Detecting Anomalies in Mobile Telecommunication Networks Using a Graph Based Approach

نویسندگان

  • Cameron Chaparro
  • William Eberle
چکیده

According to a survey conducted by the Communications Fraud Control Association an estimated $46.3 billion were lost due to telecommunications fraud in 2013. This suggests that the potential for intentional exploitation of unsuspecting users is an ongoing issue, and finding anomalies in telecommunications data can aide in the security of users, their phones, their personal information, and the companies that provide them services. Most anomaly detection approaches applied to this type of data use some type of statistical representation; however, we think that a more natural representation is to consider telecom traffic as a graph. In this paper, we specifically focus on using graphbased anomaly detection to find and report anomalies in telecom data. Up until now, little work seems to be focused on detecting and reporting anomalies in telecommunications data represented as a graph. Moreover, even less work seems to focus on detecting anomalies in phone call history with this same representation. Our goal in this application paper is to use real-world cell phone traffic to detect anomalies in user patterns based on phone call and text message history.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Approach for Detecting Relationships in Social Networks Using Cellular Automata Based Graph Coloring

All the social networks can be modeled as a graph, where each roles as vertex and each relationroles as an edge. The graph can be show as G = [V;E], where V is the set of vertices and E is theset of edges. All social networks can be segmented to K groups, where there are members in eachgroup with same features. In each group each person knows other individuals and is in touch ...

متن کامل

Detecting Anomalies in Cargo Shipments Using Graph Properties

Detecting anomalies in the structural, or relational, component of data is a new and important challenge, especially in security-related domains. In this paper, we analyze the use of variations in graph properties to detect structural anomalies in graphs. Based on several pattern recognition approaches proposed on various domains like the internet, telecommunication call records and social netw...

متن کامل

Outlier Detection in Wireless Sensor Networks Using Distributed Principal Component Analysis

Detecting anomalies is an important challenge for intrusion detection and fault diagnosis in wireless sensor networks (WSNs). To address the problem of outlier detection in wireless sensor networks, in this paper we present a PCA-based centralized approach and a DPCA-based distributed energy-efficient approach for detecting outliers in sensed data in a WSN. The outliers in sensed data can be ca...

متن کامل

Large-scale IP network behavior anomaly detection and identification using substructure-based approach and multivariate time series mining

In this paper, a substructure-based network behavior anomaly detection approach, called WFS (Weighted Frequent Subgraphs), is proposed to detect the anomalies of a large-scale IP networks. With application of WFS, an entire graph is examined, unusual substructures of which are reported. Due to additional information given by the graph, the anomalies are able to be detected more accurately. With...

متن کامل

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015