NFA: A neural factorization autoencoder based online telephony fraud detection

Abdul Wahid , Mounira Msahli , Albert Bifet , Gerard Memmi

›› 2024, Vol. 10 ›› Issue (1) : 158 -167.

PDF
›› 2024, Vol. 10 ›› Issue (1) :158 -167. DOI: 10.1016/j.dcan.2023.03.002
Special issue on intelligent anomaly/novelty detection to enhance IoT and AIoT
research-article
NFA: A neural factorization autoencoder based online telephony fraud detection
Author information +
History +
PDF

Abstract

The proliferation of internet communication channels has increased telecom fraud, causing billions of euros in losses for customers and the industry each year. Fraudsters constantly find new ways to engage in illegal activity on the network. To reduce these losses, a new fraud detection approach is required. Telecom fraud detection involves identifying a small number of fraudulent calls from a vast amount of call traffic. Developing an effective strategy to combat fraud has become challenging. Although much effort has been made to detect fraud, most existing methods are designed for batch processing, not real-time detection. To solve this problem, we propose an online fraud detection model using a Neural Factorization Autoencoder (NFA), which analyzes customer calling patterns to detect fraudulent calls. The model employs Neural Factorization Machines (NFM) and an Autoencoder (AE) to model calling patterns and a memory module to adapt to changing customer behaviour. We evaluate our approach on a large dataset of real-world call detail records and compare it with several state-of-the-art methods. Our results show that our approach outperforms the baselines, with an AUC of 91.06%, a TPR of 91.89%, an FPR of 14.76%, and an F1-score of 95.45%. These results demonstrate the effectiveness of our approach in detecting fraud in real-time and suggest that it can be a valuable tool for preventing fraud in telecommunications networks.

Keywords

Telecom industry / Streaming anomaly detection / Fraud analysis / Factorization machine / Real-time system / Security

Cite this article

Download citation ▾
Abdul Wahid, Mounira Msahli, Albert Bifet, Gerard Memmi. NFA: A neural factorization autoencoder based online telephony fraud detection. , 2024, 10(1): 158-167 DOI:10.1016/j.dcan.2023.03.002

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

K. Wieland, Network & application monitoring-can revenue assurance stop this happening? revenue leakage continues to hamper the telecom industry and operators, understandably, don't want to talk about it in, Telecommun. Int. 38 (8)(2004) 10-11.

[2]

CFCA, Fraud Loss Survey. https://cfca.org/wp-content/uploads/2021/12/CFCA-Fraud-Loss-Survey-2021-2.pdf, 2021. (Accessed 7 June 2021).

[3]

W. Rodgers, R. Attah-Boakye, K. Adams, Application of algorithmic cognitive decision trust modeling for cyber security within organisations, IEEE Trans. Eng. Manag. 69 (6) (2020) 3792-3801.

[4]

Y. Jiang, G. Liu, J. Wu, H. Lin, Telecom fraud detection via hawkes-enhanced sequence model, IEEE Trans. Knowl. Data Eng. 35 (5) (2023) 5311-5324.

[5]

V. Chadyšas, A. Bugajev, R. Kriauziene, O. Vasilecas,Outlier analysis for telecom fraud detection, in:Proceedings of the 15th International Baltic Conference on Digital Business and Intelligent Systems, 2022, pp. 219-231.

[6]

R. Brause, T. Langsdorf, M. Hepp,Neural data mining for credit card fraud detection, in:Proceedings of the 11th International Conference on Tools with Artificial Intelligence, 1999, pp. 103-106.

[7]

S. Rosset, U. Murad, E. Neumann, Y. Idan, G. Pinkas,Discovery of fraud rules for telecommunications—challenges and solutions, in:Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1999, pp. 409-413.

[8]

Q. Zhao, K. Chen, T. Li, Y. Yang, X. Wang, Detecting telecommunication fraud by understanding the contents of a call, Cybersecurity 1 (8) (2018) 1-12.

[9]

A. Ravi, M. Msahli, H. Qiu, G. Memmi, A. Bifet, M. Qiu, Wangiri fraud: pattern analysis and machine learning-based detection, IEEE Internet Things J. 10 (8) (2023) 6794-6802.

[10]

V. Chandola, A. Banerjee, V. Kumar, Anomaly detection for discrete sequences: a survey, IEEE Trans. Knowl. Data Eng. 24 (5) (2010) 823-839.

[11]

R. He, J. McAuley, Fusing similarity models with Markov chains for sparse sequential recommendation, in: Proceedings of the 16th International Conference on Data Mining, ICDM, 2016, pp. 191-200.

[12]

S. Rayana, L. Akoglu, Less is more: building selective anomaly ensembles, ACM Trans. Knowl. Discov. Data 10 (4) (2016) 1-33.

