Computer Science ›› 2023, Vol. 50 ›› Issue (8): 260-270.doi: 10.11896/jsjkx.221000103

• Information Security • Previous Articles     Next Articles

Attack Economics Based Fraud Detection for MVNO

LI Yang1, LI Zhenhua1, XIN Xianlong2   

  1. 1 School of Software,Tsinghua University,Beijing 100084,China
    2 Xiaomi Technology Co. LTD.,Beijing 100085,China
  • Received:2022-10-13 Revised:2023-03-03 Online:2023-08-15 Published:2023-08-02
  • About author:LI Yang,born in 1996,Ph.D candidate.His main research interests include network measurement and data mining.
    LI Zhenhua,born in 1983,Ph.D,asso-ciate professor,Ph.D supervisor,is a senior member of China Computer Fe-deration.His main research interests include mobile network measurement and virtualization technology.
  • Supported by:
    National Key R & D Program of China(2022YFB4500703) and National Natural Science Foundation of China(61902211,62202266).

Abstract: Driven by the full utilization of telecommunication resources and stimulating healthy market competition,mobile virtual network opera-tors(MVNOs) become popular rapidly in recent years.MVNOs rely on the infrastructures of mobile network ope-rators(MNOs) to provide users with cheaper and more flexible services.Due to the high maintenance costs of physical stores,MVNOs mostly provide fully online service.However,scammers use vulnerabilities in online authentication to purchase SIM cards and make scam calls,which seriously affects the reputation of MVNOs and their users.This has become a bottleneck problem for the survival and development of MVNOs.To address this issue,we collaborate with a large commercial MVNO with over 2 million users named Xiaomi Mobile.Related work generally assumes that scam calls are random,scattered or hidden,ma-king the detection methods inefficient or even invalid for the scenario of MVNOs.However,by analyzing the crowdsourced dataset,almost all scam calls are found to be organized,planned,and scaled.Thus,a method based on attack economics and reasonable analysis of the spatio-temporal characteristics of scam calls is proposed.This method successfully extracts the key features,and by combining with machine learning-based classification,it greatly reduces the proportion of scammers in Xiaomi Mobile to 0.023‰,which is far lower than the 0.1‰ achieved by the MNOs that have sufficient information.Under the premise of excluding the risk of being cracked,part of the code and data has been open sourced to help purify the ecology of entire telecom industry.

Key words: MVNO, Fraud detection, Attack economics, Spatio-Temporal analysis, Machine learning

CLC Number: 

