SlideShare a Scribd company logo
TELECOM
SUBSCRIPTION
FRAUD DETECTION
Using Naïve Bayes in R
By (BA Group2)
Santosh Koppada
Maruthi Nataraj K
Sudhanshu Ranjan
Sunil Kumar
Sumit Sahay
 Introduction
 Business Background
 Objective
 Datasets Description
 Tools & Methods Used
 Statistical Procedure
 Future Direction
 Telecommunication Fraud which is the focus is appealing to
fraudsters as calling from the mobile terminal is not bound to any
physical local and it is easy to get subscription.
 Fraud negatively impacts on the company in 4 ways such as
financially, marketing, customer relations and shareholder
perceptions.
 In Subscription Fraud, fraudsters obtain an account without
intention to pay the bill(theft of service).Thus, at the level of phone
number, all the calls from it will be fraudulent indicating an
abnormal usage. The account is usually used for call selling at
cheaper rates or intensive self usage.
 Bad Idea Company Ltd was a target of Subscription Fraud by a
gang of fraudsters consisting of 3 people: Sally, Virginia and Vince.
 Call logs of the fraudsters spanning over one and half months
were recorded.
 An audit is undertaken after every 5 days to check whether the
above fraudsters have joined the company network.
 The list of subscribers is reviewed to identify their calling
pattern matching with that of fraudsters.
Note : Praxis Plan –>(4 calls a day) Morning (9AM-Noon)-1, Afternoon (Noon-4PM)-1,
Evening(4PM-9PM)-1 and Night (9PM-Midnight)-1.
 Our goal is to create a fraud management classification model
that is powerful enough to handle the subscription fraud that the
company has encountered and flexible enough to potentially apply
to things that had not been witnessed yet.
 In this case, the company wants to be absolutely sure that the
person is a fraudster backed up by high percentage of confidence
(probability).
 Call detail records generated in real time that are available
immediately could be used for building a robust statistical model.
 Dataset 1 – BlackListSubscriberCallLogs.xlsx
# Instances – 138 Target Variable – Caller (3 Levels)
 Dataset 2 – AuditLog.xlsx
# Instances – 15
 Tools : R (RStudio)
 Statistical Method : Naïve Bayes Classifier
 Before the start of process, all the required packages are to be loaded.
The list is as below :
1.ElemStatLearn
2.Caret
3.klaR
4.gmodels
 BlackListSubscriberCallLogs (CSV) file is read into R Environment as
shown below (Working Directory – My Documents) :
 Then, a random sample of 70% of the total instances from the Black List
Callers is selected as Training dataset and the remaining 30% as Test
dataset.
 Next, the table proportions are checked for target variable of both
Training and Test datasets to maintain uniformity.
 Later, all the attributes and labels of Training and Test datasets are
stored in separate variables(X~, Y~ respectively) for convenience in coding.
 It is followed by building of Naïve Bayes Classifier Model based on 10 fold
cross-validation using Training dataset ( Data is broken down into 10 sets of
size n/10. Trained on 9 datasets and tested on 1. The process is repeated 10
times and mean accuracy is taken.)
 The classification model generated is applied on Test data for the
prediction of target class (Here, the posterior probabilities are also seen in
the bottom half).
 After that, confusion matrix is generated for predictions of the Naive
Bayes model versus the actual classification of the data instances to
visualize the classification errors.
 AuditLog (CSV) file (validation dataset) is read into R Environment as
shown below (Working Directory – My Documents) :
 At this stage, all the required independent attributes are stored in
separate variable accordingly and the same previous model is applied on
validation dataset this time for the prediction of probable fraudsters along
with probability.
From above, we can infer that Customer X and Customer Z might probably be
Sally (as per calling pattern) and Customer Y might be Virginia.
The same results
with a greater
accuracy can be
obtained using
E1071 package
and laplacian
correction as
shown here.
The same results
with a greater
accuracy can be
obtained using
E1071 package
and laplacian
correction as
shown here.
Naïve Bayes Classification in RapidMiner
Black List Callers
Split Validation(70:30)
Audit Log
4 Time Slots
Inside Split Validation
Performance Classification
Confusion Matrix for Test data (30%)
Final Result with Probable Fraudster and Probabilities
Thank You

