SlideShare a Scribd company logo
Fraud Analytics with Machine Learning & Engineering
(FAME) for Telecom using Big Data
Presented by:
Sudarson Roy Pratihar
Pranab Kumar Dash
Subhadip Paul
Amartya Kumar Das
1Copyright © 2015 Authors. All rights reserved.
A Quick Intro – Telecom Frauds
Fraud Analytics With Machine Learning &
Engineering
2
• Have you got missed call from unknown numbers from
overseas?
• Have you heard of PBX hacking and corporate facing huge
bills?
Problem Definition
• Telecom industries loose 46.3 billion USD
globally due to various frauds
• 10% operators have bad debt due to fraud
• Detection is cat and mouse game – pattern
changes to get undetected by available
data mining techniques
• Timely alert by processing huge volume of
call records is a challenge
• Alerts with high false positives have more
operational expenses
Fraud Analytics With Machine Learning &
Engineering
3
Importance to Telecom Industry & Society
• Efficient and self adaptive detection
mechanism can reduce significant loss
(about 2.1% of the revenue) due to fraud
and operational cost
• Less “Bad Money” to the system
Fraud Analytics With Machine Learning & Engineering 4
Data Source
• More than 1 TB of Call Detail Record
(CDR) from a reputed wholesale carrier
as history data
• Tested on few weeks of live CDR of the
carrier
Fraud Analytics With Machine Learning & Engineering 5
Analytics Technique
• Basic components of FAME are:
– Self adaptive Machine learning
methodology
– Actionable dash board for operations and
investigations team to act upon the alerts
and feedback sent to machine learning
model for adjusting weights.
– High performance big data platform for
data processing and machine learning
Fraud Analytics With Machine Learning & Engineering 6
How it detects and adapts …
7Fraud Analytics With Machine Learning & Engineering
Fraud Detection Model
Pipeline
Novelty Detection
Pipeline / Stacking
Actionable Dashboards
Pattern validation and
tuning work bench
CDR Feed
1
2 4
Remaining
Data
Frauds detected
3
5
6
7 New Patterns
More frauds
8
New model addition / Tuning of existing9
10
Operators
feedback
Analyst
Operator
Novelty Detection Pipeline
8Fraud Analytics With Machine Learning & Engineering
• Novelty detection of origin and destination
numbers separately
• Various Contextual Anomaly Detection used and
outputs are combined
• Below are some examples of algorithms used
• Box-plot based outlier
• Clustering to find out cluster with distinct
centroid
• Use of Mahalonbis Distance –
Mdist > ɸ. IQR
Novelty Detection – Illustrations
9Fraud Analytics With Machine Learning & Engineering
Fraud Detection Pipeline
10
• Use history data and flag records based on
“Novelty Detection Pipeline”
• Verify those records and mark them
• Build separate models (logistic regression,
random forest models and threshold based)
for different patterns
• Combine outputs of the models
Fraud Analytics With Machine Learning & Engineering
ACTIONABLE DASHBOARD
System Behind Magic …
11Fraud Analytics With Machine Learning & Engineering
ENSEMBLE OF SELF ADAPTIVE ALGOS
BIG DATA PLATFORM
POWERED BY HADOOP & SPARK
INTEGRATION
FACETS
FEEDBACK
CDR FEED
FROM TELECOM SYSTEM
Platform Behind Magic …
12Fraud Analytics With Machine Learning & Engineering
Accuracy Results
13
0 0.2 0.4 0.6 0.8 1
True positive
False positive
Accuracy
B-Number A-Number
Fraud Analytics With Machine Learning & Engineering
• Individual accuracy for
origin and destination
numbers detection
• Combined mechanism
has <5% false positive
What Next …
14
• Test for different types telecom frauds
• Extend this industrialized approach to other
areas (such as network intrusion detection)
• Productize as cloud based service as well as on
premise implementation
Fraud Analytics With Machine Learning & Engineering
Contact Us @
15Fraud Analytics With Machine Learning & Engineering
Amartya Kumar Das
amartya_das_2014@cba.isb.edu
https://in.linkedin.com/pub/amartya-
das/b/72b/637
Subhadip Paul
Subhadip_paul_2014@cba.isb.edu
https://in.linkedin.com/in/subhadippaul
Pranab Kumar Dash
Pranab_dash_2014@cba.isb.edu
www.linkedin.com/profile/view?id=19155
039
Sudarson Roy Pratihar
sudarson_pratihar_2014@cba.isb.edu
www.linkedin.com/in/sudarson
Follow us #FAMETELCO

