SlideShare a Scribd company logo
1 of 18
Copyright © Wondershare Software

www.wondershare.com
• Introduction
• Problem Understanding
• Data Understanding
• Course of Action

Copyright © Wondershare Software
• A telecom company named as Bad
Idea is expecting for fraudsters.
• They designed a weird rate plan
called Praxis plan where only four
calls are allowed during a day.
• Bad Idea has their call logs
spanning over one and half
months.

Copyright © Wondershare Software
• Two datasets are given:


Blacklist subscribers call log



Audited call log

• No of rows: 138
• Call timing:
•

Morning- 9AM to Noon

•

Afternoon- Noon to 4PM

•

Evening- 4PM to 9PM

•

Night- 9PM to Midnight

•

Callers: Virginia, Sally, Vince

•

Tool Used: Rapidminer & R
Copyright © Wondershare Software
•

A gang of fraudsters consist of three
people: Sally, Virginia & Vince targeted
the company.

•

There subscriptions were terminated.

•

The audit is done every 5 days to keep on
track for the fraudsters.

•

They reviewed the list of subscribers who
have made calls to the same people & in
the same time frame as those fraudsters.

Copyright © Wondershare Software
•

Algorithm: Naïve Bayesian Classifier

•

Import the data using read csv

Copyright © Wondershare Software
•

Use Split validation, it splits up the example set into a training and test
set and evaluates the model. 70% of data is used as training sample &
rest 30% is development set.

•

The first inner operator accept an Training Set while the second accept an
Test Set and the output of the first (which is in most cases a Model) and
produce a Performance Vector. Here in the first inner Naïve Bayes is used.

Copyright © Wondershare Software
•

The audit data set is imported using Read csv.

•

“Select Attributes” is applied to remove the unwanted attributes.

Copyright © Wondershare Software
•

“Apply Model” operator is used to apply the model to the training
data. The information is used to predict the value of possibly
unknown label.

•

All needed parameters are stored within the model object.

Copyright © Wondershare Software
•

Output with the probabilities of callers.

Copyright © Wondershare Software
Import the data
By using the Sampling
method divided the
dataset into train test
data

Develop the
model
Applied the model
on Test data

Applied the model
on the Audit log
set

Copyright © Wondershare Software

Converted the
predictability into
percentage
•

Import the data and convert the data into the train and test
sample:

Copyright © Wondershare Software
•

All the data which contain in the train dataset:
Dda

Copyright © Wondershare Software
•

Develop the Model using the train data set:

Copyright © Wondershare Software
•

Probability of the Caller and Predict on the test Data:

Copyright © Wondershare Software
•

Probability as per the test data and applied on the Audit Log set data and
converted in to percentage :

Copyright © Wondershare Software
ID

Morning
491 Robert
61 Quentin
703 Quentin
996 Quentin
173 Robert
575 Kelly
365 Larry
967 Mark
650 Nancy
165 Olga
557 Robert
808 Quentin
936 Robert
836 Kelly
976 Robert

Company Logo

AfternoonEvening
John
David
George David
George David
John
Emily
George Frank
John
David
John
David
George Frank
Harry
Frank
Harry
Frank
John
Frank
George David
George David
Harry
Frank
George Frank

Night
Alex
Alex
Beth
Alex
Alex
Clark
Clark
Clark
Clark
Clark
Clark
Beth
Alex
Clark
Alex

Customer
Customer X
Customer X
Customer X
Customer X
Customer X
Customer Y
Customer Y
Customer Y
Customer Y
Customer Y
Customer Z
Customer Z
Customer Z
Customer Z
Customer Z

Probable Fraudster
Vince
Sally
Sally
Vince
Vince
Vince
Vince
Virginia
Virginia
Virginia
Virginia
Sally
Vince
Virginia
Vince

Copyright © Wondershare Software

Probability
0.96
0.94
0.81
0.50
0.57
0.72
0.66
0.87
0.98
0.81
0.70
0.81
0.94
0.62
0.57
Copyright © Wondershare Software

More Related Content

What's hot

Ten Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are RealTen Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are RealTradeshift
 
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms ConferenceRevenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms ConferenceArena International
 
Building Your Business Case for P2P Automation
Building Your Business Case for P2P AutomationBuilding Your Business Case for P2P Automation
Building Your Business Case for P2P AutomationTradeshift
 
