SUBSCRIPTION FRAUD DETECTION USING AUTOENCODER IN CASE OF ETHIOTELECOM
DOI:
https://doi.org/10.61841/tp4k9012Keywords:
Telecommunication, EthioTelecom, Fraud Detection, Deep Learning, AuthoencoderAbstract
Nowadays, telecom services are becoming an essential communication and business facilitators. However, the development of telecom services motivates fraudsters for illegal use. Hence, telecom fraud becomes a serious challenge in telecommunication sector by losing telecom revenue. It also results in poor quality of services for their customers. Telecom data, SMS and voice call are not free from security issues. Despite SMS, and USSD services becomes good options over installable mobile based or web based applications due to lesser cost and real time support, the methods provide fixed amount requirements which is not dynamic way to address the need of these services subscribers. The other challenge of these services is that; the services are not safe from frauds as such, especially in GSM switches. Subscription fraud is one type of fraud in today’s telecom business which is a common telecom fraud. The need of fraudsters is to make money illegally or getting telecom services with the intention of not to pay for the service they used. The prime objective of this study is to build a predictive model using deep auto-encoder to detect subscription fraud in case of Ethiotelecom. The performance of fraud detection model is 98.95% validation accuracy on ethiotelecom call detail record dataset using deep neural network autoencoder and CNN-LSTM autoencder algorithms at threshold of 0.0103 and 0173 respectively.
References
Berhan Oumer Adame, "The Ethiopian Telecom Industry: Gaps and Recommendations towards Meaningful Connectivity and a Thriving Digital Ecosystem," HELIYON, 2021.
International Telecommunication Union Development Sector, "Global Connectivity Report," 2022.
Hendrik Wiersma and Ferdinand Nijboe, "The need for speed, THINK Economic & Financial Analysis," 2021.
ethiotelecom, "https://www.ethiotelecom.et/fraud-awareness/: Accessed on 08/06/2022," 2022.
Hailemeskel G/Tsadik, "Constructing Subscription Fraud Detection Model Using Machine Learning Algorithms: The Case of ethio telecom, ," unpuplished, Addis Ababa, Ethiopia, 2021.
Alae, and EL Hassane Ibn EL Haj Chouiekh, "Convnets for fraud detection analysis," Procedia Computer Science , 2018.
Mais, Abdallah Qusef, and George Sammour Arafat, "Detection of wangiri telecommunication fraud using ensemble learning," 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT). IEEE, 2019.
AlBough and Mhd Redwan., "Comparing data mining classification algorithms in detection of simbox fraud," 2016.
N. Kang, and L. Yang S. Wu, "Fraudulent behavior forecast in telecom industry based on data mining technology," Communications of the IIMA, 2007.
Richard A., Chris Volinsky, and Allan R. Wilks. Becker, "Fraud detection in telecommunications: History and lessons learned," Technometrics , 2010.
H. Farvaresh and M. M. Sepehri, "A data mining framework for detecting subscription fraud in telecommunication," Engineering Applications of Artificial Intelligence , 2011.
MEKALA.SAKETHA RAM, "MOBILE CREDIT USING GSM NETWORK TOPUP FOR MOBILE PHONES," Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden , 2015.
Anael Sam, Loserian S. Laizer Baraka W. Nyamtiga, "Security Perspectives For USSD Versus SMS In Conducting Mobile Transactions: A Case Study Of Tanzania," INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 1, ISSUE 3 38, 2013.
ABHISHEK SINGH and et al., "Factors Influencing Prepaid Consumer Behavior in Mobile Telecom Industry of Bihar & Jharkhand," ICFAI UNIVERSITY, JHARKHAND RANCHI, 2019.
Godfred Yaw, et al. Koi-Akrofi, "Global telecommunications fraud trend analysis," International Journal of Innovation and Applied Studies, 2019.
Yongjun Liao and et al., "Prepaid or Postpaid? That is the question.Novel Methods of Subscription Type Prediction in Mobile Phone Services," arXiv:1706.10172v1 [cs.SI], 2017.
Sen, Naidong Kang, and Liu Yang Wu, "Fraudulent behavior forecast in telecom industry based on data mining technology," Communications of the IIMA , 2007.