More Related Content

What's hot

Adaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud DetectionAdaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud Detection
Andrea Dal Pozzolo
 
Credit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research PaperCredit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research Paper
Garvit Burad
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
Scott Mongeau
 
Fraud analytics
Fraud analyticsFraud analytics
Fraud analytics
Simran Mondal
 
Fraud Detection
Fraud DetectionFraud Detection
Fraud Detection
Prashanth Vajjhala
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)
k.surya kumar
 
Credit card fraud detection using python machine learning
Credit card fraud detection using python machine learningCredit card fraud detection using python machine learning
Credit card fraud detection using python machine learning
Sandeep Garg
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
anthonytaylor01
 
Anomaly detection
Anomaly detectionAnomaly detection
Anomaly detection
Hitesh Mohapatra
 
An Introduction to Anomaly Detection
An Introduction to Anomaly DetectionAn Introduction to Anomaly Detection
An Introduction to Anomaly Detection
Kenneth Graham
 
Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine Learning
Scaleway
 
Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)
ajmal anbu
 
Bank Fraud &amp; Data Forensics
Bank Fraud &amp; Data ForensicsBank Fraud &amp; Data Forensics
Bank Fraud &amp; Data Forensics
whbrown5
 
Analytics for Audit
Analytics for AuditAnalytics for Audit
Analytics for Audit
mcoello
 
Machine Learning for Fraud Detection
Machine Learning for Fraud DetectionMachine Learning for Fraud Detection
Machine Learning for Fraud Detection
Nitesh Kumar
 
Oversight Systems: Fraud, Waste & Misuse in T&E
Oversight Systems: Fraud, Waste & Misuse in T&EOversight Systems: Fraud, Waste & Misuse in T&E
Oversight Systems: Fraud, Waste & Misuse in T&E
Oversight Systems
 
Real-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsReal-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment Transactions
Christian Gügi
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Alistair Gillespie
 
Microsoft Introduction to Automated Machine Learning
Microsoft Introduction to Automated Machine LearningMicrosoft Introduction to Automated Machine Learning
Microsoft Introduction to Automated Machine Learning
Setu Chokshi
 

What's hot (20)

Adaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud DetectionAdaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud Detection
 
Credit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research PaperCredit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research Paper
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
Fraud analytics
Fraud analyticsFraud analytics
Fraud analytics
 
Fraud Detection
Fraud DetectionFraud Detection
Fraud Detection
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)
 
Credit card fraud detection using python machine learning
Credit card fraud detection using python machine learningCredit card fraud detection using python machine learning
Credit card fraud detection using python machine learning
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Anomaly detection
Anomaly detectionAnomaly detection
Anomaly detection
 
An Introduction to Anomaly Detection
An Introduction to Anomaly DetectionAn Introduction to Anomaly Detection
An Introduction to Anomaly Detection
 
Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine Learning
 
Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)
 
Bank Fraud &amp; Data Forensics
Bank Fraud &amp; Data ForensicsBank Fraud &amp; Data Forensics
Bank Fraud &amp; Data Forensics
 
Analytics for Audit
Analytics for AuditAnalytics for Audit
Analytics for Audit
 
Machine Learning for Fraud Detection
Machine Learning for Fraud DetectionMachine Learning for Fraud Detection
Machine Learning for Fraud Detection
 
Oversight Systems: Fraud, Waste & Misuse in T&E
Oversight Systems: Fraud, Waste & Misuse in T&EOversight Systems: Fraud, Waste & Misuse in T&E
Oversight Systems: Fraud, Waste & Misuse in T&E
 
Real-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment TransactionsReal-Time Fraud Detection in Payment Transactions
Real-Time Fraud Detection in Payment Transactions
 
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the HaystackMachine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Microsoft Introduction to Automated Machine Learning
Microsoft Introduction to Automated Machine LearningMicrosoft Introduction to Automated Machine Learning
Microsoft Introduction to Automated Machine Learning
 