  • TP393
[1]DAHLMAN E,MILDH G,PARKVALL S,et al.5G evolution and beyond[J].IEICE Transactions on Communications,2021,104(9):984-991.
[2]CHAN P P K,LIU W,CHEN D,et al.Face liveness detectionusing a flash against 2D spoofing attack[J].IEEE Transactions on Information Forensics and Security,2017,13(2):521-534.
[3]PAN G,SUN L,WU Z,et al.Monocular camera-based face liveness detection by combining eyeblink and scene context[J].Tele-communication Systems,2011,47(3):215-225.
[4]DALE K,SUNKAVALLI K,JOHNSON M K,et al.Video face replacement[C]//Proceedings of the ACM Special Interest Group on Computer Graphics and Interactive Techniques(SIG-GRAPH).2011:1-10.
[5]XIAO A,LIU Y,LI Y,et al.An in-depth study of commercial MVNO:Measurement and optimization[C]//Proceedings of the 17th Annual International Conference on Mobile Systems,Applications,and Services(MobiSys).2019:457-468.
[6]LI Y,ZHENG J,LI Z,et al.Understanding the ecosystem and addressing the fundamental concerns of commercial MVNO[J].IEEE/ACM Transactions on Networking,2020,28(3):1364-1377.
[7]GOPAL R K,MEHER S K.A rule-based approach for anomaly detection in subscriber usage pattern[C]//Proceedings of the World Academy Science,Engineering Technology(WASET).2007:396-399.
[8]ZHOU C,LIN Z.Study on fraud detection of telecom industry based on rough set[C]//Proceedings of the Annual Computing and Communication Workshop and Conference(CCWC).IEEE,2018:15-19.
[9]NORTHCUTT C,JIANG L,CHUANG I.Confident learning:estimating uncertainty in dataset labels[J].Journal of Artificial Intelligence Research,2021,70(1):1373-1411.
[10]WANG Z,WU C,ZHENG K,et al.SMOTETomek-based resam-pling for personality recognition[J].IEEE Access,2019,7(1):129678-129689.
[11]DEVI D,BISWAS S K,PURKAVASTHA B,et al.Redundancy-driven modified Tomek-link based undersampling:a solution to class imba-lance[J].Pattern Recognition Letters,2017,93(C):3-12.
[12]HAN H,WANG W Y,MAO B H.Borderline-SMOTE:a newover-sampling method in imbalanced data sets learning[C]//Proceedings of the International Conference on Intelligent Computing(ICIC).Springer,2005:878-887.
[13]SUBUDHI S,PANIGRAHI S.Use of possibilistic fuzzy c-means clustering for telecom fraud detection[C]//Proceedings of the International Conference on Computational Intelligence in Data Mining(CIDM).Springer,2017,10:633-641.
[14]LI R,ZHANG Y,TUO Y,et al.A novel method for detecting telecom fraud user[C]//Proceedings of the International Conference on Information Systems Engineering(ICISE).IEEE,2018:46-50.
[15]CHOUIEKH A,HAJ E H I E.Convnets for fraud detectionanalysis[J].Procedia Computer Science,2018,127(C):133-138.
[16]LIU X,WANG X G.Probabilistic graphical model based ap-proach for bank telecommunication fraud detection[J].Compu-ter Science,2018,45(7):122-128.
[17]LU C,LIN S,LIU X,et al.Telecom fraud identification based on ADASYN and random forest[C]//Proceedings of the International Conference on Computer and Communication Systems(ICCCS).IEEE,2020:447-452.
[18]NI P,YU W.A victim-based framework for telecom fraud ana-lysis:a Bayesian network model[J].Computational Intelligence and Neuroscience,2022,2022:1-13.
[19]HU X,CHEN H,LIU S,et al.BTG:a bridge to graph machine learning in telecommunications fraud detection[J].Future Ge-neration Computer Systems,2022,137:274-287.
[20]XU H K,JIANG T T,LI X,et al.BiLSTM network fraud phone recognition based on attention mechanism[J].Computer Systems and Applications,2022,31(3):326-332.
[21]KARUNATHILAKA A.Fraud detection on international direct dial calls[M]//Diss.2021.
[22]KASHIR M,BASHIR S.Machine learning techniques for sim box fraud detection[C]//Proceedings of the International Conference on Communication Technologies(ComTech).IEEE,2019:4-8.
[23]ZHOU G M,CHEN G X,ZHOU Y Z.Research on telecomfraud user behavior based on CDR analysis[J].Information Security and Communication Privacy,2015,11(1):114-118.
[24]LI Y,LIN H,LI Z,et al.A nationwide study on cellular reliability:measurement,analysis,and enhancements[C]//Proceedings of the 2021 ACM SIGCOMM 2021 Conference.2021:597-609.
[25]MIN X,LIN R.K-means algorithm:fraud detection based on signaling data[C]//Proceedings of the IEEE World Congress on Services.IEEE,2018:21-22.
[26]LIU M,LIAO J,WANG J,et al.AGRM:attention-based graph representation model for telecom fraud detection[C]//Procee-dings of the International Conference of Communications(ICC).IEEE,2019:1-6.
[27]TERZI D S,SAGIROGLU Ş,KILINC H.Telecom fraud detection with big data analytics[J].International Journal of DataScience,2021,6(3):191-204.
[28]CHADYSAS V,BUGAJEV A,KRIAUZIENE R,et al.Outlier analysis for telecom fraud detection[C]//Proceedings of the International Baltic Conference on Digital Business and Intelligent Systems(CCIS).Cham:Springer,2022:219-231.
