Go to:
Logótipo
Você está em: Start > Publications > View > Profiling high leverage points for detecting anomalous users in telecom data networks
Map of Premises
Principal
Publication

Profiling high leverage points for detecting anomalous users in telecom data networks

Title
Profiling high leverage points for detecting anomalous users in telecom data networks
Type
Article in International Scientific Journal
Year
2020
Authors
Tabassum, S
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Azad, MA
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
João Gama
(Author)
FEP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Journal
Vol. 75 No. : 9-10
Pages: 573-581
ISSN: 0003-4347
Other information
Authenticus ID: P-00S-JD8
Abstract (EN): Fraud in telephony incurs huge revenue losses and causes a menace to both the service providers and legitimate users. This problem is growing alongside augmenting technologies. Yet, the works in this area are hindered by the availability of data and confidentiality of approaches. In this work, we deal with the problem of detecting different types of unsolicited users from spammers to fraudsters in a massive phone call network. Most of the malicious users in telecommunications have some of the characteristics in common. These characteristics can be defined by a set of features whose values are uncommon for normal users. We made use of graph-based metrics to detect profiles that are significantly far from the common user profiles in a real data log with millions of users. To achieve this, we looked for the high leverage points in the 99.99th percentile, which identified a substantial number of users as extreme anomalous points. Furthermore, clustering these points helped distinguish malicious users efficiently and minimized the problem space significantly. Convincingly, the learned profiles of these detected users coincided with fraudulent behaviors.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 9
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same journal

Synergy between synthetic aperture radar and other sensors for the remote sensing of the ocean (2001)
Article in International Scientific Journal
Ufermann, S; Robinson, IS; Da Silva, JCB
IoT data stream analytics (2020)
Article in International Scientific Journal
Bifet, A; João Gama
Interconnect bypass fraud detection: a case study (2020)
Article in International Scientific Journal
Veloso, B; Tabassum, S; Martins, C; Espanha, R; Azevedo, R; João Gama
Experimental evaluation of a R-EAM and noise impact analysis for UWB and Wi-Fi transmission in RoF networks (2013)
Article in International Scientific Journal
L. M. Pessoa; J. M. B. Oliveira; D. V. Coelho; J. C. S. Castro; H. M. Salgado
Discovering locations and habits from human mobility data (2020)
Article in International Scientific Journal
Thiago Andrade Silva; Cancela, B; João Gama
Recommend this page Top
Copyright 1996-2025 © Faculdade de Medicina Dentária da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z  I Guest Book
Page created on: 2025-07-05 at 11:50:05 | Acceptable Use Policy | Data Protection Policy | Complaint Portal