Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 1999
DOI: 10.1145/312129.312303
|View full text |Cite
|
Sign up to set email alerts
|

Discovery of fraud rules for telecommunications—challenges and solutions

Abstract: Many fraud analysis systems have at their heart a rule-based engine for generating alerts about suspicious behaviors. The rules in the system are usually based on expert knowledge. Automatic rule discovery aims at using past examples of fraudulent and legitimate usage to find new patterns and rules to help distinguish between the two. Some aspects of the problem of finding rules suitable for fraud analysis make this problem unique. Among them are the following: the need to find rules combining both the propert… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Year Published

2002
2002
2015
2015

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 105 publications
(46 citation statements)
references
References 3 publications
0
46
0
Order By: Relevance
“…To better detect fraud two advanced data mining approaches are support vector machines and random forests, together with the well known logistic regression [20] [21]. Logistic regression (LR) is useful for situations in which it is wanted to be able to predict the presence or absence of a characteristic or outcome based on values of a set of predictor variables.…”
Section: Logistic Regressionmentioning
confidence: 99%
“…To better detect fraud two advanced data mining approaches are support vector machines and random forests, together with the well known logistic regression [20] [21]. Logistic regression (LR) is useful for situations in which it is wanted to be able to predict the presence or absence of a characteristic or outcome based on values of a set of predictor variables.…”
Section: Logistic Regressionmentioning
confidence: 99%
“…Kirkos et al (2007), Fan (2004), Viaene et al (2002), Bonchi et al (1999), and Rosset et al (1999). Viaene et al (2002) actually apply different techniques in their work, from logistic regression, k-nearest neighbor, decision trees and Bayesian neural network to support vector machine, naive Bayes and tree-augmented naive Bayes.…”
Section: Fraud Detection/prevention Literature Reviewmentioning
confidence: 99%
“…Rosset et al [18] studied the fraud detection in telecommunication and presented a two-stage system based on C4.5 to find fraud rules. They adapted the C4.5 algorithm for generating rules from bi-level data, i.e., customer data and behaviour-level data.…”
Section: Fraud/intrusion Detectionmentioning
confidence: 99%