Fraud Detection in International Calls Using Fuzzy Logic

Size: px
Start display at page:

Download "Fraud Detection in International Calls Using Fuzzy Logic"

Transcription

1 Fraud Detection in International Calls Using Fuzzy Logic Hussein M. Marah Faculty of Information Technology Misurata University Misurata, Libya Osama Mohamed Elrajubi Faculty of Information Technology Misurata University Misurata, Libya Abdulla A. Abouda Almadar Aljadid Company Research and Development Office Misurata, Libya Abstract Fraud is a problem that affects operators and telecommunication companies all around the world. One of the most known fraud is the bypass fraud, which is used in international calls in order to avoid access charges and making profits. This kind of fraud causes severe losses in revenue to operators with other negative side effects. In this paper a new fraud detection technique is proposed. The proposed technique depends on user profiling and using fuzzy logic. Fuzzy logic was used in decision making process by utilizing fuzzy logic membership function. A real database from mobile operator company Almadar Aljadid in Libya is used in this investigation. Five features are extracted and employed as detection patterns in the proposed technique. The five features or detection patterns are, subscriber s mobility, incoming to outgoing calls ratio, suspicious cell activity, irregular calls, and service type. Keywords bypass fraud; international calls; fraud detection technique; user profiling; fuzzy logic; detection patterns. I. INTRODUCTION Following the huge growth in telecommunication networks in the last years, which became so important part in our lives, the service providers and telecommunication companies face a new big challenge, fraud with all different types. That was spreading so fast with millions of dollars profits around the world. Generally, Fraud in telecommunications networks can be characterized by fraud conditions, which essentially describe how the fraudster gained the illegitimate access to the network [1]. The problem of the fraudulent use of mobile phones is a common thing to communication service providers which causes billions of dollars losses in annual revenue. By definition, fraud in communication networks can be defined as the illegal access to the network and the use of its services with no intention to pay service charges or making money by using these services, while fraud detection is referred to as a try to detect illegal usage of a communication network [2]. However telecommunication operators worldwide have lost a significant amount of revenue losses caused by bypass fraud which often called subscriber identity module (SIMbox) fraud. This loss was estimated to be ($2 billion) in 2009, and then increased more than %44 in 2011 ($2.8 billion) according to Communications Fraud Control Association (CFCA) Fraud Survey 2011 [3]. In addition to financial losses, fraud may cause danger, loss of service, loss of customer confidence, hurting reputation of network operators and may threaten national security of the affected country. These reasons were the main motivations to do this work in trying to put limits for this problem and protect operators against the fraudsters. Although some revenue assurance and fraud management vendors provide detection fraud services, but the large amount of daily cellular traffic, advanced technologies used by fraudsters and inability to find definitive solution, all these obstacles make finding a good solution is extremely challenging [4]. Therefore, it is believed that with the help of improved fraud detection models and developing new techniques, fraudulent activities in mobile communication networks can be exposed and prevented, and this would be beneficial to the network operators to minimize the losses [2] [5]. The common approaches or techniques that used to combat against bypass frauds have been the use of monitoring calling patterns and profiles through fraud management systems (FMS) and the use of test call generators (TCG). Both approaches, having their own set of merits in terms of accuracy, coverage and flexibility, also suffer from drawbacks which make the use of any individual technique against bypass fraud, insufficient [3]. In this work we utilize user profiling approach which depends on analyzing the subscriber s (SIMs) activity and behavior based on detection patterns, then using fuzzy logic in

2 decision making process. Based on the fuzzy logic results we decide that certain SIM card is suspicious one. This paper is organized into four sections. Section II overview bypass fraud in mobile networks and illustrates it with basic example, sections III propose a detection technique based on specific approach, explain methods and theories that used in this technique, section IV reviews papers for previous studies in same field, and section V concludes the paper. II. BYPASS FRAUD IN MOBILE NETWORKS The development of the telecommunication and technology, and the big size of telecom market that found very attractive to fraudsters, the traditional types of fraud has been replaced with more complex ways of frauds that was spread too fast in the world. Types of fraud can be divided into fraud in traditional networks, this type has many ways such as subscription fraud, which is the signing up for a service using fake or stolen identification, with no commitment of paying the bills. And other types such as SIM cloning, premium Rate Service (PRS) fraud, internal fraud, dealer fraud, roaming fraud, calling card fraud, PBX fraud and fraud in PSTN [2] [3]. The other type is fraud in Voice over IP (VoIP) networks which can be done by using VoIP technique. As example of this type: Arbitrage fraud, call transfer fraud, location route number (LRN) fraud and bypass fraud. In this work we focus on bypass fraud which is the most type of fraud used in international calls [5] [6]. Bypass fraud also is also known to as interconnect fraud, or GSM VoIP gateway fraud and Subscriber Identity Module box (SIMbox) fraud. Generally, bypass fraud route utilizes a VoIP gateway and an attached GSM Gateway (SIMbox) in the destination country [7]. SIMbox devices are telecommunication devices that can install large numbers of SIM cards. SIMbox uses VoIP technologies to enable international mobile calls to be routed through VoIP directly into a relevant GSM network [6]. This scenario requires that the fraudsters have access to advanced technology. Bypass fraud uses several of least cost call termination techniques like SIMboxes to bypass the legal call interconnection and diverting international incoming calls to "on" or "off" network (GSM /CDMA) calls with VoIP or satellite gateway, which is making international calls appear to be local calls. Thus avoid paying charges for international calls termination which operators and government regulators are entitled to [3] [6]. Fig. 1. Basic Bypass fraud structure [3]. Figure 1 shows an example of how SIMbox bypass fraud occurs in international phone calls. When the caller in A party make international call to B party, the legitimate case, once A dials B s number, the call is routed through the cellular infrastructure of operator A to a least cost route (LCR) carrier. Based on an agreement between operator B and the LCR carrier, the call is routed to operator B s cellular core network. The LCR carrier pays operator B a fee in order to have the call terminated. Then the call is routed through the operator B s cellular infrastructure and is delivered to called party [4]. The fraud occurs when a fraudulent LCR carrier hijacks A s party call and forwards it to called party in country B over the Internet, e.g. via VoIP. Then in country B, a SIMbox (an associate of the fraudulent LCR carrier) transforms the incoming VoIP flow into a local mobile call to called party, and the operator in country B loses the termination fee for the hijacked call [4]. SIMbox generate important revenue losses by bypassing official interconnections, causing issues for many mobile operators. SIMboxes also have a negative impact on call quality and customer satisfaction, due to call redirection, inaccessible services and missing callbacks and compromise the cellular network infrastructure by overloading local base stations serving these devices [3][4]. If a fraudster uses his own network s connections to terminate the bypassed calls (on-net bypass), this ensures maximum international to national terminating charge profit margins for the fraudulent parties involved in the fraud business. As the on-net calls are expected to provide the least national calling rates, some modern bypass equipment (SIMboxes, computer programs etc.) scan the terminating party numbers and originate calls only from those connections which belong to the same operator s network as the terminating party [3].

