SlideShare a Scribd company logo
1 of 18
Copyright © Wondershare Software

www.wondershare.com
• Introduction
• Problem Understanding
• Data Understanding
• Course of Action

Copyright © Wondershare Software
• A telecom company named as Bad
Idea is expecting for fraudsters.
• They designed a weird rate plan
called Praxis plan where only four
calls are allowed during a day.
• Bad Idea has their call logs
spanning over one and half
months.

Copyright © Wondershare Software
• Two datasets are given:


Blacklist subscribers call log



Audited call log

• No of rows: 138
• Call timing:
•

Morning- 9AM to Noon

•

Afternoon- Noon to 4PM

•

Evening- 4PM to 9PM

•

Night- 9PM to Midnight

•

Callers: Virginia, Sally, Vince

•

Tool Used: Rapidminer & R
Copyright © Wondershare Software
•

A gang of fraudsters consist of three
people: Sally, Virginia & Vince targeted
the company.

•

There subscriptions were terminated.

•

The audit is done every 5 days to keep on
track for the fraudsters.

•

They reviewed the list of subscribers who
have made calls to the same people & in
the same time frame as those fraudsters.

Copyright © Wondershare Software
•

Algorithm: Naïve Bayesian Classifier

•

Import the data using read csv

Copyright © Wondershare Software
•

Use Split validation, it splits up the example set into a training and test
set and evaluates the model. 70% of data is used as training sample &
rest 30% is development set.

•

The first inner operator accept an Training Set while the second accept an
Test Set and the output of the first (which is in most cases a Model) and
produce a Performance Vector. Here in the first inner Naïve Bayes is used.

Copyright © Wondershare Software
•

The audit data set is imported using Read csv.

•

“Select Attributes” is applied to remove the unwanted attributes.

Copyright © Wondershare Software
•

“Apply Model” operator is used to apply the model to the training
data. The information is used to predict the value of possibly
unknown label.

•

All needed parameters are stored within the model object.

Copyright © Wondershare Software
•

Output with the probabilities of callers.

Copyright © Wondershare Software
Import the data
By using the Sampling
method divided the
dataset into train test
data

Develop the
model
Applied the model
on Test data

Applied the model
on the Audit log
set

Copyright © Wondershare Software

Converted the
predictability into
percentage
•

Import the data and convert the data into the train and test
sample:

Copyright © Wondershare Software
•

All the data which contain in the train dataset:
Dda

Copyright © Wondershare Software
•

Develop the Model using the train data set:

Copyright © Wondershare Software
•

Probability of the Caller and Predict on the test Data:

Copyright © Wondershare Software
•

Probability as per the test data and applied on the Audit Log set data and
converted in to percentage :

Copyright © Wondershare Software
ID

Morning
491 Robert
61 Quentin
703 Quentin
996 Quentin
173 Robert
575 Kelly
365 Larry
967 Mark
650 Nancy
165 Olga
557 Robert
808 Quentin
936 Robert
836 Kelly
976 Robert

Company Logo

AfternoonEvening
John
David
George David
George David
John
Emily
George Frank
John
David
John
David
George Frank
Harry
Frank
Harry
Frank
John
Frank
George David
George David
Harry
Frank
George Frank

Night
Alex
Alex
Beth
Alex
Alex
Clark
Clark
Clark
Clark
Clark
Clark
Beth
Alex
Clark
Alex

Customer
Customer X
Customer X
Customer X
Customer X
Customer X
Customer Y
Customer Y
Customer Y
Customer Y
Customer Y
Customer Z
Customer Z
Customer Z
Customer Z
Customer Z

Probable Fraudster
Vince
Sally
Sally
Vince
Vince
Vince
Vince
Virginia
Virginia
Virginia
Virginia
Sally
Vince
Virginia
Vince

Copyright © Wondershare Software

Probability
0.96
0.94
0.81
0.50
0.57
0.72
0.66
0.87
0.98
0.81
0.70
0.81
0.94
0.62
0.57
Copyright © Wondershare Software

