SlideShare a Scribd company logo
Copyright © Wondershare Software

www.wondershare.com
• Introduction
• Problem Understanding
• Data Understanding
• Course of Action

Copyright © Wondershare Software
• A telecom company named as Bad
Idea is expecting for fraudsters.
• They designed a weird rate plan
called Praxis plan where only four
calls are allowed during a day.
• Bad Idea has their call logs
spanning over one and half
months.

Copyright © Wondershare Software
• Two datasets are given:


Blacklist subscribers call log



Audited call log

• No of rows: 138
• Call timing:
•

Morning- 9AM to Noon

•

Afternoon- Noon to 4PM

•

Evening- 4PM to 9PM

•

Night- 9PM to Midnight

•

Callers: Virginia, Sally, Vince

•

Tool Used: Rapidminer & R
Copyright © Wondershare Software
•

A gang of fraudsters consist of three
people: Sally, Virginia & Vince targeted
the company.

•

There subscriptions were terminated.

•

The audit is done every 5 days to keep on
track for the fraudsters.

•

They reviewed the list of subscribers who
have made calls to the same people & in
the same time frame as those fraudsters.

Copyright © Wondershare Software
•

Algorithm: Naïve Bayesian Classifier

•

Import the data using read csv

Copyright © Wondershare Software
•

Use Split validation, it splits up the example set into a training and test
set and evaluates the model. 70% of data is used as training sample &
rest 30% is development set.

•

The first inner operator accept an Training Set while the second accept an
Test Set and the output of the first (which is in most cases a Model) and
produce a Performance Vector. Here in the first inner Naïve Bayes is used.

Copyright © Wondershare Software
•

The audit data set is imported using Read csv.

•

“Select Attributes” is applied to remove the unwanted attributes.

Copyright © Wondershare Software
•

“Apply Model” operator is used to apply the model to the training
data. The information is used to predict the value of possibly
unknown label.

•

All needed parameters are stored within the model object.

Copyright © Wondershare Software
•

Output with the probabilities of callers.

Copyright © Wondershare Software
Import the data
By using the Sampling
method divided the
dataset into train test
data

Develop the
model
Applied the model
on Test data

Applied the model
on the Audit log
set

Copyright © Wondershare Software

Converted the
predictability into
percentage
•

Import the data and convert the data into the train and test
sample:

Copyright © Wondershare Software
•

All the data which contain in the train dataset:
Dda

Copyright © Wondershare Software
•

Develop the Model using the train data set:

Copyright © Wondershare Software
•

Probability of the Caller and Predict on the test Data:

Copyright © Wondershare Software
•

Probability as per the test data and applied on the Audit Log set data and
converted in to percentage :

Copyright © Wondershare Software
ID

Morning
491 Robert
61 Quentin
703 Quentin
996 Quentin
173 Robert
575 Kelly
365 Larry
967 Mark
650 Nancy
165 Olga
557 Robert
808 Quentin
936 Robert
836 Kelly
976 Robert

Company Logo

AfternoonEvening
John
David
George David
George David
John
Emily
George Frank
John
David
John
David
George Frank
Harry
Frank
Harry
Frank
John
Frank
George David
George David
Harry
Frank
George Frank

Night
Alex
Alex
Beth
Alex
Alex
Clark
Clark
Clark
Clark
Clark
Clark
Beth
Alex
Clark
Alex

Customer
Customer X
Customer X
Customer X
Customer X
Customer X
Customer Y
Customer Y
Customer Y
Customer Y
Customer Y
Customer Z
Customer Z
Customer Z
Customer Z
Customer Z

Probable Fraudster
Vince
Sally
Sally
Vince
Vince
Vince
Vince
Virginia
Virginia
Virginia
Virginia
Sally
Vince
Virginia
Vince

Copyright © Wondershare Software

Probability
0.96
0.94
0.81
0.50
0.57
0.72
0.66
0.87
0.98
0.81
0.70
0.81
0.94
0.62
0.57
Copyright © Wondershare Software

More Related Content

PDF
Raf final cy
PDF
Product Assurance Guideliness For Telecom
PDF
Revenue assurance 101
PPTX
10 Ways to Stop Service Revenue Leakage
PDF
Revenue assurance 102
PDF
Telecom reporting training
PPTX
Tradeshift Supplier Management - Live Demo
PDF
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...
Raf final cy
Product Assurance Guideliness For Telecom
Revenue assurance 101
10 Ways to Stop Service Revenue Leakage
Revenue assurance 102
Telecom reporting training
Tradeshift Supplier Management - Live Demo
Revenue Assurance Industry Update - Webinar by Dr. Gadi Solotorevsky, cVidya'...

