International Journal of Information Technology

, Volume 9, Issue 3, pp 303–310 | Cite as

Perspective analysis of telecommunication fraud detection using data stream analytics and neural network classification based data mining

  • Vanita JainEmail author
Original Research


With the growing advancements in technology, the lives of the people have become easier and convenient, but at the same time it also mushrooms sophisticated practices through which the fraudsters can infiltrate an organization. Telecommunication industry, being one of the major sectors in the world, is also infiltrated by frauds. Telecommunication fraud is a combination of variety of illegal activities like unauthorized and illegitimate access, subscription identity theft and international revenue share fraud etc. Frauds have proven to be detrimental to the prosperity of a company and impacts customer relations and shareholders. This paper presents the implementation details for detecting telecommunication fraud using Data Stream Analytics and Neural Network classification based Data Mining. For detection using Data Stream Analytics, Event Hub and Stream Analytics components of Microsoft Azure have been used whereas for detection using Data Mining Neural Network Pattern Recognition tool as well as a self-coded algorithm in Matlab has been used. Based on the results, the accuracy of both the techniques have been compared and the situations for selection of a suitable technique based on the user requirements and the flow of data has been narrowed down. The findings can elucidate upon other cloud analytics systems and provide a basis for big data analytics and mining.


Data mining Event hub Neural network pattern recognition Microsoft azure Stream analytics 


  1. 1.
    Ismail A, Erdi O, Ömer FÇ (2012) Data Stream Analytics and Mining in the Cloud. IEEE 2012 4th International Conference on Cloud Computing Technology and Science, Taiwan, pp 857–62Google Scholar
  2. 2.
    Mohammad IA, Mohammad GA (2012) Detecting telecommunication fraud using neural networks through data mining. Int J Sci Eng Res 3:1–5Google Scholar
  3. 3.
    Simon A, Carmen G, Julian K, Michael M, Katrin P, David R, Torsten W (2012) Telephony fraud detection in next generation networks. In: The eighth advanced international conference on telecommunications 27 May-1 June 2012, Stuttgart, Germany; pp 203–07Google Scholar
  4. 4.
    Becker RA, Volinsky C, Wilks AR (2010) Fraud detection in telecommunications: history and lessons learned. Technometrics 52:20–33MathSciNetCrossRefGoogle Scholar
  5. 5.
    Cox KC, Eick SG, Wills GJ, Brachman RJ (1997) Visual data mining: recognizing telephone calling fraud. Data Min Knowl Disc 1:225–231CrossRefGoogle Scholar
  6. 6.
    Ranjitha P (2015) Streaming analytics over real-time big data. Global J Comput Sci Technol C Softw Data Eng 15:27–30Google Scholar
  7. 7.
    Gaber MM, Zaslavsky A, Krishnaswamy S (2005) Mining data streams: a review. ACM SIGMOD Record 34:18–26CrossRefzbMATHGoogle Scholar
  8. 8.
    Farvaresh H, Sepehri MM (2011) A data mining framework for detecting subscription fraud in telecommunication. Eng Appl Artif Intell 24:182–194CrossRefGoogle Scholar
  9. 9.
    Clifton P, Vincent L, Kate S, Ross G (2010) A Comprehensive Survey of Data Mining-based Fraud Detection Research. eprint arXiv:1009.6119, 1–14
  10. 10.
    de Sousa JVC (2013) Telecommunication fraud detection using data mining techniques. Int J Comput Sci Inf Technol 4:1–4Google Scholar
  11. 11.
    Simon H, Hongxing H, Graham JW, Rohan AB (2002) Outlier detection using replicator neural networks. Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery 4–6 September 2002, 170–80Google Scholar
  12. 12.
    Volker TMT, Michael H, Jaakko H (1998) Fraud detection in communications networks using neural and probabilistic methods. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, 12–15 May 1998; Seattle, Washington, USA, 1241–44Google Scholar
  13. 13.
    Shawe-Taylor J, Howker K, Burge P (1999) Detection of fraud in mobile telecommunication. Inf Security Tech Rep 4:3–15CrossRefGoogle Scholar
  14. 14.
    Adrian H, Tapani L (2011) Event hub: an event-driven information hub for mobile devices. UIC’11 8th international conference on Ubiquitous intelligence and computing; 2–4 September 2011; Banff, Canada; 209–23Google Scholar
  15. 15.
    de Sousa JVC (2013) Telecommunication fraud detection using data mining techniques. Int J Comput Sci Inf Technol 4:1–4Google Scholar
  16. 16.
    Nader M, Jameela AJ (2014) Real-Time Big Data Analytics: Applications and Challenges. IEEE International Conference On High Performance Computing and Simulation; 21–25 July 2014; Bologna, Italy, pp 305–10Google Scholar

Copyright information

© Bharati Vidyapeeth's Institute of Computer Applications and Management 2017

Authors and Affiliations

  1. 1.Bharati Vidyapeeth’s College of EngineeringNew DelhiIndia

Personalised recommendations