Abstract
The post-COVID-19 era will create major financial losses in organizational resources as a result of fraudulent activities by malicious agents existing at the edge and cloud domains. Most transactional systems from the edge-to-cloud layers lack the robust platform integration (such as application program interface (API) microservices) needed for fraud mitigation in networks and systems. This paper presents an AI containerization API system based on JAVA-SQL container (JSR-233) for fraud prediction and prevention in telecommunication networks. Pipeline modeling involving the Bayesian software implementation paradigm is introduced using the AI-JasCon model. A demonstration of how the AI engine works with a complex network system for observation of some calls, call frequency, and hidden activities for predictive classification (analytics) at the network backend is discussed. Robust network architecture is introduced for deterministic data mining while creating Bayesian computation to determine fraud potentials through prior, posterior, and joint probability distributions. AI-JasCon framework achieves predictive fraud detection with containerization and modularization using class models and data structures. At the network core layer, an enterprise management backend uses linear discriminant via fog controllers that processes identified fraud subscribers in the network. Also, a standard Java middleware container for distributed transaction management, directory services, and messaging is used to test the application. AI-JasCon framework provides a successful standard for determining fraudulent interactions in edge-to-cloud networks while providing a pipeline application programming model for continuous integration and continuous delivery (CI/CD).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhou C, Lin Z (2018) Study on fraud detection of telecom industry based on rough set. In: IEEE 8th annual computing and communication workshop and conference (CCWC), 8–10 Jan 2018, Las Vegas, NV, USA. https://doi.org/10.1109/CCWC.2018.8301651
DuHadway S, Talluri S, Ho W, Buckhoff T (2020) Light in dark places: the hidden world of supply chain fraud. IEEE Trans Eng Manag:1–14. https://doi.org/10.1109/TEM.2019.2957439
de Araujo B, de Almeida H, de Mello F (2019) Computational intelligence methods applied to the fraud detection of electric energy consumers. IEEE Lat Am Trans 17(01):71–77. https://doi.org/10.1109/TLA.2019.8826697
Yashchin E (2007) Modeling of risk losses using size-biased data. IBM J Res Dev 51(3.4):309–323. https://doi.org/10.1147/rd.513.0309
Almehmadi A, El-Khatib K (2017) On the possibility of insider threat prevention using intent-based access control (IBAC). IEEE Syst J 11(2):373–384. https://doi.org/10.1109/JSYST.2015.2424677
The Hindu Technology (2020) Cybercrime could cost the world almost $1 trillion in 2020, McAfee says – The Hindu. Online URL https://www.thehindu.com/sci-tech/technology/cybercrime-could-cost-the-world-almost-1-trillion/article33269047.ece
Allodi L, Hutchings A, Massacci F, Pastrana S, Vasek M (2020) WACCO 2020: the 2nd workshop on attackers and cybercrime operations co-held with IEEE European symposium on security and privacy 2020. In: 2020 IEEE European symposium on security and privacy workshops (EuroS&PW), Genoa, Italy, pp 427–427. https://doi.org/10.1109/EuroSPW51379.2020.00063
Wang C, Zhu H (2020) Representing fine-grained co-occurrences for behavior-based fraud detection in online payment services. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2020.2991872
Saheed YK, Hambali MA, Arowolo MO, Olasupo YA (2020) Application of GA feature selection on naive Bayes, random forest and SVM for credit card fraud detection. In: 2020 international conference on decision aid sciences and application (DASA), Sakheer, Bahrain, pp 1091–1097. https://doi.org/10.1109/DASA51403.2020.9317228
Jia X, Yang J, Liu R, Wang X, Cotofana SD, Zhao W (2020) Efficient computation reduction in Bayesian neural networks through feature decomposition and memorization. IEEE Trans Neural Netw Learn Syst. https://doi.org/10.1109/TNNLS.2020.2987760
Ye Q, Amini A, Zhou Q (2020) Optimizing regularized Cholesky score for order-based learning of Bayesian networks. IEEE Trans Pattern Anal Mach Intell. https://doi.org/10.1109/TPAMI.2020.2990820
