SlideShare a Scribd company logo
1 of 26
TELECOM
SUBSCRIPTION
FRAUD DETECTION
Using Naïve Bayes in R
By (BA Group2)
Santosh Koppada
Maruthi Nataraj K
Sudhanshu Ranjan
Sunil Kumar
Sumit Sahay
 Introduction
 Business Background
 Objective
 Datasets Description
 Tools & Methods Used
 Statistical Procedure
 Future Direction
 Telecommunication Fraud which is the focus is appealing to
fraudsters as calling from the mobile terminal is not bound to any
physical local and it is easy to get subscription.
 Fraud negatively impacts on the company in 4 ways such as
financially, marketing, customer relations and shareholder
perceptions.
 In Subscription Fraud, fraudsters obtain an account without
intention to pay the bill(theft of service).Thus, at the level of phone
number, all the calls from it will be fraudulent indicating an
abnormal usage. The account is usually used for call selling at
cheaper rates or intensive self usage.
 Bad Idea Company Ltd was a target of Subscription Fraud by a
gang of fraudsters consisting of 3 people: Sally, Virginia and Vince.
 Call logs of the fraudsters spanning over one and half months
were recorded.
 An audit is undertaken after every 5 days to check whether the
above fraudsters have joined the company network.
 The list of subscribers is reviewed to identify their calling
pattern matching with that of fraudsters.
Note : Praxis Plan –>(4 calls a day) Morning (9AM-Noon)-1, Afternoon (Noon-4PM)-1,
Evening(4PM-9PM)-1 and Night (9PM-Midnight)-1.
 Our goal is to create a fraud management classification model
that is powerful enough to handle the subscription fraud that the
company has encountered and flexible enough to potentially apply
to things that had not been witnessed yet.
 In this case, the company wants to be absolutely sure that the
person is a fraudster backed up by high percentage of confidence
(probability).
 Call detail records generated in real time that are available
immediately could be used for building a robust statistical model.
 Dataset 1 – BlackListSubscriberCallLogs.xlsx
# Instances – 138 Target Variable – Caller (3 Levels)
 Dataset 2 – AuditLog.xlsx
# Instances – 15
 Tools : R (RStudio)
 Statistical Method : Naïve Bayes Classifier
 Before the start of process, all the required packages are to be loaded.
The list is as below :
1.ElemStatLearn
2.Caret
3.klaR
4.gmodels
 BlackListSubscriberCallLogs (CSV) file is read into R Environment as
shown below (Working Directory – My Documents) :
 Then, a random sample of 70% of the total instances from the Black List
Callers is selected as Training dataset and the remaining 30% as Test
dataset.
 Next, the table proportions are checked for target variable of both
Training and Test datasets to maintain uniformity.
 Later, all the attributes and labels of Training and Test datasets are
stored in separate variables(X~, Y~ respectively) for convenience in coding.
 It is followed by building of Naïve Bayes Classifier Model based on 10 fold
cross-validation using Training dataset ( Data is broken down into 10 sets of
size n/10. Trained on 9 datasets and tested on 1. The process is repeated 10
times and mean accuracy is taken.)
 The classification model generated is applied on Test data for the
prediction of target class (Here, the posterior probabilities are also seen in
the bottom half).
 After that, confusion matrix is generated for predictions of the Naive
Bayes model versus the actual classification of the data instances to
visualize the classification errors.
 AuditLog (CSV) file (validation dataset) is read into R Environment as
shown below (Working Directory – My Documents) :
 At this stage, all the required independent attributes are stored in
separate variable accordingly and the same previous model is applied on
validation dataset this time for the prediction of probable fraudsters along
with probability.
From above, we can infer that Customer X and Customer Z might probably be
Sally (as per calling pattern) and Customer Y might be Virginia.
The same results
with a greater
accuracy can be
obtained using
E1071 package
and laplacian
correction as
shown here.
The same results
with a greater
accuracy can be
obtained using
E1071 package
and laplacian
correction as
shown here.
Naïve Bayes Classification in RapidMiner
Black List Callers
Split Validation(70:30)
Audit Log
4 Time Slots
Inside Split Validation
Performance Classification
Confusion Matrix for Test data (30%)
Final Result with Probable Fraudster and Probabilities
Thank You

