OVERVIEW OF FRAUD DETECTION SYSTEMS AND PERFORMANCE KPI DEVELOPMENT
DOI:
https://doi.org/10.28925/2663-4023.2024.23.274283Keywords:
FMS; ML; ETL; Hadoop; AWS; RDBMS; SS7; VoIP; IP.Abstract
In this article overview was provided on several fraud detection systems, analysis result of common scheme and development of KPIs to detect performance degradation or improvement from business logic point of view. Four different systems were reviewed. Following FMS were developed by Gigamon and Argyle Data cooperation, AWS, Subex, Cvidya Amdocs. Solution developed by Gigamon and Argyle Data consists of Gigamon fabric for information collection/filtering/enrichment and Argyle Data Fraud detection system, which is based on Hadoop technology to store collected data and analysis results by application. AWS Fraud Detection collects NRTRDE flow and process it by using ML technics provided by AWS. Subex fraud management system provides flexible ETL for data collection from different sources with adjustable detection rules and ML for suspicious behavior learning. FraudView by Cvidya Amdocs collects information from varying points like OSS/BSS, CRM customer details, Prepaid platforms, HLR, Switch CDRs, Probe (SS7, VoIP, IP) and process it by different detection engines. Simplified processing FMS processing scheme and KPIs based on different timestamps were made. Following conclusions were made: In reviewed FMS was noticed that instead of using traditional NRTRDE and TAP3 file formats, data can be collected directly from network by using network tap or port mirroring with next data enrichment, cleaning, formatting for fraud detection system to consume. Following real time method can be realized by using probes to perform data preparation or some complex solution described by Gigamon; Detection is performed by rules, provided by vendor or by ML modules, which learns behavior of subscriber in order to create detection rules. Most of systems allow to modify threshold of following rules in order to meet system user demands to check data within specific time (for example fraudster night calls to subscriber) or detect specific number of suspicious sessions, etc; In order speedup fraud detection hotlists, whitelists can be used for enrichment to filter out fraudsters, emergency or business numbers. Geographical location can be used to identify fraudster’s location within network and make correlation with other possible fraud sessions; During analysis of each FMS architecture, 3 processing stages were highlighted, which allowed to create simple KPIs for business logic and data arrival check; Developed methodology allows to check data arrival and fraud recognition with used data type to define which information provides better detection or view on rules for detection in order to show, which of them should be adjusted.
Downloads
References
Real-Time Fraud Detection and Analytics using Hadoop and Machine Learning. (2015). Network-Level Intelligence for Observability Tools | Gigamon. URL: http://surl.li/tkbjz
Argyle Data and Gigamon to deliver real-time fraud detection and analytics for communications service providers | VanillaPlus - The global voice of Telecoms IT. (2015, March 4). VanillaPlus - The global voice of Telecoms IT. URL: http://surl.li/tkbkq
Real-Time Fraud Analytics Hadoop Application. (2014, November). Cloudera | The hybrid data company. URL: http://surl.li/tkbmp
Intelligent Fraud Monitoring | AWS Solutions for Telecommunications | AWS Solutions Library. (n.d.). Amazon Web Services, Inc. URL: http://surl.li/tkbmu
Telecom Fraud Management | Telecom Fraud Detection | Telco Risk. (n.d.). Subex. URL: http://surl.li/tkbmz
PPT - Fraud Management and Operations Training PowerPoint Presentation - ID:1050298. (n.d.). SlideServe. URL: http://surl.li/tkbne
CVidya Launches FraudView® Version 9. (2010, October 13). Newswire | Press Release Distribution | Media Outreach Platform. URL: http://surl.li/tkbnm
Sahaidak, V. А., Lysenko, M. M., Senkov, O. V. (2022). Telecom fraud and it’s impact on mobile carrier business. Connectivity, 160(6), 17–20. https://doi.org/10.31673/2412-9070.2022.061720
Aravamuthan, S. (2021). Revenue Assurance and Fraud Detection for Telecom Operators – Combating Bypass Fraud. International Journal for Research in Applied Science and Engineering Technology, 9(VII), 2843–2851. https://doi.org/10.22214/ijraset.2021.37011
Pollard, C. (2005). Telecom fraud: The cost of doing nothing just went up. Computers & Security, 24(6), 437–439. https://doi.org/10.1016/j.cose.2005.07.006
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Віктор Сагайдак
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.