More Related Content

What's hot

Pollyanna Document Classifier
Pollyanna Document ClassifierPollyanna Document Classifier
Pollyanna Document ClassifierVijay PG
 
IRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud DetectionIRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud Detection
IRJET Journal
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
Justluk Luk
 
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONPDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
IJNSA Journal
 
Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage Detection
Ashwini Nerkar
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET Journal
 
IRJET- A Literature Review on Deta Leakage Detection
IRJET-  	  A Literature Review on Deta Leakage DetectionIRJET-  	  A Literature Review on Deta Leakage Detection
IRJET- A Literature Review on Deta Leakage Detection
IRJET Journal
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection
Suveeksha
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detectionChaitanya Kn
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
Sankhadip Kundu
 
How Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudHow Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments Fraud
Kyriba Corporation
 
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
Cyntegrity | Data Science for Clinical Trials
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
Mohit Pandey
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
Sumit Thakur
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Cognizant
 
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
IJET - International Journal of Engineering and Techniques
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
PierantonioAzzalini
 

What's hot (20)

Pollyanna Document Classifier
Pollyanna Document ClassifierPollyanna Document Classifier
Pollyanna Document Classifier
 
IRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud DetectionIRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud Detection
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRONPDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
PDMLP: PHISHING DETECTION USING MULTILAYER PERCEPTRON
 
Data Leakage Detection
Data Leakage DetectionData Leakage Detection
Data Leakage Detection
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
IRJET- A Literature Review on Deta Leakage Detection
IRJET-  	  A Literature Review on Deta Leakage DetectionIRJET-  	  A Literature Review on Deta Leakage Detection
IRJET- A Literature Review on Deta Leakage Detection
 
Data leakage detection
Data leakage detection Data leakage detection
Data leakage detection
 
P2 Project
P2 ProjectP2 Project
P2 Project
 
Jpdcs1 data leakage detection
Jpdcs1 data leakage detectionJpdcs1 data leakage detection
Jpdcs1 data leakage detection
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
How Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments FraudHow Kyriba Helps Protect You From Payments Fraud
How Kyriba Helps Protect You From Payments Fraud
 
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
MyRBQM Academy | Webinar Fraud and Sloppiness Detection in Clinical Trials [P...
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Data leakage detection Complete Seminar
Data leakage detection Complete SeminarData leakage detection Complete Seminar
Data leakage detection Complete Seminar
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
 
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
[IJET V2I5P15] Authors: V.Preethi, G.Velmayil
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
Extended summary of "Into the Deep Web: Understanding E-commerce Fraud from A...
 

Viewers also liked

Telecom Fraud Detection
Telecom Fraud DetectionTelecom Fraud Detection
Telecom Fraud Detection
Punit Kishore
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
sksahu099
 
Fraud in Telecoms
Fraud in TelecomsFraud in Telecoms
Fraud in Telecoms
Erick O'Connor
 
Asca Perception Data & Surveys
Asca Perception Data & SurveysAsca Perception Data & Surveys
Asca Perception Data & Surveys
shashley14
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
Kimber Spradlin
 
Top 10 implementation specialist interview questions and answers
Top 10 implementation specialist interview questions and answersTop 10 implementation specialist interview questions and answers
Top 10 implementation specialist interview questions and answersjomdare
 
Web Application Optimization Techniques
Web Application Optimization TechniquesWeb Application Optimization Techniques
Web Application Optimization Techniquestakinbo
 
Mandibular nerve block and mental nerve / oral surgery courses
Mandibular nerve block and mental nerve / oral surgery courses  Mandibular nerve block and mental nerve / oral surgery courses
Mandibular nerve block and mental nerve / oral surgery courses
Indian dental academy
 
Training i-staad pro 2007
Training i-staad pro 2007Training i-staad pro 2007
Training i-staad pro 2007fazil64
 
Strategic review (Sample)
Strategic review (Sample)Strategic review (Sample)
Strategic review (Sample)
guestbbb20c4
 