3 III. THE PROPOSED TECHNIQUE A. Fraud Detection Approaches Techniques used for fraud detection fall into two primary classes: statistical techniques and artificial intelligence [8]. Statistical data analysis techniques such as: data preprocessing, calculation of various statistical parameters, clustering and classification and computing user profiles. Artificial Intelligence such as: machine learning techniques, neural networks, pattern recognition to detect patterns of suspicious behavior, decision theory, link analysis and fuzzy logic. The proposed technique to deal with this problem is based on using user profiling approach and fuzzy logic (FL) for decision making process. This technique has been designed and implemented in a program. B. Data Acquisition Telecommunication companies need an effective and accurate billing system to be able to assure their revenue. Billing systems process the usage of network equipment that is used during the service usage into a single Call Detail Record (CDR). For that, the employed method in this work for data collection is by getting the call detail record (CDR) from telecommunication company. A sample of real call detail record (CDR) from Almadar Aljadid Company, a mobile operator in Libya was obtained and analyzed. We don t know if contains fraud or not. The CDR contains approximately 65 fields, only 11 fields were used in the detection process. The fields are shown in table 1. CDR Field Time Date Duration Call identification number Originating number Terminating number Service type Originating IMSI Terminating IMSI Table. 1. Call Detail Record fields [9] Description Time of a call Date of a call Call duration Identifies the call component Phone number of a caller party Phone number of a called party Mobile originated/terminated Call or SMS International Mobile Subscriber Identity for calling subscriber International Mobile Subscriber Identity for called subscriber First Location Information Last Location Information C. Detection Patterns Contains information about the first cell information. Contains information about the last cell information at disconnection. Five detection patterns were extracted from the sample of CDR. These five patterns are valuable in detection process. These detection patterns are as following [10]: 1. No or low mobility: this pattern represents the number of calls for subscribers without mobility. 2. Ratio of incoming to outgoing calls: this pattern represents the number of outgoing calls for subscribers with no incoming calls. 3. Use only voice service (no usage of SMS, MMS, GPRS, etc.): this pattern represents the number of outgoing voice calls for subscribers without using other services such as (SMS, MMS, GPRS sessions, etc.). 4. Suspicious activity in close proximity (hot cell site calling): This pattern represents the number of subscribers that they make voice calls within the same location (cell site). 5. Calls during irregular hours, unusual night long calls: this pattern is represents the number of irregular voice calls (long midnight calls) for subscribers. These patterns are implemented and thresholds are set by the operators analysts. The methods are continually monitoring the network traffic and keep statistics for a given time period. If the threshold is reached, a possible fraud situation is detected. Then the analysts decide on each situation if this is a real fraud situation and what actions to take by the operator [11]. We extracted detection patterns from CDR sample by using structured query language (SQL) queries, then we found the (Max, Min) values for each detection pattern, the (Max, Min) values were used for designing the membership function and fuzzy rules by using membership function equation, as illustrated in Figure 2. D. Fuzzy Logic The fuzzy set theory is taking the same logical approach as what people have been doing with the classical set theory. In the classical set theory, the two-valued characteristic function has been defined and adopted. In the fuzzy set case; a multivalued characteristic function (the membership function) has been chosen and fixed [12]. Fuzzy logic is a form of manyvalued logic; it deals with reasoning that is approximate rather than fixed and exact. Compared to traditional binary sets (Classical logic) that only takes just two values (where

4 variables may take on true or false values 0,1) fuzzy logic variables may have a truth value that ranges in degree between 0 and 1 known as a membership function [13]. In this work, we used fuzzy logic to make the decision (determine which SIM cards are used in fraud). Membership Function (MF): A fuzzy set A is a subset of the universe of discourse X that admits partial memberships. The fuzzy set A is defined as an ordered pair A = {x, μ(x)}, where x Є X, and 0<= μa(x) <= 1. The membership function μa(x) describes the degree to which the object x belongs to the set A. μa(x) = 0 represents no membership, and μa(x) = 1 represents full membership [13]. Fuzzy Rules: Human beings make decisions based on rules. Although, we may not be aware of it, all the decisions we make are all based on computer like if-then statements. If the weather is fine, then we may decide to go out for example [14]. A fuzzy system is a collection of membership functions and rules that are used to reason about data [12]. A fuzzy rule can be defined as a conditional statement [15]. As the following form: IF x is A THEN y is B Where x and y are linguistic variables, and A and B are linguistic values determined by fuzzy sets on the universe of discourses X and Y, respectively. In classical rule-based systems, if the rule antecedent (the condition) is true, then the consequent (the result) is also true. In fuzzy systems, where the condition is a fuzzy statement, all rules are corrected to a defined range, i.e. they are partially correct. If the antecedent is true to some degree of membership, then the result is also true to same degree [16]. For example, rules in a fuzzy form can be represented as: Rule: 1 IF THEN Rule: 2 IF THEN "Number of calls at night" is "little" "The result of test" is "SIM card is legal" "Number of calls at night" is "much "The result of test" is "SIM card is fraud" In Rule 1: the condition is fuzzy. So the result of condition (SIM card is legal) is correct in a ratio which is equal to the membership of the variable "number of calls at night" in the set "little". Also In Rule 2: the condition is fuzzy, so the result of condition (SIM card is fraud) is correct in a ratio which is equal to the membership of the variable "number of calls at night" in the set "much". The linguistic variable "number of calls at night" also has the range (the universe of discourse), but this range may include fuzzy sets, such as small, medium and large. The universe of discourse of the linguistic variable "Result of test" can include fuzzy sets such as very correct, correct and incorrect. Thus fuzzy rules related to fuzzy sets. The consequent of a fuzzy rule can also include multiple parts [17]. Fig. 2. Flowchart of detection patterns extraction process. Figure 2 shows the processes of extraction detection patterns from CDR and how designing membership function for each. The fuzzy system in this technique used triangular membership function for all detection patterns, by knowing the (Max, Min) values for detection patterns which extracted from database (CDR) and then calculate the membership value by using the next equation (1): Xi = Value Min Max Min Where (Xi) is the membership function value of one of detection patterns for certain subscriber, Min is the minimum value for certain detection pattern, Max is the maximum value for certain detection pattern. If any subscriber has all detection patterns with high membership function value (y) by using the next equation (2), it can be considered as potential case of fraud.

