izpis_h1_title_alt

Priprava podatkov za detekcijo goljufij v telekomunikacijah : delo diplomskega seminarja
ID Košir, Nastja (Author), ID Knez, Marjetka (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (662,49 KB)
MD5: 962DA67926F3E0E298EEBC7AB186BC69

Abstract
Lahko bi rekli, da so telekomunikacijske goljufije kuga 21. stoletja: povzročajo ogromne izgube in se hitro širijo. Vsebinsko pomenijo krajo telekomunikacijske opreme ali storitev, prikrivanje obstoja, lokacije izvira ali destinacije uporabe storitve, razkrivanje informacij o računih strank in podobno, z namenom okoristiti se z oškodovanjem telekomunikacijskega operaterja, ponudnika storitve ali uporabnika telefonskega omrežja. Že iz definicije telekomunikacijske goljufije lahko razberemo, da jih poznamo kar nekaj različnih vrst. Delimo jih po dveh kriterijih. Prvi je glede na način uporabe omrežja ali storitve z namenom zlorabe – tako ločimo več tipov goljufij. Alternativno prevare delimo po načinu dostopa do omrežja ali storitev z namenom prevare. Pravimo, da poznamo več metod goljufij. V delu diplomskega seminarja goljufe obravnavamo kot redke primerke v množici vseh uporabnikov telefonskega omrežja. Ogromne CDR datoteke z metapodatki o vseh zabeleženih klicih preiskujemo s pomočjo podatkovnega rudarjenja. Pri eksperimentalnem delu se soočimo z mnogimi izzivi: nenavadnimi časovni formati, manjkajočimi vrednostmi, obsežnimi podatkovnimi bazami, redukcijo dimenzije, veliko časovno zahtevnostjo in težavnostjo ločevanja med sleparji in običajnimi uporabniki. Potencialne goljufe iščemo s pomočjo metode k-voditeljev in metode LOF.

Language:Slovenian
Keywords:zaznavanje goljufij, odkrivanje osamelcev, veliko podatkovje, podatkovno rudarjenje, gručenje, modeliranje
Work type:Final seminar paper
Organization:FMF - Faculty of Mathematics and Physics
Year:2019
PID:20.500.12556/RUL-109396 This link opens in a new window
UDC:519.8
COBISS.SI-ID:18711385 This link opens in a new window
Publication date in RUL:01.09.2019
Views:1195
Downloads:224
Metadata:XML RDF-CHPDL DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:Data preparation for fraud detection in telecommunications
Abstract:
One could say that frauds in telecommunications are the plague of the 21st century, because of its huge losses and extremely quick spreading. They include the theft of goods or telecommunication services, hidding existence of using the service, location of origin or user's destination, disclosure of the information about clients' accounts and so on, with the purpose to benefit from the loss of telecommunication operator, provider of the service or user of the telephone network. From the definition we can conclude that there are many different frauds. We can divide them by two criteria. The first one is by the type of the fraud or the way of using of the network or service with the purpose to misuse. Similarly different methods of fraud are known with respect to the way of access to the network or service with the purpose to misuse. In the thesis the swindlers are seen as outliers in the set of all users of the telecommunications network. Huge CDR files, which include the metadata of calls, are analysed with data mining. While doing experimental work, we face many challenges, such as unusual time formats, missing values, huge data bases, reduction of the dimension, time complexity and difficulties with distinguishing the normal and fraudulent behaviour. We search for potential swindlers with k-means and LOF methods.

Keywords:fraud detection, detection of outliers, large datasets, data mining, clustering, modeling

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back