More Related Content

What's hot

Pollyanna Document Classifier
Pollyanna Document ClassifierPollyanna Document Classifier
Pollyanna Document ClassifierVijay PG
 
IRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud DetectionIRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud DetectionIRJET Journal
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionJustluk Luk
 
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONPDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONIJNSA Journal
 
Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage DetectionAshwini Nerkar
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET Journal
 
IRJET- A Literature Review on Deta Leakage Detection
IRJET-  	  A Literature Review on Deta Leakage DetectionIRJET-  	  A Literature Review on Deta Leakage Detection
IRJET- A Literature Review on Deta Leakage DetectionIRJET Journal
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection Suveeksha
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detectionChaitanya Kn
 
How Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudHow Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudKyriba Corporation
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectionMohit Pandey
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete SeminarSumit Thakur
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Cognizant
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing WebsitesIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...PierantonioAzzalini
 

What's hot (20)

Pollyanna Document Classifier
Pollyanna Document ClassifierPollyanna Document Classifier
Pollyanna Document Classifier
 
IRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud DetectionIRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud Detection
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONPDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
 
Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage Detection
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
IRJET- A Literature Review on Deta Leakage Detection
IRJET-  	  A Literature Review on Deta Leakage DetectionIRJET-  	  A Literature Review on Deta Leakage Detection
IRJET- A Literature Review on Deta Leakage Detection
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection
 
P2 Project
P2 ProjectP2 Project
P2 Project
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
How Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudHow Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments Fraud
 
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
 
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
 

Viewers also liked

Telecom Fraud Detection
Telecom Fraud DetectionTelecom Fraud Detection
Telecom Fraud DetectionPunit Kishore
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sectorsksahu099
 
Asca Perception Data & Surveys
Asca Perception Data & SurveysAsca Perception Data & Surveys
Asca Perception Data & Surveysshashley14
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 
Top 10 implementation specialist interview questions and answers
Top 10 implementation specialist interview questions and answersTop 10 implementation specialist interview questions and answers
Top 10 implementation specialist interview questions and answersjomdare
 
Web Application Optimization Techniques
Web Application Optimization TechniquesWeb Application Optimization Techniques
Web Application Optimization Techniquestakinbo
 
Mandibular nerve block and mental nerve / oral surgery courses
Mandibular nerve block and mental nerve / oral surgery courses  Mandibular nerve block and mental nerve / oral surgery courses
Mandibular nerve block and mental nerve / oral surgery courses Indian dental academy
 
Training i-staad pro 2007
Training i-staad pro 2007Training i-staad pro 2007
Training i-staad pro 2007fazil64
 
Strategic review (Sample)
Strategic review (Sample)Strategic review (Sample)
Strategic review (Sample)guestbbb20c4
 

Viewers also liked (13)

Telecom Fraud Detection
Telecom Fraud DetectionTelecom Fraud Detection
Telecom Fraud Detection
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 
Fraud in Telecoms
Fraud in TelecomsFraud in Telecoms
Fraud in Telecoms
 
Asca Perception Data & Surveys
Asca Perception Data & SurveysAsca Perception Data & Surveys
Asca Perception Data & Surveys
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
Top 10 implementation specialist interview questions and answers
Top 10 implementation specialist interview questions and answersTop 10 implementation specialist interview questions and answers
Top 10 implementation specialist interview questions and answers
 
Web Application Optimization Techniques
Web Application Optimization TechniquesWeb Application Optimization Techniques
Web Application Optimization Techniques
 