5 x1 + x2 + x3 + x4 + xn y = n Where (y) is sum of membership function (MF) for all detection patterns (x1, x2, x3, x4, x5) divided by (n), the number of patterns which found for this subscriber. The final result is fraud score (y), its value between (0 1) and represent the fraud membership function of certain subscriber which has all or some detection patterns depending founded patterns. also he should set the thresholds for fraud value (accuracy level). Then he selects specific or all patterns that he want to know if this SIM card has and click on the search button. If this SIM card has fraud score MF value more than the entered threshold value, then the program will consider it as possible case of fraud and will shows information and history of calls for this SIM card. This program can be very helpful for the mobile operators to verify possible SIMbox fraud. Figure 4 shows the graphical user interface of the program and results. E. Detection Technique Processes The general proposed technique and its verification processes are illustrated in figure 3. Fig. 4. Graphical User Interface (GUI) of the program IV. RELATED WORK Hollmén, Jaakko User profiling and classification for fraud detection in mobile communications networks [18]. This paper used user profiling and classification techniques, neural networks and probabilistic models are employed in learning usage patterns from call data. Fig. 3. The general diagram of the proposed technique We developed program with friendly user interface that designed and programmed by using C# programming language in order to implement the detection technique, we used Microsoft Visual Studio 2008 as integrated development environment (IDE), and then connected to Microsoft SQL Server 2008 that used to managing and processing input data (CDR). The analyzer who will be using the program should enter the IMSI number for any SIM card that he wants to verify and Rosas, Eugénio, and Cesar Analide Telecommunications Fraud: Problem Analysis-an Agentbased KDD Perspective [11]. The paper proposed an approach, based on the profiling and KDD (Knowledge Discovery in Data) techniques, supported in MAS (Multiagent System). Elmi, Abdikarim Hussein, Subariah Ibrahim, and Roselina Sallehuddin Detecting SIMbox fraud using neural network [19]. In this paper a supervised learning method was applied using Multi-layer perceptron (MLP) as a classifier, and a total of nine features used in identifying SIMbox fraud, subscriber are derived from the attributes of the Customer Database Record (CDR), Artificial Neural Networks (ANN) had shown classification accuracy of %. Murynets, Ilona, Michael Zabarankin, Roger Piqueras Jover, and Adam Panagia Analysis and Detection of

6 SIMbox Fraud in Mobility Networks [4]. The paper proposed novel classifiers for fraudulent SIMbox detection in mobility networks, fraudulent SIMboxes are observed to have static physical locations and to generate disproportionately large volume of outgoing calls, and the operator s fraud department confirmed that the algorithm succeeds in detecting new fraudulent SIMboxes. V. CONCLUSION We have analyzed traffic of mobile network (CDR) for a certain part of time to profiling and knowing the behavior of users in order to get a detection patterns (features) for these users (SIMs). After that, we have found a (Max, Min) values for every detection pattern, then we used these values in fuzzy logic membership equation to get the membership function for any SIM card in every pattern, to know if this SIM card perhaps a suspicious case of fraud or not based on value of membership function for all patterns (fraud score), all these processes was implemented and processed in program. The results of the program depend on input database (CDR), is it contains fraud or not. The result of fuzzy logic membership function (MF) of patterns depends on extracted values from CDR for each detection pattern (Max, Min). We had used the program and we got some results (fraud score) for SIMs cards which can be considered as fraud, but we don t have fraud data that can be used to test the results of the program, and we couldn t test or verify the results by the company s fraud department by using test call or other verification method to confirm the fraud happening in these SIMs. By using profiling with fuzzy logic in this technique can be more flexible and reliable in dealing with huge amount of input data (CDR). The profiling process can be updated every now and then, and the values of pattern (Max, Min) can be changed depending on input data (CDR) and accuracy and efficiency of the program s results. For the future work we will add more detection patterns (features) and giving weights for each of them based on its importance and effectiveness for improving the performance and accuracy of the technique. ACKNOWLEDGMENT We are grateful to the office of Research and Development (R&D) in Almadar Aljadid for Telecommunication in Libya to their support and cooperation in doing this research work. REFERENCES [1] F. N. Ogwueleka, fraud detection in mobile communications networks using user profiling and classification techniques. Journal of science and technology, vol. 29, no. 3 (2009), pp [2] Aranuwa FO (2013). Hybridized intelligent data analysis model for fraud detection in mobile communication networks. Acad. J. Sci. Res. 1(5): [3] Subex Inc. White Paper Bypass Fraud- Are you getting it right?. Available at: [4] Murynets, Ilona, Michael Zabarankin, Roger Piqueras Jover, and Adam Panagia. "Analysis and Detection of SIMbox Fraud in Mobility Networks." [5] YacineRebahi, Jens Fiedler, FabricioGouveia. SCAMSTOP: Scams and Fraud Detection in Voice over IP Networks, FraunhoferFokus, INRIA, TEIMES, PDMFC, Telio, VozTelecom.8-13, [6] TransNexus, Inc. Introduction to VoIP Fraud White Paper. (2012). Available at: [7] Three Ways to Reduce Exposure to Bypass Fraud, The Risk Management Group, May Available at: [8] G.K. Palshikar, The Hidden Truth Frauds and Their Control: A Critical Application for Business Intelligence, Intelligent Enterprise, vol. 5, no. 9, 28 May 2002, pp [9] Ericsson Gmbh Common Charging Output Asn.1 Result. 1/ Fay /11 Uen A. 6-12, , 2012 [10] Nokia Siemens Networks, Battling illegal call operations with Fraud Management Systems, (2-10), December 09, [11] Rosas, Eugénio, and Cesar Analide. "Telecommunications Fraud: Problem Analysis-an Agent-based KDD Perspective." Aveiro: EPIA (2009). [12] Tanaka, Kazuo. "An introduction to fuzzy logic for practical applications." (1997). [13] L. A. Zadeh. "Fuzzy Sets". Information and Control 8 (3) , [14] Cádiz, Rodrigo F. "A fuzzy logic model for compositional approaches to audio-visual media." Proceedings of the International Computer Music Conference [15] Dixit, Prakash Mahadeo, and Uday S. Dixit. Modeling of metal forming and machining processes: by finite element and soft computing methods. Springer, [16] Ponce-Cruz, Pedro, Fernando D. Ramírez-Figueroa, and Fernando D. Ramírez-Figueroa. Intelligent control systems with LabVIEW. Vol London, UK:: Springer, [17] Negnevitsky, Michael. Artificial intelligence: a guide to intelligent systems. Pearson Education, [18] Hollmén, Jaakko. User profiling and classification for fraud detection in mobile communications networks. Helsinki University of Technology, [19] Elmi, Abdikarim Hussein, Subariah Ibrahim, and Roselina Sallehuddin. "Detecting sim box fraud using neural network." IT Convergence and Security Springer Netherlands,