[29]JIANG Y,LIU G,WU J,et al.Telecom fraud detection viaHawkes-enhanced sequence model[J].IEEE Transactions on Knowledge and Data Engineering,2022,35(5):5311-5324.
[30]KRASIC I,ČELAR S.Telecom fraud detection with machinelearning on imbalanced dataset[C]//Proceedings of 2022 International Conference on Software,Telecommunications and Computer Networks(SoftCOM).IEEE,2022:1-6.
[31]ZHANG J J,TANG Y C,JI S Y.A telecom fraud identification method based on graph neural network[J].Application of Electronic Technique,2021,47(6):25-29.
[32]YANG J K,XIA W C.Fraud call identification based on user be-havior analysis[J].Computer Systems and Applications,2021,30(8):311-316.
[33]LIU G,GUO J,ZUO Y,et al.Fraud detection via behavioral sequence embedding[J].Knowledge and Information Systems,2020,62(7):2685-2708.
[34]FAN Y R,YANG T,KONG H F,et al.Calling features mining method of telecom fraud based on knowledge graph[J].Compu-ter Applications and Software,2019,36(11):182-187.
[35]CAMERON A C,WINDMEIJER F A G.An R-squared measure of goodness of fit for some common nonlinear regression models[J].Journal of Econometrics,1997,77(2):329-342.
[36]ZAR J H.Spearman rank correlation[M]//Encyclopedia of Biostatistics.2005.
[37]HE H,GARCIA E A.Learning from imbalanced data[J].IEEE Transactions on Knowledge and Data Engineering,2009,21(9):1263-1284.
[38]SUYKENS J A K,VANDEWALLE J.Least squares support vector machine classifiers[J].Neural Processing Letters,1999,9(3):293-300.
[39]GARDNER M W,DORLING S R.Artificial neural networks(the multilayer perceptron)—a review of applications in the atmospheric sciences[J].Atmospheric Environment,1998,32(14/15):2627-2636.
[40]FRIEDMAN J H.Greedy function approximation:a gradient boosting machine[J].Annals of Statistics,2001,29(1):1189-1232.
[41]HIDO S,KASHIMA H,TAKAHASHI Y.Roughly balanced bagging for imbalanced data[J].Statistical Analysis and Data Mining:The ASA Data Science Journal,2009,2(5/6):412-426.
[42]AGUSTA Z P.Modified balanced random forest for improving imbalanced data prediction[J].International Journal of Advances in Intelligent Informatics,2019,5(1):58-65.
[43]NEMBRINI S,KONIG I R,WRIGHT M N.The revival of the Gini importance[J].Bioinformatics,2018,34(21):3711-3718.
[44]DONG X,QIAN M,JIANG R.Packet classification based on the decision tree with information entropy[J].The Journal of Supercomputing,2020,76(6):4117-4131.
[45]ZHANG Z,PU P,HAN D,et al.Self-adaptive louvain algorithm:fast and stable community detection algorithm based on the principle of small probability event[J].Physica A:Statistical Mechanics and its Applications,2018,506(1):975-986.
[1] LIU Xiang, ZHU Jing, ZHONG Guoqiang, GU Yongjian, CUI Liyuan. Quantum Prototype Clustering [J]. Computer Science, 2023, 50(8): 27-36.
[2] WANG Yu, WANG Zuchao, PAN Rui. Survey of DGA Domain Name Detection Based on Character Feature [J]. Computer Science, 2023, 50(8): 251-259.
[3] ZHU Boyu, CHEN Xiao, SHA Letian, XIAO Fu. Two-layer IoT Device Classification Recognition Model Based on Traffic and Text Fingerprints [J]. Computer Science, 2023, 50(8): 304-313.
[4] LU Xingyuan, CHEN Jingwei, FENG Yong, WU Wenyuan. Privacy-preserving Data Classification Protocol Based on Homomorphic Encryption [J]. Computer Science, 2023, 50(8): 321-332.
[5] WANG Dongli, YANG Shan, OUYANG Wanli, LI Baopu, ZHOU Yan. Explainability of Artificial Intelligence:Development and Application [J]. Computer Science, 2023, 50(6A): 220600212-7.
[6] WANG Jinjin, CHENG Yinhui, NIE Xin, LIU Zheng. Fast Calculation Method of High-altitude Electromagnetic Pulse Environment Based on Machine Learning [J]. Computer Science, 2023, 50(6A): 220500046-5.
[7] WANG Xiya, ZHANG Ning, CHENG Xin. Review on Methods and Applications of Text Fine-grained Emotion Recognition [J]. Computer Science, 2023, 50(6A): 220900137-7.
[8] YIN Xingzi, PENG Ningning, ZHAN Xueyan. Filtered Feature Selection Algorithm Based on Persistent Homology [J]. Computer Science, 2023, 50(6): 159-166.
[9] CHEN Jinjie, HE Chao, XIAO Xiao, LEI Yinjie. Optical Performance Monitoring Method Based on Fine-grained Constellation Diagram Recognition [J]. Computer Science, 2023, 50(4): 220-225.
[10] PENG Yuefeng, ZHAO Bo, LIU Hui, AN Yang. Survey on Membership Inference Attacks Against Machine Learning [J]. Computer Science, 2023, 50(3): 351-359.
[11] XU Xia, ZHANG Hui, YANG Chunming, LI Bo, ZHAO Xujian. Fair Method for Spectral Clustering to Improve Intra-cluster Fairness [J]. Computer Science, 2023, 50(2): 158-165.
[12] WANG Yitan, WANG Yishu, YUAN Ye. Survey of Learned Index [J]. Computer Science, 2023, 50(1): 1-8.
[13] CHEN Depeng, LIU Xiao, CUI Jie, HE Daojing. Survey of Membership Inference Attacks for Machine Learning [J]. Computer Science, 2023, 50(1): 302-317.
[14] LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214.
[15] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!