Mandibular nerve block and mental nerve / oral surgery courses
Mandibular nerve block and mental nerve / oral surgery courses  Mandibular nerve block and mental nerve / oral surgery courses
Mandibular nerve block and mental nerve / oral surgery courses
 
Training i-staad pro 2007
Training i-staad pro 2007Training i-staad pro 2007
Training i-staad pro 2007
 
Hadoop and OpenStack
Hadoop and OpenStackHadoop and OpenStack
Hadoop and OpenStack
 
 Traumatic bone cyst
 Traumatic bone cyst Traumatic bone cyst
 Traumatic bone cyst
 
Strategic review (Sample)
Strategic review (Sample)Strategic review (Sample)
Strategic review (Sample)
 
SRAM Design
SRAM DesignSRAM Design
SRAM Design
 

Similar to Telecom Fraud Detection - Naive Bayes Classification

Churn in the Telecommunications Industry
Churn in the Telecommunications IndustryChurn in the Telecommunications Industry
Churn in the Telecommunications Industryskewdlogix
 
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfShrutiGarg649495
 
Lecture 22
Lecture 22Lecture 22
Lecture 22Shani729
 
Accurate Campaign Targeting Using Classification Algorithms
Accurate Campaign Targeting Using Classification AlgorithmsAccurate Campaign Targeting Using Classification Algorithms
Accurate Campaign Targeting Using Classification AlgorithmsJieming Wei
 
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...gerogepatton
 
7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...
7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...
7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...55296
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET Journal
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Khaled El Emam
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Thomas Lee
 
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNINGCREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNINGIRJET Journal
 
Data Mining on SpamBase,Wine Quality and Communities and Crime Datasets
Data Mining on SpamBase,Wine Quality and Communities and Crime DatasetsData Mining on SpamBase,Wine Quality and Communities and Crime Datasets
Data Mining on SpamBase,Wine Quality and Communities and Crime DatasetsAnkit Ghosalkar
 
IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...
IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...
IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...IRJET Journal
 
IBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcareIBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcareIBM India Smarter Computing
 
Project crm submission sonali
Project crm submission sonaliProject crm submission sonali
Project crm submission sonaliSonali Gupta
 
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...Michael Abernathy
 
Understanding IDP: Data Validation and Feedback Loop
Understanding IDP: Data Validation and Feedback LoopUnderstanding IDP: Data Validation and Feedback Loop
Understanding IDP: Data Validation and Feedback LoopInfrrd
 
Reducing False Positives
Reducing False PositivesReducing False Positives
Reducing False PositivesMayank Johri
 

Similar to Telecom Fraud Detection - Naive Bayes Classification (20)

Churn in the Telecommunications Industry
Churn in the Telecommunications IndustryChurn in the Telecommunications Industry
Churn in the Telecommunications Industry
 
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
 
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptxCredit Card Fraud Detection_ Mansi_Choudhary.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
 
Accurate Campaign Targeting Using Classification Algorithms
Accurate Campaign Targeting Using Classification AlgorithmsAccurate Campaign Targeting Using Classification Algorithms
Accurate Campaign Targeting Using Classification Algorithms
 
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
 
7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...
7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...
7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
IBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insuranceIBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insurance
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.
 
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNINGCREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
 
Data Mining on SpamBase,Wine Quality and Communities and Crime Datasets
Data Mining on SpamBase,Wine Quality and Communities and Crime DatasetsData Mining on SpamBase,Wine Quality and Communities and Crime Datasets
Data Mining on SpamBase,Wine Quality and Communities and Crime Datasets
 
IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...
IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...
IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...
 
IBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcareIBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcare
 
Detecting Credit Card Fraud: An AI-driven Approach
Detecting Credit Card Fraud: An AI-driven ApproachDetecting Credit Card Fraud: An AI-driven Approach
Detecting Credit Card Fraud: An AI-driven Approach
 
Project crm submission sonali
Project crm submission sonaliProject crm submission sonali
Project crm submission sonali
 
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
 
Understanding IDP: Data Validation and Feedback Loop
Understanding IDP: Data Validation and Feedback LoopUnderstanding IDP: Data Validation and Feedback Loop
Understanding IDP: Data Validation and Feedback Loop
 
Reducing False Positives
Reducing False PositivesReducing False Positives
Reducing False Positives
 

More from Maruthi Nataraj K

Time Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and ForecastingTime Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and ForecastingMaruthi Nataraj K
 
Text Mining of Movie Reviews
Text Mining of Movie ReviewsText Mining of Movie Reviews
Text Mining of Movie ReviewsMaruthi Nataraj K
 
How To Find Needles In Haystacks
How To Find Needles In HaystacksHow To Find Needles In Haystacks
How To Find Needles In HaystacksMaruthi Nataraj K
 
Social Media Marketing - Daily Deals
Social Media Marketing - Daily DealsSocial Media Marketing - Daily Deals
Social Media Marketing - Daily DealsMaruthi Nataraj K
 
Customer Profiling For Rural Financial Services
Customer Profiling For Rural Financial ServicesCustomer Profiling For Rural Financial Services
Customer Profiling For Rural Financial ServicesMaruthi Nataraj K
 
Time Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and ForecastingTime Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and ForecastingMaruthi Nataraj K
 
Elementary School Performance (SAS Regression Analysis)
Elementary School Performance (SAS Regression Analysis)Elementary School Performance (SAS Regression Analysis)
Elementary School Performance (SAS Regression Analysis)Maruthi Nataraj K
 
Stock Analyzer Hadoop MapReduce Implementation
Stock Analyzer Hadoop MapReduce ImplementationStock Analyzer Hadoop MapReduce Implementation
Stock Analyzer Hadoop MapReduce ImplementationMaruthi Nataraj K
 
Hospital Market Segmentation using Cluster Analysis
Hospital Market Segmentation using Cluster AnalysisHospital Market Segmentation using Cluster Analysis
Hospital Market Segmentation using Cluster AnalysisMaruthi Nataraj K
 
SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...
SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...
SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...Maruthi Nataraj K
 
Maruti Suzuki India Ltd Financial Statement Analysis
Maruti Suzuki India Ltd Financial Statement AnalysisMaruti Suzuki India Ltd Financial Statement Analysis
Maruti Suzuki India Ltd Financial Statement AnalysisMaruthi Nataraj K
 
SBI Home Loan Customer Perception Survey
SBI Home Loan Customer Perception SurveySBI Home Loan Customer Perception Survey
SBI Home Loan Customer Perception SurveyMaruthi Nataraj K
 
Basketball League Sponsorship Proposal
Basketball League Sponsorship ProposalBasketball League Sponsorship Proposal
Basketball League Sponsorship ProposalMaruthi Nataraj K
 

More from Maruthi Nataraj K (15)

Time Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and ForecastingTime Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and Forecasting
 
Text Mining of Movie Reviews
Text Mining of Movie ReviewsText Mining of Movie Reviews
Text Mining of Movie Reviews
 
How To Find Needles In Haystacks
How To Find Needles In HaystacksHow To Find Needles In Haystacks
How To Find Needles In Haystacks
 
Social Media Marketing - Daily Deals
Social Media Marketing - Daily DealsSocial Media Marketing - Daily Deals
Social Media Marketing - Daily Deals
 
Customer Profiling For Rural Financial Services
Customer Profiling For Rural Financial ServicesCustomer Profiling For Rural Financial Services
Customer Profiling For Rural Financial Services
 
Time Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and ForecastingTime Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and Forecasting
 
Linear Regression using R
Linear Regression using RLinear Regression using R
Linear Regression using R
 
Elementary School Performance (SAS Regression Analysis)
Elementary School Performance (SAS Regression Analysis)Elementary School Performance (SAS Regression Analysis)
Elementary School Performance (SAS Regression Analysis)
 
Stock Analyzer Hadoop MapReduce Implementation
Stock Analyzer Hadoop MapReduce ImplementationStock Analyzer Hadoop MapReduce Implementation
Stock Analyzer Hadoop MapReduce Implementation
 
Hospital Market Segmentation using Cluster Analysis
Hospital Market Segmentation using Cluster AnalysisHospital Market Segmentation using Cluster Analysis
Hospital Market Segmentation using Cluster Analysis
 
SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...
SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...
SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...
 
