DETECTION OF FRAUDULENT PHONE CALLS DETECTION IN MOBILE APPLICATIONS
Main Article Content
Abstract
The primary challenge faced over the course of this decade-long endeavour is the difficulty in devising effective features without direct access to telephony network infrastructure. we conducted an extensive three-month measurement study using these call logs, which encompassed a staggering 9 billion records. Based on the insights gleaned from this study, we identified and designed 29 features that could be used by machine learning algorithms to predict malicious calls. Fraudulent phone calls or scams and spam s via telephone or mobile phone have become a common threat to individuals and organizations. Artificial Intelligence (AI) and Machine Learning (ML) have emerged as powerful tools in detecting and analyzing fraud or malicious calls. This paper presents an overview of AI-based fraud or spam detection and analysis techniques, along with its challenges and potential solutions. The novel fraud call detection approach is proposed that achieved high accuracy and precision. The outcomes revealed that the most effective approach could reduce unblocked malicious calls by up to 90%, while maintaining a precision rate exceeding 93.79% for benign call traffic. Moreover, our analysis demonstrated that these models could be implemented efficiently without incurring significant latency overhead.
Downloads
Metrics
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
References
P. Sornsuwit, and S. Jaiyen, “A new hybrid machine learning for cybersecurity threat detection based on adaptive
boosting,”Applied Artificial Intelligence, 33(5), pp.462-482, 2019.
K.Shaukat, S. Luo, S.Chen, and D. Liu, “Cyber threat detection using machine learning techniques: A performance
evaluation perspective,”in IEEE international conference on cyber warfare and security. IEEE, October2020,pp. 1-6.
S. M. Gowri, G. Sharang Ramana, M. Sree Ranjani and T. Tharani," Detection of Telephony Spam and Scams using
Recurrent Neural Network (RNN) Algorithm," 2021 7th International Conference on Advanced Computing and
Communication Systems (ICACCS), Coimbatore, India, 2021, pp. 1284-1288, doi:
1109/ICACCS51430.2021.9441982.
Abidogun, Olusola Adeniyi. "Data mining, fraud detection and mobile telecommunications: call pattern analysis with
unsupervised neural networks." PhD diss., University of the Western Cape, 2005.
S. Sandhya, N. Karthikeyan, R. Sruthi “Machine learning method for detecting and analysis of fraud phone calls
datasets” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878 (Online), Volume-8
Issue-6, March 2020
Mohammad Iquebal Akhter, Dr. Mohammad Gulam Ahamad “Detecting Telecommunication fraud using neural
networks through data mining” international Journal of Scientific & Engineering Research, Volume 3, Issue 3, March-
I. Murynets, M. Zabarankin, R. P. Jover and Panagia, "Analysis and detection of SIMbox fraud in mobility networks,"
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications,Toronto,ON,Canada,2014,pp.1519-1526,doi:
1109/INFOCOM.2014.6848087.
Crawford, M., Khoshgoftaar, T.M., Prusa,J.D. et al. Survey of review spam detection using machine learning
techniques. Journal of Big Data 2, 23 (2015). doi:10.1186/s40537-015-0029- 9.
Marzuoli A, Kingravi H, Dewey D and Pienta R. (2016). Uncovering the Landscape of Fraud and Spam in the
Telephony Channel 2016 15th IEEE International Conference on Machine Learning and
Applications(ICMLA).10.1109/ICMLA.2016.0 153. 978-1-5090-6167-9. (853- 858).
B. Teh, M. B. Islam, N. Kumar, M. K. Islam and U. Eaganathan,"Statistical and Spending Behavior based Fraud
Detection of Card-based Payment System,"2018 International SSConference on Electrical Engineering and Informatics
(ICELTICs), Banda Aceh, Indonesia, 2018, pp. 78-83, doi:10.1109/ICELTICS.2018.8548878.
H. Tu, A. Doupe, Z. Zhao, and G.-J. Ahn, “ Sok: Everyone hates ’robocalls: A survey of techniques against telephone
spam,” 2016 IEEE Symposium on Security and Privacy (SP), pp. 320 338, 2016.
M. Crawford, T.M. Khoshgoftaar, J.D Prusa, A.N. Richter, H. Al Najada, "Survey of review spam detection using
machine learning techniques", Journal of Big Data, 2, pp. 1-24, 42015.