DETECTION OF FRAUDULENT PHONE CALLS DETECTION IN MOBILE APPLICATIONS

Main Article Content

Dr K. BHARGAVI
B. MITHILA SHIVANI

Abstract

The primary challenge faced over the course of this decade-long endeavour is the difficulty in devising effective features without direct access to telephony network infrastructure. we conducted an extensive three-month measurement study using these call logs, which encompassed a staggering 9 billion records. Based on the insights gleaned from this study, we identified and designed 29 features that could be used by machine learning algorithms to predict malicious calls. Fraudulent phone calls or scams and spam s via telephone or mobile phone have become a common threat to individuals and organizations. Artificial Intelligence (AI) and Machine Learning (ML) have emerged as powerful tools in detecting and analyzing fraud or malicious calls. This paper presents an overview of AI-based fraud or spam detection and analysis techniques, along with its challenges and potential solutions. The novel fraud call detection approach is proposed that achieved high accuracy and precision. The outcomes revealed that the most effective approach could reduce unblocked malicious calls by up to 90%, while maintaining a precision rate exceeding 93.79% for benign call traffic. Moreover, our analysis demonstrated that these models could be implemented efficiently without incurring significant latency overhead.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
BHARGAVI, D. K. ., & SHIVANI, B. M. . (2024). DETECTION OF FRAUDULENT PHONE CALLS DETECTION IN MOBILE APPLICATIONS. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 15(2), 1–5. https://doi.org/10.61841/turcomat.v15i2.14644
Section
Research Articles

References

P. Sornsuwit, and S. Jaiyen, “A new hybrid machine learning for cybersecurity threat detection based on adaptive

boosting,”Applied Artificial Intelligence, 33(5), pp.462-482, 2019.

K.Shaukat, S. Luo, S.Chen, and D. Liu, “Cyber threat detection using machine learning techniques: A performance

evaluation perspective,”in IEEE international conference on cyber warfare and security. IEEE, October2020,pp. 1-6.

S. M. Gowri, G. Sharang Ramana, M. Sree Ranjani and T. Tharani," Detection of Telephony Spam and Scams using

Recurrent Neural Network (RNN) Algorithm," 2021 7th International Conference on Advanced Computing and

Communication Systems (ICACCS), Coimbatore, India, 2021, pp. 1284-1288, doi:

1109/ICACCS51430.2021.9441982.

Abidogun, Olusola Adeniyi. "Data mining, fraud detection and mobile telecommunications: call pattern analysis with

unsupervised neural networks." PhD diss., University of the Western Cape, 2005.

S. Sandhya, N. Karthikeyan, R. Sruthi “Machine learning method for detecting and analysis of fraud phone calls

datasets” International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878 (Online), Volume-8

Issue-6, March 2020

Mohammad Iquebal Akhter, Dr. Mohammad Gulam Ahamad “Detecting Telecommunication fraud using neural

networks through data mining” international Journal of Scientific & Engineering Research, Volume 3, Issue 3, March-

I. Murynets, M. Zabarankin, R. P. Jover and Panagia, "Analysis and detection of SIMbox fraud in mobility networks,"

IEEE INFOCOM 2014 - IEEE Conference on Computer Communications,Toronto,ON,Canada,2014,pp.1519-1526,doi:

1109/INFOCOM.2014.6848087.

Crawford, M., Khoshgoftaar, T.M., Prusa,J.D. et al. Survey of review spam detection using machine learning

techniques. Journal of Big Data 2, 23 (2015). doi:10.1186/s40537-015-0029- 9.

Marzuoli A, Kingravi H, Dewey D and Pienta R. (2016). Uncovering the Landscape of Fraud and Spam in the

Telephony Channel 2016 15th IEEE International Conference on Machine Learning and

Applications(ICMLA).10.1109/ICMLA.2016.0 153. 978-1-5090-6167-9. (853- 858).

B. Teh, M. B. Islam, N. Kumar, M. K. Islam and U. Eaganathan,"Statistical and Spending Behavior based Fraud

Detection of Card-based Payment System,"2018 International SSConference on Electrical Engineering and Informatics

(ICELTICs), Banda Aceh, Indonesia, 2018, pp. 78-83, doi:10.1109/ICELTICS.2018.8548878.

H. Tu, A. Doupe, Z. Zhao, and G.-J. Ahn, “ Sok: Everyone hates ’robocalls: A survey of techniques against telephone

spam,” 2016 IEEE Symposium on Security and Privacy (SP), pp. 320 338, 2016.

M. Crawford, T.M. Khoshgoftaar, J.D Prusa, A.N. Richter, H. Al Najada, "Survey of review spam detection using

machine learning techniques", Journal of Big Data, 2, pp. 1-24, 42015.