Advertisement

Testing the Fraud Detection Ability of Different User Profiles by Means of FF-NN Classifiers

  • Constantinos S. Hilas
  • John N. Sahalos
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4132)

Abstract

Telecommunications fraud has drawn the attention in research due to the huge economic burden on companies and to the interesting aspect of users’ behavior characterization. In the present paper, we deal with the issue of user characterization. Several real cases of defrauded user accounts for different user profiles were studied. Each profile’s ability to characterize user behavior in order to discriminate normal activity from fraudulent one was tested. Feed-forward neural networks were used as classifiers. It is found that summary characteristics of user’s behavior perform better than detailed ones towards this task.

Keywords

Receiver Operating Characteristic Curve True Positive Rate User Profile Legitimate User Personal Identification Numbers 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Gosset, P., Hyland, M.: Classification, detection and prosecution of fraud in mobile networks. In: Proceedings of ACTS Mobile Summit, Sorrento Italy (1999)Google Scholar
  2. 2.
    Bolton, R.J., Hand, D.J.: Statistical fraud detection: a review. Statistical Science 17(3), 235–255 (2002)MATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    ACTS ACo95, project ASPeCT: Legal aspects of fraud detection. AC095/KUL/W26/ DS/P/25/2 (1998)Google Scholar
  4. 4.
    Hilas, C.S., Sahalos, J.N.: User profiling for fraud detection in telecommunications networks. In: Proc. of the 5th Int. Conf. on Technology and Automation - ICTA 2005, Thessaloniki Greece, pp. 382–387 (2005)Google Scholar
  5. 5.
    Moreau, Y., Preneel, B., Burge, P., Shawe-Taylor, J., Stoermann, C., Cooke, C.: Novel Techniques for Fraud Detection in Mobile Telecommunication Networks. ACTS Mobile Summit. Granada Spain (1997)Google Scholar
  6. 6.
    Buschkes, R., Kesdogan, D., Reichl, P.: How to increase security in Mobile Networks by Anomaly Detection. In: Proc. of the 14th Annual Computer Security Applications Conference - ACSAC 1998, vol. 8 (1998)Google Scholar
  7. 7.
    Rosset, S., Murad, U., Neumann, E., Idan, Y., Pinkas, G.: Discovery of fraud rules for telecommunications – challenges and solutions. In: Proc. of ACM SIGKDD 1999, pp. 409–413. ACM Press, San Diego (1999)Google Scholar
  8. 8.
    Adomavicious, G., Tuzhilin, A.l.: User profiling in Personalization Applications through Rule Discovery and Validation. In: Proc. of ACM SIGKDD 1999, pp. 377–381. ACM Press, San Diego (1999)Google Scholar
  9. 9.
    Fawcett, T., Provost, F.: Adaptive Fraud Detection. Data Mining and Knowledge Discovery 1, 291–316 (1997)CrossRefGoogle Scholar
  10. 10.
    Oh, S.H., Lee, W.S.: An anomaly intrusion detection method by clustering normal user behavior. Computers & Security 22(7), 596–612 (2003)CrossRefGoogle Scholar
  11. 11.
    Cox, K.C., Eick, S.G., Wills, G.J., Brachman, R.J.: Visual data mining: Recognizing telephone calling fraud. J. Data Mining and Knowledge Discover 1(2), 225–231 (1997)CrossRefGoogle Scholar
  12. 12.
    Taniguchi, M., Haft, M., Hollmen, J., Tresp, V.: Fraud detection in communication networks using neural and probabilistic methods. In: Proc. of the 1998 IEEE Int. Conf. Acoustics, Speech and Signal Processing, vol. 2, pp. 1241–1244 (1998)Google Scholar
  13. 13.
    Manikopoulos, C., Papavassilliou, S.: Network Intrusion and Fault Detection: A Statistical Anomaly Approach. IEEE Communications Magazine, Vol 40(10), 76–82 (2002)CrossRefGoogle Scholar
  14. 14.
    Hollmen, J., Tresp, V.: Call-based fraud detection in mobile communication networks using a hierarchical regime switching model. In: Proc. of the 1998 Conf. on Advances in Neural Information Processing Systems II, pp. 889–895. MIT Press, Cambridge (1999)Google Scholar
  15. 15.
    Phua, C., Alahakoon, D., Lee, V.: Minority Report in Fraud Detection: Classification of Skewed Data. ACM SIGKDD Explorations – Special Issue on Imbalanced Data Sets 6(1), 50–58 (2004)Google Scholar
  16. 16.
    Fawcett, T., Phua, C.: Fraud Detection Bibliography (2005), Accessed from http://liinwww.ira.uka.de/bibliography/Ai/fraud.detection.html
  17. 17.
    Hinde, S.F.: Call Record Analysis. In: IEE Colloquium on Making Life Easier - Network Design and Management Tools (Digest No: 1996/217), pp. 8/1–8/4 (1996)Google Scholar
  18. 18.
    Manly, B.F.J.: Multivariate Statistical Methods: A Primer, 2nd edn. Chapman & Hall, Boca Raton (1994)Google Scholar
  19. 19.
    Lin, C.-T., Lee, G.C.S.: Neural-Fuzzy Systems: a neuro fuzzy synergism to intelligent systems. Prentice Hall, Upper Saddle River (1996)Google Scholar
  20. 20.
    Riedmiller, M., Braun, H.: A direct adaptive method for faster backpropagation learning: The RPROP algorithm. In: Proc. of the IEEE Int. Conf. on Neural Networks, vol. 1, pp. 586–591 (1993)Google Scholar
  21. 21.
    Downey, T.J., Meyer, D.J., Price, R.K., Spitznagel, E.L.: Using the receiver operating characteristic to asses the performance of neural classifiers. In: Int. Joint Conf. Neural Networks, vol. 5, pp. 3642–3646 (1999)Google Scholar
  22. 22.
    Provost, F., Fawcett, T., Kohavi, R.: The case against accuracy estimation for comparing induction algorithms. In: Proc of the Fifteenth Int. Conf. on Machine Learning, pp. 43–48. Morgan Kaufmann, San Francisco (1998)Google Scholar
  23. 23.
    Kajitani, Y., Hipel, K.W., McLeod Ian, A.: Forecasting nonlinear time series with feed-forward neural networks: a case study of Canadian lynx data. Journal of Forecasting 24(2), 105–117 (2005)CrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Constantinos S. Hilas
    • 1
  • John N. Sahalos
    • 2
  1. 1.Dept. of Informatics and CommunicationsTechnological Educational Institute of SerresSerresGreece
  2. 2.Radiocommunications LaboratoryAristotle University of ThessalonikiThessalonikiGreece

Personalised recommendations