Fraud Detection in International Calls Using Fuzzy Logic

Fraud Detection in International Calls Using Fuzzy Logic Fraud Detection in International Calls Using Fuzzy Logic Osama Mohamed Elrajubi, Hussein Marah, Abdulla A. Abouda Abstract Telecommunications fraud is a problem that affects operators and telecommunication

More information

Predictive SIM Box Fraud Detection Model for ethio telecom

Predictive SIM Box Fraud Detection Model for ethio telecom Predictive SIM Box Fraud Detection Model for ethio telecom Feven Fesseha HiLCoE, Software Engineering Programme, Ethiopia feven.fesseha@ethiotelecom.et Mesfin Kifle HiLCoE, Ethiopia Department of Computer

More information

Analysis and Detection of Fraud in International Calls Using Decision Tree

Analysis and Detection of Fraud in International Calls Using Decision Tree Analysis and Detection of Fraud in International Calls Using Decision Tree Ahmed Aljarray and Abdulla Abouda Almadar Aljadid R&D Office, Libya-Misrata Abstract. fraud is one of the most severe threats

More information

Detecting SIM Box Fraud Using Neural Network

Detecting SIM Box Fraud Using Neural Network Detecting SIM Box Fraud Using Neural Network Abdikarim Hussein Elmi, Subariah Ibrahim and Roselina Sallehuddin Abstract One of the most severe threats to revenue and quality of service in telecom providers

More information

Course Outline Comprehensive Training on Bypass/SIM Box Fraud Detection and Termination Duration: 3 Days

Course Outline Comprehensive Training on Bypass/SIM Box Fraud Detection and Termination Duration: 3 Days Course Outline Comprehensive Training on Bypass/SIM Box Fraud Detection and Termination Duration: 3 Days Title: Comprehensive Training on Bypass/SIM Box Fraud: Detection and Termination Duration: 3 day

More information

Fraude dans la Telephonie

Fraude dans la Telephonie Fraude dans la Telephonie Aurélien Francillon Merve Sahin With Monaco Telecom Also with cooperations: NYU Abu Dhabi Georgia Tech Telecom Paris Tech (Marc Relieu) Telephony Fraud A long-standing problem

More information

We will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are:

We will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are: Introduction to Telecom Fraud This guide will help you learn about the different types of telecom fraud and industry best practices for detection and prevention. Three Major Categories of Telecom Fraud

More information

Nuno Pestana, WeDo Technologies

Nuno Pestana, WeDo Technologies Nuno Pestana, WeDo Technologies SUBSCRIPTION FRAUD SUBSCRIPTION FRAUD In Raid FMS REAL-TIME Subscription Fraud SUBSCRIPTION FRAUD SUBSCRIPTION FRAUD In Raid FMS REAL-TIME Subscription Fraud FRAUD THE IMPACT

More information

Journal of Applied and Physical Sciences 2016, 2(3): 77-81

Journal of Applied and Physical Sciences 2016, 2(3): 77-81 Journal of Applied and Physical Sciences JAPS 2016, 2(3): 77-81 PRIMARY RESEARCH Dynamic detection system design of fraud simbox to improve quality service of international incoming call Edi Sukamto 1*,

More information

E N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G. W U G M a l a y s i a

E N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G. W U G M a l a y s i a E N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G W U G M a l a y s i a 2 0 1 7 CONTACTS NUNO PESTANA FRAUD PROFESSIONAL SERVICES MANAGER +351 939 651 481 nuno.pestana@wedotechnol

More information

@First Anti Fraud Interconnect Roaming & Security of Transactions

@First Anti Fraud Interconnect Roaming & Security of Transactions @First Anti Fraud Interconnect Roaming & Security of Transactions Pierre Paufique, Vice President Customer Service Operations & Fraud, Cost and Revenue Assurance, International Carriers, Orange agenda

More information

Paper on Handling Menace of International Grey Traffic

Paper on Handling Menace of International Grey Traffic Paper on Handling Menace of International Grey Traffic White Paper 01 of 2012 PiRRC In this paper discussion is only about the conventional international voice telephony requiring a license to bring in

More information

Over-The-Top Bypass: Study of a Recent Telephony Fraud

Over-The-Top Bypass: Study of a Recent Telephony Fraud Over-The-Top Bypass: Study of a Recent Telephony Fraud Merve Sahin Eurecom & Monaco Digital Security Agency merve.sahin@eurecom.fr Aurélien Francillon Eurecom aurelien.francillon@eurecom.fr ABSTRACT In

More information

Mavenir Spam and Fraud Control

Mavenir Spam and Fraud Control SOLUTION BRIEF Assuring Operator Revenue and A2P Grey Route Monetization Operators are realizing the scale and potential of A2P (Application to Person) messaging revenues, and how advances in messaging

More information

Telecommunications Fraud: Problem Analysis - an Agent-based KDD Perspective

Telecommunications Fraud: Problem Analysis - an Agent-based KDD Perspective Telecommunications Fraud: Problem Analysis - an Agent-based KDD Perspective Eugénio Rosas and Cesar Analide Department of Informatics University of Minho Braga, Portugal eugeniorosas@gmail.com, analide@di.uminho.pt

More information

REAL-TIME FRAUD DETECTION IN TELECOMMUNICATION NETWORK USING CALL PATTERN ANALYSIS

REAL-TIME FRAUD DETECTION IN TELECOMMUNICATION NETWORK USING CALL PATTERN ANALYSIS REAL-TIME FRAUD DETECTION IN TELECOMMUNICATION NETWORK USING CALL PATTERN ANALYSIS Kehelwala Gamaralalage Dasun Chamara Kehelwala (148223L) Degree of Master of Science Department of Computer Science and

More information

Express Monitoring 2019

Express Monitoring 2019 Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities

More information

White Paper. Bypass Fraud- Are you getting it right?

White Paper. Bypass Fraud- Are you getting it right? White Paper Bypass Fraud- Are you getting it right? Contents Abstract Bypass Fraud is big Huge losses from Bypass Fraud Different techniques used to detect Bypass Fraud Best bet! Combine TCG and FMS to

More information

Telephony Fraud and Abuse. Merve Sahin

Telephony Fraud and Abuse. Merve Sahin Telephony Fraud and Abuse Merve Sahin sahin@eurecom.fr Background 2 Telephony Networks Quick history 1870s: Plain Old Telephone System (POTS) Enabled by transmission of voice over copper lines Used in-band

More information

HOW TO SELECT A SECURITY-BASED MESSAGING PARTNER. Six key features to consider when choosing a mission-critical messaging partner for your business.

