Detecting SIM Box Fraud Using Neural Network

Similar documents
Predictive SIM Box Fraud Detection Model for ethio telecom

Fraud Detection in International Calls Using Fuzzy Logic

Analysis and Detection of Fraud in International Calls Using Decision Tree

Fraud Detection in International Calls Using Fuzzy Logic

Finding Dominant Parameters For Fault Diagnosis Of a Single Bearing System Using Back Propagation Neural Network

CS6220: DATA MINING TECHNIQUES

Research Article International Journals of Advanced Research in Computer Science and Software Engineering ISSN: X (Volume-7, Issue-6)

We will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are:

A *69>H>N6 #DJGC6A DG C<>C::G>C<,8>:C8:H /DA 'D 2:6G, ()-"&"3 -"(' ( +-" " " % '.+ % ' -0(+$,

Review on Methods of Selecting Number of Hidden Nodes in Artificial Neural Network

Rank Measures for Ordering

REAL-TIME FRAUD DETECTION IN TELECOMMUNICATION NETWORK USING CALL PATTERN ANALYSIS

Face Detection Using Radial Basis Function Neural Networks With Fixed Spread Value

Automatic Classification of Attacks on IP Telephony

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X

LECTURE NOTES Professor Anita Wasilewska NEURAL NETWORKS

Natural Language Processing CS 6320 Lecture 6 Neural Language Models. Instructor: Sanda Harabagiu

CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS

Data Mining. Neural Networks

Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction

Face Detection Using Radial Basis Function Neural Networks with Fixed Spread Value

Image Compression: An Artificial Neural Network Approach

Course Outline Comprehensive Training on Bypass/SIM Box Fraud Detection and Termination Duration: 3 Days

WHAT TYPE OF NEURAL NETWORK IS IDEAL FOR PREDICTIONS OF SOLAR FLARES?

Supervised Learning Classification Algorithms Comparison

Lecture #11: The Perceptron

Multilayer Feed-forward networks

Lecture 20: Neural Networks for NLP. Zubin Pahuja

Performance Analysis of Data Mining Classification Techniques

Notes on Multilayer, Feedforward Neural Networks

Processing Missing Values with Self-Organized Maps

Traffic Signs Recognition using HP and HOG Descriptors Combined to MLP and SVM Classifiers

IN recent years, neural networks have attracted considerable attention

An Algorithm For Training Multilayer Perceptron (MLP) For Image Reconstruction Using Neural Network Without Overfitting.

An advanced data leakage detection system analyzing relations between data leak activity

EE 589 INTRODUCTION TO ARTIFICIAL NETWORK REPORT OF THE TERM PROJECT REAL TIME ODOR RECOGNATION SYSTEM FATMA ÖZYURT SANCAR

Applying Kohonen Network in Organising Unstructured Data for Talus Bone

Analytical model A structure and process for analyzing a dataset. For example, a decision tree is a model for the classification of a dataset.

11/14/2010 Intelligent Systems and Soft Computing 1

Credit card Fraud Detection using Predictive Modeling: a Review

CMPT 882 Week 3 Summary

More on Learning. Neural Nets Support Vectors Machines Unsupervised Learning (Clustering) K-Means Expectation-Maximization

Climate Precipitation Prediction by Neural Network

Perceptrons and Backpropagation. Fabio Zachert Cognitive Modelling WiSe 2014/15

A NEURAL NETWORK APPLICATION FOR A COMPUTER ACCESS SECURITY SYSTEM: KEYSTROKE DYNAMICS VERSUS VOICE PATTERNS

Neural Network Neurons

6. NEURAL NETWORK BASED PATH PLANNING ALGORITHM 6.1 INTRODUCTION

Simulation of Zhang Suen Algorithm using Feed- Forward Neural Networks

COMBINING NEURAL NETWORKS FOR SKIN DETECTION

Pattern Classification Algorithms for Face Recognition

Evolving SQL Queries for Data Mining

ISSN: (Online) Volume 3, Issue 9, September 2015 International Journal of Advance Research in Computer Science and Management Studies

