Detection of Wangiri Telecommunication Fraud Using Ensemble Learning

被引:0
作者
Arafat, Mais [1 ]
Qusef, Abdallah [1 ]
Sammour, George [1 ]
机构
[1] Princess Sumaya Univ Technol, King Hussein Sch Comp Sci, Amman, Jordan
来源
2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT) | 2019年
关键词
Telecommunication; Fraud; Detection; Wangiri; Data Mining; Machine Learning; Ensemble Learning; Classification;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fraudsters can manipulate telecom regulatory systems to their advantage, and to the disadvantage of the telecom operator, in ways that are difficult to detect, trace, and prosecute. A subscriber whose network has been compromised will often refuse to pay large fraudulent charges, leaving the operator to cover the bill resulting in revenue losses. Moreover, attacks frequently happen over holidays and weekends, when networks are often less monitored closely. This calls for an intelligent automated solution for telecom fraud detection. Wangiri (Japanese term) telecom fraud also referred to as "one ring and cut fraud" relies on this single ring method for a quick way to make money. Missed calls from unknown callers entice subscribers to call back unknowingly premium numbers where they are deceived to stay on the line for as long as possible in an effort to inflate their bill. This paper proposes the use of varied ensemble classifiers to overcome the highly biased dataset and help make a more precise classification in an efficient and effective manner. Extreme Gradient Boosting algorithm was found to have the best results in terms of correctness and performance.
引用
收藏
页码:330 / 335
页数:6
相关论文
共 20 条
[11]   Adaptive fraud detection [J].
Fawcett, T ;
Provost, F .
DATA MINING AND KNOWLEDGE DISCOVERY, 1997, 1 (03) :291-316
[12]   An introduction to ROC analysis [J].
Fawcett, Tom .
PATTERN RECOGNITION LETTERS, 2006, 27 (08) :861-874
[13]   A Review on Ensembles for the Class Imbalance Problem: Bagging-, Boosting-, and Hybrid-Based Approaches [J].
Galar, Mikel ;
Fernandez, Alberto ;
Barrenechea, Edurne ;
Bustince, Humberto ;
Herrera, Francisco .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2012, 42 (04) :463-484
[14]  
Jiang H, 2016, INT C PAR DISTRIB SY, P785, DOI [10.1109/ICPADS.2016.0107, 10.1109/ICPADS.2016.105]
[15]  
Kabari L. G., 2016, INT J COMPUTER SCI M, V2
[16]  
Lindelof J., 2018, DETECT PROTECT WANGI
[17]  
MORENO DE SOUSA JC., 2014, THESIS
[18]  
Pedregosa F, 2011, J MACH LEARN RES, V12, P2825
[19]  
Phua Clifton, 2010, A Comprehensive Survey of Data Mining-based Fraud Detection Research, DOI [DOI 10.1016/J.CHB.2012.01.002, 10.1016/j.chb.2012.01.002]
[20]  
Zhou CL, 2018, 2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P15, DOI 10.1109/CCWC.2018.8301651