HOW TO SELECT A SECURITY-BASED MESSAGING PARTNER. Six key features to consider when choosing a mission-critical messaging partner for your business. HOW TO SELECT A SECURITY-BASED MESSAGING PARTNER Six key features to consider when choosing a mission-critical messaging partner for your business. MESSAGING MEANS BUSINESS Text messaging (or SMS) is a

More information

The strategies for preventing telecom fraud in EACO countries

The strategies for preventing telecom fraud in EACO countries The strategies for preventing telecom fraud in EACO countries 25 th May 2011 Protais KANYANKORE RWANDA UTILITIES REGULATORY AGENCY Table of contents 1. Overview on Grey traffic Affected areas Who is involved

More information

Reducing Telecoms Fraud Losses

Reducing Telecoms Fraud Losses Reducing Telecoms Fraud Losses A Telsis White Paper Intelligence for Your Network Introduction According to the Communication Fraud Control Association (CFCA), fraud costs the telecoms industry 1.69% of

More information

Interconnection and Roaming

Interconnection and Roaming Interconnection and Roaming Operator Business Slide 1 Importance of Interconnection Operator s perspective Connectivity =>Network effect => Customer satisfaction =>Revenue Slide 2 Types of interconnections

More information

Quad BRI GSM Gateway with 8 GSM Ports

Quad BRI GSM Gateway with 8 GSM Ports Quad BRI GSM Gateway with 8 GSM Ports HG-2000/3U Cost Saving Customer Premises Equipment with Carrier Grade Performance Product Description November 2009 Contents Next Page Hypermedia HG-2000/3U 3 Contents

More information

The unbundling of international roaming

The unbundling of international roaming The unbundling of international roaming There have been times that automatic international roaming did not exist. Already in the 1980 s some early type of a roaming service was available. The caller needed

More information

ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum

ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum Roaming Service in Sudan improvement & Challenges Zain, MTN & Sudani Content - Telecom

More information

David Morrow. Preventing PBX Fraud. -basic steps to help secure your PBX. prevention will always be cheaper than cure

David Morrow. Preventing PBX Fraud. -basic steps to help secure your PBX. prevention will always be cheaper than cure David Morrow Preventing PBX Fraud -basic steps to help secure your PBX prevention will always be cheaper than cure Contents 1 About the Guide 3 2 What you need to know 3 3 What you need to Do 6 4 If you

More information

HOW TO ANALYZE AND UNDERSTAND YOUR NETWORK

HOW TO ANALYZE AND UNDERSTAND YOUR NETWORK Handbook HOW TO ANALYZE AND UNDERSTAND YOUR NETWORK Part 3: Network Traffic Monitoring or Packet Analysis? by Pavel Minarik, Chief Technology Officer at Flowmon Networks www.flowmon.com In previous two

More information

POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ)

POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ) POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ) POSTAL AND TELECOMMUNICATIONS PERFORMANCE REPORT SECTOR THIRD QUARTER Disclaimer: This report has been prepared based on data provided

More information

Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony

Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony Mobile TeleSystems (MTS) Converges Fixed and Mobile Telephony MTS creates new revenue opportunities with new services. EXECUTIVE SUMMARY Mobile TeleSystems (MTS) Industry: Telecommunications BUSINESS CHALLENGE

More information

Routing & Addressing FORUM. Carlos Dasilva, Orange. presented by. May 26, The opportunities and the issues given by

Routing & Addressing FORUM. Carlos Dasilva, Orange. presented by. May 26, The opportunities and the issues given by i3 FORUM www.i3forum.org Routing & Addressing The opportunities and the issues given by alternatives routing and addressing schemes. presented by Carlos Dasilva, Orange May 26, 2011 Agenda I3forum Objectives

More information

Modern IP Communication bears risks

Modern IP Communication bears risks Modern IP Communication bears risks How to protect your business telephony from cyber attacks Voice-over-IP (VoIP) provides many new features over PSTN. However, the interconnection with your IT infrastructure

More information

AAA Authentication: New Use Cases

AAA Authentication: New Use Cases AAA Authentication: New Use Cases An AdvOSS Solution White Paper Authors: Farhan Zaidi and Fawad Pasha Contact: {farhan.zaidi, fawadpasha}@advoss.com Whitepaper URL www.advoss.com/resources/whitepapers/aaa-authentication-new-usecases.pdf

More information

The Truth About IoT / M2M Cellular Roaming

The Truth About IoT / M2M Cellular Roaming The Truth About IoT / M2M Cellular Roaming Aeris White Paper www.aeris.com THE TRUTH ABOUT M2M / IOT CELLULAR ROAMING COPYRIGHT 2016, AERIS COMMUNICATIONS, INC. i Let our experts lead the way Table of

More information

Positive Technologies Telecom Attack Discovery DATA SHEET

Positive Technologies Telecom Attack Discovery DATA SHEET Positive Technologies Telecom Attack Discovery DATA SHEET PT TELECOM ATTACK DISCOVERY DATA SHEET CELLULAR NETWORK SECURITY COMPLICATIONS As is shown in the network analysis performed by Positive Technologies

More information

International Journal of Mechatronics, Electrical and Computer Technology

International Journal of Mechatronics, Electrical and Computer Technology Identification of Mazandaran Telecommunication Company Fixed phone subscribers using H-Means and W-K-Means Algorithm Abstract Yaser Babagoli Ahangar 1*, Homayon Motameni 2 and Ramzanali Abasnejad Varzi

More information

Over 20 years of experience in the international telecom market.

Over 20 years of experience in the international telecom market. The Ultimate Choice OUR COMPANY With more than two decades of proven track record in the telecom business, PROTEL S.A.L. OFFSHORE is a key global voice carrier headquartered in Beirut, Lebanon. As a leading

More information

MOBILE VOICE SERVICE SCHEDULE

MOBILE VOICE SERVICE SCHEDULE MOBILE VOICE SERVICE SCHEDULE 1. About this document This Service Schedule forms part your Contract. In the event of any inconsistency between this Service Schedule and another clause of your Contract,

More information

Hypermedia HG-4000/3U. VoIP GSM Gateway. Cost Saving Customer Premises Equipment with Carrier Grade Performance. Product Description January 2013

Hypermedia HG-4000/3U. VoIP GSM Gateway. Cost Saving Customer Premises Equipment with Carrier Grade Performance. Product Description January 2013 Hypermedia HG-4000/3U VoIP GSM Gateway Cost Saving Customer Premises Equipment with Carrier Grade Performance Product Description January 2013 Contents Next Page Hypermedia HG-4000/3U 2 Contact Information

More information

Mavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales

Mavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales Mavenir Keynote Think Smarter Secure communication Innovate Services By Mohamed Issa Regional Head of Africa Sales The New Mavenir: Combining Market Leaders Combing three industry-leading companies to

