Fraud Detection in International Calls Using Fuzzy Logic
|
|
- Sabrina Morgan
- 6 years ago
- Views:
Transcription
1 Fraud Detection in International Calls Using Fuzzy Logic Hussein M. Marah Faculty of Information Technology Misurata University Misurata, Libya Osama Mohamed Elrajubi Faculty of Information Technology Misurata University Misurata, Libya Abdulla A. Abouda Almadar Aljadid Company Research and Development Office Misurata, Libya Abstract Fraud is a problem that affects operators and telecommunication companies all around the world. One of the most known fraud is the bypass fraud, which is used in international calls in order to avoid access charges and making profits. This kind of fraud causes severe losses in revenue to operators with other negative side effects. In this paper a new fraud detection technique is proposed. The proposed technique depends on user profiling and using fuzzy logic. Fuzzy logic was used in decision making process by utilizing fuzzy logic membership function. A real database from mobile operator company Almadar Aljadid in Libya is used in this investigation. Five features are extracted and employed as detection patterns in the proposed technique. The five features or detection patterns are, subscriber s mobility, incoming to outgoing calls ratio, suspicious cell activity, irregular calls, and service type. Keywords bypass fraud; international calls; fraud detection technique; user profiling; fuzzy logic; detection patterns. I. INTRODUCTION Following the huge growth in telecommunication networks in the last years, which became so important part in our lives, the service providers and telecommunication companies face a new big challenge, fraud with all different types. That was spreading so fast with millions of dollars profits around the world. Generally, Fraud in telecommunications networks can be characterized by fraud conditions, which essentially describe how the fraudster gained the illegitimate access to the network [1]. The problem of the fraudulent use of mobile phones is a common thing to communication service providers which causes billions of dollars losses in annual revenue. By definition, fraud in communication networks can be defined as the illegal access to the network and the use of its services with no intention to pay service charges or making money by using these services, while fraud detection is referred to as a try to detect illegal usage of a communication network [2]. However telecommunication operators worldwide have lost a significant amount of revenue losses caused by bypass fraud which often called subscriber identity module (SIMbox) fraud. This loss was estimated to be ($2 billion) in 2009, and then increased more than %44 in 2011 ($2.8 billion) according to Communications Fraud Control Association (CFCA) Fraud Survey 2011 [3]. In addition to financial losses, fraud may cause danger, loss of service, loss of customer confidence, hurting reputation of network operators and may threaten national security of the affected country. These reasons were the main motivations to do this work in trying to put limits for this problem and protect operators against the fraudsters. Although some revenue assurance and fraud management vendors provide detection fraud services, but the large amount of daily cellular traffic, advanced technologies used by fraudsters and inability to find definitive solution, all these obstacles make finding a good solution is extremely challenging [4]. Therefore, it is believed that with the help of improved fraud detection models and developing new techniques, fraudulent activities in mobile communication networks can be exposed and prevented, and this would be beneficial to the network operators to minimize the losses [2] [5]. The common approaches or techniques that used to combat against bypass frauds have been the use of monitoring calling patterns and profiles through fraud management systems (FMS) and the use of test call generators (TCG). Both approaches, having their own set of merits in terms of accuracy, coverage and flexibility, also suffer from drawbacks which make the use of any individual technique against bypass fraud, insufficient [3]. In this work we utilize user profiling approach which depends on analyzing the subscriber s (SIMs) activity and behavior based on detection patterns, then using fuzzy logic in
2 decision making process. Based on the fuzzy logic results we decide that certain SIM card is suspicious one. This paper is organized into four sections. Section II overview bypass fraud in mobile networks and illustrates it with basic example, sections III propose a detection technique based on specific approach, explain methods and theories that used in this technique, section IV reviews papers for previous studies in same field, and section V concludes the paper. II. BYPASS FRAUD IN MOBILE NETWORKS The development of the telecommunication and technology, and the big size of telecom market that found very attractive to fraudsters, the traditional types of fraud has been replaced with more complex ways of frauds that was spread too fast in the world. Types of fraud can be divided into fraud in traditional networks, this type has many ways such as subscription fraud, which is the signing up for a service using fake or stolen identification, with no commitment of paying the bills. And other types such as SIM cloning, premium Rate Service (PRS) fraud, internal fraud, dealer fraud, roaming fraud, calling card fraud, PBX fraud and fraud in PSTN [2] [3]. The other type is fraud in Voice over IP (VoIP) networks which can be done by using VoIP technique. As example of this type: Arbitrage fraud, call transfer fraud, location route number (LRN) fraud and bypass fraud. In this work we focus on bypass fraud which is the most type of fraud used in international calls [5] [6]. Bypass fraud also is also known to as interconnect fraud, or GSM VoIP gateway fraud and Subscriber Identity Module box (SIMbox) fraud. Generally, bypass fraud route utilizes a VoIP gateway and an attached GSM Gateway (SIMbox) in the destination country [7]. SIMbox devices are telecommunication devices that can install large numbers of SIM cards. SIMbox uses VoIP technologies to enable international mobile calls to be routed through VoIP directly into a relevant GSM network [6]. This scenario requires that the fraudsters have access to advanced technology. Bypass fraud uses several of least cost call termination techniques like SIMboxes to bypass the legal call interconnection and diverting international incoming calls to "on" or "off" network (GSM /CDMA) calls with VoIP or satellite gateway, which is making international calls appear to be local calls. Thus avoid paying charges for international calls termination which operators and government regulators are entitled to [3] [6]. Fig. 1. Basic Bypass fraud structure [3]. Figure 1 shows an example of how SIMbox bypass fraud occurs in international phone calls. When the caller in A party make international call to B party, the legitimate case, once A dials B s number, the call is routed through the cellular infrastructure of operator A to a least cost route (LCR) carrier. Based on an agreement between operator B and the LCR carrier, the call is routed to operator B s cellular core network. The LCR carrier pays operator B a fee in order to have the call terminated. Then the call is routed through the operator B s cellular infrastructure and is delivered to called party [4]. The fraud occurs when a fraudulent LCR carrier hijacks A s party call and forwards it to called party in country B over the Internet, e.g. via VoIP. Then in country B, a SIMbox (an associate of the fraudulent LCR carrier) transforms the incoming VoIP flow into a local mobile call to called party, and the operator in country B loses the termination fee for the hijacked call [4]. SIMbox generate important revenue losses by bypassing official interconnections, causing issues for many mobile operators. SIMboxes also have a negative impact on call quality and customer satisfaction, due to call redirection, inaccessible services and missing callbacks and compromise the cellular network infrastructure by overloading local base stations serving these devices [3][4]. If a fraudster uses his own network s connections to terminate the bypassed calls (on-net bypass), this ensures maximum international to national terminating charge profit margins for the fraudulent parties involved in the fraud business. As the on-net calls are expected to provide the least national calling rates, some modern bypass equipment (SIMboxes, computer programs etc.) scan the terminating party numbers and originate calls only from those connections which belong to the same operator s network as the terminating party [3].