[13]

J. Jurgovsky, M. Granitzer, K. Ziegler, S. Calabretto, P.-E. Portier, L. He-Guelton, O. Caelen, Sequence classification for credit-card fraud detection, Expert Syst. Appl. 100 (2018) 234-245.

[14]

S. Wang, C. Liu, X. Gao, H. Qu, W. Xu,Session-based fraud detection in online e-commerce transactions using recurrent neural networks, in:Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases, 2017, pp. 241-252.

[15]

B. Branco, P. Abreu, A.S. Gomes, M.S. Almeida, J.T. Ascens-ao, P. Bizarro,Interleaved sequence rnns for fraud detection, in:Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2020, pp. 3101-3109.

[16]

Y. Zhu, D. Xi, B. Song, F. Zhuang, S. Chen, X. Gu, Q. He,Modeling users' behavior sequences with hierarchical explainable network for cross-domain fraud detection, in:Proceedings of the Web Conference, 2020, pp. 928-938.

[17]

J. Zhang, H. Chen, X. Yao, X. Fu, Cpfinder: Finding an unknown caller's profession from anonymized mobile phone data, Digit. Commun. Netw. 8 (3) (2022) 324-332.

[18]

M.U. Togbe, Y. Chabchoub, A. Boly, M. Barry, R. Chiky, M. Bahri, Anomalies detection using isolation in concept-drifting data streams, Computers 10 (1) (2021) 13.

[19]

Z. Li, Y. Zhao, X. Hu, N. Botta, C. Ionescu, G. Chen, Ecod: unsupervised outlier detection using empirical cumulative distribution functions, IEEE Trans. Knowl. Data Eng 35 (12) (2023) 12181-12193.

[20]

Z. Li, Y. Zhao, N. Botta, C. Ionescu, X. Hu, Copod: copula-based outlier detection,in:Proceedings of the 2020 IEEE International Conference on Data Mining, ICDM, 2020, pp. 1118-1123.

[21]

Y. Zhao, X. Hu, C. Cheng, C. Wang, C. Wan, W. Wang, J. Yang, H. Bai, Z. Li, C. Xiao, et al., Suod: accelerating large-scale unsupervised heterogeneous outlier detection, Proc. Mach. Learn. Syst. 3 (2021) 463-478.

[22]

L. Ruff, R. Vandermeulen, N. Goernitz, L. Deecke, S.A. Siddiqui, A. Binder, E. Müller, M. Kloft,Deep one-class classification, in:Proceedings of the 37th International Conference on Machine Learning, 2018, pp. 4393-4402.

[23]

T. Pevnỳ, Loda: lightweight on-line detector of anomalies, Mach. Learn. 102 (2)(2016) 275-304.

[24]

F.T. Liu, K.M. Ting, Z.-H. Zhou,Isolation forest, in:Proceedings of the 8th IEEE International Conference on Data Mining, 2008, pp. 413-422.

[25]

S. Bhatia, A. Jain, S. Srivastava, K. Kawaguchi, B. Hooi, Memstream: memory-based streaming anomaly detection,in: Proceedings of the ACM Web Conference, 2022, pp. 610-621.

[26]

X. He, T.-S. Chua,Neural factorization machines for sparse predictive analytics, in:Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2017, pp. 355-364.

[27]

R. Steffen, Factorization machines, in: Proceedings of the 10th IEEE International Conference on Data Mining, ICDM, 2010, pp. 995-1000.

[28]

K.D. Doan, P. Yadav, C.K. Reddy,Adversarial factorization autoencoder for look-alike modeling, in:Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019, pp. 2803-2812.

[29]

I. Goodfellow, Y. Bengio, A. Courville, Deep Learning, MIT Press, Massachusetts, 2016.

[30]

P. Burge, J. Shawe-Taylor,Detecting cellular fraud using adaptive prototypes, in:Proceedings of the AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management, 1997, pp. 9-13.

[31]

D.E. Denning, An intrusion-detection model, IEEE Trans. Software Eng. SE-13 (2)(1987) 222-232.

[32]

T. Fawcett, F. Provost, Adaptive fraud detection, Data Min. Knowl. Discov. 1 (3)(1997) 291-316.

[33]

T.F. Lunt, A survey of intrusion detection techniques, Comput. Secur. 12 (4) (1993) 405-418.

[34]

J. Tang, K. Wang,Personalized top-n sequential recommendation via convolutional sequence embedding, in:Proceedings of the 11th ACM International Conference on Web Search and Data Mining, 2018, pp. 565-573.

[35]

J. Lian, X. Zhou, F. Zhang, Z. Chen, X. Xie, G. Sun, xdeepfm: combining explicit and implicit feature interactions for recommender systems,in: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018, pp. 1754-1763.

[36]

R. Wang, B. Fu, G. Fu, M. Wang,Deep & cross network for ad click predictions, in:Proceedings of the ADKDD’17, 2017, pp. 1-7.

PDF

79

Accesses

0

Citation

Detail

Sections
Recommended

/