Abstract
With the growing advancements in technology, the lives of the people have become easier and convenient, but at the same time it also mushrooms sophisticated practices through which the fraudsters can infiltrate an organization. Telecommunication industry, being one of the major sectors in the world, is also infiltrated by frauds. Telecommunication fraud is a combination of variety of illegal activities like unauthorized and illegitimate access, subscription identity theft and international revenue share fraud etc. Frauds have proven to be detrimental to the prosperity of a company and impacts customer relations and shareholders. This paper presents the implementation details for detecting telecommunication fraud using Data Stream Analytics and Neural Network classification based Data Mining. For detection using Data Stream Analytics, Event Hub and Stream Analytics components of Microsoft Azure have been used whereas for detection using Data Mining Neural Network Pattern Recognition tool as well as a self-coded algorithm in Matlab has been used. Based on the results, the accuracy of both the techniques have been compared and the situations for selection of a suitable technique based on the user requirements and the flow of data has been narrowed down. The findings can elucidate upon other cloud analytics systems and provide a basis for big data analytics and mining.











Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ismail A, Erdi O, Ömer FÇ (2012) Data Stream Analytics and Mining in the Cloud. IEEE 2012 4th International Conference on Cloud Computing Technology and Science, Taiwan, pp 857–62
Mohammad IA, Mohammad GA (2012) Detecting telecommunication fraud using neural networks through data mining. Int J Sci Eng Res 3:1–5
Simon A, Carmen G, Julian K, Michael M, Katrin P, David R, Torsten W (2012) Telephony fraud detection in next generation networks. In: The eighth advanced international conference on telecommunications 27 May-1 June 2012, Stuttgart, Germany; pp 203–07
Becker RA, Volinsky C, Wilks AR (2010) Fraud detection in telecommunications: history and lessons learned. Technometrics 52:20–33
Cox KC, Eick SG, Wills GJ, Brachman RJ (1997) Visual data mining: recognizing telephone calling fraud. Data Min Knowl Disc 1:225–231
Ranjitha P (2015) Streaming analytics over real-time big data. Global J Comput Sci Technol C Softw Data Eng 15:27–30
Gaber MM, Zaslavsky A, Krishnaswamy S (2005) Mining data streams: a review. ACM SIGMOD Record 34:18–26
Farvaresh H, Sepehri MM (2011) A data mining framework for detecting subscription fraud in telecommunication. Eng Appl Artif Intell 24:182–194
Clifton P, Vincent L, Kate S, Ross G (2010) A Comprehensive Survey of Data Mining-based Fraud Detection Research. eprint arXiv:1009.6119, 1–14
de Sousa JVC (2013) Telecommunication fraud detection using data mining techniques. Int J Comput Sci Inf Technol 4:1–4
Simon H, Hongxing H, Graham JW, Rohan AB (2002) Outlier detection using replicator neural networks. Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery 4–6 September 2002, 170–80
Volker TMT, Michael H, Jaakko H (1998) Fraud detection in communications networks using neural and probabilistic methods. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, 12–15 May 1998; Seattle, Washington, USA, 1241–44
Shawe-Taylor J, Howker K, Burge P (1999) Detection of fraud in mobile telecommunication. Inf Security Tech Rep 4:3–15
Adrian H, Tapani L (2011) Event hub: an event-driven information hub for mobile devices. UIC’11 8th international conference on Ubiquitous intelligence and computing; 2–4 September 2011; Banff, Canada; 209–23
de Sousa JVC (2013) Telecommunication fraud detection using data mining techniques. Int J Comput Sci Inf Technol 4:1–4
Nader M, Jameela AJ (2014) Real-Time Big Data Analytics: Applications and Challenges. IEEE International Conference On High Performance Computing and Simulation; 21–25 July 2014; Bologna, Italy, pp 305–10
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jain, V. Perspective analysis of telecommunication fraud detection using data stream analytics and neural network classification based data mining. Int. j. inf. tecnol. 9, 303–310 (2017). https://doi.org/10.1007/s41870-017-0036-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-017-0036-5