SRAM Design
SRAM DesignSRAM Design
SRAM Design
Bharat Biyani
 

Viewers also liked (13)

Telecom Fraud Detection
Telecom Fraud DetectionTelecom Fraud Detection
Telecom Fraud Detection
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 
Fraud in Telecoms
Fraud in TelecomsFraud in Telecoms
Fraud in Telecoms
 
Asca Perception Data & Surveys
Asca Perception Data & SurveysAsca Perception Data & Surveys
Asca Perception Data & Surveys
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
Top 10 implementation specialist interview questions and answers
Top 10 implementation specialist interview questions and answersTop 10 implementation specialist interview questions and answers
Top 10 implementation specialist interview questions and answers
 
Web Application Optimization Techniques
Web Application Optimization TechniquesWeb Application Optimization Techniques
Web Application Optimization Techniques
 
Mandibular nerve block and mental nerve / oral surgery courses
Mandibular nerve block and mental nerve / oral surgery courses  Mandibular nerve block and mental nerve / oral surgery courses
Mandibular nerve block and mental nerve / oral surgery courses
 
Training i-staad pro 2007
Training i-staad pro 2007Training i-staad pro 2007
Training i-staad pro 2007
 
Hadoop and OpenStack
Hadoop and OpenStackHadoop and OpenStack
Hadoop and OpenStack
 
 Traumatic bone cyst
 Traumatic bone cyst Traumatic bone cyst
 Traumatic bone cyst
 
Strategic review (Sample)
Strategic review (Sample)Strategic review (Sample)
Strategic review (Sample)
 
SRAM Design
SRAM DesignSRAM Design
SRAM Design
 

Similar to Telecom Fraud Detection - Naive Bayes Classification

Churn in the Telecommunications Industry
Churn in the Telecommunications IndustryChurn in the Telecommunications Industry
Churn in the Telecommunications Industry
skewdlogix
 
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
ShrutiGarg649495
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
Shani729
 
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptxCredit Card Fraud Detection_ Mansi_Choudhary.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
Boston Institute of Analytics
 
Accurate Campaign Targeting Using Classification Algorithms
Accurate Campaign Targeting Using Classification AlgorithmsAccurate Campaign Targeting Using Classification Algorithms
Accurate Campaign Targeting Using Classification Algorithms
Jieming Wei
 
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
gerogepatton
 
7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...
7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...
7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...
55296
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET Journal
 
IBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insuranceIBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insurance
IBM India Smarter Computing
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Khaled El Emam
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.
Thomas Lee
 
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNINGCREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
IRJET Journal
 
Data Mining on SpamBase,Wine Quality and Communities and Crime Datasets
Data Mining on SpamBase,Wine Quality and Communities and Crime DatasetsData Mining on SpamBase,Wine Quality and Communities and Crime Datasets
Data Mining on SpamBase,Wine Quality and Communities and Crime Datasets
Ankit Ghosalkar
 
IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...
IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...
IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...
IRJET Journal
 
IBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcareIBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcare
IBM India Smarter Computing
 
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital AgeCredit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Boston Institute of Analytics
 
Detecting Credit Card Fraud: An AI-driven Approach
Detecting Credit Card Fraud: An AI-driven ApproachDetecting Credit Card Fraud: An AI-driven Approach
Detecting Credit Card Fraud: An AI-driven Approach
Boston Institute of Analytics
 
Project crm submission sonali
Project crm submission sonaliProject crm submission sonali
Project crm submission sonali
Sonali Gupta
 
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Michael Abernathy
 
Understanding IDP: Data Validation and Feedback Loop
Understanding IDP: Data Validation and Feedback LoopUnderstanding IDP: Data Validation and Feedback Loop
Understanding IDP: Data Validation and Feedback Loop
Infrrd
 

Similar to Telecom Fraud Detection - Naive Bayes Classification (20)

Churn in the Telecommunications Industry
Churn in the Telecommunications IndustryChurn in the Telecommunications Industry
Churn in the Telecommunications Industry
 
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
 
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptxCredit Card Fraud Detection_ Mansi_Choudhary.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
 
Accurate Campaign Targeting Using Classification Algorithms
Accurate Campaign Targeting Using Classification AlgorithmsAccurate Campaign Targeting Using Classification Algorithms
Accurate Campaign Targeting Using Classification Algorithms
 
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
 
7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...
7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...
7. Plan, perform, and evaluate samples for substantive procedures IPPTChap009...
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
IBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insuranceIBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insurance
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.
 