Performance Evaluation of Various Classification Algorithms

Neural Networks. Single-layer neural network. CSE 446: Machine Learning Emily Fox University of Washington March 10, /10/2017

Datasets Size: Effect on Clustering Results

Paper on Handling Menace of International Grey Traffic

Use of Artificial Neural Networks to Investigate the Surface Roughness in CNC Milling Machine

4.12 Generalization. In back-propagation learning, as many training examples as possible are typically used.

INVESTIGATING DATA MINING BY ARTIFICIAL NEURAL NETWORK: A CASE OF REAL ESTATE PROPERTY EVALUATION

Knowledge Discovery and Data Mining. Neural Nets. A simple NN as a Mathematical Formula. Notes. Lecture 13 - Neural Nets. Tom Kelsey.

Classification Lecture Notes cse352. Neural Networks. Professor Anita Wasilewska

Neural Network Classifier for Isolated Character Recognition

Knowledge Discovery and Data Mining

Object Detection Lecture Introduction to deep learning (CNN) Idar Dyrdal

Why MultiLayer Perceptron/Neural Network? Objective: Attributes:

Weka ( )

A Comparative Study of Selected Classification Algorithms of Data Mining

Seismic regionalization based on an artificial neural network

Comparative Study of Instance Based Learning and Back Propagation for Classification Problems

IMPLEMENTATION OF CLASSIFICATION ALGORITHMS USING WEKA NAÏVE BAYES CLASSIFIER

An Efficient Clustering for Crime Analysis

Credit Card Fraud Detection Using Historical Transaction Data

Global Journal of Engineering Science and Research Management

Liquefaction Analysis in 3D based on Neural Network Algorithm

ESTIMATION OF SUBSURFACE QANATS DEPTH BY MULTI LAYER PERCEPTRON NEURAL NETWORK VIA MICROGRAVITY DATA

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

In this assignment, we investigated the use of neural networks for supervised classification

Recognition of Handwritten Digits using Machine Learning Techniques

Assignment # 5. Farrukh Jabeen Due Date: November 2, Neural Networks: Backpropation

Learning. Learning agents Inductive learning. Neural Networks. Different Learning Scenarios Evaluation

Fraude dans la Telephonie

Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques

Keywords Intrusion Detection System, Artificial Neural Network, Multi-Layer Perceptron. Apriori algorithm

Improving Imputation Accuracy in Ordinal Data Using Classification

International gateway liberalization

Website: HOPEFIELD NETWORK. Inderjeet Singh Behl, Ankush Saini, Jaideep Verma. ID-

Identification of Multisensor Conversion Characteristic Using Neural Networks

CHAPTER VI BACK PROPAGATION ALGORITHM

Chapter-8. Conclusion and Future Scope

Character Recognition Using Convolutional Neural Networks

Efficiency of k-means and K-Medoids Algorithms for Clustering Arbitrary Data Points

Handwritten Character Recognition with Feedback Neural Network

Yuki Osada Andrew Cannon

Neural Networks (Overview) Prof. Richard Zanibbi

IMPLEMENTATION OF FPGA-BASED ARTIFICIAL NEURAL NETWORK (ANN) FOR FULL ADDER. Research Scholar, IIT Kharagpur.

