Go to:
Logótipo
Você está em: Start > Publications > View > Fraud Detection using Heavy Hitters: a Case Study
Map of Premises
Principal
Publication

Fraud Detection using Heavy Hitters: a Case Study

Title
Fraud Detection using Heavy Hitters: a Case Study
Type
Article in International Conference Proceedings Book
Year
2020
Authors
Veloso, B
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. View Authenticus page Without ORCID
Martins, C
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Espanha, R
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Azevedo, R
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
João Gama
(Author)
FEP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Other information
Authenticus ID: P-00R-ZAN
Abstract (EN): The high asymmetry of international termination rates, where calls are charged with higher values, are fertile ground for the appearance of frauds in Telecom Companies. In this paper, we present three different and complementary solutions for a real problem called Interconnect Bypass Fraud. This problem is one of the most common in the telecommunication domain and can be detected by the occurrence of abnormal behaviours from specific numbers. Our goal is to detect as soon as possible numbers with abnormal behaviours, e.g. bursts of calls, repetitions and mirror behaviours. Based on this assumption, we propose: (i) the adoption of a new fast forgetting technique that works together with the Lossy Counting algorithm; (ii) the proposal of a single pass hierarchical heavy hitter algorithm that also contains a forgetting technique; and (iii) the application of the HyperLogLog sketches for each phone number. We used the heavy hitters to detect abnormal behaviours, e.g. burst of calls, repetition and mirror. The hierarchical heavy hitters algorithm is used to detect the numbers that make calls for a huge set of destinations and destination numbers that receives a huge set of calls to provoke a denial of service. Additionally, to detect the cardinality of destination numbers of each origin number we use the HyperLogLog algorithm. The results shows that these three approaches combined complements the techniques used by the telecom company and make the fraud task more difficult.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 8
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same authors

Interconnect bypass fraud detection: a case study (2020)
Article in International Scientific Journal
Veloso, B; Tabassum, S; Martins, C; Espanha, R; Azevedo, R; João Gama
Detecting Bursts of Activity in Telecommunications (2019)
Article in International Conference Proceedings Book
Veloso, B; Martins, C; Espanha, R; Azevedo, R; João Gama
Recommend this page Top
Copyright 1996-2025 © Faculdade de Medicina Dentária da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-08-17 at 13:04:08 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book