You are on page 1of 6

MOBILE FRAUD DETECTION

S.C.Sivakumar,
J.Vigneshwaran,
Vidyaavikas College of engineering and technology,
Tiruchengode,

Mail id:
Scsiva1991@gmail.com
Vigneshwaranj.ece@gmail.com

Abstract Introduction
It is estimated that the mobile
This paper discusses the status of communications industry loses several
research on detection of million customers per year due to fraud.
fraud undertaken in Therefore, prevention and early
mobile system. detection of fraudulent activity is an
A first task has been the important goal for network operators. It
identification of possible fraud scenarios is clear that the additional security
and of typical fraud indicators, which measures taken in GSM and in the future
can be mapped to data in toll tickets. UMTS (Universal Mobile
Currently, this project is exploring the Telecommunications System) make
detection of fraudulent behavior based these networks less vulnerable to fraud
on a combination of absolute and than the analogue networks.
differential usage. Three approaches are Nevertheless, certain types of
being investigated: a rule-based commercial fraud are very hard to
approach and two approaches based on preclude by technical means. It is also
neural networks, where both supervised anticipated that the introduction of new
and unsupervised learning are services can lead to the development of
considered. Special attention is being new ways to defraud the system. The use
paid to the feasibility of the of sophisticated fraud detection
implementations. techniques can assist in early detection
of commercial frauds, and will also likely ability of particular indicators to
reduce the effectively of technical identify a specific fraud, these indicators
frauds. have been classified both by their type
and by their use.
The remainder of this paper is organized The different types are: -
as follows: usage indicators, related to the way in
Chapter 1 discusses the identification of which a mobile telephone is used;
possible fraud scenarios and of fraud mobility indicators, related to the
indicators mobility of the telephone;
Chapter 2 discusses the general approach deductive indicators, which arise as a
of user profiling, by-product of fraudulent behavior (e.g.,
Chapter 3 presents the rule-based overlapping calls and velocity checks).
approach Indicators have also been classified by
Chapter 4 presents the neural net-based use: -
approach to fraud detection. primary indicators can, in principle, be
employed in isolation to detect fraud;
Possible frauds and their indicators secondary indicators provide useful
information in isolation (but are not
Possible Frauds: sufficient by themselves);
The first stage of the work tertiary indicators provide supporting
consists of the identification of possible information when combined with other
fraud scenarios in telecommunications indicators.
networks and particularly in mobile A selection has been made of those
phone networks. These scenarios have scenarios which cannot be easily
been classified by the technical manner detected using existing tools, but which
in which they are committed; also an could be identified using more
investigation has been undertaken to sophisticated approaches.
identify which parts of the mobile
telecommunications network are abused Toll Ticket
in order to commit any particular fraud. The potential fraud indicators
Other characteristics that have been have been mapped to network data
studied are whether frauds are technical required to measure them. The
fraud operated for financial gain, or they information required to monitor the use
are fraud related to personal use - hence of the communications network is
not employed for profiteering. A further contained in the toll tickets.
classification is achieved by considering Toll Tickets are data records
whether the network abuse is the result containing details pertaining to every
of administrative fraud, procurement mobile phone call attempt. Toll Tickets
fraud, or application fraud. are transmitted to the network operator
by the cells or switches that the mobile
Indicators phone was communicating with. They
Subsequently, typical indicators are used to determine the charge to the
have been identified which may be used subscriber, but they also provide
for the purposes of detecting fraud information about customer usage and
committed using mobile telephones. In thus facilitate the detection of any
order to provide an indication of the possible fraudulent use. It has been
investigated which fields in the GSM toll through profiling the behaviour of a
tickets can be used as indicators for user. Firstly, certain behavioural patterns
fraudulent behavior. may be considered anomalous for one
Before use in the fraud detection type of user, and hence potentially
engine, the toll tickets are being indicative of fraud, that is considered
preprocessed. An essential component of acceptable for another. With a
this process is the encryption of all differential analysis flexible criteria can
personal information in the toll tickets be developed that detect any change in
(such as telephone numbers). This usage based on a detailed history profile
allows for the protection of the privacy of queue.
of users during the development of the Clearly it is not optimal to search and
fraud detection tools, while at the same retrieve historical information
time the network operators will be able concerning a user's activities prior to
to obtain the identity of fraudulent users. each calculation, on receipt of a new
Toll Ticket. A more suitable approach is
Absolute analysis to compute a single cumulative CUP and
Existing fraud detection systems UPH, for each user, from incoming Toll
tend to interrogate sequences of Toll Tickets, which can be stored as
Tickets comparing a function of the individual records, possibly in a
various fields with fixed criteria known database. So that we maintain the
as triggers. A trigger, if activated, raises concept of having two different spans
an alert status, which cumulatively over the Toll Tickets without retaining a
would lead to an investigation by the database record for each Toll Ticket, we
network operator. Such fixed trigger will need to decay both profiles before
systems perform what is known as an the influence of a new Toll Ticket can be
absolute analysis of the Toll Tickets and taken into consideration. A
are good at detecting the extremes of straightforward decay factor may not be
fraudulent activity. suitable, as this will potentially dilute
information relating to encoded
Differential analysis parameters stored in the user's profile.
Another approach to the problem An important concern here is the
is to perform a differential analysis. Here potential creation of false behaviour
we monitor behavioural patterns of the patterns. Several decaying systems are
mobile phone comparing its most recent currently being investigated.
activities with a history of its usage.
Criteria can then be derived to use as Relevant toll ticket data
triggers that are activated when usage There are two important
patterns of the mobile phone change requirements for user profiling. At first,
significantly over a short period of time. efficiency is of the foremost concern for
A change in the behaviour pattern of a storing the user data and for performing