INTELLIGENT SEISMIC STRUCTURAL HEALTH MONITORING SYSTEM FOR THE SECOND PENANG BRIDGE OF MALAYSIA

An Efficient Approach for Color Pattern Matching Using Image Mining

Extreme Learning Machines. Tony Oakden ANU AI Masters Project (early Presentation) 4/8/2014

II. ARTIFICIAL NEURAL NETWORK

A NEURAL NETWORK BASED TRAFFIC-FLOW PREDICTION MODEL. Bosnia Herzegovina. Denizli 20070, Turkey. Buyukcekmece, Istanbul, Turkey

Transcription:

Detecting SIM Box Fraud Using Neural Network Abdikarim Hussein Elmi, Subariah Ibrahim and Roselina Sallehuddin Abstract One of the most severe threats to revenue and quality of service in telecom providers is fraud. The advent of new technologies has provided fraudsters new techniques to commit fraud. SIM box fraud is one of such fraud that has emerged with the use of VOIP technologies. In this work, a total of nine features found to be useful in identifying SIM box fraud subscriber are derived from the attributes of the Customer Database Record (CDR). Artificial Neural Networks (ANN) has shown promising solutions in classification problems due to their generalization capabilities. Therefore, supervised learning method was applied using Multi layer perceptron (MLP) as a classifier. Dataset obtained from real mobile communication company was used for the experiments. ANN had shown classification accuracy of 98.71 %. Keywords Multi layer perceptron SIM box fraud Classification Telecom fraud A. H. Elmi (&) S. Ibrahim R. Sallehuddin Faculty of Computer Science and Information System, Universiti Teknologi Malaysia, 81300 Skudai, Johor, Malaysia e-mail: sirabdikarim@yahoo.com S. Ibrahim e-mail: subariah@utm.my R. Sallehuddin e-mail: roselina@utm.my K. J. Kim and K.-Y. Chung (eds.), IT Convergence and Security 2012, Lecture Notes in Electrical Engineering 215, DOI: 10.1007/978-94-007-5860-5_69, Ó Springer Science+Business Media Dordrecht 2013 575

576 A. H. Elmi et al. 1 Introduction The theft of service and misuse of voice as well as data networks of telecom providers is considered as fraud. The perpetrator s intention could be to avoid the service charges completely or reduce the charges that would have been charged for the service used. The intention could also be deeper than that and the fraudster s aim might be to gain profit by misusing the network of the provider [1]. Losses due to fraud in telecom industry are highly significant. Even though telecommunication industry suffers major losses due to fraud there is no comprehensive published research on this area mainly due to lack of publicly available data to perform experiments on. The data to be used for the experiments contains confidential information of customers and in most cases law and enforcement authorities prohibit exposing the confidential information of customers [2]. On the other hand, any broad research published publicly about fraud detection methods will be utilized by fraudsters to evade from detection [1, 3]. Existing research work is mainly focusing on subscription and superimposed types of fraud which are the dominant types of fraud in telecom industries worldwide. However, another type of fraud called SIM box bypass fraud has become a challenging threat to telecom companies in some parts of Africa and Asia. The success of this fraud depends on obtaining SIM cards. Therefore the effects of SIM box bypass fraud vary across countries. In countries where unregistered SIM cards are not allowed and the government laws recognize the SIM box devices as illegal equipment, the effect is less compared to countries where obtaining of SIM cards by customers is very cheap or even free and government laws do not prohibit unregistered subscribers. The fact that this type of fraud is not a problem for all telecom companies worldwide might justify the reason why the publicly available research on this type of fraud is very limited. SIM box fraud takes place when individuals or organizations buy thousands of SIM cards offering free or low cost calls to mobile numbers. The SIM cards are used to channel national or international calls away from mobile network operators and deliver them as local calls, costing operators millions in revenue loss [4, 5]. A SIM box is VoIP gateway device that maps the call from VoIP to a SIM card (in the SIM box) of the same mobile operator of the destination mobile [5]. In this paper we present a study on which set of descriptors that can be used to detect SIM cards originating from SIM box devices have been identified. Neural Networks are promising solutions to this type of problem as they can learn complex patterns and trends within a noisy data. Neural networks have particularly shown better performance results than other techniques in the domain of telecom fraud. Therefore, supervised learning method was applied using Multi layer perceptron (MLP) as a classifier. The dataset that was used for this study is obtained from a real mobile communication network and contains subscribers/sim cards that have been tested and approved by the operator to be SIM box fraud SIM cards and normal SIM cards. The next section describes the dataset and descriptors used.

