BRUTUS - A Hybrid Detection Tool

نویسندگان

  • P.Burge
  • J.Shawe-Taylor
چکیده

ACTS project AC095, Advanced Security for Personal Communications Technologies (ASPeCT), is engaged in the advancement of security issues for the next generation of mobile communications UMTS. One of the work packages within this project is developing fraud detection and management tools. Prototypes of three different fraud detection tools have been developed, and demonstrated, using Rule-Based and Neural Network technologies. Last year ASPeCT introduced new fraud detection concepts for the GSM network building on the experience gained from fraud scenarios encountered on the Vodafone TACS network. Based on these findings we proposed various Rule-Based and Neural Network architectures to implement these ideas as separate fraud detection tools. The goal was to develop techniques that would work under GSM and later migrate to UMTS. This year we report back on the successes of the various methods and propose BRUTUS, a hybrid detection tool, built upon a generalisation of the existing fraud detection techniques. The new system migrates to other areas of electronic commerce and incorporates extra features for the purpose of business marketing and engineering. A common suite of experiments has been performed on the three systems using two sets of data. One dataset contained only fraudulent activity, transcribed into GSM Toll Ticket format from TACS. The second contained the Toll Tickets of new subscribers from the GSM network. We varied parameters that could be tuned in each of the systems in order to determine the number of subscribers raising alarms. Curves were produced showing the trade-off between the percentage of correctly identified fraudsters versus the percentage of new subscribers raising alarms. This ratio is extremely important as even a small percentage of new subscribers amounts to a significant number of individuals. BRUTUS utilises a management module, or Adaptive Critic, providing the user with a comprehensive analysing tool for pseudo real-time detection of behaviour changes. We provide details of the systems architecture of the individual components and the common framework within which they operate. Future direction for the project will be outlined with our current aims and suggestions for areas in which further work needs to be performed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

متن کامل

Intrusion Detection based on a Novel Hybrid Learning Approach

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

متن کامل

Fault Detection and Classification in Double-Circuit Transmission Line in Presence of TCSC Using Hybrid Intelligent Method

In this paper, an effective method for fault detection and classification in a double-circuit transmission line compensated with TCSC is proposed. The mutual coupling of parallel transmission lines and presence of TCSC affect the frequency content of the input signal of a distance relay and hence fault detection and fault classification face some challenges. One of the most effective methods fo...

متن کامل

Partial Order Reductions for Security Protocol Verification

In this paper we explore partial order reduction that make the task of verifying cryptographic protocols more efficient. These reduction techniques have been implemented in our tool BRUTUS. Although we have implemented several reduction techniques in our tool BRUTUS, due to space restrictions in this paper we only focus on partial order reductions. Partial order reductions have proved very usef...

متن کامل

A Brutus Logic for a Spi-calculus Dialect Acm Computing Classiication: D.2.4 Software/program Veriication -f.3.1 Specifying and Verifying and Reasoning about Programs

In the eld of process algebras, the spi-calculus, a modi-ed version of the-calculus with encryption primitives, is indicated as an expressive speciication language for cryptographic protocols. In spi-calculus basic security properties, such as secrecy and integrity can be formalized as may-testing equivalences which do not seem easily ex-tendible to express other kinds of interesting properties...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997