Viewers also liked

Deep Learning for Fraud Detection
Deep Learning for Fraud DetectionDeep Learning for Fraud Detection
Deep Learning for Fraud Detection
DataWorks Summit/Hadoop Summit
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
Dominic Sroda Korkoryi
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
Gwen (Chen) Shapira
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector Venktesh Venke
 
Machine learning on big data for personalized Internet advertising
Machine learning on big data for personalized Internet advertisingMachine learning on big data for personalized Internet advertising
Machine learning on big data for personalized Internet advertising
Trieu Nguyen
 
Digital bankleadgen
Digital bankleadgenDigital bankleadgen
Digital bankleadgen
Sudarson Roy Pratihar
 
Types of telecom fraud
Types of telecom fraudTypes of telecom fraud
Types of telecom fraud
Oluwaseun ADEBAYO
 
Masters thesis - Fraud & Big Data
Masters thesis - Fraud & Big DataMasters thesis - Fraud & Big Data
Masters thesis - Fraud & Big Data
Stephanie Canovas
 
Machine learning in the enterprise
Machine learning in the enterpriseMachine learning in the enterprise
Machine learning in the enterprise
Jesus Rodriguez
 
Operations Management Suite, the Penguins and the others
Operations Management Suite, the Penguins and the othersOperations Management Suite, the Penguins and the others
Operations Management Suite, the Penguins and the others
Christian Heitkamp
 
VMware vSphere Vs. Microsoft Hyper-V: A Technical Analysis
VMware vSphere Vs. Microsoft Hyper-V: A Technical AnalysisVMware vSphere Vs. Microsoft Hyper-V: A Technical Analysis
VMware vSphere Vs. Microsoft Hyper-V: A Technical Analysis
Corporate Technologies
 
OMS Overview
OMS OverviewOMS Overview
OMS Overview
Jan Van Meirvenne
 
A practical guidance of the enterprise machine learning
A practical guidance of the enterprise machine learning A practical guidance of the enterprise machine learning
A practical guidance of the enterprise machine learning
Jesus Rodriguez
 
10x Content: What it is and Why it Matters
10x Content: What it is and Why it Matters10x Content: What it is and Why it Matters
10x Content: What it is and Why it Matters
Adam Monago
 
Hybrid IT Management - Microsoft Operations Management Suite
Hybrid IT Management - Microsoft Operations Management SuiteHybrid IT Management - Microsoft Operations Management Suite
Hybrid IT Management - Microsoft Operations Management Suite
Rishi Bhatia
 
Innovation Portfolio Management Analytics
Innovation Portfolio Management AnalyticsInnovation Portfolio Management Analytics
Innovation Portfolio Management Analytics
Scott Mongeau
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
Fuh George Cheo
 
Data Science, Machine Learning, and H2O
Data Science, Machine Learning, and H2OData Science, Machine Learning, and H2O
Data Science, Machine Learning, and H2O
Sri Ambati
 
Apache Spark™ Applications the Easy Way - Pierre Borckmans
Apache Spark™ Applications the Easy Way - Pierre BorckmansApache Spark™ Applications the Easy Way - Pierre Borckmans
Apache Spark™ Applications the Easy Way - Pierre Borckmans
sparktc
 

Viewers also liked (20)

Deep Learning for Fraud Detection
Deep Learning for Fraud DetectionDeep Learning for Fraud Detection
Deep Learning for Fraud Detection
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 
Fraud Detection Architecture
Fraud Detection ArchitectureFraud Detection Architecture
Fraud Detection Architecture
 
Fraud in the Banking Sector
Fraud in the Banking Sector Fraud in the Banking Sector
Fraud in the Banking Sector
 
Machine learning on big data for personalized Internet advertising
Machine learning on big data for personalized Internet advertisingMachine learning on big data for personalized Internet advertising
Machine learning on big data for personalized Internet advertising
 
Digital bankleadgen
Digital bankleadgenDigital bankleadgen
Digital bankleadgen
 
Types of telecom fraud
Types of telecom fraudTypes of telecom fraud
Types of telecom fraud
 
Masters thesis - Fraud & Big Data
Masters thesis - Fraud & Big DataMasters thesis - Fraud & Big Data
Masters thesis - Fraud & Big Data
 
Machine learning in the enterprise
Machine learning in the enterpriseMachine learning in the enterprise
Machine learning in the enterprise
 