3 III. THE PROPOSED TECHNIQUE A. Fraud Detection Approaches Techniques used for fraud detection fall into two primary classes: statistical techniques and artificial intelligence [8]. Statistical data analysis techniques such as: data preprocessing, calculation of various statistical parameters, clustering and classification and computing user profiles. Artificial Intelligence such as: machine learning techniques, neural networks, pattern recognition to detect patterns of suspicious behavior, decision theory, link analysis and fuzzy logic. The proposed technique to deal with this problem is based on using user profiling approach and fuzzy logic (FL) for decision making process. This technique has been designed and implemented in a program. B. Data Acquisition Telecommunication companies need an effective and accurate billing system to be able to assure their revenue. Billing systems process the usage of network equipment that is used during the service usage into a single Call Detail Record (CDR). For that, the employed method in this work for data collection is by getting the call detail record (CDR) from telecommunication company. A sample of real call detail record (CDR) from Almadar Aljadid Company, a mobile operator in Libya was obtained and analyzed. We don t know if contains fraud or not. The CDR contains approximately 65 fields, only 11 fields were used in the detection process. The fields are shown in table 1. CDR Field Time Date Duration Call identification number Originating number Terminating number Service type Originating IMSI Terminating IMSI Table. 1. Call Detail Record fields [9] Description Time of a call Date of a call Call duration Identifies the call component Phone number of a caller party Phone number of a called party Mobile originated/terminated Call or SMS International Mobile Subscriber Identity for calling subscriber International Mobile Subscriber Identity for called subscriber First Location Information Last Location Information C. Detection Patterns Contains information about the first cell information. Contains information about the last cell information at disconnection. Five detection patterns were extracted from the sample of CDR. These five patterns are valuable in detection process. These detection patterns are as following [10]: 1. No or low mobility: this pattern represents the number of calls for subscribers without mobility. 2. Ratio of incoming to outgoing calls: this pattern represents the number of outgoing calls for subscribers with no incoming calls. 3. Use only voice service (no usage of SMS, MMS, GPRS, etc.): this pattern represents the number of outgoing voice calls for subscribers without using other services such as (SMS, MMS, GPRS sessions, etc.). 4. Suspicious activity in close proximity (hot cell site calling): This pattern represents the number of subscribers that they make voice calls within the same location (cell site). 5. Calls during irregular hours, unusual night long calls: this pattern is represents the number of irregular voice calls (long midnight calls) for subscribers. These patterns are implemented and thresholds are set by the operators analysts. The methods are continually monitoring the network traffic and keep statistics for a given time period. If the threshold is reached, a possible fraud situation is detected. Then the analysts decide on each situation if this is a real fraud situation and what actions to take by the operator [11]. We extracted detection patterns from CDR sample by using structured query language (SQL) queries, then we found the (Max, Min) values for each detection pattern, the (Max, Min) values were used for designing the membership function and fuzzy rules by using membership function equation, as illustrated in Figure 2. D. Fuzzy Logic The fuzzy set theory is taking the same logical approach as what people have been doing with the classical set theory. In the classical set theory, the two-valued characteristic function has been defined and adopted. In the fuzzy set case; a multivalued characteristic function (the membership function) has been chosen and fixed [12]. Fuzzy logic is a form of manyvalued logic; it deals with reasoning that is approximate rather than fixed and exact. Compared to traditional binary sets (Classical logic) that only takes just two values (where
4 variables may take on true or false values 0,1) fuzzy logic variables may have a truth value that ranges in degree between 0 and 1 known as a membership function [13]. In this work, we used fuzzy logic to make the decision (determine which SIM cards are used in fraud). Membership Function (MF): A fuzzy set A is a subset of the universe of discourse X that admits partial memberships. The fuzzy set A is defined as an ordered pair A = {x, μ(x)}, where x Є X, and 0<= μa(x) <= 1. The membership function μa(x) describes the degree to which the object x belongs to the set A. μa(x) = 0 represents no membership, and μa(x) = 1 represents full membership [13]. Fuzzy Rules: Human beings make decisions based on rules. Although, we may not be aware of it, all the decisions we make are all based on computer like if-then statements. If the weather is fine, then we may decide to go out for example [14]. A fuzzy system is a collection of membership functions and rules that are used to reason about data [12]. A fuzzy rule can be defined as a conditional statement [15]. As the following form: IF x is A THEN y is B Where x and y are linguistic variables, and A and B are linguistic values determined by fuzzy sets on the universe of discourses X and Y, respectively. In classical rule-based systems, if the rule antecedent (the condition) is true, then the consequent (the result) is also true. In fuzzy systems, where the condition is a fuzzy statement, all rules are corrected to a defined range, i.e. they are partially correct. If the antecedent is true to some degree of membership, then the result is also true to same degree [16]. For example, rules in a fuzzy form can be represented as: Rule: 1 IF THEN Rule: 2 IF THEN "Number of calls at night" is "little" "The result of test" is "SIM card is legal" "Number of calls at night" is "much "The result of test" is "SIM card is fraud" In Rule 1: the condition is fuzzy. So the result of condition (SIM card is legal) is correct in a ratio which is equal to the membership of the variable "number of calls at night" in the set "little". Also In Rule 2: the condition is fuzzy, so the result of condition (SIM card is fraud) is correct in a ratio which is equal to the membership of the variable "number of calls at night" in the set "much". The linguistic variable "number of calls at night" also has the range (the universe of discourse), but this range may include fuzzy sets, such as small, medium and large. The universe of discourse of the linguistic variable "Result of test" can include fuzzy sets such as very correct, correct and incorrect. Thus fuzzy rules related to fuzzy sets. The consequent of a fuzzy rule can also include multiple parts [17]. Fig. 2. Flowchart of detection patterns extraction process. Figure 2 shows the processes of extraction detection patterns from CDR and how designing membership function for each. The fuzzy system in this technique used triangular membership function for all detection patterns, by knowing the (Max, Min) values for detection patterns which extracted from database (CDR) and then calculate the membership value by using the next equation (1): Xi = Value Min Max Min Where (Xi) is the membership function value of one of detection patterns for certain subscriber, Min is the minimum value for certain detection pattern, Max is the maximum value for certain detection pattern. If any subscriber has all detection patterns with high membership function value (y) by using the next equation (2), it can be considered as potential case of fraud.