Posch K, Pilz J (2020) Correlated parameters to accurately measure uncertainty in deep neural networks. IEEE Trans Neural Netw Learn Syst. https://doi.org/10.1109/TNNLS.2020.2980004
Yan S, Yao K, Tran CC (2021) Using artificial neural network for predicting and evaluating situation awareness of operator. IEEE Access. https://doi.org/10.1109/ACCESS.2021.3055345
Chiu C, Hsu P-L (2005) A constraint-based genetic algorithm approach for mining classification rules. IEEE Trans Syst Man Cybern Part C Appl Rev 35(2):205–220. https://doi.org/10.1109/TSMCC.2004.841919
Wang S, Cao L (2020) Inferring implicit rules by learning explicit and hidden item dependency. IEEE Trans Syst Man Cybern Syst 50(3):935–946. https://doi.org/10.1109/TSMC.2017.2768547
Zhang D, Zhou L (2004) Discovering golden nuggets: data mining in financial application. IEEE Trans Syst Man Cybern Part C Appl Rev 34(4):513–522. https://doi.org/10.1109/TSMCC.2004.829279
DÃaz Vera JC, NegrÃn Ortiz GM, Molina C, Vila MA (2019) Extending knowledge based redundancy in association rules with imprecise knowledge. IEEE Lat Am Trans 17(04):648–653. https://doi.org/10.1109/TLA.2019.8891930
Charte F, Rivera AJ, del Jesus MJ, Herrera F (2014) LI-MLC: a label inference methodology for addressing high dimensionality in the label space for multilabel classification. IEEE Trans Neural Netw Learn Syst 25(10):1842–1854. https://doi.org/10.1109/TNNLS.2013.2296501
Mahmoud MS, Khan GD (2018) LMI consensus condition for discrete-time multi-agent systems. IEEE/CAA J Autom Sin 5(2):509–513. https://doi.org/10.1109/JAS.2016.7510016
Li H, Li X (2020) Distributed model predictive consensus of heterogeneous time-varying multi-agent systems: with and without self-triggered mechanism. IEEE Trans Circuits Syst I Regul Pap 67(12):5358–5368. https://doi.org/10.1109/TCSI.2020.3008528
Shi J (2020) Cooperative control for nonlinear multi-agent systems based on event-triggered scheme. IEEE Trans Circuits Syst II Express Briefs. https://doi.org/10.1109/TCSII.2020.3035075
Zhou C, Lin Z (2018) Study on fraud detection of telecom industry based on rough set. In: Proceedings of the IEEE 8th annual computing and communication workshop and conference (CCWC), 8–10 Jan. 2018, Las Vegas, NV, USA. https://doi.org/10.1109/CCWC.2018.8301651
Gopal RK, Meher SK (2007) A rule-based approach for anomaly detection in subscriber usage pattern. Int J Eng Appl Sci 3:7
Estévez PA, Held CM, Perez CA (2006) Subscription fraud prevention in telecommunications using fuzzy rules and neural networks. Expert Syst Appl 31:337–344
Awoyelu L, Adebomi A (2015) Fraud detection in telecommunications industry: bridging the gap with random rough subspace based neural network ensemble method. Comput Eng Intell Syst 6(10)
Dong F, Wang H, Li L, Guo Y, Bissyande TF, Liu T, Xu G, Klein J (2018) FraudDroid: automated ad fraud detection for android apps. In: Conference’17, July 2017, Washington, DC, USA 2018. ACM. ISBN 123-4567-24-567/08/06. https://doi.org/10.475/123v4. arXiv:1709.01213v4 [cs.CR] https://doi.org/10.1145/3236024.3236045
Yusoff MIM, Mohamed I, Bakar MRA (2013) Fraud detection in telecommunication industry using Gaussian mixed model. In: Proceedings of international conference on research and innovation in information systems (ICRIIS), 27–28 Nov. 2013, Kuala Lumpur, Malaysia. https://doi.org/10.1109/ICRIIS.2013.6716681
Filippov V, Mukhanov L, Shchukin B (2008) Credit card fraud detection system. In: Proceedings of the 7th IEEE international conference on cybernetic intelligent systems, 9–10 Sept. 2008, London, UK. https://doi.org/10.1109/UKRICIS.2008.4798919
Niu K, Jiao H, Deng N, Gao Z (2016) A real-time fraud detection algorithm based on intelligent scoring for the telecom industry. In: Proceedings of the international conference on networking and network applications (NaNA), 23–25 July 2016, Hakodate, Japan. https://doi.org/10.1109/NaNA.2016.11
Tarmazakov EI, Silnov DS (2018) Modern approaches to prevent fraud in mobile communications networks. In: Proceedings of the IEEE conference of Russian young researchers in electrical and electronic engineering (EIConRus), 29th Jan.–1st Feb. 2018, Moscow, Russia. https://doi.org/10.1109/EIConRus.2018.8317111
Hines C, Youssef A (2018) Machine learning applied to rotating check fraud detection. In: IEEE proceedings of the 2018 1st international conference on data intelligence and security (ICDIS), 8–10 April 2018, South Padre Island, TX, USA. https://doi.org/10.1109/ICDIS.2018.00012
