” Pattern Recognit. Lett., vol. 27, no. 8, pp. 861–874, 2006.
[83] J. Davis and M. Goadrich, “The Relationship Between Precision-Recall and ROC Curves,” in Proceedings of the 23rd International Conference on Machine Learning, 2006, pp. 233–240.
[84] P. Gogoi, D. K. Bhattacharyya, B. Borah, and J. K. Kalita, “A Survey of Outlier Detection Methods in Network Anomaly Identification,” Comput. J., 2011.
[85] R. Caruana and A. Niculescu-Mizil, “Data Mining in Metric Space: An Empirical Analysis of Supervised Learning Performance Criteria,” in Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004, pp. 69–78.
[86] A. Nawawi and A. S. A. P. Salin, “Employee fraud and misconduct: empirical evidence from a telecommunication company,” Inf. Comput. Secur., vol. 26, no. 1, pp. 129–144, 2018.