際際滷

際際滷Share a Scribd company logo
2
Most read
3
Most read
1
Phone Fraudsters in a Haystack
Sri Kanajan, Prasad Telekuntla, Mijail Gomez
3rd place in Tata Telecommunications Global Hackathon
2
Leaves International Missed Call
Unknowingly Calls Premium Number or
Manipulative Advertisement
$2 BILLION OF LOST REVENUE FROM
TELCOM PROVIDERS
Example of Phone Fraud
3
Motivations
 Current statistical solutions have low specificity and sensitivity
 Human fraud analysts have to continually update their heuristic
based rules and thresholds
 Need an adaptive solution that works in real time with minimal false
positives
4
Statistical
Analysis
Anomaly
Detection
Live Streaming
Phone Data
Hybrid Statistical and Machine Learning Solution
Number of Callers/Callee/Cumulative Call
Duration
Machine Learning
(Random Forests)
Evaluation of other features in the call log such as
answer indicator, area code, pricing
Used Hackathon De-identified Phone Log
Dataset 16 GB
5
Anomaly Detection Through Statistical Analysis
# of Unique Callers per Phone
Number
# of Unique Callees per Phone
Number
Cumulative Duration of Calls to
Specific Phone Numbers
ANOMALOUS Phone Numbers!!
6
Statistical
Analysis
Anomaly
Detection
Machine Learning
(Random Forests)
Graph
Analysis
Anomaly
Detection
Live Streaming
Phone Data
Predicted
Anomalies
Hybrid Statistical and Machine Learning Solution
7
Fraud Detection Using Graph Metrics
 Triangle Counting
 PageRank
 Others Note: Goal is to uncover the callers that are
very different from the large majority
8
Using Principal Component Analysis to uncover the outliers in the graph metrics
Fraud Detection Using Graph Metrics
Possible Fraudsters!
9
Statistical
Analysis
Anomaly
Detection
Machine Learning
(Random Forests)
Graph
Analysis
Anomaly
Detection
Live Streaming
Phone Data
Predicted
Anomalies
Human
Observed
Fraud
Analyst
Hybrid Statistical and Machine Learning Solution
Possible Fraud
10
Human Fraud Analyst Confirmation of Fraudster
www.fraud-detector.net
Fraud Detection Using Graph Metrics
11
Statistical
Analysis
Anomaly
Detection
Machine Learning
(Random Forests)
Graph
Analysis
Anomaly
Detection
Live Streaming
Phone Data
Predicted
Anomalies
Confirmed
Fraudsters
Human
Observed
Fraud
Analyst
Hybrid Statistical and Machine Learning Solution
Possible Fraud
12
Ensemble Model  Machine Learning and Statistical
 With labeled data, the classifier can progressively identify patterns
beyond the graph metrics (uses all other features in the raw call log)
 E.g. patterns in area codes or specific pricing plans used by fraudsters
 Active learning is done online while the system is active. I.e. the
longer the system is in use, the better it gets
14
Conclusion
Possible False Positive
Possible Fraudster
16
Acknowledgements
D3
Python
Zipfian Academy
Technologies Used

More Related Content

Similar to Phone Fraud Detection (20)

