Login New user?  
01-Applied Mathematics & Information Sciences
An International Journal
               
 
 
 
 
 
 
 
 
 
 
 
 
 

Content
 

Volumes > Volume 09 > No. 4

 
   

Clustering of Telecommunications User Profiles for Fraud Detection and Security Enhancement in Large Corporate Networks: A case Study

PP: 1709-1718
Author(s)
Constantinos S. Hilas, Paris A. Mastorocostas, Ioannis T. Rekanos,
Abstract
A user’s transactions with modern networks and services produce a vast amount of user related data. The byproduct of every phone call a person makes or every web page one visits is translated into a log record with usage data. By studying these log records, the user’s behavior is revealed and one may come up with clues about user preferences, identify security issues, or discover fraudulent use of the network or the service one provides. Thus, the modeling of network users’ behavior may serve as an invaluable tool for the IT manager. In this paper, many of these issues are discussed and emphasis is given on the construction of appropriate user behavior representation in telecommunications. As an example, the application of two clustering techniques is presented, with the task to identify appropriate user behavior representations (profiles) inside a large organization’s telecommunications network, in order to spot fraudulent usage. Through this study a researcher and/or the organization’s network manager may gain more insight into the problems of user profiling and fraud detection.

  Home   About us   News   Journals   Conferences Contact us Copyright naturalspublishing.com. All Rights Reserved