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNINGCREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
 
Data Mining on SpamBase,Wine Quality and Communities and Crime Datasets
Data Mining on SpamBase,Wine Quality and Communities and Crime DatasetsData Mining on SpamBase,Wine Quality and Communities and Crime Datasets
Data Mining on SpamBase,Wine Quality and Communities and Crime Datasets
 
IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...
IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...
IRJET- A Comparative Study to Detect Fraud Financial Statement using Data Min...
 
IBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcareIBM Smarter Analytics Signature Solution for healthcare
IBM Smarter Analytics Signature Solution for healthcare
 
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital AgeCredit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
 
Detecting Credit Card Fraud: An AI-driven Approach
Detecting Credit Card Fraud: An AI-driven ApproachDetecting Credit Card Fraud: An AI-driven Approach
Detecting Credit Card Fraud: An AI-driven Approach
 
Project crm submission sonali
Project crm submission sonaliProject crm submission sonali
Project crm submission sonali
 
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
Law Enforcement Fraud Prevention Network and Financial Instrument Secure Tran...
 
Understanding IDP: Data Validation and Feedback Loop
Understanding IDP: Data Validation and Feedback LoopUnderstanding IDP: Data Validation and Feedback Loop
Understanding IDP: Data Validation and Feedback Loop
 

More from Maruthi Nataraj K

Time Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and ForecastingTime Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and Forecasting
Maruthi Nataraj K
 
Text Mining of Movie Reviews
Text Mining of Movie ReviewsText Mining of Movie Reviews
Text Mining of Movie Reviews
Maruthi Nataraj K
 
How To Find Needles In Haystacks
How To Find Needles In HaystacksHow To Find Needles In Haystacks
How To Find Needles In Haystacks
Maruthi Nataraj K
 
Social Media Marketing - Daily Deals
Social Media Marketing - Daily DealsSocial Media Marketing - Daily Deals
Social Media Marketing - Daily Deals
Maruthi Nataraj K
 
Customer Profiling For Rural Financial Services
Customer Profiling For Rural Financial ServicesCustomer Profiling For Rural Financial Services
Customer Profiling For Rural Financial Services
Maruthi Nataraj K
 
Time Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and ForecastingTime Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and Forecasting
Maruthi Nataraj K
 
Linear Regression using R
Linear Regression using RLinear Regression using R
Linear Regression using R
Maruthi Nataraj K
 
Elementary School Performance (SAS Regression Analysis)
Elementary School Performance (SAS Regression Analysis)Elementary School Performance (SAS Regression Analysis)
Elementary School Performance (SAS Regression Analysis)
Maruthi Nataraj K
 
Stock Analyzer Hadoop MapReduce Implementation
Stock Analyzer Hadoop MapReduce ImplementationStock Analyzer Hadoop MapReduce Implementation
Stock Analyzer Hadoop MapReduce Implementation
Maruthi Nataraj K
 
Hospital Market Segmentation using Cluster Analysis
Hospital Market Segmentation using Cluster AnalysisHospital Market Segmentation using Cluster Analysis
Hospital Market Segmentation using Cluster Analysis
Maruthi Nataraj K
 
SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...
SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...
SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...
Maruthi Nataraj K
 
Maruti Suzuki India Ltd Financial Statement Analysis
Maruti Suzuki India Ltd Financial Statement AnalysisMaruti Suzuki India Ltd Financial Statement Analysis
Maruti Suzuki India Ltd Financial Statement Analysis
Maruthi Nataraj K
 
SBI Home Loan Customer Perception Survey
SBI Home Loan Customer Perception SurveySBI Home Loan Customer Perception Survey
SBI Home Loan Customer Perception Survey
Maruthi Nataraj K
 