PDF
Graph Gurus 21: Integrating Real-Time Deep-Link Graph Analytics with Spark AI
TigerGraph
PDF
Fraud Analytics with Machine Learning and Big Data Engineering for Telecom
Sudarson Roy Pratihar
PPTX
Financial Fraud Detection: Identifying and Preventing Financial Fraud
Boston Institute of Analytics
PPTX
Apostu sergiu project
Apostu Sergiu
PDF
2015 feb 24_paytm_labs_intro_ashwin_armandoadam
Adam Muise
PPTX
PYTHON PROJECT[1] Online Fraud Fraud Detection Cybersecurity Anomaly Detec...
71762305091
PPTX
Emerging technologies enabling in fraud detection
Umasree Raghunath
PDF
Ba group3
Ashish Ranjan
PDF
Telecom Fraudsters Prediction
Ashish Ranjan
PDF
ATM fraud detection system using machine learning algorithms
IRJET Journal
PDF
Rv defcon25 burner phone challenge - dakota nelson
reconvillage
PPTX
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Impetus Technologies
PDF
Data pipelines and anomaly detection
Sho Fola Soboyejo
PDF
Hadoop BIG Data - Fraud Detection with Real-Time Analytics
hkbhadraa
PDF
MapReduce-iterative support vector machine classifier: novel fraud detection...
IJECEIAES
PDF
Artificial Intellegence (AI) FINDS A WAY: How MachineLearning is the Future ...
2iSolutions Inc. USA
PPTX
Fraud detection in financial transaction using advanced analvtics technique
BSrikanth21
PPTX
Machine_Learning and Fraud Detection . pptx
c6j0cb2voy
PDF
Real-World Data Science (Fraud Detection, Customer Churn & Predictive Mainten...
Shirin Elsinghorst
Graph Gurus 21: Integrating Real-Time Deep-Link Graph Analytics with Spark AI
TigerGraph
Fraud Analytics with Machine Learning and Big Data Engineering for Telecom
Sudarson Roy Pratihar
Financial Fraud Detection: Identifying and Preventing Financial Fraud
Boston Institute of Analytics
Apostu sergiu project
Apostu Sergiu
2015 feb 24_paytm_labs_intro_ashwin_armandoadam
Adam Muise
PYTHON PROJECT[1] Online Fraud Fraud Detection Cybersecurity Anomaly Detec...
71762305091
Emerging technologies enabling in fraud detection
Umasree Raghunath
Ba group3
Ashish Ranjan
Telecom Fraudsters Prediction
Ashish Ranjan
ATM fraud detection system using machine learning algorithms
IRJET Journal
Rv defcon25 burner phone challenge - dakota nelson
reconvillage
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Impetus Technologies
Data pipelines and anomaly detection
Sho Fola Soboyejo
Hadoop BIG Data - Fraud Detection with Real-Time Analytics
hkbhadraa
MapReduce-iterative support vector machine classifier: novel fraud detection...
IJECEIAES
Artificial Intellegence (AI) FINDS A WAY: How MachineLearning is the Future ...
2iSolutions Inc. USA
Fraud detection in financial transaction using advanced analvtics technique
BSrikanth21
Machine_Learning and Fraud Detection . pptx
c6j0cb2voy
Real-World Data Science (Fraud Detection, Customer Churn & Predictive Mainten...
Shirin Elsinghorst

Recently uploaded (20)

PDF
Unlocking FME Flows Potential: Architecture Design for Modern Enterprises
Safe Software
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
PDF
My Journey from CAD to BIM: A True Underdog Story
Safe Software
PDF
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
PDF
Scaling i.MX Applications Processors Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
PPSX
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
PDF
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
PPTX
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
DOCX
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
PPTX
UserCon Belgium: Honey, VMware increased my bill
stijn40
PDF
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
PPTX
Simplifica la seguridad en la nube y la detecci坦n de amenazas con FortiCNAPP
Cristian Garcia G.
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
PPTX
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
PDF
Database Benchmarking for Performance Masterclass: Session 2 - Data Modeling ...
ScyllaDB
PPTX
叶Wondershare Filmora Crack 14.0.7 + Key Download 2025
sebastian aliya
PPTX
Enabling the Digital Artisan keynote at ICOCI 2025
Alan Dix
PPTX
Smarter Governance with AI: What Every Board Needs to Know
OnBoard
PPTX
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
Unlocking FME Flows Potential: Architecture Design for Modern Enterprises
Safe Software
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
My Journey from CAD to BIM: A True Underdog Story
Safe Software
Automating the Geo-Referencing of Historic Aerial Photography in Flanders
Safe Software
Scaling i.MX Applications Processors Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
Daily Lesson Log MATATAG ICT TEchnology 8
LOIDAALMAZAN3
UserCon Belgium: Honey, VMware increased my bill
stijn40
ArcGIS Utility Network Migration - The Hunter Water Story
Safe Software
Simplifica la seguridad en la nube y la detecci坦n de amenazas con FortiCNAPP
Cristian Garcia G.
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
MARTSIA: A Tool for Confidential Data Exchange via Public Blockchain - Poster...
Michele Kryston
Database Benchmarking for Performance Masterclass: Session 2 - Data Modeling ...
ScyllaDB
叶Wondershare Filmora Crack 14.0.7 + Key Download 2025
sebastian aliya
Enabling the Digital Artisan keynote at ICOCI 2025
Alan Dix
Smarter Governance with AI: What Every Board Needs to Know
OnBoard
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
Ad

Phone Fraud Detection