More Related Content

What's hot

Tradeshift, Hackett Group & sharedserviceslink - P2P Webinar
Tradeshift, Hackett Group & sharedserviceslink - P2P WebinarTradeshift, Hackett Group & sharedserviceslink - P2P Webinar
Tradeshift, Hackett Group & sharedserviceslink - P2P Webinar
Tradeshift
 
5 Proven Strategies for Working Capital
5 Proven Strategies for Working Capital5 Proven Strategies for Working Capital
5 Proven Strategies for Working Capital
Tradeshift
 

What's hot (20)

Ten Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are RealTen Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are Real
 
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms ConferenceRevenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
 
Building Your Business Case for P2P Automation
Building Your Business Case for P2P AutomationBuilding Your Business Case for P2P Automation
Building Your Business Case for P2P Automation
 
P2P in 2020 - The Push for Supplier Self-Service
P2P in 2020 - The Push for Supplier Self-ServiceP2P in 2020 - The Push for Supplier Self-Service
P2P in 2020 - The Push for Supplier Self-Service
 
Tradeshift, Hackett Group & sharedserviceslink - P2P Webinar
Tradeshift, Hackett Group & sharedserviceslink - P2P WebinarTradeshift, Hackett Group & sharedserviceslink - P2P Webinar
Tradeshift, Hackett Group & sharedserviceslink - P2P Webinar
 
A Proactive Approach to Supplier Onboarding
A Proactive Approach to Supplier OnboardingA Proactive Approach to Supplier Onboarding
A Proactive Approach to Supplier Onboarding
 
5 Proven Strategies for Working Capital
5 Proven Strategies for Working Capital5 Proven Strategies for Working Capital
5 Proven Strategies for Working Capital
 
Supplier Information and Lifecycle Management
Supplier Information and Lifecycle ManagementSupplier Information and Lifecycle Management
Supplier Information and Lifecycle Management
 
Top P2P Trends in 2016
Top P2P Trends in 2016Top P2P Trends in 2016
Top P2P Trends in 2016
 
5 ways to accelerate supplier onboarding
5 ways to accelerate supplier onboarding 5 ways to accelerate supplier onboarding
5 ways to accelerate supplier onboarding
 
The Art of Supplier Onboarding
The Art of Supplier OnboardingThe Art of Supplier Onboarding
The Art of Supplier Onboarding
 
Fact or Fiction – You Can Manage All Your Supplier Information, Transactions ...
Fact or Fiction – You Can Manage All Your Supplier Information, Transactions ...Fact or Fiction – You Can Manage All Your Supplier Information, Transactions ...
Fact or Fiction – You Can Manage All Your Supplier Information, Transactions ...
 
Accounts Payable Trends 2017: The Process and Technology of AP Invoices | Sep...
Accounts Payable Trends 2017: The Process and Technology of AP Invoices | Sep...Accounts Payable Trends 2017: The Process and Technology of AP Invoices | Sep...
Accounts Payable Trends 2017: The Process and Technology of AP Invoices | Sep...
 
Perfect Your Touchless Invoicing
Perfect Your Touchless InvoicingPerfect Your Touchless Invoicing
Perfect Your Touchless Invoicing
 
Integrated Order to Cash (O2C) Automation Software for Global Shared Services...
Integrated Order to Cash (O2C) Automation Software for Global Shared Services...Integrated Order to Cash (O2C) Automation Software for Global Shared Services...
Integrated Order to Cash (O2C) Automation Software for Global Shared Services...
 
