[go: up one dir, main page]

Veloso et al., 2020 - Google Patents

Fraud detection using heavy hitters: a case study

Veloso et al., 2020

Document ID
277503437986881495
Author
Veloso B
Martins C
Espanha R
Azevedo R
Gama J
Publication year
Publication venue
Proceedings of the 35th Annual ACM Symposium on Applied Computing

External Links

Snippet

The high asymmetry of international termination rates, where calls are charged with higher values, are fertile ground for the appearance of frauds in Telecom Companies. In this paper, we present three different and complementary solutions for a real problem called …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring

Similar Documents

Publication Publication Date Title
Du et al. Ldptrace: Locally differentially private trajectory synthesis
EP0897566B1 (en) Monitoring and retraining neural network
KR100595786B1 (en) System and method for determining validity of interactions on a network
EP0894378B1 (en) Signature based fraud detection system
Luo et al. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
US6038555A (en) Generic processing capability
CN107517216B (en) Network security event correlation method
Xing et al. Employing latent dirichlet allocation for fraud detection in telecommunications
Hollmén User profiling and classification for fraud detection in mobile communications networks
Marchal et al. Detecting organized ecommerce fraud using scalable categorical clustering
Kumar et al. An information theoretic approach for feature selection
Tabassum et al. Sampling massive streaming call graphs
Li et al. Efficient weighted probabilistic frequent itemset mining in uncertain databases
Veloso et al. Fraud detection using heavy hitters: a case study
Zhang et al. Differentially private stream processing at scale
Veloso et al. Interconnect bypass fraud detection: a case study
CN118101341B (en) Multi-platform supervision system for commercial tenant center based on big data
CN110032596A (en) Traffic Anomaly user identification method and system
CN117932639A (en) Data leakage protection system based on big data management
Veloso et al. Detecting Bursts of Activity from Streams
CN116257562A (en) Abnormal object identification method, device, medium, equipment and program product
He et al. Automated mining of approximate periodicity on numeric data: a statistical approach
Ogwueleka Fraud detection in mobile communications networks using user profiling and classification techniques
Ning et al. Tiaa: A visual toolkit for intrusion alert analysis
Van Heerden Detecting fraud in cellular telephone networks