Operations Management Suite, the Penguins and the others
Operations Management Suite, the Penguins and the othersOperations Management Suite, the Penguins and the others
Operations Management Suite, the Penguins and the others
 
VMware vSphere Vs. Microsoft Hyper-V: A Technical Analysis
VMware vSphere Vs. Microsoft Hyper-V: A Technical AnalysisVMware vSphere Vs. Microsoft Hyper-V: A Technical Analysis
VMware vSphere Vs. Microsoft Hyper-V: A Technical Analysis
 
OMS Overview
OMS OverviewOMS Overview
OMS Overview
 
A practical guidance of the enterprise machine learning
A practical guidance of the enterprise machine learning A practical guidance of the enterprise machine learning
A practical guidance of the enterprise machine learning
 
10x Content: What it is and Why it Matters
10x Content: What it is and Why it Matters10x Content: What it is and Why it Matters
10x Content: What it is and Why it Matters
 
Hybrid IT Management - Microsoft Operations Management Suite
Hybrid IT Management - Microsoft Operations Management SuiteHybrid IT Management - Microsoft Operations Management Suite
Hybrid IT Management - Microsoft Operations Management Suite
 
Innovation Portfolio Management Analytics
Innovation Portfolio Management AnalyticsInnovation Portfolio Management Analytics
Innovation Portfolio Management Analytics
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
Data Science, Machine Learning, and H2O
Data Science, Machine Learning, and H2OData Science, Machine Learning, and H2O
Data Science, Machine Learning, and H2O
 
Apache Spark™ Applications the Easy Way - Pierre Borckmans
Apache Spark™ Applications the Easy Way - Pierre BorckmansApache Spark™ Applications the Easy Way - Pierre Borckmans
Apache Spark™ Applications the Easy Way - Pierre Borckmans
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
 

Similar to Fraud Analytics with Machine Learning and Big Data Engineering for Telecom

SmartData Webinar: Applying Neocortical Research to Streaming Analytics
SmartData Webinar: Applying Neocortical Research to Streaming AnalyticsSmartData Webinar: Applying Neocortical Research to Streaming Analytics
SmartData Webinar: Applying Neocortical Research to Streaming Analytics
DATAVERSITY
 
Apeman masta midih-oc2_demo_day
Apeman masta midih-oc2_demo_dayApeman masta midih-oc2_demo_day
Apeman masta midih-oc2_demo_day
MIDIH_EU
 
6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution6. Kepware_IIoT_Solution
6. Kepware_IIoT_SolutionSteve Lim
 
College_Tech-seminar_2024_Indrajith.pptx
College_Tech-seminar_2024_Indrajith.pptxCollege_Tech-seminar_2024_Indrajith.pptx
College_Tech-seminar_2024_Indrajith.pptx
IndrajithN1
 
Analytics&IoT
Analytics&IoTAnalytics&IoT
Analytics&IoT
Selvaraj Kesavan
 
Intelligent Digital Mesh Testing
Intelligent Digital Mesh TestingIntelligent Digital Mesh Testing
Intelligent Digital Mesh Testing
Nagarro
 
[DSC Croatia 22] Building smarter ML and AI models and making them more accur...
[DSC Croatia 22] Building smarter ML and AI models and making them more accur...[DSC Croatia 22] Building smarter ML and AI models and making them more accur...
[DSC Croatia 22] Building smarter ML and AI models and making them more accur...
DataScienceConferenc1
 
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
James Crawshaw
 
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxShare Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
yatintaneja6
 
2020 09-16-ai-engineering challanges
2020 09-16-ai-engineering challanges2020 09-16-ai-engineering challanges
2020 09-16-ai-engineering challanges
Ivica Crnkovic
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty
 
LEGaTO: Use cases
LEGaTO: Use casesLEGaTO: Use cases
LEGaTO: Use cases
LEGATO project
 
Machine Learning open studio solution for data scientists & developers
Machine Learning open studio solution for data scientists & developersMachine Learning open studio solution for data scientists & developers
Machine Learning open studio solution for data scientists & developers
Activeeon
 
Automation of the Drilling System: What has been done, what is being done, an...
Automation of the Drilling System: What has been done, what is being done, an...Automation of the Drilling System: What has been done, what is being done, an...
Automation of the Drilling System: What has been done, what is being done, an...
Society of Petroleum Engineers
 
Rise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetupRise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetup
Shlomo Yona
 
