Go to:
Logótipo
Você está em: Start > Publications > View > A case study on using heavy-hitters in interconnect bypass fraud
Publication

A case study on using heavy-hitters in interconnect bypass fraud

Title
A case study on using heavy-hitters in interconnect bypass fraud
Type
Article in International Scientific Journal
Year
2020
Authors
João Gama
(Author)
FEP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Martins, C
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Espanha, R
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Azevedo, R
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Journal
Vol. 20
Pages: 47-57
ISSN: 1559-6915
Other information
Authenticus ID: P-00S-TA1
Abstract (EN): <jats:p> Nowadays, fraudsters are continually trying to explore technical gaps in telecom companies to get some profit. The high cost of international termination rates in Telecom Companies, and mainly because of their high asymmetry property, attracts the attention of fraudsters. In this paper, we explore the application of three deterministic algorithms and one probabilistic, that combined can help to identify possible abnormal behaviors. Interconnect Bypass Fraud (IBF) is on the top three (worldwide), most common frauds in the telecommunication domain. Typically, the Telecom Companies can detect IBF by the occurrence of bursts of calls, repetitions, and mirror behaviors from specific numbers. The goal of our work is to discover as soon as possible numbers with abnormal behaviors and based on this assumption we developed: ( <jats:italic>i</jats:italic> ) the lossy count algorithm with fast forgetting technique; and ( <jats:italic>ii</jats:italic> ) the single-pass hierarchical heavy hitter algorithm that also contains a forgetting technique; as well as the application of the HyperLogLog sketches, and the application of sticky sampling algorithm. We applied the four algorithms in two real datasets and did a parameter sensitivity analysis. The results show that our two proposals (Lossy Counting with fast forgetting and the Hierarchical Heavy Hitters) can capture the most recent abnormal behaviors, faster than the baseline algorithms. Nonetheless, these four algorithms combined can make the fraud task more difficult and can complement the techniques used by the Telecom Company. </jats:p>
Language: English
Type (Professor's evaluation): Scientific
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same authors

Anonymised Phone Call Dataset for Anomaly Detection (2024)
Other Publications
Veloso, B; Martins, C; Espanha, R; Silva, PR; Azevedo, R; Gama, João

Of the same journal

A spatiotemporal extension for dealing with moving objects with extent in Oracle 11g (2012)
Article in International Scientific Journal
Matos, L; Moreira, J; Alexandre Carvalho
Recommend this page Top
Copyright 1996-2026 © Faculdade de Farmácia da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2026-03-05 at 03:04:01 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book