Interconnect Bypass Fraud Detection Model Using Data Mining Technique

dc.contributor.advisorMidekso, Dida (PhD)
dc.contributor.authorHaile, Bekele
dc.date.accessioned2020-09-21T07:00:09Z
dc.date.accessioned2023-11-09T11:26:25Z
dc.date.available2020-09-21T07:00:09Z
dc.date.available2023-11-09T11:26:25Z
dc.date.issued2019-08-08
dc.description.abstractInterconnect bypass fraud is a process by which official interconnect termination routes are being bypassed by using VoIP to route international call traffics into a SIM-Box device where calls are terminated and subsequently regenerated as local calls. According to communication fraud control associate (CFCA, 2017), it is categorized under a type of damage fraud along with subscription fraud. Telecom industry has been expanded dynamically as a result of the development of affordable technologies and an increasing demand of communications. However, the expansion in telecommunication industries in parallel motivated fraudsters to commit telecom fraud using different methods and techniques resulting in the decreasing of the revenue and quality of service in telecommunication providers. This thesis work focuses on predicting interconnect bypass fraud using different classfication techniques such as multilayer perceptron (MLP), support vector machine (SVM), random decision forest (RF), and J48 algorithms. To achieve our objective, call detail records (CDR) are collected from ethio telcom billing system for two months, from 41 millions active mobile subscribers. We applied cross-industrial standard process for data mining (CRISP-DM) model to the collected raw data; extracted important features from customers CDRs, and derived additional new features so as to characterize the behavior of interconnect bypass fraud. In addition, we preprocessed, aggregated and formatted the datasets convenient for the selected ML algorithms. Each algorithm was trained with five different aggregated datasets such as 4 hours, 8 hours, 12 hours, daily and weekly using two training modes (10-fold cross validation and percent split). The performance of the models were compared using confusion matrix and we proposed the best models for interconnect bypass fraud prediction. From our experiments, we found that J48 and RF models gave us the highest accuracy as compared to MLP and SVM by giving the classification accuracy of 99.99%, 99.99%, 99.84% and 95.61% respectively on 8 hours aggregated dataset.en_US
dc.identifier.urihttp://10.90.10.223:4000/handle/123456789/22388
dc.language.isoenen_US
dc.publisherAddis Ababa Universityen_US
dc.subjectTelecom Frauden_US
dc.subjectBypass Frauden_US
dc.subjectSIM-Boxen_US
dc.subjectFraud Detectionen_US
dc.subjectData Miningen_US
dc.subjectKnowledge Discoveryen_US
dc.subjectCRISP-DM Process Modelen_US
dc.subjectSupervised Machine Learningen_US
dc.subjectMultilayer Perceptronen_US
dc.subjectSupport Vector Machineen_US
dc.subjectJ48en_US
dc.subjectRandom Foresten_US
dc.titleInterconnect Bypass Fraud Detection Model Using Data Mining Techniqueen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Bekele Haile 2019.pdf
Size:
1.16 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Plain Text
Description:

Collections