More information

Chapter2. Current Status of Information and Communications

Chapter2. Current Status of Information and Communications Chapter2 Current Status of Information and Communications Section 1 Telecommunications Business 1. Telecommunications market Sales of Japan s telecommunication business reached 14.5910 trillion yen in

More information

Basics of GSM in depth

Basics of GSM in depth This document will be helpful for the telecom engineers who deal with GSM as well as for the fresher /interested readers. This document has some advantages over other GSM texts in that it quickly gets

More information

TREATMENT OFOVER THETOP (OTT) SERVICES

TREATMENT OFOVER THETOP (OTT) SERVICES ICT OPEN FORUM SHOULD OTT SERVICES BE REGULATED? TREATMENT OFOVER THETOP (OTT) SERVICES JUNE, 2015 PRESENTED BY: ANNIE BALDEO KIRK SOOKRAM Outline Background Overview of OTT services Impact of OTT services

More information

GLOSSARY OF CELLUAR TERMS

GLOSSARY OF CELLUAR TERMS GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service

More information

Terms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber

Terms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber Terms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber Section 1 General 1.1 This Terms and Conditions of Mobile Phone Service shall be effective between Advanced Wireless

More information

Record Linkage using Probabilistic Methods and Data Mining Techniques

Record Linkage using Probabilistic Methods and Data Mining Techniques Doi:10.5901/mjss.2017.v8n3p203 Abstract Record Linkage using Probabilistic Methods and Data Mining Techniques Ogerta Elezaj Faculty of Economy, University of Tirana Gloria Tuxhari Faculty of Economy, University

More information

Representative office in Russia: Representative office in Great Britain:

Representative office in Russia: Representative office in Great Britain: a British company that develops services in the field of telecommunications now offers a unique platform for creating your own virtual mobile network (MVNO) Representative office in Russia: +7 499 649

More information

Nuance Loop Voice & Data Credit

Nuance Loop Voice & Data Credit Nuance Loop Voice & Data Credit 2018 Nuance Communications, Inc. All rights reserved 2 Nuance Loop - delivering increased revenue and ARPU for mobile operators Mobile operators face increasing pressure

More information

Response to Portfolio Committee on Communications. Measures to Reduce Interconnection Rates and High Costs of Telecommunications in South Africa

Response to Portfolio Committee on Communications. Measures to Reduce Interconnection Rates and High Costs of Telecommunications in South Africa Response to Portfolio Committee on Communications Measures to Reduce Interconnection Rates and High Costs of Telecommunications in South Africa 1 Mobile Termination Rates Interconnection Rate to Mobile

More information

Enter a description and the IP address of each gateway (). Treat SIP providers as gateways.

Enter a description and the IP address of each gateway (). Treat SIP providers as gateways. Configuration Wizard At the end of the setup the Imagicle Billing wizard will start automatically. Note: the Wizard can be manually started through the "Configure Imagicle Billing" link from the Imagicle

More information

Guillaume Le Mener Head of Marketing & Corporate Development Mavenir. Leonardo Hilario Planning & Project Manager Telefónica Hispanoamérica

Guillaume Le Mener Head of Marketing & Corporate Development Mavenir. Leonardo Hilario Planning & Project Manager Telefónica Hispanoamérica Guillaume Le Mener Head of Marketing & Corporate Development Mavenir Leonardo Hilario Planning & Project Manager Telefónica Hispanoamérica Securing New Revenue from Messaging Fraud Prevention Telefonica

More information

National Travel Associates

National Travel Associates National Travel Associates Fraud Prevention Module 2012 National Travel Associates Fraud In The Travel Industry With the popularity of online booking engines in the 90 s there was a huge insurgence of

More information

Cloud PBX: Real world scenarios

Cloud PBX: Real world scenarios Cloud PBX: Real world scenarios Ralph Eckhard Ralph Eckhard IT Architect @ PeopleWare ICT Modern Workplace / M365 www.365dude.nl @ralpje Elements of Skype for Business Online Skype for Business (E1,E3,E5)

More information

Nokia Conference Call Fourth Quarter 2010 and Full Year 2010 Financial Results

Nokia Conference Call Fourth Quarter 2010 and Full Year 2010 Financial Results Nokia Conference Call Fourth Quarter 2010 and Full Year 2010 Financial Results January 27, 2011 15.00 Helsinki time 8.00 New York time Stephen Elop President and CEO Timo Ihamuotila CFO Matt Shimao Head

More information

BlueWater Software Constant Innovation by Orca Wave

BlueWater Software Constant Innovation by Orca Wave BlueWater Software Constant Innovation by Orca Wave Overview: Revenue assurance, cost management and delivering key and timely information to BlueWater Users; are operational pillars of our BlueWater software

More information

International Roaming. User Guide

International Roaming. User Guide International Roaming User Guide 1 Table of Contents What is International Roaming?... 2 Getting International Roaming... 2 How International Roaming works... 2 Just before you go... 2 What you need to

More information

RECOMMENDATION ITU-R M SECURITY PRINCIPLES FOR INTERNATIONAL MOBILE TELECOMMUNICATIONS-2000 (IMT-2000) (Question ITU-R 39/8) TABLE OF CONTENTS

RECOMMENDATION ITU-R M SECURITY PRINCIPLES FOR INTERNATIONAL MOBILE TELECOMMUNICATIONS-2000 (IMT-2000) (Question ITU-R 39/8) TABLE OF CONTENTS Rec. ITU-R M.1078 1 RECOMMENDATION ITU-R M.1078 SECURITY PRINCIPLES FOR INTERNATIONAL MOBILE TELECOMMUNICATIONS-2000 (IMT-2000) (Question ITU-R 39/8) Rec. ITU-R M.1078 (1994) TABLE OF CONTENTS 1. Introduction...

More information

Telephony Fraud Detection in Next Generation Networks

Telephony Fraud Detection in Next Generation Networks Telephony Fraud Detection in Next Generation Networks Simon Augustin, Carmen Gaißer, Julian Knauer, Michael Massoth, Katrin Piejko, David Rihm and Torsten Wiens Department of Computer Science Hochschule

More information

Pay as you go Terms and Charges

Pay as you go Terms and Charges Pay as you go Terms and Charges Would you prefer this information in large print, on disk, or in Braille? Call our specialist accessibility team on 03333 043 222 or email disability.access@vodafone.co.uk

More information

BelZo Mobile. Multi IMSI SIM User Guide I WELCOME TO MULTI IMSI SIM USER GUIDE. Belzo. [Category: Key-Distributor Prospects]

BelZo Mobile. Multi IMSI SIM User Guide I WELCOME TO MULTI IMSI SIM USER GUIDE. Belzo. [Category: Key-Distributor Prospects] Belzo WELCOME TO BelZo Mobile MULTI IMSI SIM USER GUIDE [Category: Key-Distributor Prospects] 1 Getting Started The enclosed SIM card connects you to the BelZo global network. Break out the SIM card from

More information

NOKIA FINANCIAL RESULTS Q3 / 2012

NOKIA FINANCIAL RESULTS Q3 / 2012 Nokia Internal Use Only NOKIA FINANCIAL RESULTS Q3 / 2012 Conference Call October 18, 2012 15.00 / Helsinki 08.00 / New York Stephen Elop / President & CEO Timo Ihamuotila / CFO Matt Shimao / Head of Investor

More information

David Morrow Group Corporate Security Fraud Manager Vodafone Group Services Limited.