5 x1 + x2 + x3 + x4 + xn y = n Where (y) is sum of membership function (MF) for all detection patterns (x1, x2, x3, x4, x5) divided by (n), the number of patterns which found for this subscriber. The final result is fraud score (y), its value between (0 1) and represent the fraud membership function of certain subscriber which has all or some detection patterns depending founded patterns. also he should set the thresholds for fraud value (accuracy level). Then he selects specific or all patterns that he want to know if this SIM card has and click on the search button. If this SIM card has fraud score MF value more than the entered threshold value, then the program will consider it as possible case of fraud and will shows information and history of calls for this SIM card. This program can be very helpful for the mobile operators to verify possible SIMbox fraud. Figure 4 shows the graphical user interface of the program and results. E. Detection Technique Processes The general proposed technique and its verification processes are illustrated in figure 3. Fig. 4. Graphical User Interface (GUI) of the program IV. RELATED WORK Hollmén, Jaakko User profiling and classification for fraud detection in mobile communications networks [18]. This paper used user profiling and classification techniques, neural networks and probabilistic models are employed in learning usage patterns from call data. Fig. 3. The general diagram of the proposed technique We developed program with friendly user interface that designed and programmed by using C# programming language in order to implement the detection technique, we used Microsoft Visual Studio 2008 as integrated development environment (IDE), and then connected to Microsoft SQL Server 2008 that used to managing and processing input data (CDR). The analyzer who will be using the program should enter the IMSI number for any SIM card that he wants to verify and Rosas, Eugénio, and Cesar Analide Telecommunications Fraud: Problem Analysis-an Agentbased KDD Perspective [11]. The paper proposed an approach, based on the profiling and KDD (Knowledge Discovery in Data) techniques, supported in MAS (Multiagent System). Elmi, Abdikarim Hussein, Subariah Ibrahim, and Roselina Sallehuddin Detecting SIMbox fraud using neural network [19]. In this paper a supervised learning method was applied using Multi-layer perceptron (MLP) as a classifier, and a total of nine features used in identifying SIMbox fraud, subscriber are derived from the attributes of the Customer Database Record (CDR), Artificial Neural Networks (ANN) had shown classification accuracy of %. Murynets, Ilona, Michael Zabarankin, Roger Piqueras Jover, and Adam Panagia Analysis and Detection of
6 SIMbox Fraud in Mobility Networks [4]. The paper proposed novel classifiers for fraudulent SIMbox detection in mobility networks, fraudulent SIMboxes are observed to have static physical locations and to generate disproportionately large volume of outgoing calls, and the operator s fraud department confirmed that the algorithm succeeds in detecting new fraudulent SIMboxes. V. CONCLUSION We have analyzed traffic of mobile network (CDR) for a certain part of time to profiling and knowing the behavior of users in order to get a detection patterns (features) for these users (SIMs). After that, we have found a (Max, Min) values for every detection pattern, then we used these values in fuzzy logic membership equation to get the membership function for any SIM card in every pattern, to know if this SIM card perhaps a suspicious case of fraud or not based on value of membership function for all patterns (fraud score), all these processes was implemented and processed in program. The results of the program depend on input database (CDR), is it contains fraud or not. The result of fuzzy logic membership function (MF) of patterns depends on extracted values from CDR for each detection pattern (Max, Min). We had used the program and we got some results (fraud score) for SIMs cards which can be considered as fraud, but we don t have fraud data that can be used to test the results of the program, and we couldn t test or verify the results by the company s fraud department by using test call or other verification method to confirm the fraud happening in these SIMs. By using profiling with fuzzy logic in this technique can be more flexible and reliable in dealing with huge amount of input data (CDR). The profiling process can be updated every now and then, and the values of pattern (Max, Min) can be changed depending on input data (CDR) and accuracy and efficiency of the program s results. For the future work we will add more detection patterns (features) and giving weights for each of them based on its importance and effectiveness for improving the performance and accuracy of the technique. ACKNOWLEDGMENT We are grateful to the office of Research and Development (R&D) in Almadar Aljadid for Telecommunication in Libya to their support and cooperation in doing this research work. REFERENCES [1] F. N. Ogwueleka, fraud detection in mobile communications networks using user profiling and classification techniques. Journal of science and technology, vol. 29, no. 3 (2009), pp [2] Aranuwa FO (2013). Hybridized intelligent data analysis model for fraud detection in mobile communication networks. Acad. J. Sci. Res. 1(5): [3] Subex Inc. White Paper Bypass Fraud- Are you getting it right?. Available at: [4] Murynets, Ilona, Michael Zabarankin, Roger Piqueras Jover, and Adam Panagia. "Analysis and Detection of SIMbox Fraud in Mobility Networks." [5] YacineRebahi, Jens Fiedler, FabricioGouveia. SCAMSTOP: Scams and Fraud Detection in Voice over IP Networks, FraunhoferFokus, INRIA, TEIMES, PDMFC, Telio, VozTelecom.8-13, [6] TransNexus, Inc. Introduction to VoIP Fraud White Paper. (2012). Available at: [7] Three Ways to Reduce Exposure to Bypass Fraud, The Risk Management Group, May Available at: [8] G.K. Palshikar, The Hidden Truth Frauds and Their Control: A Critical Application for Business Intelligence, Intelligent Enterprise, vol. 5, no. 9, 28 May 2002, pp [9] Ericsson Gmbh Common Charging Output Asn.1 Result. 