Machine Learning in the Real World
Machine Learning in the Real WorldMachine Learning in the Real World
Machine Learning in the Real World
Srinath Perera
 
Von der Zustandsüberwachung zur vorausschauenden Wartung
Von der Zustandsüberwachung zur vorausschauenden WartungVon der Zustandsüberwachung zur vorausschauenden Wartung
Von der Zustandsüberwachung zur vorausschauenden Wartung
Peter Schleinitz
 
Webinar: Machine Learning para Microcontroladores
Webinar: Machine Learning para MicrocontroladoresWebinar: Machine Learning para Microcontroladores
Webinar: Machine Learning para Microcontroladores
Embarcados
 
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
StampedeCon
 
IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)
stelligence
 

Similar to Fraud Analytics with Machine Learning and Big Data Engineering for Telecom (20)

SmartData Webinar: Applying Neocortical Research to Streaming Analytics
SmartData Webinar: Applying Neocortical Research to Streaming AnalyticsSmartData Webinar: Applying Neocortical Research to Streaming Analytics
SmartData Webinar: Applying Neocortical Research to Streaming Analytics
 
Apeman masta midih-oc2_demo_day
Apeman masta midih-oc2_demo_dayApeman masta midih-oc2_demo_day
Apeman masta midih-oc2_demo_day
 
6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution6. Kepware_IIoT_Solution
6. Kepware_IIoT_Solution
 
College_Tech-seminar_2024_Indrajith.pptx
College_Tech-seminar_2024_Indrajith.pptxCollege_Tech-seminar_2024_Indrajith.pptx
College_Tech-seminar_2024_Indrajith.pptx
 
Analytics&IoT
Analytics&IoTAnalytics&IoT
Analytics&IoT
 
Intelligent Digital Mesh Testing
Intelligent Digital Mesh TestingIntelligent Digital Mesh Testing
Intelligent Digital Mesh Testing
 
[DSC Croatia 22] Building smarter ML and AI models and making them more accur...
[DSC Croatia 22] Building smarter ML and AI models and making them more accur...[DSC Croatia 22] Building smarter ML and AI models and making them more accur...
[DSC Croatia 22] Building smarter ML and AI models and making them more accur...
 
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
The Scope for Robotic Process Automation & Machine Learning in Telecom Operat...
 
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxShare Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
 
2020 09-16-ai-engineering challanges
2020 09-16-ai-engineering challanges2020 09-16-ai-engineering challanges
2020 09-16-ai-engineering challanges
 
AI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are DangerousAI & ML in Cyber Security - Why Algorithms Are Dangerous
AI & ML in Cyber Security - Why Algorithms Are Dangerous
 
LEGaTO: Use cases
LEGaTO: Use casesLEGaTO: Use cases
LEGaTO: Use cases
 
Machine Learning open studio solution for data scientists & developers
Machine Learning open studio solution for data scientists & developersMachine Learning open studio solution for data scientists & developers
Machine Learning open studio solution for data scientists & developers
 
Automation of the Drilling System: What has been done, what is being done, an...
Automation of the Drilling System: What has been done, what is being done, an...Automation of the Drilling System: What has been done, what is being done, an...
Automation of the Drilling System: What has been done, what is being done, an...
 
Rise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetupRise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetup
 
Machine Learning in the Real World
Machine Learning in the Real WorldMachine Learning in the Real World
Machine Learning in the Real World
 
Von der Zustandsüberwachung zur vorausschauenden Wartung
Von der Zustandsüberwachung zur vorausschauenden WartungVon der Zustandsüberwachung zur vorausschauenden Wartung
Von der Zustandsüberwachung zur vorausschauenden Wartung
 
Webinar: Machine Learning para Microcontroladores
Webinar: Machine Learning para MicrocontroladoresWebinar: Machine Learning para Microcontroladores
Webinar: Machine Learning para Microcontroladores
 
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
 
IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)
 

Recently uploaded

一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
ewymefz
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
Tiktokethiodaily
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
ewymefz
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Linda486226
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
pchutichetpong
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Boston Institute of Analytics
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
Opendatabay
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 

Recently uploaded (20)