Detecting SIM Box Fraud Using Neural Network 577 Section 2 discusses the method applied and Sect. 3 presents the results obtained from the experiments. Last section concludes the work. 1.1 Dataset and Descriptors The huge volumes of data stored by telecommunication companies include Customer Data Record (CDR) which is the database that stores the call information of each subscriber. Whenever a subscriber makes a call over the operator s network a toll ticket is prepared which contains complete information of the call made including the subscriber id, the called number, duration of the call, time, destination location etc. In this fraud scenario the CDR database serves a suitable source of information where useful knowledge about callers can be extracted to identify fraudulent calls made by subscribers. This study is based on Global Systems for mobile communications (GSM) network and specifically the Customer Data Record (CDR) database of prepaid subscribers. The dataset used for the experiments contained 234,324 calls made by 6415 subscribers from one Cell-ID. The dataset consisted of 2126 fraud subscribers and 4289 normal subscribers which is equivalent to 66.86 % of legitimate subscribers and 33.14 % of SIM box fraud subscribers. The total duration of these call transactions was two months. A Total of 9 features have been identified to be useful in detecting SIM box fraud. Table 1 shows the list of these features and their description. Table 1 Selected descriptors Field Name Description Call sub This is the subscriber identity module (SIM) number which was used as the identity field Total calls This feature is derived from counting the total calls made by each subscriber on a single day Total numbers called This feature is the total different unique subscribers called by the customer (subscriber) on a single day Total minutes Total duration of all calls made by the subscriber in minutes on a single day Total night calls The total calls made by the subscriber during the midnight (12:00 to 5:00 am) on a single day Total numbers called at The total different unique subscribers called during the midnight night (12:00 to 5:00 am) on a single day Total minutes at night The total duration of all calls made by the subscriber in minutes at midnight (12:00 to 5:00 am) Total incoming Total number of calls received by the subscriber on a single day Called numbers to total This is the ratio of the total numbers called/total calls calls ratio Average minutes The is the average call duration of each subscriber

578 A. H. Elmi et al. 2 Materials and Methods Neural Network is a group of simulated neurons interconnected to represent a computation mathematical model that can take one or more inputs to produce an output by learning the complex relationships between the inputs and outputs [6]. Supervised learning requires an input pattern along with the associated output values which is given by an external supervisor [7, 8]. 2.1 Multi Layer Perceptron Feed Forward Neural Network contains neurons and edges that form a network. The neurons are set of nodes and are of three types: input, hidden and output. Each node is a unit of processing. The edges are the links between two nodes and they have associated weights [8]. In Multi layer perceptron the network consists of multiple layers of computational units, usually connected in a feed-forward way. Each neuron in one layer has direct connections to the neurons of the subsequent layer although not to other nodes in the same layer. There might be more than one hidden layer [9, 10]. A neuron has a number of inputs and one output. It combines all the input values (Combination), does certain calculations, and then triggers an output value (activation) [8, 11]. There are different ways to combine inputs. One of the most popular methods is the weighted sum, meaning that the sum of each input value is multiplied by its associated weight. Therefore, for a given node g we have: Net g ¼ X w ij x ij1 ¼ w 0j x 0j þ w 1j x 1j þ: w ij x ij ð1þ where x ij represents the i th input to node j, w ij represents the weight associated with the i th input to node j and there are I? 1 inputs to node j. The value obtained from the combination function is passed to non-linear activation function as input. One of the most common activation functions used by Neural Network is the sigmoid function. This is a nonlinear functions and result in nonlinear behaviour. Sigmoid function is used in this study. Following is definitions of sigmoid function: 1 Sigmoid ¼ 1 þ e x ð2þ where x is the input value and e is base of natural logarithms, equal to about 2.718281828. The output value from this activation function is then passed along the connection to the connected nodes in the next layer. Back-propagation algorithm is a commonly used supervised algorithm to train feed-forward networks. The whole purpose of neural network training is to minimize the training errors.