Ledisi G., Domaka N. Nanwin, and Edikan Uduak Nquoh Kabari, "Telecommunications Subscription Fraud Detection Using Naïve Bayesian Network.," International Journal of Computer Science and Mathematical Theory, 2016.
Kelemework Abebe., "Comparison of Supervised Machine Learning Algorithms on Detection of Signalling DoS attack to the 3G (UMTS) mobile network-in the case of ethio telecom," Diss. Addis Ababa University, Addis Ababa,Ethiopia, 2020.
Derebe Tekeste, "Comparative Analysis Of Machine Learning Algorithms For Subscription Fraud Detection: The Case Of Ethiotelecom ," Unpuplished paper,Addis Ababa University, Ethiopia, 2020.
Pablo A., Claudio M. Held, and Claudio A. Perez Estévez, "Subscription fraud prevention in telecommunications using fuzzy rules and neural networks," Expert Systems with Application, 20006.
Apapan, and Yan Liu Pumsirirat, "Credit card fraud detection using deep learning based on auto-encoder and restricted boltzmann machine," International Journal of advanced computer science and applications 9.1, 2018.
Yew Kee Wong, "The Difference Of Machine Learning And Deep Learning Algorithms," School of Information Engineering, HuangHuai University, Henan, China.
Pramila P., and Seema Shah Shinde, "A review of machine learning and deep learning applications," 2018 Fourth international conference on computing communication control and automation (ICCUBEA). IEEE, 2018.
TomZahavy and Shie Mannor Guy Tennenholtz, "TRAIN ON VALIDATION: SQUEEZING THE DATA LEMON," rXiv:1802.05846v1 , 2018.
Guansong, et al. Pang, "Deep learning for anomaly detection: A review," ACM Computing Surveys (CSUR), 2021.
Celia, et al. Cintas, "Anomalous Pattern Detection in Activations and Reconstruction Error of Autoencoders," Under review as a conference paper at ICLR 2020, 2020.
Limin, et al Yang, "CADE:Detecting and Explaining Concept Drift Samples for Security Applications," 0th USENIX Security Symposium (USENIX Security 21, 2021.
J. Zhu, "Deep Learning-Based Autoencoder for Data-Driven Modeling of an RF Photoinjector," arXiv:2101.10437v1, 2021.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Journal of Advance Research in Social Science and Humanities (ISSN 2208-2387)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Terms & Condition
Submission -
Author can submit the manuscript through our online submission process or email us at the designated email id in contact details.
The other mode of submission not accepted than online and email.
Before submission please read the submission guidelines.
NN Publication accepts only article submitted in pdf/doc/docx/rtf file format. Another format except given file formats will no be considered .
Author will be responsible for the error mistakes in the submission files. The minor changes can be done without any cost after publication. But for major changes NN Publication may charges you the editing charges.
Publication (Online) -
The online publication is scheduled on last date of every month, but it can be delayed by 24 to 48 hours due to editorial process if huge number of articles comes to publish in single issue.
Automatic notificatation email will be sent to the all users on publication of an issue, so its author’s duty to check their email inbox or SPAM folder to get this notification.
After publication of article author can not withdraw their article.
If editor’s found any issue after publication of article then the NN Publication have the authority to remove the article from online website.
No refund will be provided after online publication of article.
Publication (Print) -
The print copy publication are sent as per the author’s request after 2 weeks of online publication of that issue.
NN Publication will ship the article by India Post and provide the consignment number on dispatch of print copy.
NN Publication follows all the guidelines of delivery provided by IndiaPost and hence not responsible for delay in delivery due to any kind of reasons.
Refund of hard copy will not be provided after dispatch or print of the journal.
NN Publication will be responsible for raise a complain if there is any issue occurs in delivery, but still will not be responsible for providing the refund.
NN Publication will be responsible to resend the print copy only and only if the print copy is lost or print copy is damaged in delivery / or there is delay more than 6 months.
According to India Post the delivery should be completed with in 1-3 weeks after dispatch of articles.
Privacy Policy-
NN Publicationl uses the email ids of authors and editors and readers for sending editorial or publication notification only, we do not reveal or sell the email ids to any other website or company.