What's hot (20)

PDF
Ten Tips to Ensue that Your Suppliers are Real
PDF
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
PDF
Building Your Business Case for P2P Automation
PPT
P2P in 2020 - The Push for Supplier Self-Service
PPTX
Tradeshift, Hackett Group & sharedserviceslink - P2P Webinar
PDF
A Proactive Approach to Supplier Onboarding
PPTX
5 Proven Strategies for Working Capital
PPTX
Supplier Information and Lifecycle Management
PPTX
Top P2P Trends in 2016
PPTX
5 ways to accelerate supplier onboarding
PPTX
The Art of Supplier Onboarding
PPTX
Fact or Fiction – You Can Manage All Your Supplier Information, Transactions ...
PPTX
Accounts Payable Trends 2017: The Process and Technology of AP Invoices | Sep...
PPTX
Perfect Your Touchless Invoicing
PPTX
Integrated Order to Cash (O2C) Automation Software for Global Shared Services...
PPT
KHMS profile
PPTX
Boost your bottom line and supply chain health
PPTX
2019-05 Maximize Your Revenue with 3 Key Medical Billing KPIs
PDF
Driving a Supplier Responsibility Agenda that Your CEO Would be Proud Of
PPTX
Fixing the Broken Promise of eProcurement
Ten Tips to Ensue that Your Suppliers are Real
Revenue Assurance, Fraud Reduction and Cost Managment in Telecoms Conference
Building Your Business Case for P2P Automation
P2P in 2020 - The Push for Supplier Self-Service
Tradeshift, Hackett Group & sharedserviceslink - P2P Webinar
A Proactive Approach to Supplier Onboarding
5 Proven Strategies for Working Capital
Supplier Information and Lifecycle Management
Top P2P Trends in 2016
5 ways to accelerate supplier onboarding
The Art of Supplier Onboarding
Fact or Fiction – You Can Manage All Your Supplier Information, Transactions ...
Accounts Payable Trends 2017: The Process and Technology of AP Invoices | Sep...
Perfect Your Touchless Invoicing
Integrated Order to Cash (O2C) Automation Software for Global Shared Services...
KHMS profile
Boost your bottom line and supply chain health
2019-05 Maximize Your Revenue with 3 Key Medical Billing KPIs
Driving a Supplier Responsibility Agenda that Your CEO Would be Proud Of
Fixing the Broken Promise of eProcurement
Ad

Viewers also liked (20)

PDF
Fraud in Telecoms
DOCX
Frauds in telecom sector
PPT
Telecom Fraud Detection - Naive Bayes Classification
PPTX
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
PPTX
International Revenue Share Fraud webinar
PDF
Types of telecom fraud
PDF
Valutazione Delle Capacità Predittive di un FMS
PDF
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
PDF
Subscription fraud analytics using classification
PDF
Fraud Management System - ISACA
PPTX
FraudStrike
PDF
Reveneu frauds and telcos
PPTX
IRSF Protection with PRISM
PPTX
FraudStrike Bringing IRSF Under Control
PPT
Ff46 45 irsf_ic_283762
PPTX
Sim box fraud
PPTX
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
PPTX
Q1 2016 Fraud Detection, Prevention & Risk Management
PDF
Detecting fraud in cellular telephone networks
PDF
Fraud Management Industry Update Webinar by cVidya
Fraud in Telecoms
Frauds in telecom sector
Telecom Fraud Detection - Naive Bayes Classification
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
International Revenue Share Fraud webinar
Types of telecom fraud
Valutazione Delle Capacità Predittive di un FMS
Implementare il paradigma Software-Defined Networking utilizzando OpenFlow sw...
Subscription fraud analytics using classification
Fraud Management System - ISACA
FraudStrike
Reveneu frauds and telcos
IRSF Protection with PRISM
FraudStrike Bringing IRSF Under Control
Ff46 45 irsf_ic_283762
Sim box fraud
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Q1 2016 Fraud Detection, Prevention & Risk Management
Detecting fraud in cellular telephone networks
Fraud Management Industry Update Webinar by cVidya
Ad

Similar to Telecom Fraud Detection (20)

PPTX
SANS CTI Summit 2016 Borderless Threat Intelligence
PPTX
Deteo. Data science, Big Data expertise
DOCX
School of Computer & Information SciencesITS-532 Cloud Com
PDF
Phishing Website Detection by Machine Learning Techniques Presentation.pdf
PDF
Using Data Science for Cybersecurity
PDF
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
PPTX
Zero Trust Model
PPTX
Crescendo
PPTX
HRTech Integration Masterclass Session 4 How to Expand Your Recruitment Datab...
PDF
Benefits of Cloud Software
PDF
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
PPTX
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
PPTX
Anomali Detect 2016 - Borderless Threat Intelligence
PDF
ThreadFix 2.1 and Your Application Security Program
PPTX
Voice of the Voter Webinar.pptx
PDF
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
PDF
Design and Development of an Efficient Malware Detection Using ML
PDF
How to Overcome the 5 Barriers to Production App Security Testing
PPTX
Harrier Success Stories
PDF
Harrier_Success-Stories
SANS CTI Summit 2016 Borderless Threat Intelligence
Deteo. Data science, Big Data expertise
School of Computer & Information SciencesITS-532 Cloud Com
Phishing Website Detection by Machine Learning Techniques Presentation.pdf
Using Data Science for Cybersecurity
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Toge...
Zero Trust Model
Crescendo
HRTech Integration Masterclass Session 4 How to Expand Your Recruitment Datab...
Benefits of Cloud Software
Rapid Fire Tools: Top Ways to Use IT Assessments to Win New Business & Grow
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Anomali Detect 2016 - Borderless Threat Intelligence
ThreadFix 2.1 and Your Application Security Program
Voice of the Voter Webinar.pptx
Giving your AppSec program the edge - using OpenSAMM for benchmarking and sof...
Design and Development of an Efficient Malware Detection Using ML
How to Overcome the 5 Barriers to Production App Security Testing
Harrier Success Stories
Harrier_Success-Stories