Detecting SIM Box Fraud Using Neural Network 579 Equation 3 gives one of the common methods for calculating the error for neurons at the output layer using the derivative of the logistic function: Err ¼ O 1 ð1 O 1 ÞðT i O 1 Þ ð3þ In this case, Oi is the output of the output neuron unit i, and T i is the actual value for this output neuron based on the training sample. The error calculation of the hidden neurons is based on the errors of the neurons in the subsequent layers and the associated weights as shown in Eq. 4. Err i ¼ O i ð1 O i Þ X j Err i W ij ð4þ O i is the output of the hidden neuron unit I, which has j outputs to the subsequent layer. Err j is the error of neuron unit j, and W ij is the weight between these two neurons. After the error of each neuron is calculated, the next step is to adjust the weights in the network accordingly using Eq. 5. W ij; new ¼ W ij þ l Err j O i ð5þ Here l, is value ranging from 0 to 1. The variable l is called learning rate. If the value of l is smaller, the changes on the weights get smaller after each iteration, signifying slower learning rates. To obtain the best Neural Network architecture for this research, four parameters settings were considered. The number of hidden layers in the network architecture as well as the number of neurons in each hidden layer is considered. The learning rate and momentum parameters which have significant effect on the performance of any neural network architecture are also considered. Three architectures of neural network were considered in this research; one, two and three hidden layers and 5, 9 and 18 hidden nodes in each hidden layer. The learning rate is a constant chosen to help the network weights move toward a global minimum of Sum Square Error (SSE). Therefore, in this research four values of learning rate are considered: 0.1, 0.3, 0.6 and 0.9. The back-propagation algorithm is made more powerful through the addition of a momentum term. Momentum helps in the early stages of the algorithms, by increasing the rate at which the weights approach the neighbourhood of optimality. Therefore, four values of momentum term are used in this study: 0.1, 0.3, 0.6 and 0.9. 3 Results and Discussions This section discusses the results obtained in comparing the ANN models created to find the neural network architecture which provides the most reliable and accurate predictions. All possible combination of the parameter settings was experimented and as a result, 240 neural network models were created. The models were evaluated based on their prediction accuracy, generalization error, time taken

580 A. H. Elmi et al. to build the model, precision and recall. 10 Fold cross-validation results of the models were compared. Classification accuracy ranged from 56.1 to 98.71 %. It has been observed that the models show the worst performance results when both momentum and learning rate are increased to range of 0.6 0.9. The highest classification accuracy that could be achieved in these values was 86.16 % and the root mean square error was as high as 0.66. In all network layers; 3, 4, and 5, the overall accuracy degraded significantly when this range was used. This could be explained by the fact that higher values of learning rate and momentum could lead the algorithm to overshoot the optimal configuration. Figure 1 compares the best classification accuracy of the three hidden layers experimented with respect to the learning rate parameter. When one and two hidden layers are used, the accuracy degrades as the learning rate is increased from 0.1 to 0.3. But accuracy again increases until the learning rate is 0.6 where it starts to decline dramatically if further increased. However, when three hidden layers are used, the accuracy increases as the learning rate is increased from 0.1 to 0.6 and then the accuracy declines if the learning rate is increased from this point. The highest accuracy was achieved when two hidden layers were used at a learning rate of 0.6. Another observation shown by the graph is that the classification accuracy for all hidden layers decreases as the learning rate is increased from 0.6 to 0.9. Figure 1 also compares the classification accuracy of all hidden layers with respect to momentum term. From the figure, it can be clearly seen that hidden layer 2 at a momentum of 0.3 shows the best performance. The performance also degrades after the momentum of 0.3 for two and three hidden layers. The classification accuracy degrades significantly for all hidden layers at a momentum of 0.9. Fig. 1 Accuracy against learning rate and momentum for all hidden layers