1/ Fay /11 Uen A. 6-12, , 2012 [10] Nokia Siemens Networks, Battling illegal call operations with Fraud Management Systems, (2-10), December 09, [11] Rosas, Eugénio, and Cesar Analide. "Telecommunications Fraud: Problem Analysis-an Agent-based KDD Perspective." Aveiro: EPIA (2009). [12] Tanaka, Kazuo. "An introduction to fuzzy logic for practical applications." (1997). [13] L. A. Zadeh. "Fuzzy Sets". Information and Control 8 (3) , [14] Cádiz, Rodrigo F. "A fuzzy logic model for compositional approaches to audio-visual media." Proceedings of the International Computer Music Conference [15] Dixit, Prakash Mahadeo, and Uday S. Dixit. Modeling of metal forming and machining processes: by finite element and soft computing methods. Springer, [16] Ponce-Cruz, Pedro, Fernando D. Ramírez-Figueroa, and Fernando D. Ramírez-Figueroa. Intelligent control systems with LabVIEW. Vol London, UK:: Springer, [17] Negnevitsky, Michael. Artificial intelligence: a guide to intelligent systems. Pearson Education, [18] Hollmén, Jaakko. User profiling and classification for fraud detection in mobile communications networks. Helsinki University of Technology, [19] Elmi, Abdikarim Hussein, Subariah Ibrahim, and Roselina Sallehuddin. "Detecting sim box fraud using neural network." IT Convergence and Security Springer Netherlands,
Fraud Detection in International Calls Using Fuzzy Logic
Fraud Detection in International Calls Using Fuzzy Logic Osama Mohamed Elrajubi, Hussein Marah, Abdulla A. Abouda Abstract Telecommunications fraud is a problem that affects operators and telecommunication
More informationPredictive SIM Box Fraud Detection Model for ethio telecom
Predictive SIM Box Fraud Detection Model for ethio telecom Feven Fesseha HiLCoE, Software Engineering Programme, Ethiopia feven.fesseha@ethiotelecom.et Mesfin Kifle HiLCoE, Ethiopia Department of Computer
More informationAnalysis and Detection of Fraud in International Calls Using Decision Tree
Analysis and Detection of Fraud in International Calls Using Decision Tree Ahmed Aljarray and Abdulla Abouda Almadar Aljadid R&D Office, Libya-Misrata Abstract. fraud is one of the most severe threats
More informationDetecting SIM Box Fraud Using Neural Network
Detecting SIM Box Fraud Using Neural Network Abdikarim Hussein Elmi, Subariah Ibrahim and Roselina Sallehuddin Abstract One of the most severe threats to revenue and quality of service in telecom providers
More informationCourse Outline Comprehensive Training on Bypass/SIM Box Fraud Detection and Termination Duration: 3 Days
Course Outline Comprehensive Training on Bypass/SIM Box Fraud Detection and Termination Duration: 3 Days Title: Comprehensive Training on Bypass/SIM Box Fraud: Detection and Termination Duration: 3 day
More informationFraude dans la Telephonie
Fraude dans la Telephonie Aurélien Francillon Merve Sahin With Monaco Telecom Also with cooperations: NYU Abu Dhabi Georgia Tech Telecom Paris Tech (Marc Relieu) Telephony Fraud A long-standing problem
More informationWe will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are:
Introduction to Telecom Fraud This guide will help you learn about the different types of telecom fraud and industry best practices for detection and prevention. Three Major Categories of Telecom Fraud
More informationNuno Pestana, WeDo Technologies
Nuno Pestana, WeDo Technologies SUBSCRIPTION FRAUD SUBSCRIPTION FRAUD In Raid FMS REAL-TIME Subscription Fraud SUBSCRIPTION FRAUD SUBSCRIPTION FRAUD In Raid FMS REAL-TIME Subscription Fraud FRAUD THE IMPACT
More informationJournal of Applied and Physical Sciences 2016, 2(3): 77-81
Journal of Applied and Physical Sciences JAPS 2016, 2(3): 77-81 PRIMARY RESEARCH Dynamic detection system design of fraud simbox to improve quality service of international incoming call Edi Sukamto 1*,
More informationE N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G. W U G M a l a y s i a
E N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G W U G M a l a y s i a 2 0 1 7 CONTACTS NUNO PESTANA FRAUD PROFESSIONAL SERVICES MANAGER +351 939 651 481 nuno.pestana@wedotechnol
More information@First Anti Fraud Interconnect Roaming & Security of Transactions
@First Anti Fraud Interconnect Roaming & Security of Transactions Pierre Paufique, Vice President Customer Service Operations & Fraud, Cost and Revenue Assurance, International Carriers, Orange agenda
More informationPaper on Handling Menace of International Grey Traffic
Paper on Handling Menace of International Grey Traffic White Paper 01 of 2012 PiRRC In this paper discussion is only about the conventional international voice telephony requiring a license to bring in
More informationOver-The-Top Bypass: Study of a Recent Telephony Fraud
Over-The-Top Bypass: Study of a Recent Telephony Fraud Merve Sahin Eurecom & Monaco Digital Security Agency merve.sahin@eurecom.fr Aurélien Francillon Eurecom aurelien.francillon@eurecom.fr ABSTRACT In
More informationMavenir Spam and Fraud Control
SOLUTION BRIEF Assuring Operator Revenue and A2P Grey Route Monetization Operators are realizing the scale and potential of A2P (Application to Person) messaging revenues, and how advances in messaging
More informationTelecommunications Fraud: Problem Analysis - an Agent-based KDD Perspective
Telecommunications Fraud: Problem Analysis - an Agent-based KDD Perspective Eugénio Rosas and Cesar Analide Department of Informatics University of Minho Braga, Portugal eugeniorosas@gmail.com, analide@di.uminho.pt
More informationREAL-TIME FRAUD DETECTION IN TELECOMMUNICATION NETWORK USING CALL PATTERN ANALYSIS
REAL-TIME FRAUD DETECTION IN TELECOMMUNICATION NETWORK USING CALL PATTERN ANALYSIS Kehelwala Gamaralalage Dasun Chamara Kehelwala (148223L) Degree of Master of Science Department of Computer Science and
More informationExpress Monitoring 2019
Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities
More informationWhite Paper. Bypass Fraud- Are you getting it right?