KHMS profile
KHMS profile KHMS profile
KHMS profile
 
Boost your bottom line and supply chain health
Boost your bottom line and supply chain healthBoost your bottom line and supply chain health
Boost your bottom line and supply chain health
 
2019-05 Maximize Your Revenue with 3 Key Medical Billing KPIs
2019-05 Maximize Your Revenue with 3 Key Medical Billing KPIs2019-05 Maximize Your Revenue with 3 Key Medical Billing KPIs
2019-05 Maximize Your Revenue with 3 Key Medical Billing KPIs
 
Driving a Supplier Responsibility Agenda that Your CEO Would be Proud Of
Driving a Supplier Responsibility Agenda that Your CEO Would be Proud OfDriving a Supplier Responsibility Agenda that Your CEO Would be Proud Of
Driving a Supplier Responsibility Agenda that Your CEO Would be Proud Of
 
Fixing the Broken Promise of eProcurement
Fixing the Broken Promise of eProcurement Fixing the Broken Promise of eProcurement
Fixing the Broken Promise of eProcurement
 

Viewers also liked

Reveneu frauds and telcos
Reveneu frauds and telcosReveneu frauds and telcos
Reveneu frauds and telcos
mrkhanlodhi
 
Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk Management
Ron Steinkamp
 
Detecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networksDetecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networks
Jamal Meselmani
 
Fraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyaFraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidya
cVidya Networks
 

Viewers also liked (20)

Fraud in Telecoms
Fraud in TelecomsFraud in Telecoms
Fraud in Telecoms
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 
Telecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes ClassificationTelecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes Classification
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinar
 
Types of telecom fraud
Types of telecom fraudTypes of telecom fraud
Types of telecom fraud
 
Valutazione Delle Capacità Predittive di un FMS
Valutazione Delle Capacità Predittive di un FMSValutazione Delle Capacità Predittive di un FMS
Valutazione Delle Capacità Predittive di un FMS
 
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
 
Subscription fraud analytics using classification
Subscription fraud analytics using classificationSubscription fraud analytics using classification
Subscription fraud analytics using classification
 
Fraud Management System - ISACA
Fraud Management System - ISACAFraud Management System - ISACA
Fraud Management System - ISACA
 
FraudStrike
FraudStrike FraudStrike
FraudStrike
 
Reveneu frauds and telcos
Reveneu frauds and telcosReveneu frauds and telcos
Reveneu frauds and telcos
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
 
FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under Control
 
Ff46 45 irsf_ic_283762
Ff46 45 irsf_ic_283762Ff46 45 irsf_ic_283762
Ff46 45 irsf_ic_283762
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraud
 
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
 
Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk Management
 
Detecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networksDetecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networks
 
Fraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyaFraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidya
 

Similar to Telecom Fraud Detection

School of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComSchool of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud Com
TaunyaCoffman887
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for Cybersecurity
VMware Tanzu
 
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & GrowRapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
MAXfocus
 

Similar to Telecom Fraud Detection (20)

SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat Intelligence
 
Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise
 
School of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComSchool of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud Com
 
Phishing Website Detection by Machine Learning Techniques Presentation.pdf
Phishing Website Detection by Machine Learning Techniques Presentation.pdfPhishing Website Detection by Machine Learning Techniques Presentation.pdf
Phishing Website Detection by Machine Learning Techniques Presentation.pdf
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for Cybersecurity
 
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Crescendo
CrescendoCrescendo
Crescendo
 
HRTech Integration Masterclass Session 4 How to Expand Your Recruitment Datab...
HRTech Integration Masterclass Session 4 How to Expand Your Recruitment Datab...HRTech Integration Masterclass Session 4 How to Expand Your Recruitment Datab...
HRTech Integration Masterclass Session 4 How to Expand Your Recruitment Datab...
 
Benefits of Cloud Software
Benefits of Cloud SoftwareBenefits of Cloud Software
Benefits of Cloud Software
 
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & GrowRapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat Intelligence
 
ThreadFix 2.1 and Your Application Security Program
ThreadFix 2.1 and Your Application Security ProgramThreadFix 2.1 and Your Application Security Program
ThreadFix 2.1 and Your Application Security Program
 
Voice of the Voter Webinar.pptx
Voice of the Voter Webinar.pptxVoice of the Voter Webinar.pptx
Voice of the Voter Webinar.pptx
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 
Design and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLDesign and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using ML
 
How to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingHow to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security Testing
 
