Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff

Fraud activities have reached to critical point causing millions of ringgit of losses to telecommunication companies, and as a result, forcing them to employ applications or systems (such as Telekom Malaysia Berhad’s Next Generation Fraud Detection System) to detect the said activities. We introdu...

وصف كامل

التفاصيل البيبلوغرافية
المؤلف الرئيسي: Mohd Yusoff, Mohd Izhan
التنسيق: أطروحة
منشور في: 2014
الموضوعات:
_version_ 1849733952044007424
author Mohd Yusoff, Mohd Izhan
author_facet Mohd Yusoff, Mohd Izhan
author_sort Mohd Yusoff, Mohd Izhan
description Fraud activities have reached to critical point causing millions of ringgit of losses to telecommunication companies, and as a result, forcing them to employ applications or systems (such as Telekom Malaysia Berhad’s Next Generation Fraud Detection System) to detect the said activities. We introduce a new algorithm that could detect fraud activities in telecommunication industry (e.g. intrusion fraud which occurs when legitimate account is comprised by an intruder who makes or sells calls on this account) that uses Gaussian Mixed Model (or GMM), a probabilistic model normally used in fraud detection via speech recognition. Due to the complexity of GMM, we use Expectation Maximization (or EM) algorithm by Dempster et al. (1977) to obtain the maximum likelihood estimates of the GMM parameters. Together with Kernel method (see Silverman, 1986), we improve the process of finding the number of components in GMM. In addition, we have also successfully derived the likelihood ratio test in the determination of the number of components in GMM and the comparison of its results with those of Akaike Information Criteria (AIC) will also be highlighted in this thesis. The said algorithm uses similarity coefficient to classify the real data based on the log-likelihood function and it’s extended to detect incoming fraud calls as suspected by the telecommunication company. The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. The real data, which included call charging and duration, are collected from Telekom Malaysia Berhad’s exchanges and they are believed to be contaminated by fraud activities. As the original data are clearly not in the format that is generally used for speech recognition, they are reformatted prior to testing and analysis. The new algorithm is in agreement with those suspected by the company.
format Thesis
id oai:studentsrepo.um.edu.my:4832
institution Universiti Malaya
publishDate 2014
record_format eprints
spelling oai:studentsrepo.um.edu.my:48322015-03-04T04:43:25Z Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff Mohd Yusoff, Mohd Izhan Q Science (General) QA Mathematics Fraud activities have reached to critical point causing millions of ringgit of losses to telecommunication companies, and as a result, forcing them to employ applications or systems (such as Telekom Malaysia Berhad’s Next Generation Fraud Detection System) to detect the said activities. We introduce a new algorithm that could detect fraud activities in telecommunication industry (e.g. intrusion fraud which occurs when legitimate account is comprised by an intruder who makes or sells calls on this account) that uses Gaussian Mixed Model (or GMM), a probabilistic model normally used in fraud detection via speech recognition. Due to the complexity of GMM, we use Expectation Maximization (or EM) algorithm by Dempster et al. (1977) to obtain the maximum likelihood estimates of the GMM parameters. Together with Kernel method (see Silverman, 1986), we improve the process of finding the number of components in GMM. In addition, we have also successfully derived the likelihood ratio test in the determination of the number of components in GMM and the comparison of its results with those of Akaike Information Criteria (AIC) will also be highlighted in this thesis. The said algorithm uses similarity coefficient to classify the real data based on the log-likelihood function and it’s extended to detect incoming fraud calls as suspected by the telecommunication company. The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. The real data, which included call charging and duration, are collected from Telekom Malaysia Berhad’s exchanges and they are believed to be contaminated by fraud activities. As the original data are clearly not in the format that is generally used for speech recognition, they are reformatted prior to testing and analysis. The new algorithm is in agreement with those suspected by the company. 2014 Thesis NonPeerReviewed application/pdf http://studentsrepo.um.edu.my/4832/1/FRAUD_DETECTION_IN_TELECOMMUNICATION_USING_PATTERN_RECOG_(1).pdf application/pdf http://studentsrepo.um.edu.my/4832/2/FRAUD_DETECTION_IN_TELECOMMUNICATION_USING_PATTERN_RECOG_(2).pdf Mohd Yusoff, Mohd Izhan (2014) Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff. PhD thesis, University of Malaya. http://studentsrepo.um.edu.my/4832/
spellingShingle Q Science (General)
QA Mathematics
Mohd Yusoff, Mohd Izhan
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
title Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
title_full Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
title_fullStr Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
title_full_unstemmed Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
title_short Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
title_sort fraud detection in telecommunication using pattern recognition method mohd izhan mohd yusoff
topic Q Science (General)
QA Mathematics
url-record http://studentsrepo.um.edu.my/4832/
work_keys_str_mv AT mohdyusoffmohdizhan frauddetectionintelecommunicationusingpatternrecognitionmethodmohdizhanmohdyusoff