Veloso et al., 2020 - Google Patents
Fraud detection using heavy hitters: a case studyVeloso et al., 2020
- Document ID
- 277503437986881495
- Author
- Veloso B
- Martins C
- Espanha R
- Azevedo R
- Gama J
- Publication year
- Publication venue
- Proceedings of the 35th Annual ACM Symposium on Applied Computing
External Links
Snippet
The high asymmetry of international termination rates, where calls are charged with higher values, are fertile ground for the appearance of frauds in Telecom Companies. In this paper, we present three different and complementary solutions for a real problem called …
- 238000001514 detection method 0 title description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Du et al. | Ldptrace: Locally differentially private trajectory synthesis | |
| EP0897566B1 (en) | Monitoring and retraining neural network | |
| KR100595786B1 (en) | System and method for determining validity of interactions on a network | |
| EP0894378B1 (en) | Signature based fraud detection system | |
| Luo et al. | Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection | |
| US6038555A (en) | Generic processing capability | |
| CN107517216B (en) | Network security event correlation method | |
| Xing et al. | Employing latent dirichlet allocation for fraud detection in telecommunications | |
| Hollmén | User profiling and classification for fraud detection in mobile communications networks | |
| Marchal et al. | Detecting organized ecommerce fraud using scalable categorical clustering | |
| Kumar et al. | An information theoretic approach for feature selection | |
| Tabassum et al. | Sampling massive streaming call graphs | |
| Li et al. | Efficient weighted probabilistic frequent itemset mining in uncertain databases | |
| Veloso et al. | Fraud detection using heavy hitters: a case study | |
| Zhang et al. | Differentially private stream processing at scale | |
| Veloso et al. | Interconnect bypass fraud detection: a case study | |
| CN118101341B (en) | Multi-platform supervision system for commercial tenant center based on big data | |
| CN110032596A (en) | Traffic Anomaly user identification method and system | |
| CN117932639A (en) | Data leakage protection system based on big data management | |
| Veloso et al. | Detecting Bursts of Activity from Streams | |
| CN116257562A (en) | Abnormal object identification method, device, medium, equipment and program product | |
| He et al. | Automated mining of approximate periodicity on numeric data: a statistical approach | |
| Ogwueleka | Fraud detection in mobile communications networks using user profiling and classification techniques | |
| Ning et al. | Tiaa: A visual toolkit for intrusion alert analysis | |
| Van Heerden | Detecting fraud in cellular telephone networks |