White Paper Bypass Fraud- Are you getting it right? Contents Abstract Bypass Fraud is big Huge losses from Bypass Fraud Different techniques used to detect Bypass Fraud Best bet! Combine TCG and FMS to
More informationTelephony Fraud and Abuse. Merve Sahin
Telephony Fraud and Abuse Merve Sahin sahin@eurecom.fr Background 2 Telephony Networks Quick history 1870s: Plain Old Telephone System (POTS) Enabled by transmission of voice over copper lines Used in-band
More informationHOW TO SELECT A SECURITY-BASED MESSAGING PARTNER. Six key features to consider when choosing a mission-critical messaging partner for your business.
HOW TO SELECT A SECURITY-BASED MESSAGING PARTNER Six key features to consider when choosing a mission-critical messaging partner for your business. MESSAGING MEANS BUSINESS Text messaging (or SMS) is a
More informationThe strategies for preventing telecom fraud in EACO countries
The strategies for preventing telecom fraud in EACO countries 25 th May 2011 Protais KANYANKORE RWANDA UTILITIES REGULATORY AGENCY Table of contents 1. Overview on Grey traffic Affected areas Who is involved
More informationReducing Telecoms Fraud Losses
Reducing Telecoms Fraud Losses A Telsis White Paper Intelligence for Your Network Introduction According to the Communication Fraud Control Association (CFCA), fraud costs the telecoms industry 1.69% of
More informationInterconnection and Roaming
Interconnection and Roaming Operator Business Slide 1 Importance of Interconnection Operator s perspective Connectivity =>Network effect => Customer satisfaction =>Revenue Slide 2 Types of interconnections
More informationQuad BRI GSM Gateway with 8 GSM Ports
Quad BRI GSM Gateway with 8 GSM Ports HG-2000/3U Cost Saving Customer Premises Equipment with Carrier Grade Performance Product Description November 2009 Contents Next Page Hypermedia HG-2000/3U 3 Contents
More informationThe unbundling of international roaming
The unbundling of international roaming There have been times that automatic international roaming did not exist. Already in the 1980 s some early type of a roaming service was available. The caller needed
More informationITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum
ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum Roaming Service in Sudan improvement & Challenges Zain, MTN & Sudani Content - Telecom
More informationDavid Morrow. Preventing PBX Fraud. -basic steps to help secure your PBX. prevention will always be cheaper than cure
David Morrow Preventing PBX Fraud -basic steps to help secure your PBX prevention will always be cheaper than cure Contents 1 About the Guide 3 2 What you need to know 3 3 What you need to Do 6 4 If you
More informationHOW TO ANALYZE AND UNDERSTAND YOUR NETWORK
Handbook HOW TO ANALYZE AND UNDERSTAND YOUR NETWORK Part 3: Network Traffic Monitoring or Packet Analysis? by Pavel Minarik, Chief Technology Officer at Flowmon Networks www.flowmon.com In previous two
More informationPOSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ)
POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ) POSTAL AND TELECOMMUNICATIONS PERFORMANCE REPORT SECTOR THIRD QUARTER Disclaimer: This report has been prepared based on data provided
More informationMobile TeleSystems (MTS) Converges Fixed and Mobile Telephony
Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony MTS creates new revenue opportunities with new services. EXECUTIVE SUMMARY Mobile TeleSystems (MTS) Industry: Telecommunications BUSINESS CHALLENGE
More informationRouting & Addressing FORUM. Carlos Dasilva, Orange. presented by. May 26, The opportunities and the issues given by
i3 FORUM www.i3forum.org Routing & Addressing The opportunities and the issues given by alternatives routing and addressing schemes. presented by Carlos Dasilva, Orange May 26, 2011 Agenda I3forum Objectives
More informationModern IP Communication bears risks
Modern IP Communication bears risks How to protect your business telephony from cyber attacks Voice-over-IP (VoIP) provides many new features over PSTN. However, the interconnection with your IT infrastructure
More informationAAA Authentication: New Use Cases
AAA Authentication: New Use Cases An AdvOSS Solution White Paper Authors: Farhan Zaidi and Fawad Pasha Contact: {farhan.zaidi, fawadpasha}@advoss.com Whitepaper URL www.advoss.com/resources/whitepapers/aaa-authentication-new-usecases.pdf
More informationThe Truth About IoT / M2M Cellular Roaming
The Truth About IoT / M2M Cellular Roaming Aeris White Paper www.aeris.com THE TRUTH ABOUT M2M / IOT CELLULAR ROAMING COPYRIGHT 2016, AERIS COMMUNICATIONS, INC. i Let our experts lead the way Table of
More informationPositive Technologies Telecom Attack Discovery DATA SHEET
Positive Technologies Telecom Attack Discovery DATA SHEET PT TELECOM ATTACK DISCOVERY DATA SHEET CELLULAR NETWORK SECURITY COMPLICATIONS As is shown in the network analysis performed by Positive Technologies
More informationInternational Journal of Mechatronics, Electrical and Computer Technology
Identification of Mazandaran Telecommunication Company Fixed phone subscribers using H-Means and W-K-Means Algorithm Abstract Yaser Babagoli Ahangar 1*, Homayon Motameni 2 and Ramzanali Abasnejad Varzi
More informationOver 20 years of experience in the international telecom market.
