Skip to main content
Log in

Perspective analysis of telecommunication fraud detection using data stream analytics and neural network classification based data mining

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

With the growing advancements in technology, the lives of the people have become easier and convenient, but at the same time it also mushrooms sophisticated practices through which the fraudsters can infiltrate an organization. Telecommunication industry, being one of the major sectors in the world, is also infiltrated by frauds. Telecommunication fraud is a combination of variety of illegal activities like unauthorized and illegitimate access, subscription identity theft and international revenue share fraud etc. Frauds have proven to be detrimental to the prosperity of a company and impacts customer relations and shareholders. This paper presents the implementation details for detecting telecommunication fraud using Data Stream Analytics and Neural Network classification based Data Mining. For detection using Data Stream Analytics, Event Hub and Stream Analytics components of Microsoft Azure have been used whereas for detection using Data Mining Neural Network Pattern Recognition tool as well as a self-coded algorithm in Matlab has been used. Based on the results, the accuracy of both the techniques have been compared and the situations for selection of a suitable technique based on the user requirements and the flow of data has been narrowed down. The findings can elucidate upon other cloud analytics systems and provide a basis for big data analytics and mining.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Ismail A, Erdi O, Ömer FÇ (2012) Data Stream Analytics and Mining in the Cloud. IEEE 2012 4th International Conference on Cloud Computing Technology and Science, Taiwan, pp 857–62

  2. Mohammad IA, Mohammad GA (2012) Detecting telecommunication fraud using neural networks through data mining. Int J Sci Eng Res 3:1–5

    Google Scholar 

  3. Simon A, Carmen G, Julian K, Michael M, Katrin P, David R, Torsten W (2012) Telephony fraud detection in next generation networks. In: The eighth advanced international conference on telecommunications 27 May-1 June 2012, Stuttgart, Germany; pp 203–07

  4. Becker RA, Volinsky C, Wilks AR (2010) Fraud detection in telecommunications: history and lessons learned. Technometrics 52:20–33

    Article  MathSciNet  Google Scholar 

  5. Cox KC, Eick SG, Wills GJ, Brachman RJ (1997) Visual data mining: recognizing telephone calling fraud. Data Min Knowl Disc 1:225–231

    Article  Google Scholar 

  6. Ranjitha P (2015) Streaming analytics over real-time big data. Global J Comput Sci Technol C Softw Data Eng 15:27–30

    Google Scholar 

  7. Gaber MM, Zaslavsky A, Krishnaswamy S (2005) Mining data streams: a review. ACM SIGMOD Record 34:18–26

    Article  MATH  Google Scholar 

  8. Farvaresh H, Sepehri MM (2011) A data mining framework for detecting subscription fraud in telecommunication. Eng Appl Artif Intell 24:182–194

    Article  Google Scholar 

  9. Clifton P, Vincent L, Kate S, Ross G (2010) A Comprehensive Survey of Data Mining-based Fraud Detection Research. eprint arXiv:1009.6119, 1–14

  10. de Sousa JVC (2013) Telecommunication fraud detection using data mining techniques. Int J Comput Sci Inf Technol 4:1–4

    Google Scholar 

  11. Simon H, Hongxing H, Graham JW, Rohan AB (2002) Outlier detection using replicator neural networks. Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery 4–6 September 2002, 170–80

  12. Volker TMT, Michael H, Jaakko H (1998) Fraud detection in communications networks using neural and probabilistic methods. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, 12–15 May 1998; Seattle, Washington, USA, 1241–44

  13. Shawe-Taylor J, Howker K, Burge P (1999) Detection of fraud in mobile telecommunication. Inf Security Tech Rep 4:3–15

    Article  Google Scholar 

  14. Adrian H, Tapani L (2011) Event hub: an event-driven information hub for mobile devices. UIC’11 8th international conference on Ubiquitous intelligence and computing; 2–4 September 2011; Banff, Canada; 209–23

  15. de Sousa JVC (2013) Telecommunication fraud detection using data mining techniques. Int J Comput Sci Inf Technol 4:1–4

    Google Scholar 

  16. Nader M, Jameela AJ (2014) Real-Time Big Data Analytics: Applications and Challenges. IEEE International Conference On High Performance Computing and Simulation; 21–25 July 2014; Bologna, Italy, pp 305–10

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vanita Jain.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jain, V. Perspective analysis of telecommunication fraud detection using data stream analytics and neural network classification based data mining. Int. j. inf. tecnol. 9, 303–310 (2017). https://doi.org/10.1007/s41870-017-0036-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-017-0036-5

Keywords

Navigation