Basketball League Sponsorship Proposal
Basketball League Sponsorship ProposalBasketball League Sponsorship Proposal
Basketball League Sponsorship Proposal
Maruthi Nataraj K
 

More from Maruthi Nataraj K (15)

Time Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and ForecastingTime Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and Forecasting
 
Text Mining of Movie Reviews
Text Mining of Movie ReviewsText Mining of Movie Reviews
Text Mining of Movie Reviews
 
How To Find Needles In Haystacks
How To Find Needles In HaystacksHow To Find Needles In Haystacks
How To Find Needles In Haystacks
 
Social Media Marketing - Daily Deals
Social Media Marketing - Daily DealsSocial Media Marketing - Daily Deals
Social Media Marketing - Daily Deals
 
Customer Profiling For Rural Financial Services
Customer Profiling For Rural Financial ServicesCustomer Profiling For Rural Financial Services
Customer Profiling For Rural Financial Services
 
Time Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and ForecastingTime Series Analysis - Modeling and Forecasting
Time Series Analysis - Modeling and Forecasting
 
Linear Regression using R
Linear Regression using RLinear Regression using R
Linear Regression using R
 
Elementary School Performance (SAS Regression Analysis)
Elementary School Performance (SAS Regression Analysis)Elementary School Performance (SAS Regression Analysis)
Elementary School Performance (SAS Regression Analysis)
 
Stock Analyzer Hadoop MapReduce Implementation
Stock Analyzer Hadoop MapReduce ImplementationStock Analyzer Hadoop MapReduce Implementation
Stock Analyzer Hadoop MapReduce Implementation
 
Hospital Market Segmentation using Cluster Analysis
Hospital Market Segmentation using Cluster AnalysisHospital Market Segmentation using Cluster Analysis
Hospital Market Segmentation using Cluster Analysis
 
SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...
SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...
SAS Medical Case Study - A Comparison Between Ketamine,Clonidine and combinat...
 
Maruti Suzuki India Ltd Financial Statement Analysis
Maruti Suzuki India Ltd Financial Statement AnalysisMaruti Suzuki India Ltd Financial Statement Analysis
Maruti Suzuki India Ltd Financial Statement Analysis
 
SBI Home Loan Customer Perception Survey
SBI Home Loan Customer Perception SurveySBI Home Loan Customer Perception Survey
SBI Home Loan Customer Perception Survey
 
Basketball League Sponsorship Proposal
Basketball League Sponsorship ProposalBasketball League Sponsorship Proposal
Basketball League Sponsorship Proposal
 
Bank market classification
Bank market classificationBank market classification
Bank market classification
 

Recently uploaded

一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
vcaxypu
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
correoyaya
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
Opendatabay
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
ocavb
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
AlejandraGmez176757
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
ewymefz
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
NABLAS株式会社
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
NABLAS株式会社
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
benishzehra469
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
vcaxypu
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Linda486226
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
Oppotus
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
AbhimanyuSinha9
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
axoqas
 

Recently uploaded (20)

一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
一比一原版(RUG毕业证)格罗宁根大学毕业证成绩单
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
Innovative Methods in Media and Communication Research by Sebastian Kubitschk...
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单一比一原版(TWU毕业证)西三一大学毕业证成绩单
一比一原版(TWU毕业证)西三一大学毕业证成绩单
 
Business update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMIBusiness update Q1 2024 Lar España Real Estate SOCIMI
Business update Q1 2024 Lar España Real Estate SOCIMI
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
 
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...Best best suvichar in gujarati english meaning of this sentence as Silk road ...
Best best suvichar in gujarati english meaning of this sentence as Silk road ...
 