The Ultimate Choice OUR COMPANY With more than two decades of proven track record in the telecom business, PROTEL S.A.L. OFFSHORE is a key global voice carrier headquartered in Beirut, Lebanon. As a leading
More informationMOBILE VOICE SERVICE SCHEDULE
MOBILE VOICE SERVICE SCHEDULE 1. About this document This Service Schedule forms part your Contract. In the event of any inconsistency between this Service Schedule and another clause of your Contract,
More informationHypermedia HG-4000/3U. VoIP GSM Gateway. Cost Saving Customer Premises Equipment with Carrier Grade Performance. Product Description January 2013
Hypermedia HG-4000/3U VoIP GSM Gateway Cost Saving Customer Premises Equipment with Carrier Grade Performance Product Description January 2013 Contents Next Page Hypermedia HG-4000/3U 2 Contact Information
More informationMavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales
Mavenir Keynote Think Smarter Secure communication Innovate Services By Mohamed Issa Regional Head of Africa Sales The New Mavenir: Combining Market Leaders Combing three industry-leading companies to
More informationChapter2. Current Status of Information and Communications
Chapter2 Current Status of Information and Communications Section 1 Telecommunications Business 1. Telecommunications market Sales of Japan s telecommunication business reached 14.5910 trillion yen in
More informationBasics of GSM in depth
This document will be helpful for the telecom engineers who deal with GSM as well as for the fresher /interested readers. This document has some advantages over other GSM texts in that it quickly gets
More informationTREATMENT OFOVER THETOP (OTT) SERVICES
ICT OPEN FORUM SHOULD OTT SERVICES BE REGULATED? TREATMENT OFOVER THETOP (OTT) SERVICES JUNE, 2015 PRESENTED BY: ANNIE BALDEO KIRK SOOKRAM Outline Background Overview of OTT services Impact of OTT services
More informationGLOSSARY OF CELLUAR TERMS
GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service
More informationTerms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber
Terms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber Section 1 General 1.1 This Terms and Conditions of Mobile Phone Service shall be effective between Advanced Wireless
More informationRecord Linkage using Probabilistic Methods and Data Mining Techniques
Doi:10.5901/mjss.2017.v8n3p203 Abstract Record Linkage using Probabilistic Methods and Data Mining Techniques Ogerta Elezaj Faculty of Economy, University of Tirana Gloria Tuxhari Faculty of Economy, University
More informationRepresentative office in Russia: Representative office in Great Britain:
a British company that develops services in the field of telecommunications now offers a unique platform for creating your own virtual mobile network (MVNO) Representative office in Russia: +7 499 649
More informationNuance Loop Voice & Data Credit
Nuance Loop Voice & Data Credit 2018 Nuance Communications, Inc. All rights reserved 2 Nuance Loop - delivering increased revenue and ARPU for mobile operators Mobile operators face increasing pressure
More informationResponse to Portfolio Committee on Communications. Measures to Reduce Interconnection Rates and High Costs of Telecommunications in South Africa
Response to Portfolio Committee on Communications Measures to Reduce Interconnection Rates and High Costs of Telecommunications in South Africa 1 Mobile Termination Rates Interconnection Rate to Mobile
More informationEnter a description and the IP address of each gateway (). Treat SIP providers as gateways.
Configuration Wizard At the end of the setup the Imagicle Billing wizard will start automatically. Note: the Wizard can be manually started through the "Configure Imagicle Billing" link from the Imagicle
More informationGuillaume Le Mener Head of Marketing & Corporate Development Mavenir. Leonardo Hilario Planning & Project Manager Telefónica Hispanoamérica
Guillaume Le Mener Head of Marketing & Corporate Development Mavenir Leonardo Hilario Planning & Project Manager Telefónica Hispanoamérica Securing New Revenue from Messaging Fraud Prevention Telefonica
More informationNational Travel Associates
National Travel Associates Fraud Prevention Module 2012 National Travel Associates Fraud In The Travel Industry With the popularity of online booking engines in the 90 s there was a huge insurgence of
More informationCloud PBX: Real world scenarios
Cloud PBX: Real world scenarios Ralph Eckhard Ralph Eckhard IT Architect @ PeopleWare ICT Modern Workplace / M365 www.365dude.nl @ralpje Elements of Skype for Business Online Skype for Business (E1,E3,E5)
More informationNokia Conference Call Fourth Quarter 2010 and Full Year 2010 Financial Results
Nokia Conference Call Fourth Quarter 2010 and Full Year 2010 Financial Results January 27, 2011 15.00 Helsinki time 8.00 New York time Stephen Elop President and CEO Timo Ihamuotila CFO Matt Shimao Head
More informationBlueWater Software Constant Innovation by Orca Wave
BlueWater Software Constant Innovation by Orca Wave Overview: Revenue assurance, cost management and delivering key and timely information to BlueWater Users; are operational pillars of our BlueWater software
More informationInternational Roaming. User Guide
International Roaming User Guide 1 Table of Contents What is International Roaming?... 2 Getting International Roaming... 2 How International Roaming works... 2 Just before you go... 2 What you need to
More informationRECOMMENDATION ITU-R M SECURITY PRINCIPLES FOR INTERNATIONAL MOBILE TELECOMMUNICATIONS-2000 (IMT-2000) (Question ITU-R 39/8) TABLE OF CONTENTS
Rec. ITU-R M.1078 1 RECOMMENDATION ITU-R M.1078 SECURITY PRINCIPLES FOR INTERNATIONAL MOBILE TELECOMMUNICATIONS-2000 (IMT-2000) (Question ITU-R 39/8) Rec. ITU-R M.1078 (1994) TABLE OF CONTENTS 1. Introduction...