David Morrow Group Corporate Security Fraud Manager Vodafone Group Services Limited. David Morrow Group Corporate Security Fraud Manager Vodafone Group Services Limited www.i3forum.org GSM Association Fraud Forum Presentation to i3 Forum David Morrow, Vodafone Document Number Meeting Date

More information

Nokia Conference Call 1Q 2012 Financial Results

Nokia Conference Call 1Q 2012 Financial Results Nokia Internal Use Only Nokia Conference Call 1Q 2012 Financial Results April 19 th, 2012 15.00 Helsinki time 8.00 New York time Stephen Elop President & CEO Timo Ihamuotila CFO Matt Shimao Head of Investor

More information

Telecommunications market data tables Q2 2015

Telecommunications market data tables Q2 2015 Telecommunications market data tables Q2 2015 1 Market monitor 2 Fixed telecoms market data tables 3 Mobile telecoms market data tables Published: 12 November 2015-1 - 1. Market monitor In the following

More information

Telecommunications market data tables Q1 2016

Telecommunications market data tables Q1 2016 Telecommunications market data tables Q1 2016 1 Market monitor 2 Fixed telecoms market data tables 3 Mobile telecoms market data tables Published: 11 August 2016-1 - 1. Market monitor In the following

More information

Sprint Security Support Services for Schedule No. 11*

Sprint Security Support Services for Schedule No. 11* Sprint Security Support Services are designed to minimize the vulnerability of Sprint's voice services customers to certain outbound international and inbound domestic toll free communications fraud originating

More information

The following table sets out major indicators of our business development in 2001, 2002 and 2003.

The following table sets out major indicators of our business development in 2001, 2002 and 2003. The following table sets out major indicators of our business development in 2001, 2002 and 2003. Change 2003 over 2001 2002 2003 2002 Local wireline access lines in service (in thousands) 80,834 96,788

More information

MTN Zambia. Per Eriksson CEO

MTN Zambia. Per Eriksson CEO MTN Zambia Per Eriksson CEO Overview Population 11.5m (Dec 07) Market sizing 5.9m (2012) Penetration 13% (Dec 07) Economics GDP/Capita $950 Inflation 10% (2008 E) Local rates 182 T-Bill, 12.3% Currency

More information

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data

Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Outlier Detection Using Unsupervised and Semi-Supervised Technique on High Dimensional Data Ms. Gayatri Attarde 1, Prof. Aarti Deshpande 2 M. E Student, Department of Computer Engineering, GHRCCEM, University

More information

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table

More information

IP-Telephony & VOIP. VOIP Definitions. Packetize (IP) Transport. Digitize and Compress

IP-Telephony & VOIP. VOIP Definitions. Packetize (IP) Transport. Digitize and Compress Eng. Abdulla Jassmi Head of Tariff Settlement Telecom Economics & Tariff Settlement ITU TAS Meeting ( 31 May 3 Jun 2005) IP Telephony & VoIP. Agenda - VoIP definition. - Advantages and disadvantages of

More information

A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS

A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS Vilnius, October 2005 Page

More information

POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ)

POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ) POSTAL AND TELECOMMUNICATIONS REGULATORY AUTHORITY OF ZIMBABWE (POTRAZ) POSTAL AND TELECOMMUNICATIONS SECTOR PERFORMANCE REPORT FOURTH QUARTER 2015 Disclaimer: This report has been prepared based on data

More information

Fraud classification and recommendations on dispute handling within the wholesale telecom industry Release May 2014

Fraud classification and recommendations on dispute handling within the wholesale telecom industry Release May 2014 INTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP i3 FORUM (www.i3forum.org) Fraud classification and recommendations on dispute handling within the wholesale telecom industry Release 3.0 - May

More information

Interconnection and Roaming. Interconnection Business interfaces in Internet

Interconnection and Roaming. Interconnection Business interfaces in Internet Interconnection and Roaming S-38.041 Networking Business Slide 1 Interconnection Business interfaces in Internet Access ISP Transit ISP 9 4 Peering point/bilateral agreements (Network Access Point, NAP)

More information

Fixed Mobile Convergence

Fixed Mobile Convergence Cisco Expo 2006 Fixed Mobile Convergence Business Track Bo Finnemann Cisco DK 2006 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda, Fixed Mobile Convergence Market Perspective What

More information

Freecoms VoIP Mobile Community Telecom S. Ferrari, page n 1»

Freecoms VoIP Mobile Community Telecom S. Ferrari, page n 1» Freecoms VoIP Mobile Community Telecom S. Ferrari, page n 1» Multiservice Mobile VoIP Community Powerful multiservice package: Home and Mobile VoIP communication. Business and Private WEB Portal community

More information

Notice to our customers regarding Toll Fraud

Notice to our customers regarding Toll Fraud Notice to our customers regarding Toll Fraud - Beware of Toll Fraud. - Toll Fraud is a crime against you. Bizfon isn't responsible for your Toll Fraud. - You need to take steps to protect yourself from

More information

Our Vision. Our Mission

Our Vision. Our Mission While you re still wondering, others have already started. It s time for you to be the first, to be a pioneer in the telecom industry with Monty Mobile. www.montymobile.com About Monty Mobile Founded in

More information

PT Indosat Tbk. First Half 2006 Results. First Half 2006 Results Page 1

PT Indosat Tbk. First Half 2006 Results. First Half 2006 Results Page 1 PT Indosat Tbk First Half 2006 Results First Half 2006 Results Page 1 Key Highlights in 1H 2006 (YoY) Cellular Subscribers growth by 7.7% Operating revenues Flat (-0.2%) MIDI revenues increased by 13.1%

More information

Digital Agenda Scoreboard 2017 Electronic communications market indicators: Definitions, methodology and footnotes on Member State data

Digital Agenda Scoreboard 2017 Electronic communications market indicators: Definitions, methodology and footnotes on Member State data Digital Agenda Scoreboard 2017 Electronic communications market indicators: Definitions, methodology and footnotes on Member State data Financial indicators, fixed and mobile telephony, broadcasting and

