Detection of Mobile Phone Fraud Using Possibilistic Fuzzy C-Means Clustering and Hidden Markov Model

  title={Detection of Mobile Phone Fraud Using Possibilistic Fuzzy C-Means Clustering and Hidden Markov Model},
  author={Sharmila Subudhi and Suvasini Panigrahi and Tanmay Kumar},
  journal={Int. J. Synth. Emot.},
This paper presents a novel approach for fraud detection in mobile phone networks by using a combination of Possibilistic Fuzzy C-Means clustering and Hidden Markov Model HMM. The clustering technique is first applied on two calling features extracted from the past call records of a subscriber generating a behavioral profile for the user. The HMM parameters are computed from the profile, which are used to generate some profile sequences for training. The trained HMM model is then applied for… 

A hybrid mobile call fraud detection model using optimized fuzzy C-means clustering and group method of data handling-based network

A novel two-stage fraud detection system in mobile telecom networks has been presented in this paper that identifies the malicious calls among the normal ones in two stages. Initially, a genetic

Assisting Telecommunication Fraud Prediction: Detect Individuals Carrying Multiple Phones Based on Trajectory Data Mining

Through analyzing trajectory data, individuals with multiple phones can be found and recognized as potential telecommunications fraudsters which should be intensively monitored and provided a technical support for the prevention of fraudulent activities.

Copy Move Forgery Detection on Digital Images – Primer Research

This article added preliminary research methods (existing algorithms), used hybrid approaches of existing algorithms, and added single image forensics analysis method also and made a comparative analysis based on some clustering algorithms and its applications, drawbacks, digital forensics tool analysis.



Use of fuzzy clustering and support vector machine for detecting fraud in mobile telecommunication networks

This paper addresses the problem of finding out fraudulent calls in mobile phones by analysing the user's calling behaviour. In this work, we have used support vector machine SVM along with fuzzy

Credit Card Fraud Detection Using Hidden Markov Model

This paper model the sequence of operations in credit card transaction processing using a hidden Markov model (HMM) and shows how it can be used for the detection of frauds and compares it with other techniques available in the literature.

Fraud detection in communication networks using neural and probabilistic methods

A feed-forward neural network based on supervised learning is used to learn a discriminative function to classify subscribers using summary statistics, and Bayesian networks can be used to infer the probability of fraud given the subscribers' behavior.

Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks

The proposed fraud detection system (FDS) consists of four components, namely, rule-based deviation detector, Dempster-Shafer component, call history database and Bayesian learning.

Clustering of Telecommunications User Profiles for Fraud Detection and Security Enhancement in Large Corporate Networks: A case Study

The application of two clustering techniques is presented, with the task to identify appropriate user behavior representation inside a large organization's telecommunicati ons network, in order to spot fraudulent usage.

Anomalous Behavior Detection in Mobile Network

This work proposes User Group Partition Algorithm and Behavior Pattern Matching Algorithm to extract anomalous calls from mobile call detail records effectively and warns the user that the suspicious mobile phone call is detected and asks the user which action will be taken.

A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection

A simple data preprocessing approach to speed up a hidden Markov model (HMM) training for system-call-based anomaly intrusion detection and can reduce training time by up to 50 percent with unnoticeable intrusion detection performance degradation, compared to a conventional batch HMM training scheme.

Employing Self-Organizing Map for Fraud Detection

A fraud detection method based on the user accounts visualization and threshold-type detection and a method of the detection threshold setting on the basis of the SOM U-matrix are proposed.