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PDF
Empathic Computing: Creating Shared Understanding
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
Empathic Computing: Creating Shared Understanding
cuic standard and advanced reporting.pdf
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Review of recent advances in non-invasive hemoglobin estimation
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Digital-Transformation-Roadmap-for-Companies.pptx

Telecom Fraud Detection

  • 1. Copyright © Wondershare Software www.wondershare.com
  • 2. • Introduction • Problem Understanding • Data Understanding • Course of Action Copyright © Wondershare Software
  • 3. • A telecom company named as Bad Idea is expecting for fraudsters. • They designed a weird rate plan called Praxis plan where only four calls are allowed during a day. • Bad Idea has their call logs spanning over one and half months. Copyright © Wondershare Software
  • 4. • Two datasets are given:  Blacklist subscribers call log  Audited call log • No of rows: 138 • Call timing: • Morning- 9AM to Noon • Afternoon- Noon to 4PM • Evening- 4PM to 9PM • Night- 9PM to Midnight • Callers: Virginia, Sally, Vince • Tool Used: Rapidminer & R Copyright © Wondershare Software
  • 5. • A gang of fraudsters consist of three people: Sally, Virginia & Vince targeted the company. • There subscriptions were terminated. • The audit is done every 5 days to keep on track for the fraudsters. • They reviewed the list of subscribers who have made calls to the same people & in the same time frame as those fraudsters. Copyright © Wondershare Software
  • 6. • Algorithm: Naïve Bayesian Classifier • Import the data using read csv Copyright © Wondershare Software
  • 7. • Use Split validation, it splits up the example set into a training and test set and evaluates the model. 70% of data is used as training sample & rest 30% is development set. • The first inner operator accept an Training Set while the second accept an Test Set and the output of the first (which is in most cases a Model) and produce a Performance Vector. Here in the first inner Naïve Bayes is used. Copyright © Wondershare Software
  • 8. • The audit data set is imported using Read csv. • “Select Attributes” is applied to remove the unwanted attributes. Copyright © Wondershare Software
  • 9. • “Apply Model” operator is used to apply the model to the training data. The information is used to predict the value of possibly unknown label. • All needed parameters are stored within the model object. Copyright © Wondershare Software
  • 10. • Output with the probabilities of callers. Copyright © Wondershare Software
  • 11. Import the data By using the Sampling method divided the dataset into train test data Develop the model Applied the model on Test data Applied the model on the Audit log set Copyright © Wondershare Software Converted the predictability into percentage
  • 12. • Import the data and convert the data into the train and test sample: Copyright © Wondershare Software
  • 13. • All the data which contain in the train dataset: Dda Copyright © Wondershare Software
  • 14. • Develop the Model using the train data set: Copyright © Wondershare Software
  • 15. • Probability of the Caller and Predict on the test Data: Copyright © Wondershare Software
  • 16. • Probability as per the test data and applied on the Audit Log set data and converted in to percentage : Copyright © Wondershare Software
  • 17. ID Morning 491 Robert 61 Quentin 703 Quentin 996 Quentin 173 Robert 575 Kelly 365 Larry 967 Mark 650 Nancy 165 Olga 557 Robert 808 Quentin 936 Robert 836 Kelly 976 Robert Company Logo AfternoonEvening John David George David George David John Emily George Frank John David John David George Frank Harry Frank Harry Frank John Frank George David George David Harry Frank George Frank Night Alex Alex Beth Alex Alex Clark Clark Clark Clark Clark Clark Beth Alex Clark Alex Customer Customer X Customer X Customer X Customer X Customer X Customer Y Customer Y Customer Y Customer Y Customer Y Customer Z Customer Z Customer Z Customer Z Customer Z Probable Fraudster Vince Sally Sally Vince Vince Vince Vince Virginia Virginia Virginia Virginia Sally Vince Virginia Vince Copyright © Wondershare Software Probability 0.96 0.94 0.81 0.50 0.57 0.72 0.66 0.87 0.98 0.81 0.70 0.81 0.94 0.62 0.57