一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 

Fraud Analytics with Machine Learning and Big Data Engineering for Telecom

  • 1. Fraud Analytics with Machine Learning & Engineering (FAME) for Telecom using Big Data Presented by: Sudarson Roy Pratihar Pranab Kumar Dash Subhadip Paul Amartya Kumar Das 1Copyright © 2015 Authors. All rights reserved.
  • 2. A Quick Intro – Telecom Frauds Fraud Analytics With Machine Learning & Engineering 2 • Have you got missed call from unknown numbers from overseas? • Have you heard of PBX hacking and corporate facing huge bills?
  • 3. Problem Definition • Telecom industries loose 46.3 billion USD globally due to various frauds • 10% operators have bad debt due to fraud • Detection is cat and mouse game – pattern changes to get undetected by available data mining techniques • Timely alert by processing huge volume of call records is a challenge • Alerts with high false positives have more operational expenses Fraud Analytics With Machine Learning & Engineering 3
  • 4. Importance to Telecom Industry & Society • Efficient and self adaptive detection mechanism can reduce significant loss (about 2.1% of the revenue) due to fraud and operational cost • Less “Bad Money” to the system Fraud Analytics With Machine Learning & Engineering 4
  • 5. Data Source • More than 1 TB of Call Detail Record (CDR) from a reputed wholesale carrier as history data • Tested on few weeks of live CDR of the carrier Fraud Analytics With Machine Learning & Engineering 5
  • 6. Analytics Technique • Basic components of FAME are: – Self adaptive Machine learning methodology – Actionable dash board for operations and investigations team to act upon the alerts and feedback sent to machine learning model for adjusting weights. – High performance big data platform for data processing and machine learning Fraud Analytics With Machine Learning & Engineering 6
  • 7. How it detects and adapts … 7Fraud Analytics With Machine Learning & Engineering Fraud Detection Model Pipeline Novelty Detection Pipeline / Stacking Actionable Dashboards Pattern validation and tuning work bench CDR Feed 1 2 4 Remaining Data Frauds detected 3 5 6 7 New Patterns More frauds 8 New model addition / Tuning of existing9 10 Operators feedback Analyst Operator
  • 8. Novelty Detection Pipeline 8Fraud Analytics With Machine Learning & Engineering • Novelty detection of origin and destination numbers separately • Various Contextual Anomaly Detection used and outputs are combined • Below are some examples of algorithms used • Box-plot based outlier • Clustering to find out cluster with distinct centroid • Use of Mahalonbis Distance – Mdist > ɸ. IQR
  • 9. Novelty Detection – Illustrations 9Fraud Analytics With Machine Learning & Engineering
  • 10. Fraud Detection Pipeline 10 • Use history data and flag records based on “Novelty Detection Pipeline” • Verify those records and mark them • Build separate models (logistic regression, random forest models and threshold based) for different patterns • Combine outputs of the models Fraud Analytics With Machine Learning & Engineering
  • 11. ACTIONABLE DASHBOARD System Behind Magic … 11Fraud Analytics With Machine Learning & Engineering ENSEMBLE OF SELF ADAPTIVE ALGOS BIG DATA PLATFORM POWERED BY HADOOP & SPARK INTEGRATION FACETS FEEDBACK CDR FEED FROM TELECOM SYSTEM
  • 12. Platform Behind Magic … 12Fraud Analytics With Machine Learning & Engineering
  • 13. Accuracy Results 13 0 0.2 0.4 0.6 0.8 1 True positive False positive Accuracy B-Number A-Number Fraud Analytics With Machine Learning & Engineering • Individual accuracy for origin and destination numbers detection • Combined mechanism has <5% false positive
  • 14. What Next … 14 • Test for different types telecom frauds • Extend this industrialized approach to other areas (such as network intrusion detection) • Productize as cloud based service as well as on premise implementation Fraud Analytics With Machine Learning & Engineering
  • 15. Contact Us @ 15Fraud Analytics With Machine Learning & Engineering Amartya Kumar Das amartya_das_2014@cba.isb.edu https://in.linkedin.com/pub/amartya- das/b/72b/637 Subhadip Paul Subhadip_paul_2014@cba.isb.edu https://in.linkedin.com/in/subhadippaul Pranab Kumar Dash Pranab_dash_2014@cba.isb.edu www.linkedin.com/profile/view?id=19155 039 Sudarson Roy Pratihar sudarson_pratihar_2014@cba.isb.edu www.linkedin.com/in/sudarson Follow us #FAMETELCO