Maruti Suzuki India Ltd Financial Statement Analysis
Maruti Suzuki India Ltd Financial Statement AnalysisMaruti Suzuki India Ltd Financial Statement Analysis
Maruti Suzuki India Ltd Financial Statement Analysis
 
SBI Home Loan Customer Perception Survey
SBI Home Loan Customer Perception SurveySBI Home Loan Customer Perception Survey
SBI Home Loan Customer Perception Survey
 
Basketball League Sponsorship Proposal
Basketball League Sponsorship ProposalBasketball League Sponsorship Proposal
Basketball League Sponsorship Proposal
 
Bank market classification
Bank market classificationBank market classification
Bank market classification
 

Recently uploaded

怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制vexqp
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格q6pzkpark
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制vexqp
 
Dubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls DubaiDubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls Dubaikojalkojal131
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...nirzagarg
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
SR-101-01012024-EN.docx Federal Constitution of the Swiss Confederation
SR-101-01012024-EN.docx  Federal Constitution  of the Swiss ConfederationSR-101-01012024-EN.docx  Federal Constitution  of the Swiss Confederation
SR-101-01012024-EN.docx Federal Constitution of the Swiss ConfederationEfruzAsilolu
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...Health
 
Harnessing the Power of GenAI for BI and Reporting.pptx
Harnessing the Power of GenAI for BI and Reporting.pptxHarnessing the Power of GenAI for BI and Reporting.pptx
Harnessing the Power of GenAI for BI and Reporting.pptxParas Gupta
 
Data Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdfData Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdftheeltifs
 
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptxThe-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptxVivek487417
 
Switzerland Constitution 2002.pdf.........
Switzerland Constitution 2002.pdf.........Switzerland Constitution 2002.pdf.........
Switzerland Constitution 2002.pdf.........EfruzAsilolu
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...gajnagarg
 
PLE-statistics document for primary schs
PLE-statistics document for primary schsPLE-statistics document for primary schs
PLE-statistics document for primary schscnajjemba
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabiaahmedjiabur940
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...nirzagarg
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNKTimothy Spann
 

Recently uploaded (20)

怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
 
Dubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls DubaiDubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls Dubai
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
 
SR-101-01012024-EN.docx Federal Constitution of the Swiss Confederation
SR-101-01012024-EN.docx  Federal Constitution  of the Swiss ConfederationSR-101-01012024-EN.docx  Federal Constitution  of the Swiss Confederation
SR-101-01012024-EN.docx Federal Constitution of the Swiss Confederation
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
 
Harnessing the Power of GenAI for BI and Reporting.pptx
Harnessing the Power of GenAI for BI and Reporting.pptxHarnessing the Power of GenAI for BI and Reporting.pptx
Harnessing the Power of GenAI for BI and Reporting.pptx
 
Data Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdfData Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdf
 
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptxThe-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
 
Switzerland Constitution 2002.pdf.........
Switzerland Constitution 2002.pdf.........Switzerland Constitution 2002.pdf.........
Switzerland Constitution 2002.pdf.........
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
PLE-statistics document for primary schs
PLE-statistics document for primary schsPLE-statistics document for primary schs
PLE-statistics document for primary schs
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
 