Cao C, Gao Y, Luo Y, Xia M, Dong W, Chen C, Liu X (2020) AdSherlock: efficient and deployable click fraud detection for Mobile applications. IEEE Trans Mob Comput. https://doi.org/10.1109/TMC.2020.2966991
Cheng D, Wang X, Zhang Y, Zhang L (2020) Graph neural network for fraud detection via spatial-temporal attention. IEEE Trans Knowl Data Eng:1–1. https://doi.org/10.1109/TKDE.2020.3025588
Wang C, Wang C, Zhu H, Cui J (2020) LAW: learning automatic windows for online payment fraud detection. IEEE Trans Dependable Secure Comput:1–1. https://doi.org/10.1109/TDSC.2020.3037784
Dal Pozzolo A, Boracchi G, Caelen O, Alippi C, Bontempi G (2018) Credit card fraud detection: a realistic modeling and a novel learning strategy. IEEE Trans Neural Netw Learn Syst 29(8):3784–3797. https://doi.org/10.1109/TNNLS.2017.2736643
Ji S, Li J, Yuan Q, Lu J (2020) Multi-range gated graph neural network for telecommunication fraud detection. In: 2020 IEEE international joint conference on neural networks (IJCNN), Glasgow, United Kingdom, pp 1–6. https://doi.org/10.1109/IJCNN48605.2020.9207589
Tarmazakov EI, Silnov DS (2018) Modern approaches to prevent fraud in mobile communications networks. In: 2018 IEEE conference of Russian young researchers in electrical and electronic engineering (EIConRus), Moscow, pp 379–381. https://doi.org/10.1109/EIConRus.2018.8317111
Mohamed A, Bandi AFM, Tamrin AR, Jaafar MD, Hasan S, Jusof F (2009) Telecommunication fraud prediction using backpropagation neural network. In: 2009 International conference of soft computing and pattern recognition, Malacca, pp 259–265. https://doi.org/10.1109/SoCPaR.2009.60
Baharim KN, Kamaruddin MS, Jusof F (2008) Leveraging missing values in call detail record using Naïve Bayes for fraud analysis. In: 2008 International conference on information networking, Busan, pp 1–5. https://doi.org/10.1109/ICOIN.2008.4472791
Elrajubi OM, Elshawesh AM, Abuzaraida MA (2017) Detection of bypass fraud based on speaker recognition. In: 2017 8th International conference on information technology (ICIT), Amman, pp 50–54. https://doi.org/10.1109/ICITECH.2017.8079914
Xu W, Pang Y, Ma J, Wang S-Y, Hao G, Zeng S, Qian Y-H (2008) Fraud detection in telecommunication: a rough fuzzy set based approach. In: 2008 International conference on machine learning and cybernetics, Kunming, pp 1249–1253. https://doi.org/10.1109/ICMLC.2008.4620596
Arafat M, Qusef A, Sammour G (2019) Detection of Wangiri telecommunication fraud using ensemble learning. In: 2019 IEEE Jordan international joint conference on electrical engineering and information technology (JEEIT), Amman, Jordan, pp 330–335. https://doi.org/10.1109/JEEIT.2019.8717528
Özlan B, Haznedaroğlu A, Arslan LM (2019) Automatic fraud detection in call center conversations. In: 2019 IEEE 27th signal processing and communications applications conference (SIU), Sivas, Turkey, pp 1–4. https://doi.org/10.1109/SIU.2019.8806262
Niu K, Jiao H, Deng N, Gao Z (2016) A real-time fraud detection algorithm based on intelligent scoring for the telecom industry. In: IEEE 2016 international conference on networking and network applications (NaNA), Hakodate, pp 303–306. https://doi.org/10.1109/NaNA.2016.11
Zhong R, Dong X, Lin R, Zou H (2019) An incremental identification method for fraud phone calls based on broad learning system. In: 2019 IEEE 19th international conference on communication technology (ICCT), Xi’an, China, pp 1306–1310. https://doi.org/10.1109/ICCT46805.2019.8947271
Odusami M, Misra S, Abayomi-Alli O, Abayomi-Alli A, Fernandez-Sanz L (2020) A survey and meta-analysis of application-layer distributed denial-of-service attack. Int J Commun Syst., Wiley 33(18):e4603
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Nonum, E.O., Okafor, K.C., Nosike, I.A.A., Misra, S. (2022). AI-JasCon: An Artificial Intelligent Containerization System for Bayesian Fraud Determination in Complex Networks. In: Misra, S., Kumar Tyagi, A., Piuri, V., Garg, L. (eds) Artificial Intelligence for Cloud and Edge Computing. Internet of Things. Springer, Cham. https://doi.org/10.1007/978-3-030-80821-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-80821-1_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-80820-4
Online ISBN: 978-3-030-80821-1
eBook Packages: Computer ScienceComputer Science (R0)