Harrier Success Stories
Harrier Success StoriesHarrier Success Stories
Harrier Success Stories
 
Harrier_Success-Stories
Harrier_Success-StoriesHarrier_Success-Stories
Harrier_Success-Stories
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Telecom Fraud Detection

  • 1. Copyright © Wondershare Software www.wondershare.com
  • 2. • Introduction • Problem Understanding • Data Understanding • Course of Action Copyright © Wondershare Software
  • 3. • A telecom company named as Bad Idea is expecting for fraudsters. • They designed a weird rate plan called Praxis plan where only four calls are allowed during a day. • Bad Idea has their call logs spanning over one and half months. Copyright © Wondershare Software
  • 4. • Two datasets are given:  Blacklist subscribers call log  Audited call log • No of rows: 138 • Call timing: • Morning- 9AM to Noon • Afternoon- Noon to 4PM • Evening- 4PM to 9PM • Night- 9PM to Midnight • Callers: Virginia, Sally, Vince • Tool Used: Rapidminer & R Copyright © Wondershare Software
  • 5. • A gang of fraudsters consist of three people: Sally, Virginia & Vince targeted the company. • There subscriptions were terminated. • The audit is done every 5 days to keep on track for the fraudsters. • They reviewed the list of subscribers who have made calls to the same people & in the same time frame as those fraudsters. Copyright © Wondershare Software
  • 6. • Algorithm: Naïve Bayesian Classifier • Import the data using read csv Copyright © Wondershare Software
  • 7. • Use Split validation, it splits up the example set into a training and test set and evaluates the model. 70% of data is used as training sample & rest 30% is development set. • The first inner operator accept an Training Set while the second accept an Test Set and the output of the first (which is in most cases a Model) and produce a Performance Vector. Here in the first inner Naïve Bayes is used. Copyright © Wondershare Software
  • 8. • The audit data set is imported using Read csv. • “Select Attributes” is applied to remove the unwanted attributes. Copyright © Wondershare Software
  • 9. • “Apply Model” operator is used to apply the model to the training data. The information is used to predict the value of possibly unknown label. • All needed parameters are stored within the model object. Copyright © Wondershare Software
  • 10. • Output with the probabilities of callers. Copyright © Wondershare Software
  • 11. Import the data By using the Sampling method divided the dataset into train test data Develop the model Applied the model on Test data Applied the model on the Audit log set Copyright © Wondershare Software Converted the predictability into percentage
  • 12. • Import the data and convert the data into the train and test sample: Copyright © Wondershare Software
  • 13. • All the data which contain in the train dataset: Dda Copyright © Wondershare Software
  • 14. • Develop the Model using the train data set: Copyright © Wondershare Software
  • 15. • Probability of the Caller and Predict on the test Data: Copyright © Wondershare Software
  • 16. • Probability as per the test data and applied on the Audit Log set data and converted in to percentage : Copyright © Wondershare Software
  • 17. ID Morning 491 Robert 61 Quentin 703 Quentin 996 Quentin 173 Robert 575 Kelly 365 Larry 967 Mark 650 Nancy 165 Olga 557 Robert 808 Quentin 936 Robert 836 Kelly 976 Robert Company Logo AfternoonEvening John David George David George David John Emily George Frank John David John David George Frank Harry Frank Harry Frank John Frank George David George David Harry Frank George Frank Night Alex Alex Beth Alex Alex Clark Clark Clark Clark Clark Clark Beth Alex Clark Alex Customer Customer X Customer X Customer X Customer X Customer X Customer Y Customer Y Customer Y Customer Y Customer Y Customer Z Customer Z Customer Z Customer Z Customer Z Probable Fraudster Vince Sally Sally Vince Vince Vince Vince Virginia Virginia Virginia Virginia Sally Vince Virginia Vince Copyright © Wondershare Software Probability 0.96 0.94 0.81 0.50 0.57 0.72 0.66 0.87 0.98 0.81 0.70 0.81 0.94 0.62 0.57