mobile phone is a common characteristic updates. Secondly, user profiles have to
in nearly all fraud scenarios excluding realize a precise description of user
those committed on subscription where behaviour to facilitate reliable fraud
there is no behavioural pattern detection. All the information that a
established. fraud detection tool will need to handle
There are many advantages to is derived from the toll tickets provided
performing a differential analysis
by the network operator. (Protocol Data Analysis Tool). PDAT is
The following toll ticket components a rule-based tool for intrusion detection.
have been viewed to be the most fraud PDAT works in heterogeneous
relevant measures: environments, has the possibility of on-
Charged_IMSI (identifies the user) line analysis, and provides a
First_Cell_Id (location characteristic for performance of about 200 KB input per
mobile originating calls) second. Important goals were flexibility
Chargeable_Duration (base for all cost and broad applicability, including the
estimations) analysis of general protocol data, which
B_Type_of_Number (for distinguishing is achieved by the special language
between national / international calls) PDAL (Protocol Data Analysis
Non_Charged_Party (the number dialed) Language). PDAL allows the
programming of analysis criteria as well
as a GUI-aided configuration of the
These components will continually be analysis at run-time.
picked out of the toll tickets and Intrusion detection and mobile
incorporated into the user profiles in a fraud detection are quite similar problem
cumulative manner. fields and the flexibility and broad
applicability of PDAT are promising for
It is also anticipated that the analysis of using this tool for mobile fraud detection
cell congestion can provide useful too. The main difference between
ancillary information. Rule-based intrusion detection and mobile fraud
approach to fraud detection detection seems to be the kind of input
data. The recording for intrusion
This approach works best with
detection produces 50 MB per day per
user profiles containing explicit
user, but only for the few users of one
information, where fraud criteria given
UNIX-system. In comparison, fraud
as rules can be referred. User profiles are
detection has to deal with a huge amount
maintained for the directory number of
of mobile phone subscribers (roughly 1
the calling party (A-number), for the
Million), each of whom, however,
directory number of the called party (B-
produces only about 300 bytes of data
number) and also for the cells used to
per day. PDAT was able to keep all
make/receive the calls. A-number
interim results in main memory, since
profiles represent user behaviour and are
only a few users had to be dealt with.
useful for the detection of most types of
For fraud detection, however,
fraud, while B-number profiles point to
intermediate data has of course to be
hot destinations and thus allow the
stored on hard disc. Because of these
detection of frauds based upon call
new requirements it was necessary to
forwarding. All deviations from normal
develop some completely new concepts
user behaviour resulting from the
such as user profiling and fast swapping
different analyzing processes are
for the updating of user profiles. Also,
collected and alarms will finally be
the internal architecture had to be
raised if the results in combination fulfill
changed to a great extent.
given alarm criteria.
The implementation of this
solution is based on an existing rule-
based tool for audit trail analysis PDAT
Neural network based approach to cluster they are closest to, and are
fraud detection recognized as belonging to the class
A second approach to identify corresponding to that cluster. In
fraudulent behaviour uses neural supervised learning, the patterns have to
networks. The multiplicity and be a priori labeled as belonging to some
heterogeneity of the fraud scenarios class. During learning, the network tries
require the use of intelligent detection to adapt its units so that it produces the
systems. The fraud detection engine has correct label at its output for each
to be flexible enough to cope with the training pattern. Once training is finished
diversity of fraud. It should also be the units are frozen, and when a new
adaptive in order to face new fraud pattern is presented, it is classified
scenarios, since fraudsters are likely to according to the output produced by the
develop new forms of fraud once older network.
attacks become impractical. Further, Unsupervised learning presents
fraud appears in the billing system as some difficulties. The problem is that
abnormal usage patterns in the toll ticket patterns have to be presented - that is,
records of one or more users. The encoded - in such a way that the data
function of the fraud detection engine is from fraudulent usage will form groups
to recognize such patterns and produce that are distinct enough from regular
the necessary alarms. High flexibility data. On the other hand, these systems
and adaptively for a pattern recognition can be trained using clean data only.
problem directly point to neural With supervised learning, the difficulty
networks as a potential solution. Neural is that one must obtain a significant
networks are systems of elementary amount of fraudulent data, and label it as
decision units that can be adapted by such. This represents a significant effort.
training in order to recognize and Further, it is not clear how such systems
classify arbitrary patterns. The will handle new fraud strategies.
interaction of a high number of Therefore, none of the approaches
elementary units makes it possible to appears to be a priori superior to the
learn arbitrarily complex tasks. For fraud other, and both directions are being
detection in telephone networks, neural investigated.
network engines are currently being
developed worldwide. As a closely
Conclusion
related application, neural networks are
now routinely used for the detection of Limitations
credit card fraud. Since this system is based on
There are two main forms of history of user, it is not a foolproof
learning in neural networks: system. There is every possibility that
unsupervised learning and supervised even stolen mobile can be made similar
learning. In unsupervised learning, the use as before. But anyhow the losses by
network groups similar training patterns making similar use will be very less.
in clusters. It is then up to the user to Usually whenever a mobile is stolen, the
recognize what class or behaviour has to user is likely to complaint to the police.
be associated to each cluster. When So the limitation mentioned above may
patterns are presented to the network not be a major problem.
after training, they are associated to the
Another limitation may be that, the user
may himself make abnormal use of his
mobile. So it is very essential that such
false alarms should be prevented.

Future Expansion
The above-mentioned limitation
can be overcome very easily. One of
the available methods is to have a
password mechanism.
In password mechanism the user will
be provided with a unique code or
password. When network moderator
has a doubt of misuse of a particular
mobile he can ask for password
confirmation from the user.

You might also like