More information

Mobile Charging. Emphasis on Business and Subscriber Aspects

Mobile Charging. Emphasis on Business and Subscriber Aspects Mobile Charging Emphasis on Business and Subscriber Aspects Content Introduction Basic Subscription Models Different subscription set-ups Postpaid & Prepaid charging Offline & online charging Mobile content

More information

ENTERPRISE VOICE SERVICE TERMS. Enterprise Voice Service Terms

ENTERPRISE VOICE SERVICE TERMS. Enterprise Voice Service Terms Enterprise Voice Service Terms Contents 1. How these Service Terms work... 3 2. Our Obligations... 3 3. Your Obligations... 3 4. Emergency Calls... 4 5. Service Constraints... 4 6. Number Porting... 5

More information

Telio Holding ASA Q4 06 presentation

Telio Holding ASA Q4 06 presentation Telio Holding ASA Q4 06 presentation Telio Holding ASA Leading European broadband telephony provider Committed to improving user experience and reducing cost to subscribers Innovative products and services

More information

Network Protocol Analysis: A New Tool for Blocking International Bypass Fraud Before Revenue is Lost

Network Protocol Analysis: A New Tool for Blocking International Bypass Fraud Before Revenue is Lost Network Protocol Analysis: A New Tool for Blocking International Bypass Fraud Before Revenue is Lost How to Defend Your Network Against the New SIM Server Threat A WHITEPAPER BY SPONSORED BY The international

More information

ARCT. co consumer ISSUE. ES committe EACO GUIDELINES G SERVISES (DRAFT)

ARCT. co consumer ISSUE. ES committe EACO GUIDELINES G SERVISES (DRAFT) ARCT EACO GUIDELINES G ON ROAMIN NG SERVISES (DRAFT) Eac co consumer ISSUE ES committe ee TABLE OF CONTENTS 1. INTRODUCTION 3 1.1 BACKGROUND 3 1.2 OBJECTIVE OF THE GUIDELINES 3 1.3 OVERVIEW OF THE GUIDELINES

More information

Project Proposal for:

Project Proposal for: Page1 Project Proposal for: Asterisk IP Telephony Mobility Facility Over the existing Office LAN/WAN and Wi-Fi Network, WiMAX, 3G/4G, CDMA, and GSM Technology Solutions & Design For: o Commercial Bank

More information

Automated Call Quality, CLI and Performance Testing

Automated Call Quality, CLI and Performance Testing . Automated Call Quality, CLI and Performance Testing 2 itest The most comprehensive test platform available. itest is a testing and performance monitoring platform designed specifically for the 21st Century

More information

BRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers

BRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers 1 BRIDGE TO GLOBAL MARKET FOR MVNOs Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers How to compete with big MNOs on equal terms 2 Your

More information

Keywords Fuzzy, Set Theory, KDD, Data Base, Transformed Database.

Keywords Fuzzy, Set Theory, KDD, Data Base, Transformed Database. Volume 6, Issue 5, May 016 ISSN: 77 18X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Fuzzy Logic in Online

More information

Fuzzy Reasoning. Outline

Fuzzy Reasoning. Outline Fuzzy Reasoning Outline Introduction Bivalent & Multivalent Logics Fundamental fuzzy concepts Fuzzification Defuzzification Fuzzy Expert System Neuro-fuzzy System Introduction Fuzzy concept first introduced

More information

Chapter 4 Fuzzy Logic

Chapter 4 Fuzzy Logic 4.1 Introduction Chapter 4 Fuzzy Logic The human brain interprets the sensory information provided by organs. Fuzzy set theory focus on processing the information. Numerical computation can be performed

More information

VoLTE: Particularities from Measurements to Analysis. Haarlem, Alberto Pérez

VoLTE: Particularities from Measurements to Analysis. Haarlem, Alberto Pérez VoLTE: Particularities from Measurements to Analysis Haarlem, 9.5.2016 Alberto Pérez Omnitele Ltd. 2016 2agenda > 1. Introduction 2. VoLTE a new old technology 3. Measuring VoLTE Test Scenarios 4. Analysing

More information

VOIP²ALL SERIES. 4 Channel Gateway User Guide. Version 5.38

VOIP²ALL SERIES. 4 Channel Gateway User Guide. Version 5.38 VOIP²ALL SERIES 4 Channel Gateway User Guide Version 5.38 Contents CONTENTS 1. INTRODUCTION TO THE VOIP²ALL GATEWAY... 4 1.1. The VoIP²ALL Gateway Solution Overview... 4 1.2. About this Manual... 5 1.3.

More information

MARKET OBSERVATORY : THE TELECOMMUNICATIONS SERVICES MARKET IN FRANCE AT THE FOURTH QUARTER 2004 (declared operators) May 2005

MARKET OBSERVATORY : THE TELECOMMUNICATIONS SERVICES MARKET IN FRANCE AT THE FOURTH QUARTER 2004 (declared operators) May 2005 : THE TELECOMMUNICATIONS SERVICES MARKET IN FRANCE AT THE FOURTH QUARTER 20 (declared operators) May 25 2 Introduction At the fourth quarter 20, the electronic communications market in France represented

More information

INTRODUCTION TO NUMBER PORTABILITY

INTRODUCTION TO NUMBER PORTABILITY INTRODUCTION TO NUMBER PORTABILITY With this whitepaper Rabión Consultancy aims to provide a quick and broad overview of number portability. Number portability is arguably the most visible instrument a

More information

Analysis of interconnect usage charges in India

Analysis of interconnect usage charges in India Viewpoint Analysis of interconnect usage charges in India Sourabh Kaushal April 2011 2 Summary: Analysis of interconnect usage charges in India In India the Interconnect Usage Charges (IUC) were introduced

More information

Unbundling roaming services. An effective way to create competition for roaming services in the European Union

Unbundling roaming services. An effective way to create competition for roaming services in the European Union Unbundling roaming services An effective way to create competition for roaming services in the European Union 1 Overview > Short summary of the solution > Key factors in choosing one structural solution

More information

Keep the Door Open for Users and Closed to Hackers

Keep the Door Open for Users and Closed to Hackers Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According

More information

VoIP Theft of Service Protecting Your Network. Introduction to VoIP Theft of Service. Meet our Expert Phone Power

VoIP Theft of Service Protecting Your Network. Introduction to VoIP Theft of Service. Meet our Expert Phone Power VoIP Theft of Service Protecting Your Network Introduction to VoIP Theft of Service The truth is you just aren t a phone company until you ve had a run-in with telecom fraud. VoIP fraud is a significant

More information