P2P in 2020 - The Push for Supplier Self-Service
P2P in 2020 - The Push for Supplier Self-ServiceP2P in 2020 - The Push for Supplier Self-Service
P2P in 2020 - The Push for Supplier Self-ServiceTradeshift
 
Tradeshift, Hackett Group & sharedserviceslink - P2P Webinar
Tradeshift, Hackett Group & sharedserviceslink - P2P WebinarTradeshift, Hackett Group & sharedserviceslink - P2P Webinar
Tradeshift, Hackett Group & sharedserviceslink - P2P WebinarTradeshift
 
A Proactive Approach to Supplier Onboarding
A Proactive Approach to Supplier OnboardingA Proactive Approach to Supplier Onboarding
A Proactive Approach to Supplier OnboardingTradeshift
 
5 Proven Strategies for Working Capital
5 Proven Strategies for Working Capital5 Proven Strategies for Working Capital
5 Proven Strategies for Working CapitalTradeshift
 
Supplier Information and Lifecycle Management
Supplier Information and Lifecycle ManagementSupplier Information and Lifecycle Management
Supplier Information and Lifecycle ManagementTradeshift
 
Top P2P Trends in 2016
Top P2P Trends in 2016Top P2P Trends in 2016
Top P2P Trends in 2016Tradeshift
 
5 ways to accelerate supplier onboarding
5 ways to accelerate supplier onboarding 5 ways to accelerate supplier onboarding
5 ways to accelerate supplier onboarding Tradeshift
 
The Art of Supplier Onboarding
The Art of Supplier OnboardingThe Art of Supplier Onboarding
The Art of Supplier OnboardingTradeshift
 
Fact or Fiction – You Can Manage All Your Supplier Information, Transactions ...
Fact or Fiction – You Can Manage All Your Supplier Information, Transactions ...Fact or Fiction – You Can Manage All Your Supplier Information, Transactions ...
Fact or Fiction – You Can Manage All Your Supplier Information, Transactions ...Tradeshift
 
Accounts Payable Trends 2017: The Process and Technology of AP Invoices | Sep...
Accounts Payable Trends 2017: The Process and Technology of AP Invoices | Sep...Accounts Payable Trends 2017: The Process and Technology of AP Invoices | Sep...
Accounts Payable Trends 2017: The Process and Technology of AP Invoices | Sep...Ashley Emery
 
Perfect Your Touchless Invoicing
Perfect Your Touchless InvoicingPerfect Your Touchless Invoicing
Perfect Your Touchless InvoicingTradeshift
 
Integrated Order to Cash (O2C) Automation Software for Global Shared Services...
Integrated Order to Cash (O2C) Automation Software for Global Shared Services...Integrated Order to Cash (O2C) Automation Software for Global Shared Services...
Integrated Order to Cash (O2C) Automation Software for Global Shared Services...Emagia
 
Boost your bottom line and supply chain health
Boost your bottom line and supply chain healthBoost your bottom line and supply chain health
Boost your bottom line and supply chain healthTradeshift
 
2019-05 Maximize Your Revenue with 3 Key Medical Billing KPIs
2019-05 Maximize Your Revenue with 3 Key Medical Billing KPIs2019-05 Maximize Your Revenue with 3 Key Medical Billing KPIs
2019-05 Maximize Your Revenue with 3 Key Medical Billing KPIsKareo
 
Driving a Supplier Responsibility Agenda that Your CEO Would be Proud Of
Driving a Supplier Responsibility Agenda that Your CEO Would be Proud OfDriving a Supplier Responsibility Agenda that Your CEO Would be Proud Of
Driving a Supplier Responsibility Agenda that Your CEO Would be Proud OfTradeshift
 
Fixing the Broken Promise of eProcurement
Fixing the Broken Promise of eProcurement Fixing the Broken Promise of eProcurement
Fixing the Broken Promise of eProcurement Tradeshift
 

What's hot (20)

Ten Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are RealTen Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are Real
 
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms ConferenceRevenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
 
Building Your Business Case for P2P Automation
Building Your Business Case for P2P AutomationBuilding Your Business Case for P2P Automation
Building Your Business Case for P2P Automation
 
P2P in 2020 - The Push for Supplier Self-Service
P2P in 2020 - The Push for Supplier Self-ServiceP2P in 2020 - The Push for Supplier Self-Service
P2P in 2020 - The Push for Supplier Self-Service
 
Tradeshift, Hackett Group & sharedserviceslink - P2P Webinar
Tradeshift, Hackett Group & sharedserviceslink - P2P WebinarTradeshift, Hackett Group & sharedserviceslink - P2P Webinar
Tradeshift, Hackett Group & sharedserviceslink - P2P Webinar
 