More informationTelephony Fraud Detection in Next Generation Networks
Telephony Fraud Detection in Next Generation Networks Simon Augustin, Carmen Gaißer, Julian Knauer, Michael Massoth, Katrin Piejko, David Rihm and Torsten Wiens Department of Computer Science Hochschule
More informationPay as you go Terms and Charges
Pay as you go Terms and Charges Would you prefer this information in large print, on disk, or in Braille? Call our specialist accessibility team on 03333 043 222 or email disability.access@vodafone.co.uk
More informationBelZo Mobile. Multi IMSI SIM User Guide I WELCOME TO MULTI IMSI SIM USER GUIDE. Belzo. [Category: Key-Distributor Prospects]
Belzo WELCOME TO BelZo Mobile MULTI IMSI SIM USER GUIDE [Category: Key-Distributor Prospects] 1 Getting Started The enclosed SIM card connects you to the BelZo global network. Break out the SIM card from
More informationNOKIA FINANCIAL RESULTS Q3 / 2012
Nokia Internal Use Only NOKIA FINANCIAL RESULTS Q3 / 2012 Conference Call October 18, 2012 15.00 / Helsinki 08.00 / New York Stephen Elop / President & CEO Timo Ihamuotila / CFO Matt Shimao / Head of Investor
More informationDavid Morrow Group Corporate Security Fraud Manager Vodafone Group Services Limited.
David Morrow Group Corporate Security Fraud Manager Vodafone Group Services Limited www.i3forum.org GSM Association Fraud Forum Presentation to i3 Forum David Morrow, Vodafone Document Number Meeting Date
More informationNokia Conference Call 1Q 2012 Financial Results
Nokia Internal Use Only Nokia Conference Call 1Q 2012 Financial Results April 19 th, 2012 15.00 Helsinki time 8.00 New York time Stephen Elop President & CEO Timo Ihamuotila CFO Matt Shimao Head of Investor
More informationTelecommunications market data tables Q2 2015
Telecommunications market data tables Q2 2015 1 Market monitor 2 Fixed telecoms market data tables 3 Mobile telecoms market data tables Published: 12 November 2015-1 - 1. Market monitor In the following
More informationTelecommunications market data tables Q1 2016
Telecommunications market data tables Q1 2016 1 Market monitor 2 Fixed telecoms market data tables 3 Mobile telecoms market data tables Published: 11 August 2016-1 - 1. Market monitor In the following
More informationSprint Security Support Services for Schedule No. 11*
Sprint Security Support Services are designed to minimize the vulnerability of Sprint's voice services customers to certain outbound international and inbound domestic toll free communications fraud originating
More informationThe following table sets out major indicators of our business development in 2001, 2002 and 2003.
The following table sets out major indicators of our business development in 2001, 2002 and 2003. Change 2003 over 2001 2002 2003 2002 Local wireline access lines in service (in thousands) 80,834 96,788
More informationMTN Zambia. Per Eriksson CEO
MTN Zambia Per Eriksson CEO Overview Population 11.5m (Dec 07) Market sizing 5.9m (2012) Penetration 13% (Dec 07) Economics GDP/Capita $950 Inflation 10% (2008 E) Local rates 182 T-Bill, 12.3% Currency
More informationOutlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data
Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Ms. Gayatri Attarde 1, Prof. Aarti Deshpande 2 M. E Student, Department of Computer Engineering, GHRCCEM, University
More informationThe Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
More informationIP-Telephony & VOIP. VOIP Definitions. Packetize (IP) Transport. Digitize and Compress
Eng. Abdulla Jassmi Head of Tariff Settlement Telecom Economics & Tariff Settlement ITU TAS Meeting ( 31 May 3 Jun 2005) IP Telephony & VoIP. Agenda - VoIP definition. - Advantages and disadvantages of
More informationA MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS Vilnius, October 2005 Page
More informationPOSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ)
POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ) POSTAL AND TELECOMMUNICATIONS SECTOR PERFORMANCE REPORT FOURTH QUARTER 2015 Disclaimer: This report has been prepared based on data
More informationFraud classification and recommendations on dispute handling within the wholesale telecom industry Release May 2014
INTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP i3 FORUM (www.i3forum.org) Fraud classification and recommendations on dispute handling within the wholesale telecom industry Release 3.0 - May
More informationInterconnection and Roaming. Interconnection Business interfaces in Internet
Interconnection and Roaming S-38.041 Networking Business Slide 1 Interconnection Business interfaces in Internet Access ISP Transit ISP 9 4 Peering point/bilateral agreements (Network Access Point, NAP)
More informationFixed Mobile Convergence
Cisco Expo 2006 Fixed Mobile Convergence Business Track Bo Finnemann Cisco DK 2006 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda, Fixed Mobile Convergence Market Perspective What
More informationFreecoms VoIP Mobile Community Telecom S. Ferrari, page n 1»
Freecoms VoIP Mobile Community Telecom S. Ferrari, page n 1» Multiservice Mobile VoIP Community Powerful multiservice package: Home and Mobile VoIP communication. Business and Private WEB Portal community
More informationNotice to our customers regarding Toll Fraud
Notice to our customers regarding Toll Fraud - Beware of Toll Fraud. - Toll Fraud is a crime against you. Bizfon isn't responsible for your Toll Fraud. - You need to take steps to protect yourself from
More informationOur Vision. Our Mission
While you re still wondering, others have already started. It s time for you to be the first, to be a pioneer in the telecom industry with Monty Mobile. www.montymobile.com About Monty Mobile Founded in
