IEEE INFOCOM 2014 - IEEE Conference on Computer Communications 2014
DOI: 10.1109/infocom.2014.6848087
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and detection of SIMbox fraud in mobility networks

Abstract: Voice traffic termination fraud, often referred to as Subscriber Identity Module box (SIMbox) fraud, is a common illegal practice on mobile networks. As a result, cellular operators around the globe lose billions annually. Moreover, SIMboxes compromise the cellular network infrastructure by overloading local base stations serving these devices. This paper analyzes the fraudulent traffic from SIMboxes operating with a large number of SIM cards. It processes hundreds of millions of anonymized voice call detail r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
33
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(34 citation statements)
references
References 13 publications
1
33
0
Order By: Relevance
“…In fact, telecommunications was one of the first industries that adopted machine learning technologies due to the huge amount of high-quality data they store [67]. Most of the academic work in this field focus on applying machine learning on certain behavior patterns extracted from CDRs to detect: subscription fraud [30], [32], account takeover [33], [34], [55], simbox fraud [28], [43] and voice spam [41]. As each fraud type exhibit different call patterns, features used in these previous work varies.…”
Section: Related Workmentioning
confidence: 99%
“…In fact, telecommunications was one of the first industries that adopted machine learning technologies due to the huge amount of high-quality data they store [67]. Most of the academic work in this field focus on applying machine learning on certain behavior patterns extracted from CDRs to detect: subscription fraud [30], [32], account takeover [33], [34], [55], simbox fraud [28], [43] and voice spam [41]. As each fraud type exhibit different call patterns, features used in these previous work varies.…”
Section: Related Workmentioning
confidence: 99%
“…(4) Classifier---Immune Algorithm [14]: (5) The introduction of the artificial immune system originated in Japan in December 1996, it was the first time that an international symposium based on the immune system was held in Japan. Inspired by the biological immune system, the concept of the "Artificial Immune System" (AIS) was first proposed.…”
Section: Principle Of Algorithmmentioning
confidence: 99%
“…For example, if a SIM card constantly makes large volumes of calls, makes calls to a large number of different destinations, or never moves out of a cell, then it is likely to be on a SIM box. Murynets et al [26] built a predictive model based on decision trees using more than 40 different features. They however do not report the final classification rules perhaps due to the same reasons mentioned above.…”
Section: B) Sim Box Detectionmentioning
confidence: 99%
“…Murynets et al . [26] built a predictive model based on decision trees using more than 40 different features. They however do not report the final classification rules perhaps due to the same reasons mentioned above.…”
Section: Use Casesmentioning
confidence: 99%