A Proactive Approach to Supplier Onboarding
A Proactive Approach to Supplier OnboardingA Proactive Approach to Supplier Onboarding
A Proactive Approach to Supplier Onboarding
 
5 Proven Strategies for Working Capital
5 Proven Strategies for Working Capital5 Proven Strategies for Working Capital
5 Proven Strategies for Working Capital
 
Supplier Information and Lifecycle Management
Supplier Information and Lifecycle ManagementSupplier Information and Lifecycle Management
Supplier Information and Lifecycle Management
 
Top P2P Trends in 2016
Top P2P Trends in 2016Top P2P Trends in 2016
Top P2P Trends in 2016
 
5 ways to accelerate supplier onboarding
5 ways to accelerate supplier onboarding 5 ways to accelerate supplier onboarding
5 ways to accelerate supplier onboarding
 
The Art of Supplier Onboarding
The Art of Supplier OnboardingThe Art of Supplier Onboarding
The Art of Supplier Onboarding
 
Fact or Fiction – You Can Manage All Your Supplier Information, Transactions ...
Fact or Fiction – You Can Manage All Your Supplier Information, Transactions ...Fact or Fiction – You Can Manage All Your Supplier Information, Transactions ...
Fact or Fiction – You Can Manage All Your Supplier Information, Transactions ...
 
Accounts Payable Trends 2017: The Process and Technology of AP Invoices | Sep...
Accounts Payable Trends 2017: The Process and Technology of AP Invoices | Sep...Accounts Payable Trends 2017: The Process and Technology of AP Invoices | Sep...
Accounts Payable Trends 2017: The Process and Technology of AP Invoices | Sep...
 
Perfect Your Touchless Invoicing
Perfect Your Touchless InvoicingPerfect Your Touchless Invoicing
Perfect Your Touchless Invoicing
 
Integrated Order to Cash (O2C) Automation Software for Global Shared Services...
Integrated Order to Cash (O2C) Automation Software for Global Shared Services...Integrated Order to Cash (O2C) Automation Software for Global Shared Services...
Integrated Order to Cash (O2C) Automation Software for Global Shared Services...
 
KHMS profile
KHMS profile KHMS profile
KHMS profile
 
Boost your bottom line and supply chain health
Boost your bottom line and supply chain healthBoost your bottom line and supply chain health
Boost your bottom line and supply chain health
 
2019-05 Maximize Your Revenue with 3 Key Medical Billing KPIs
2019-05 Maximize Your Revenue with 3 Key Medical Billing KPIs2019-05 Maximize Your Revenue with 3 Key Medical Billing KPIs
2019-05 Maximize Your Revenue with 3 Key Medical Billing KPIs
 
Driving a Supplier Responsibility Agenda that Your CEO Would be Proud Of
Driving a Supplier Responsibility Agenda that Your CEO Would be Proud OfDriving a Supplier Responsibility Agenda that Your CEO Would be Proud Of
Driving a Supplier Responsibility Agenda that Your CEO Would be Proud Of
 
Fixing the Broken Promise of eProcurement
Fixing the Broken Promise of eProcurement Fixing the Broken Promise of eProcurement
Fixing the Broken Promise of eProcurement
 

Viewers also liked

Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sectorsksahu099
 
Telecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes ClassificationTelecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes ClassificationMaruthi Nataraj K
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinarXINTEC
 
Valutazione Delle Capacità Predittive di un FMS
Valutazione Delle Capacità Predittive di un FMSValutazione Delle Capacità Predittive di un FMS
Valutazione Delle Capacità Predittive di un FMSScattareggia
 
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...Francesco Ciclosi
 
Subscription fraud analytics using classification
Subscription fraud analytics using classificationSubscription fraud analytics using classification
Subscription fraud analytics using classificationSomdeep Sen
 
Fraud Management System - ISACA
Fraud Management System - ISACAFraud Management System - ISACA
Fraud Management System - ISACAScattareggia
 
FraudStrike
FraudStrike FraudStrike
FraudStrike XINTEC
 
Reveneu frauds and telcos
Reveneu frauds and telcosReveneu frauds and telcos
Reveneu frauds and telcosmrkhanlodhi
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISMXINTEC
 
FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlRichard Hickson
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraudXINTEC
 
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Neo4j
 
Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementRon Steinkamp
 
Detecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networksDetecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networksJamal Meselmani
 
Fraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyaFraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyacVidya Networks
 

Viewers also liked (20)

Fraud in Telecoms
Fraud in TelecomsFraud in Telecoms
Fraud in Telecoms
 
Frauds in telecom sector
Frauds in telecom sectorFrauds in telecom sector
Frauds in telecom sector
 
Telecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes ClassificationTelecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes Classification
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinar
 
Types of telecom fraud
Types of telecom fraudTypes of telecom fraud
Types of telecom fraud
 
Valutazione Delle Capacità Predittive di un FMS
Valutazione Delle Capacità Predittive di un FMSValutazione Delle Capacità Predittive di un FMS
Valutazione Delle Capacità Predittive di un FMS
 
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
 
Subscription fraud analytics using classification
Subscription fraud analytics using classificationSubscription fraud analytics using classification
Subscription fraud analytics using classification
 
Fraud Management System - ISACA
Fraud Management System - ISACAFraud Management System - ISACA
Fraud Management System - ISACA
 
FraudStrike
FraudStrike FraudStrike
FraudStrike
 
Reveneu frauds and telcos
Reveneu frauds and telcosReveneu frauds and telcos
Reveneu frauds and telcos
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
 
FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under Control
 
Ff46 45 irsf_ic_283762
Ff46 45 irsf_ic_283762Ff46 45 irsf_ic_283762
Ff46 45 irsf_ic_283762
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraud
 
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
 
Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk Management
 
Detecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networksDetecting fraud in cellular telephone networks
Detecting fraud in cellular telephone networks
 
Fraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidyaFraud Management Industry Update Webinar by cVidya
Fraud Management Industry Update Webinar by cVidya
 

Similar to Telecom Fraud Detection

SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceJason Trost
 
Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise deteo
 
School of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComSchool of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComTaunyaCoffman887
 
Phishing Website Detection by Machine Learning Techniques Presentation.pdf
Phishing Website Detection by Machine Learning Techniques Presentation.pdfPhishing Website Detection by Machine Learning Techniques Presentation.pdf
Phishing Website Detection by Machine Learning Techniques Presentation.pdfVaralakshmiKC
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for CybersecurityVMware Tanzu
 
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...Denim Group
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust ModelYash
 
Benefits of Cloud Software
Benefits of Cloud SoftwareBenefits of Cloud Software
Benefits of Cloud SoftwareRapidScale
 
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & GrowRapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & GrowMAXfocus
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Cloudera, Inc.
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceJason Trost
 
ThreadFix 2.1 and Your Application Security Program
ThreadFix 2.1 and Your Application Security ProgramThreadFix 2.1 and Your Application Security Program
ThreadFix 2.1 and Your Application Security ProgramDenim Group
 
Voice of the Voter Webinar.pptx
Voice of the Voter Webinar.pptxVoice of the Voter Webinar.pptx
Voice of the Voter Webinar.pptxDaniel Rangel
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Denim Group
 
Design and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLDesign and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLSiva krishnam raju Patsamatla
 
How to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingHow to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingCenzic
 

Similar to Telecom Fraud Detection (20)

SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat Intelligence
 
Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise
 
School of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud ComSchool of Computer & Information SciencesITS-532 Cloud Com
School of Computer & Information SciencesITS-532 Cloud Com
 
Phishing Website Detection by Machine Learning Techniques Presentation.pdf
Phishing Website Detection by Machine Learning Techniques Presentation.pdfPhishing Website Detection by Machine Learning Techniques Presentation.pdf
Phishing Website Detection by Machine Learning Techniques Presentation.pdf
 
Using Data Science for Cybersecurity
Using Data Science for CybersecurityUsing Data Science for Cybersecurity
Using Data Science for Cybersecurity
 
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Crescendo
CrescendoCrescendo
Crescendo
 
HRTech Integration Masterclass Session 4 How to Expand Your Recruitment Datab...
HRTech Integration Masterclass Session 4 How to Expand Your Recruitment Datab...HRTech Integration Masterclass Session 4 How to Expand Your Recruitment Datab...
HRTech Integration Masterclass Session 4 How to Expand Your Recruitment Datab...
 