More informationPT Indosat Tbk. First Half 2006 Results. First Half 2006 Results Page 1
PT Indosat Tbk First Half 2006 Results First Half 2006 Results Page 1 Key Highlights in 1H 2006 (YoY) Cellular Subscribers growth by 7.7% Operating revenues Flat (-0.2%) MIDI revenues increased by 13.1%
More informationDigital Agenda Scoreboard 2017 Electronic communications market indicators: Definitions, methodology and footnotes on Member State data
Digital Agenda Scoreboard 2017 Electronic communications market indicators: Definitions, methodology and footnotes on Member State data Financial indicators, fixed and mobile telephony, broadcasting and
More informationMobile Charging. Emphasis on Business and Subscriber Aspects
Mobile Charging Emphasis on Business and Subscriber Aspects Content Introduction Basic Subscription Models Different subscription set-ups Postpaid & Prepaid charging Offline & online charging Mobile content
More informationENTERPRISE VOICE SERVICE TERMS. Enterprise Voice Service Terms
Enterprise Voice Service Terms Contents 1. How these Service Terms work... 3 2. Our Obligations... 3 3. Your Obligations... 3 4. Emergency Calls... 4 5. Service Constraints... 4 6. Number Porting... 5
More informationTelio Holding ASA Q4 06 presentation
Telio Holding ASA Q4 06 presentation Telio Holding ASA Leading European broadband telephony provider Committed to improving user experience and reducing cost to subscribers Innovative products and services
More informationNetwork Protocol Analysis: A New Tool for Blocking International Bypass Fraud Before Revenue is Lost
Network Protocol Analysis: A New Tool for Blocking International Bypass Fraud Before Revenue is Lost How to Defend Your Network Against the New SIM Server Threat A WHITEPAPER BY SPONSORED BY The international
More informationARCT. co consumer ISSUE. ES committe EACO GUIDELINES G SERVISES (DRAFT)
ARCT EACO GUIDELINES G ON ROAMIN NG SERVISES (DRAFT) Eac co consumer ISSUE ES committe ee TABLE OF CONTENTS 1. INTRODUCTION 3 1.1 BACKGROUND 3 1.2 OBJECTIVE OF THE GUIDELINES 3 1.3 OVERVIEW OF THE GUIDELINES
More informationProject Proposal for:
Page1 Project Proposal for: Asterisk IP Telephony Mobility Facility Over the existing Office LAN/WAN and Wi-Fi Network, WiMAX, 3G/4G, CDMA, and GSM Technology Solutions & Design For: o Commercial Bank
More informationAutomated Call Quality, CLI and Performance Testing
. Automated Call Quality, CLI and Performance Testing 2 itest The most comprehensive test platform available. itest is a testing and performance monitoring platform designed specifically for the 21st Century
More informationBRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers
1 BRIDGE TO GLOBAL MARKET FOR MVNOs Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers How to compete with big MNOs on equal terms 2 Your
More informationKeywords Fuzzy, Set Theory, KDD, Data Base, Transformed Database.
Volume 6, Issue 5, May 016 ISSN: 77 18X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Fuzzy Logic in Online
More informationFuzzy Reasoning. Outline
Fuzzy Reasoning Outline Introduction Bivalent & Multivalent Logics Fundamental fuzzy concepts Fuzzification Defuzzification Fuzzy Expert System Neuro-fuzzy System Introduction Fuzzy concept first introduced
More informationChapter 4 Fuzzy Logic
4.1 Introduction Chapter 4 Fuzzy Logic The human brain interprets the sensory information provided by organs. Fuzzy set theory focus on processing the information. Numerical computation can be performed
More informationVoLTE: Particularities from Measurements to Analysis. Haarlem, Alberto Pérez
VoLTE: Particularities from Measurements to Analysis Haarlem, 9.5.2016 Alberto Pérez Omnitele Ltd. 2016 2agenda > 1. Introduction 2. VoLTE a new old technology 3. Measuring VoLTE Test Scenarios 4. Analysing
More informationVOIP²ALL SERIES. 4 Channel Gateway User Guide. Version 5.38
VOIP²ALL SERIES 4 Channel Gateway User Guide Version 5.38 Contents CONTENTS 1. INTRODUCTION TO THE VOIP²ALL GATEWAY... 4 1.1. The VoIP²ALL Gateway Solution Overview... 4 1.2. About this Manual... 5 1.3.
More informationMARKET OBSERVATORY : THE TELECOMMUNICATIONS SERVICES MARKET IN FRANCE AT THE FOURTH QUARTER 2004 (declared operators) May 2005
: THE TELECOMMUNICATIONS SERVICES MARKET IN FRANCE AT THE FOURTH QUARTER 20 (declared operators) May 25 2 Introduction At the fourth quarter 20, the electronic communications market in France represented
More informationINTRODUCTION TO NUMBER PORTABILITY
INTRODUCTION TO NUMBER PORTABILITY With this whitepaper Rabión Consultancy aims to provide a quick and broad overview of number portability. Number portability is arguably the most visible instrument a
More informationAnalysis of interconnect usage charges in India
Viewpoint Analysis of interconnect usage charges in India Sourabh Kaushal April 2011 2 Summary: Analysis of interconnect usage charges in India In India the Interconnect Usage Charges (IUC) were introduced
More informationUnbundling roaming services. An effective way to create competition for roaming services in the European Union
Unbundling roaming services An effective way to create competition for roaming services in the European Union 1 Overview > Short summary of the solution > Key factors in choosing one structural solution
More informationKeep the Door Open for Users and Closed to Hackers
Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According
More informationVoIP Theft of Service Protecting Your Network. Introduction to VoIP Theft of Service. Meet our Expert Phone Power
VoIP Theft of Service Protecting Your Network Introduction to VoIP Theft of Service The truth is you just aren t a phone company until you ve had a run-in with telecom fraud. VoIP fraud is a significant
More information