Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Fraud activities have reached to critical point causing millions of ringgit of losses to telecommunication companies, and as a result, forcing them to employ applications or systems (such as Telekom Malaysia Berhad’s Next Generation Fraud Detection System) to detect the said activities. We introdu...
| المؤلف الرئيسي: | |
|---|---|
| التنسيق: | أطروحة |
| منشور في: |
2014
|
| الموضوعات: |
| _version_ | 1849733952044007424 |
|---|---|
| author | Mohd Yusoff, Mohd Izhan |
| author_facet | Mohd Yusoff, Mohd Izhan |
| author_sort | Mohd Yusoff, Mohd Izhan |
| description | Fraud activities have reached to critical point causing millions of ringgit of losses to telecommunication companies, and as a result, forcing them to employ
applications or systems (such as Telekom Malaysia Berhad’s Next Generation Fraud Detection System) to detect the said activities.
We introduce a new algorithm that could detect fraud activities in telecommunication industry (e.g. intrusion fraud which occurs when legitimate account is comprised by an intruder who makes or sells calls on this account) that uses Gaussian Mixed Model (or GMM), a probabilistic model normally used in fraud detection via speech recognition. Due to the complexity of GMM, we use Expectation Maximization (or EM) algorithm by Dempster et al. (1977) to obtain the maximum likelihood estimates of the GMM parameters. Together with Kernel method (see Silverman,
1986), we improve the process of finding the number of components in GMM. In addition, we have also successfully derived the likelihood ratio test in the determination
of the number of components in GMM and the comparison of its results with those of Akaike Information Criteria (AIC) will also be highlighted in this thesis. The said
algorithm uses similarity coefficient to classify the real data based on the log-likelihood function and it’s extended to detect incoming fraud calls as suspected by the
telecommunication company.
The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. The real data, which included call charging and
duration, are collected from Telekom Malaysia Berhad’s exchanges and they are believed to be contaminated by fraud activities. As the original data are clearly not in
the format that is generally used for speech recognition, they are reformatted prior to testing and analysis. The new algorithm is in agreement with those suspected by the
company. |
| format | Thesis |
| id | oai:studentsrepo.um.edu.my:4832 |
| institution | Universiti Malaya |
| publishDate | 2014 |
| record_format | eprints |
| spelling | oai:studentsrepo.um.edu.my:48322015-03-04T04:43:25Z Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff Mohd Yusoff, Mohd Izhan Q Science (General) QA Mathematics Fraud activities have reached to critical point causing millions of ringgit of losses to telecommunication companies, and as a result, forcing them to employ applications or systems (such as Telekom Malaysia Berhad’s Next Generation Fraud Detection System) to detect the said activities. We introduce a new algorithm that could detect fraud activities in telecommunication industry (e.g. intrusion fraud which occurs when legitimate account is comprised by an intruder who makes or sells calls on this account) that uses Gaussian Mixed Model (or GMM), a probabilistic model normally used in fraud detection via speech recognition. Due to the complexity of GMM, we use Expectation Maximization (or EM) algorithm by Dempster et al. (1977) to obtain the maximum likelihood estimates of the GMM parameters. Together with Kernel method (see Silverman, 1986), we improve the process of finding the number of components in GMM. In addition, we have also successfully derived the likelihood ratio test in the determination of the number of components in GMM and the comparison of its results with those of Akaike Information Criteria (AIC) will also be highlighted in this thesis. The said algorithm uses similarity coefficient to classify the real data based on the log-likelihood function and it’s extended to detect incoming fraud calls as suspected by the telecommunication company. The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. The real data, which included call charging and duration, are collected from Telekom Malaysia Berhad’s exchanges and they are believed to be contaminated by fraud activities. As the original data are clearly not in the format that is generally used for speech recognition, they are reformatted prior to testing and analysis. The new algorithm is in agreement with those suspected by the company. 2014 Thesis NonPeerReviewed application/pdf http://studentsrepo.um.edu.my/4832/1/FRAUD_DETECTION_IN_TELECOMMUNICATION_USING_PATTERN_RECOG_(1).pdf application/pdf http://studentsrepo.um.edu.my/4832/2/FRAUD_DETECTION_IN_TELECOMMUNICATION_USING_PATTERN_RECOG_(2).pdf Mohd Yusoff, Mohd Izhan (2014) Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff. PhD thesis, University of Malaya. http://studentsrepo.um.edu.my/4832/ |
| spellingShingle | Q Science (General) QA Mathematics Mohd Yusoff, Mohd Izhan Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff |
| title | Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff |
| title_full | Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff |
| title_fullStr | Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff |
| title_full_unstemmed | Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff |
| title_short | Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff |
| title_sort | fraud detection in telecommunication using pattern recognition method mohd izhan mohd yusoff |
| topic | Q Science (General) QA Mathematics |
| url-record | http://studentsrepo.um.edu.my/4832/ |
| work_keys_str_mv | AT mohdyusoffmohdizhan frauddetectionintelecommunicationusingpatternrecognitionmethodmohdizhanmohdyusoff |