Detecting SIM Box Fraud Using Neural Network 581 Table 2 Confusion matrix of Selected ANN model Normal Fraud Normal 4269 20 Fraud 63 2063 Table 3 Results of the best ANN Best model RMSE 0.10380 Accuracy 98.7061 % Time 17.17 ROC area 0.997 Precision 0.987 Recall 0.987 Table 4 Parameter values of best ANN model Best model Input layer nodes 9 Hidden layer 1 nodes 5 Hidden layer 2 nodes 5 Hidden layer 3 nodes N Output nodes 2 Learning rate 0.6 Momentum 0.3 The conclusion that can be made from these figures is that, very high learning and momentum rates significantly degrade the classification accuracy of the models. The best results are obtained when lower value of momentum is used with relatively higher value of learning rate. From the analysis discussed in this section, the best results were obtained when two hidden layers each having five hidden neurons was used with learning rate of 0.6 and a momentum term of 0.3. In the confusion matrix shown in Table 2, the columns represent the predicted values and rows represent the actual cases. The model was able to correctly classify 2063 out of the 2125 fraud subscribers and 4269 out of the 4289 normal subscribers. Fraud is the negative target value, false negative count is 63 and false positive count is only 20. Table 3 shows performance results of the best model and Table 4 shows the parameter values used in this model. 4 Conclusions The focus of this work was to come up with a set of features that can be used to effectively identify SIM cards originating from SIM box devices and an algorithm that can classify subscribers with high accuracy. The learning potentials of neural

582 A. H. Elmi et al. network for the detection of SIM box fraud subscribers were investigated. The experimental results revealed that ANN has high classification accuracy. SVM has recently found considerable attention in classification problems due to its generalization capabilities and less computational power. In future work SVM will also be investigated and compared with ANN. Acknowledgments The authors first thank the anonymous reviewers for their valuable comments and to Universiti Teknologi Malaysia (UTM) for the FRGS Grant Vote number 4F086 that is sponsored by Ministry of Higher Education (MOHE) and Research Management Centre, Universiti Teknologi Malaysia, Skudai, Johor. References 1. Taniguchi M, Haft M, Hollmen J, Tresp V (1998) Fraud detection in communications networks using neural and probabilistic methods. In: Proceedings of the 1998 IEEE international conference on acoustics speech and signal processing, vol 2. IEEE, Los Alamitos, pp 1241 1244 2. Hilas C, Mastorocostas P (2008) An application of supervised and unsupervised learning approaches to telecommunications fraud detection. Knowl Based Syst 21(7):721 726 3. Azgomi NL (2009) A taxonomy of frauds and fraud detection techniques. In: Proceedings of CISTM 2009, Ghaziabad, India, pp 256 267 4. Telenor GS (2010) Global SIM box detection 5. Nokia Siemens Neworks Corporation (2008). Battling illegal call operations with fraud management systems 6. Larose DT (2005) Discovering knowledge in data. John Wiley and Sons, Inc., Hoboken 7. Ghosh M (2010) Telecoms fraud. Comput Fraud Secur 2010(7):14 17 8. MacLennan J (2009) Data mining with Microsoft SQL Server 2008. Wiley Publishing Inc, Indianapolis 9. Mark EM, Venkayala S (2007) Java data mining strategy, standard, and practice. Diane Cerra, San Francisco 10. Cortesao L, Martins F, Rosa A, Carvalho P (2005) Fraud management systems in telecommunications: a practical approach. In: Proceeding of ICT, 2005 11. Pablo A, Este 0 vez CM, Claudio AP (2005) Subscription fraud prevention in telecommunications using fuzzy rules and neural networks. In: Proceedings of the expert systems with applications. Santiago, Chile, 2005 12. Hilas C, Mastorocostas P (2008) An application of supervised and unsupervised learning approaches to telecommunications fraud detection. Knowl Based Syst 21(7):721 726