Advertisement

Unsupervised Profiling for Identifying Superimposed Fraud

  • Uzi Murad
  • Gadi Pinkas
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1704)

Abstract

Many fraud analysis applications try to detect “probably fraudulent” usage patterns, and to discover these patterns in historical data. This paper builds on a different detection concept; there are no fixed “probably fraudulent” patterns, but any significant deviation from the normal behavior indicates a potential fraud. In order to detect such deviations, a comprehensive representation of “customer behavior” must be used. This paper presents such representation, and discusses issues derived from it: a distance function and a clustering algorithm for probability distributions.

Keywords

False Alarm Rate Customer Behavior Call Duration Fraud Detection Fraud Case 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Burge, P., Shawe-Taylor, J.: Detecting Cellular Fraud Using Adaptive Prototypes. In: Proceedings of AAAI 1997 Workshop on AI Approaches to Fraud Detection and Risk Management, Providence RI, pp. 9–13 (1997)Google Scholar
  2. 2.
    Duda, R.O., Hart, P.E.: Pattern Classification and Scene Analysis. John Wiley & Sons, Inc., New York (1973)zbMATHGoogle Scholar
  3. 3.
    Fawcett, T., Provost, F.: Adaptive Fraud Detection. In: Fayyad, U., Mannila, H., Piatetsky- Shapiro, G. (eds.) Data Mining and Knowledge Discovery, vol. 1, pp. 291–316. Kulwer Academic Publishers, Boston (1997)Google Scholar
  4. 4.
    Fawcett, T., Provost, F.: Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions. In: Agrawal, R., Stolorz, P., Piatetsky- Shapiro, G. (eds.) Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, pp. 43–48. AAAI Press, Menlo Park (1997)Google Scholar
  5. 5.
    Jain, A.K., Dubes, R.C.: Algorithms for Clustering Data. Prentice-Hall, Englewood Cliffs (1988)zbMATHGoogle Scholar
  6. 6.
    Kittler, J.: Feature Selection and Extraction. In: Young, T.Y., Fu, K. (eds.) Handbook of Pattern Recognition and Image Processing, Orlando, pp. 59–83. Academic Press Inc., London (1986)Google Scholar
  7. 7.
    Kokkinaki, A.I.: On Atypical Database Transactions: Identification of Probable Fraud using Machine Learning for User Profiling. In: Proceedings of IEEE Knowledge and Data Engineering Exchange Workshop, pp. 107–113 (1997)Google Scholar
  8. 8.
    McQueen, J.B.: Some Methods for Classification and Analysis of Multivariante Observations. In: Proceedings of Fifth Berkeley Symposium on Mathematical Statistics and Probability, pp. 281–297 (1967)Google Scholar
  9. 9.
    Moreau, Y., Vandewalle, J.: Detection of Mobile Phone Fraud using Supervised Neural Networks: A First Prototype (1997)Available via, ftp://ftp.esat.kuleuven.ac.be/pub/SISTA/moreau/reports/icann97_TR97-44.ps
  10. 10.
    Moreau, Y., Preneel, B., Burge, P., Shawe-Taylor, J., Stoermann, C., Cook, C.: Novel Techniques for Fraud Detection in Mobile Telecommunication Networks. In: ACTS Mobile Summit, Grenada, Spain (1997)Google Scholar
  11. 11.
    Murad, U.: Three Level Profiling for Telecommunication Fraud Detection. M.Sc. thesis, Tel Aviv University, Israel (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • Uzi Murad
    • 1
  • Gadi Pinkas
    • 2
  1. 1.Tel Aviv UniversityRamat-AvivIsrael
  2. 2.Amdocs (Israel) Ltd.Ra’ananaIsrael

Personalised recommendations