Telecom Fraud Detection - Naive Bayes Classification

  • 1. TELECOM SUBSCRIPTION FRAUD DETECTION Using Naïve Bayes in R By (BA Group2) Santosh Koppada Maruthi Nataraj K Sudhanshu Ranjan Sunil Kumar Sumit Sahay
  • 2.  Introduction  Business Background  Objective  Datasets Description  Tools & Methods Used  Statistical Procedure  Future Direction
  • 3.  Telecommunication Fraud which is the focus is appealing to fraudsters as calling from the mobile terminal is not bound to any physical local and it is easy to get subscription.  Fraud negatively impacts on the company in 4 ways such as financially, marketing, customer relations and shareholder perceptions.  In Subscription Fraud, fraudsters obtain an account without intention to pay the bill(theft of service).Thus, at the level of phone number, all the calls from it will be fraudulent indicating an abnormal usage. The account is usually used for call selling at cheaper rates or intensive self usage.
  • 4.  Bad Idea Company Ltd was a target of Subscription Fraud by a gang of fraudsters consisting of 3 people: Sally, Virginia and Vince.  Call logs of the fraudsters spanning over one and half months were recorded.  An audit is undertaken after every 5 days to check whether the above fraudsters have joined the company network.  The list of subscribers is reviewed to identify their calling pattern matching with that of fraudsters. Note : Praxis Plan –>(4 calls a day) Morning (9AM-Noon)-1, Afternoon (Noon-4PM)-1, Evening(4PM-9PM)-1 and Night (9PM-Midnight)-1.
  • 5.  Our goal is to create a fraud management classification model that is powerful enough to handle the subscription fraud that the company has encountered and flexible enough to potentially apply to things that had not been witnessed yet.  In this case, the company wants to be absolutely sure that the person is a fraudster backed up by high percentage of confidence (probability).  Call detail records generated in real time that are available immediately could be used for building a robust statistical model.
  • 6.  Dataset 1 – BlackListSubscriberCallLogs.xlsx # Instances – 138 Target Variable – Caller (3 Levels)  Dataset 2 – AuditLog.xlsx # Instances – 15
  • 7.  Tools : R (RStudio)  Statistical Method : Naïve Bayes Classifier
  • 8.  Before the start of process, all the required packages are to be loaded. The list is as below : 1.ElemStatLearn 2.Caret 3.klaR 4.gmodels
  • 9.  BlackListSubscriberCallLogs (CSV) file is read into R Environment as shown below (Working Directory – My Documents) :
  • 10.  Then, a random sample of 70% of the total instances from the Black List Callers is selected as Training dataset and the remaining 30% as Test dataset.
  • 11.  Next, the table proportions are checked for target variable of both Training and Test datasets to maintain uniformity.  Later, all the attributes and labels of Training and Test datasets are stored in separate variables(X~, Y~ respectively) for convenience in coding.  It is followed by building of Naïve Bayes Classifier Model based on 10 fold cross-validation using Training dataset ( Data is broken down into 10 sets of size n/10. Trained on 9 datasets and tested on 1. The process is repeated 10 times and mean accuracy is taken.)
  • 12.
  • 13.  The classification model generated is applied on Test data for the prediction of target class (Here, the posterior probabilities are also seen in the bottom half).
  • 14.  After that, confusion matrix is generated for predictions of the Naive Bayes model versus the actual classification of the data instances to visualize the classification errors.
  • 15.
  • 16.  AuditLog (CSV) file (validation dataset) is read into R Environment as shown below (Working Directory – My Documents) :
  • 17.  At this stage, all the required independent attributes are stored in separate variable accordingly and the same previous model is applied on validation dataset this time for the prediction of probable fraudsters along with probability.
  • 18.
  • 19. From above, we can infer that Customer X and Customer Z might probably be Sally (as per calling pattern) and Customer Y might be Virginia.
  • 20. The same results with a greater accuracy can be obtained using E1071 package and laplacian correction as shown here. The same results with a greater accuracy can be obtained using E1071 package and laplacian correction as shown here.
  • 21.
  • 22. Naïve Bayes Classification in RapidMiner Black List Callers Split Validation(70:30) Audit Log 4 Time Slots
  • 24. Confusion Matrix for Test data (30%)
  • 25. Final Result with Probable Fraudster and Probabilities