Benefits of Cloud Software
Benefits of Cloud SoftwareBenefits of Cloud Software
Benefits of Cloud Software
 
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & GrowRapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat Intelligence
 
ThreadFix 2.1 and Your Application Security Program
ThreadFix 2.1 and Your Application Security ProgramThreadFix 2.1 and Your Application Security Program
ThreadFix 2.1 and Your Application Security Program
 
Voice of the Voter Webinar.pptx
Voice of the Voter Webinar.pptxVoice of the Voter Webinar.pptx
Voice of the Voter Webinar.pptx
 
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
 
Design and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLDesign and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using ML
 
How to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security TestingHow to Overcome the 5 Barriers to Production App Security Testing
How to Overcome the 5 Barriers to Production App Security Testing
 
Harrier Success Stories
Harrier Success StoriesHarrier Success Stories
Harrier Success Stories
 
Harrier_Success-Stories
Harrier_Success-StoriesHarrier_Success-Stories
Harrier_Success-Stories
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Telecom Fraud Detection

  • 1. Copyright © Wondershare Software www.wondershare.com
  • 2. • Introduction • Problem Understanding • Data Understanding • Course of Action Copyright © Wondershare Software
  • 3. • A telecom company named as Bad Idea is expecting for fraudsters. • They designed a weird rate plan called Praxis plan where only four calls are allowed during a day. • Bad Idea has their call logs spanning over one and half months. Copyright © Wondershare Software
  • 4. • Two datasets are given:  Blacklist subscribers call log  Audited call log • No of rows: 138 • Call timing: • Morning- 9AM to Noon • Afternoon- Noon to 4PM • Evening- 4PM to 9PM • Night- 9PM to Midnight • Callers: Virginia, Sally, Vince • Tool Used: Rapidminer & R Copyright © Wondershare Software
  • 5. • A gang of fraudsters consist of three people: Sally, Virginia & Vince targeted the company. • There subscriptions were terminated. • The audit is done every 5 days to keep on track for the fraudsters. • They reviewed the list of subscribers who have made calls to the same people & in the same time frame as those fraudsters. Copyright © Wondershare Software
  • 6. • Algorithm: Naïve Bayesian Classifier • Import the data using read csv Copyright © Wondershare Software
  • 7. • Use Split validation, it splits up the example set into a training and test set and evaluates the model. 70% of data is used as training sample & rest 30% is development set. • The first inner operator accept an Training Set while the second accept an Test Set and the output of the first (which is in most cases a Model) and produce a Performance Vector. Here in the first inner Naïve Bayes is used. Copyright © Wondershare Software
  • 8. • The audit data set is imported using Read csv. • “Select Attributes” is applied to remove the unwanted attributes. Copyright © Wondershare Software
  • 9. • “Apply Model” operator is used to apply the model to the training data. The information is used to predict the value of possibly unknown label. • All needed parameters are stored within the model object. Copyright © Wondershare Software
  • 10. • Output with the probabilities of callers. Copyright © Wondershare Software
  • 11. Import the data By using the Sampling method divided the dataset into train test data Develop the model Applied the model on Test data Applied the model on the Audit log set Copyright © Wondershare Software Converted the predictability into percentage
  • 12. • Import the data and convert the data into the train and test sample: Copyright © Wondershare Software
  • 13. • All the data which contain in the train dataset: Dda Copyright © Wondershare Software
  • 14. • Develop the Model using the train data set: Copyright © Wondershare Software
  • 15. • Probability of the Caller and Predict on the test Data: Copyright © Wondershare Software
  • 16. • Probability as per the test data and applied on the Audit Log set data and converted in to percentage : Copyright © Wondershare Software
  • 17. ID Morning 491 Robert 61 Quentin 703 Quentin 996 Quentin 173 Robert 575 Kelly 365 Larry 967 Mark 650 Nancy 165 Olga 557 Robert 808 Quentin 936 Robert 836 Kelly 976 Robert Company Logo AfternoonEvening John David George David George David John Emily George Frank John David John David George Frank Harry Frank Harry Frank John Frank George David George David Harry Frank George Frank Night Alex Alex Beth Alex Alex Clark Clark Clark Clark Clark Clark Beth Alex Clark Alex Customer Customer X Customer X Customer X Customer X Customer X Customer Y Customer Y Customer Y Customer Y Customer Y Customer Z Customer Z Customer Z Customer Z Customer Z Probable Fraudster Vince Sally Sally Vince Vince Vince Vince Virginia Virginia Virginia Virginia Sally Vince Virginia Vince Copyright © Wondershare Software Probability 0.96 0.94 0.81 0.50 0.57 0.72 0.66 0.87 0.98 0.81 0.70 0.81 0.94 0.62 0.57