OVERVIEW OF FRAUD DETECTION SYSTEMS AND PERFORMANCE KPI DEVELOPMENT

Authors

DOI:

https://doi.org/10.28925/2663-4023.2024.23.274283

Keywords:

FMS; ML; ETL; Hadoop; AWS; RDBMS; SS7; VoIP; IP.

Abstract

In this article overview was provided on several fraud detection systems, analysis result of common scheme and development of KPIs to detect performance degradation or improvement from business logic point of view. Four different systems were reviewed. Following FMS were developed by Gigamon and Argyle Data cooperation, AWS, Subex, Cvidya Amdocs. Solution developed by Gigamon and Argyle Data consists of Gigamon fabric for information collection/filtering/enrichment and Argyle Data Fraud detection system, which is based on Hadoop technology to store collected data and analysis results by application. AWS Fraud Detection collects NRTRDE flow and process it by using ML technics provided by AWS. Subex fraud management system provides flexible ETL for data collection from different sources with adjustable detection rules and ML for suspicious behavior learning. FraudView by Cvidya Amdocs collects information from varying points like OSS/BSS, CRM customer details, Prepaid platforms, HLR, Switch CDRs, Probe (SS7, VoIP, IP) and process it by different detection engines. Simplified processing FMS processing scheme and KPIs based on different timestamps were made. Following conclusions were made: In reviewed FMS was noticed that instead of using traditional NRTRDE and TAP3 file formats, data can be collected directly from network by using network tap or port mirroring with next data enrichment, cleaning, formatting for fraud detection system to consume. Following real time method can be realized by using probes to perform data preparation or some complex solution described by Gigamon; Detection is performed by rules, provided by vendor or by ML modules, which learns behavior of subscriber in order to create detection rules. Most of systems allow to modify threshold of following rules in order to meet system user demands to check data within specific time (for example fraudster night calls to subscriber) or detect specific number of suspicious sessions, etc; In order speedup fraud detection hotlists, whitelists can be used for enrichment to filter out fraudsters, emergency or business numbers. Geographical location can be used to identify fraudster’s location within network and make correlation with other possible fraud sessions; During analysis of each FMS architecture, 3 processing stages were highlighted, which allowed to create simple KPIs for business logic and data arrival check; Developed methodology allows to check data arrival and fraud recognition with used data type to define which information provides better detection or view on rules for detection in order to show, which of them should be adjusted.

Downloads

Download data is not yet available.

References

Real-Time Fraud Detection and Analytics using Hadoop and Machine Learning. (2015). Network-Level Intelligence for Observability Tools | Gigamon. URL: http://surl.li/tkbjz

Argyle Data and Gigamon to deliver real-time fraud detection and analytics for communications service providers | VanillaPlus - The global voice of Telecoms IT. (2015, March 4). VanillaPlus - The global voice of Telecoms IT. URL: http://surl.li/tkbkq

Real-Time Fraud Analytics Hadoop Application. (2014, November). Cloudera | The hybrid data company. URL: http://surl.li/tkbmp

Intelligent Fraud Monitoring | AWS Solutions for Telecommunications | AWS Solutions Library. (n.d.). Amazon Web Services, Inc. URL: http://surl.li/tkbmu

Telecom Fraud Management | Telecom Fraud Detection | Telco Risk. (n.d.). Subex. URL: http://surl.li/tkbmz

PPT - Fraud Management and Operations Training PowerPoint Presentation - ID:1050298. (n.d.). SlideServe. URL: http://surl.li/tkbne

CVidya Launches FraudView® Version 9. (2010, October 13). Newswire | Press Release Distribution | Media Outreach Platform. URL: http://surl.li/tkbnm

Sahaidak, V. А., Lysenko, M. M., Senkov, O. V. (2022). Telecom fraud and it’s impact on mobile carrier business. Connectivity, 160(6), 17–20. https://doi.org/10.31673/2412-9070.2022.061720

Aravamuthan, S. (2021). Revenue Assurance and Fraud Detection for Telecom Operators – Combating Bypass Fraud. International Journal for Research in Applied Science and Engineering Technology, 9(VII), 2843–2851. https://doi.org/10.22214/ijraset.2021.37011

Pollard, C. (2005). Telecom fraud: The cost of doing nothing just went up. Computers & Security, 24(6), 437–439. https://doi.org/10.1016/j.cose.2005.07.006

Downloads


Abstract views: 77

Published

2024-03-28

How to Cite

Sahaidak, V. (2024). OVERVIEW OF FRAUD DETECTION SYSTEMS AND PERFORMANCE KPI DEVELOPMENT. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(23), 274–283. https://doi.org/10.28925/2663-4023.2024.23.274283