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
做(mqu毕业证书)麦考瑞大学毕业证硕士文凭证书学费发票原版一模一样
 

Telecom Fraud Detection - Naive Bayes Classification

  • 1. TELECOM SUBSCRIPTION FRAUD DETECTION Using Naïve Bayes in R By (BA Group2) Santosh Koppada Maruthi Nataraj K Sudhanshu Ranjan Sunil Kumar Sumit Sahay
  • 2.  Introduction  Business Background  Objective  Datasets Description  Tools & Methods Used  Statistical Procedure  Future Direction
  • 3.  Telecommunication Fraud which is the focus is appealing to fraudsters as calling from the mobile terminal is not bound to any physical local and it is easy to get subscription.  Fraud negatively impacts on the company in 4 ways such as financially, marketing, customer relations and shareholder perceptions.  In Subscription Fraud, fraudsters obtain an account without intention to pay the bill(theft of service).Thus, at the level of phone number, all the calls from it will be fraudulent indicating an abnormal usage. The account is usually used for call selling at cheaper rates or intensive self usage.
  • 4.  Bad Idea Company Ltd was a target of Subscription Fraud by a gang of fraudsters consisting of 3 people: Sally, Virginia and Vince.  Call logs of the fraudsters spanning over one and half months were recorded.  An audit is undertaken after every 5 days to check whether the above fraudsters have joined the company network.  The list of subscribers is reviewed to identify their calling pattern matching with that of fraudsters. Note : Praxis Plan –>(4 calls a day) Morning (9AM-Noon)-1, Afternoon (Noon-4PM)-1, Evening(4PM-9PM)-1 and Night (9PM-Midnight)-1.
  • 5.  Our goal is to create a fraud management classification model that is powerful enough to handle the subscription fraud that the company has encountered and flexible enough to potentially apply to things that had not been witnessed yet.  In this case, the company wants to be absolutely sure that the person is a fraudster backed up by high percentage of confidence (probability).  Call detail records generated in real time that are available immediately could be used for building a robust statistical model.
  • 6.  Dataset 1 – BlackListSubscriberCallLogs.xlsx # Instances – 138 Target Variable – Caller (3 Levels)  Dataset 2 – AuditLog.xlsx # Instances – 15
  • 7.  Tools : R (RStudio)  Statistical Method : Naïve Bayes Classifier
  • 8.  Before the start of process, all the required packages are to be loaded. The list is as below : 1.ElemStatLearn 2.Caret 3.klaR 4.gmodels
  • 9.  BlackListSubscriberCallLogs (CSV) file is read into R Environment as shown below (Working Directory – My Documents) :
  • 10.  Then, a random sample of 70% of the total instances from the Black List Callers is selected as Training dataset and the remaining 30% as Test dataset.
  • 11.  Next, the table proportions are checked for target variable of both Training and Test datasets to maintain uniformity.  Later, all the attributes and labels of Training and Test datasets are stored in separate variables(X~, Y~ respectively) for convenience in coding.  It is followed by building of Naïve Bayes Classifier Model based on 10 fold cross-validation using Training dataset ( Data is broken down into 10 sets of size n/10. Trained on 9 datasets and tested on 1. The process is repeated 10 times and mean accuracy is taken.)
  • 12.
  • 13.  The classification model generated is applied on Test data for the prediction of target class (Here, the posterior probabilities are also seen in the bottom half).
  • 14.  After that, confusion matrix is generated for predictions of the Naive Bayes model versus the actual classification of the data instances to visualize the classification errors.
  • 15.
  • 16.  AuditLog (CSV) file (validation dataset) is read into R Environment as shown below (Working Directory – My Documents) :
  • 17.  At this stage, all the required independent attributes are stored in separate variable accordingly and the same previous model is applied on validation dataset this time for the prediction of probable fraudsters along with probability.
  • 18.
  • 19. From above, we can infer that Customer X and Customer Z might probably be Sally (as per calling pattern) and Customer Y might be Virginia.
  • 20. The same results with a greater accuracy can be obtained using E1071 package and laplacian correction as shown here. The same results with a greater accuracy can be obtained using E1071 package and laplacian correction as shown here.
  • 21.
  • 22. Naïve Bayes Classification in RapidMiner Black List Callers Split Validation(70:30) Audit Log 4 Time Slots
  • 24. Confusion Matrix for Test data (30%)
  • 25. Final Result with Probable Fraudster and Probabilities