An Experimental Analysis of Fraud Detection Methods in Enterprise Telecommunication Data using Unsupervised Outlier Ensembles

被引:0
|
作者
Kaiafas, Georgios [1 ]
Hammerschmidt, Christian [1 ]
State, Radu [1 ]
Nguyen, Cu D. [2 ]
Ries, Thorsten [2 ]
Ourdane, Mohamed [2 ]
机构
[1] Univ Luxembourg, SnT, Luxembourg, Luxembourg
[2] POST Luxembourg, Luxembourg, Luxembourg
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work uses outlier ensembles to detect fraudulent calls in telephone communication logs made on the network of POST Luxembourg. Outlier detection on high-dimensional data is challenging and developing an approach which is robust enough is of paramount importance to automatically identify unexpected events. For use in real-world business applications it is important to obtain a robust detection method, i.e. a method that can perform well on different types of data, to ensure that the method will not impact that business in unexpected ways. Many factors affect the robustness of an outlier detection approach and this experimental analysis exposes these factors in the context of outlier ensembles using feature bagging. Real-world problems demand knowledge about possible candidate approaches that address the problem, and decide for the best performing method using a train-test split of labeled data. In the unsupervised setup the knowledge about performance is missing during the learning phase thus is difficult to decide during that phase. Hence, in this setup it is important to know about how the performance is affected before the learning phase. Hence, this analysis demonstrates that despite the collective power of outlier ensembles they are still affected by i) data normalization schemes, ii) combination functions iii) outlier detection algorithms.
引用
收藏
页码:37 / 42
页数:6
相关论文
共 50 条
  • [21] Perspective analysis of telecommunication fraud detection using data stream analytics and neural network classification based data mining
    Jain V.
    International Journal of Information Technology, 2017, 9 (3) : 303 - 310
  • [22] Data mining application to healthcare fraud detection: a two-step unsupervised clustering method for outlier detection with administrative databases
    Michela Carlotta Massi
    Francesca Ieva
    Emanuele Lettieri
    BMC Medical Informatics and Decision Making, 20
  • [23] Building outlier detection ensembles by selective parameterization of heterogeneous methods☆
    Mukhriya, Akanksha
    Kumar, Rajeev
    PATTERN RECOGNITION LETTERS, 2021, 146 : 126 - 133
  • [24] Anomaly Detection using Unsupervised Methods: Credit Card Fraud Case Study
    Rezapour, Mahdi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 1 - 8
  • [25] Unsupervised Feature Selection for Outlier Detection in Categorical Data using Mutual Information
    Suri, N. N. R. Ranga
    Murty, M. Narasimha
    Athithan, G.
    2012 12TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), 2012, : 253 - 258
  • [26] Unsupervised Outlier Detection Mechanism for Tea Traceability Data
    Yang, Honggang
    Li, Shaowen
    Tu, Lijing
    Ma, Rongrong
    Chen, Yin
    IEEE ACCESS, 2022, 10 : 94818 - 94831
  • [27] An outlier ensemble for unsupervised anomaly detection in honeypots data
    Boukela, Lynda
    Zhang, Gongxuan
    Bouzefrane, Samia
    Zhou, Junlong
    INTELLIGENT DATA ANALYSIS, 2020, 24 (04) : 743 - 758
  • [28] Benchmarking Unsupervised Outlier Detection with Realistic Synthetic Data
    Steinbuss, Georg
    Boehm, Klemens
    ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA, 2021, 15 (04)
  • [29] Fraud Detection of Medical Insurance Employing Outlier Analysis
    Peng, Jinfeng
    Li, Qingzhong
    Li, Hui
    Liu, Lei
    Yan, Zhongmin
    Zhang, Shidong
    PROCEEDINGS OF THE 2018 IEEE 22ND INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN ((CSCWD)), 2018, : 341 - 346
  • [30] Detection of Wangiri Telecommunication Fraud Using Ensemble Learning
    Arafat, Mais
    Qusef, Abdallah
    Sammour, George
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 330 - 335