Chandra et al., 2014 - Google Patents
Detection and Prevention of Premium Number Fraud in Mobile Computing.Chandra et al., 2014
- Document ID
- 4769158341865279957
- Author
- Chandra J
- Reddy M
- Ranjith G
- Publication year
- Publication venue
- International Journal of Advanced Research in Computer Science
External Links
Snippet
Abstract The Fraud Detection is identifying unauthorized use of Telecommunication. There are different types of call frauds and the SMS Frauds from premium numbers, which include Wangari Calls and Wangari Call Backs. A Research Conducted taking a Scenarios of …
- 238000001514 detection method 0 title abstract description 20
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/41—Billing record details, i.e. parameters, identifiers, structure of call data record [CDR]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Supervisory, monitoring, management, i.e. operation, administration, maintenance or testing arrangements
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/47—Fraud detection or prevention means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/80—Rating or billing plans; Tariff determination aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04Q—SELECTING
- H04Q3/00—Selecting arrangements
- H04Q3/0016—Arrangements providing connection between exchanges
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/32—Involving wireless systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/70—Administration or customization aspects; Counter-checking correct charges
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/24—Accounting or billing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M17/00—Prepayment of wireline communication systems, wireless communication systems or telephone systems
- H04M17/02—Coin-freed or check-freed systems, e.g. mobile- or card-operated phones, public telephones or booths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Metering, charging or billing arrangements specially adapted for data wireline or wireless communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/66—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7496345B1 (en) | Systems and methods for processing calls directed to telephones having a portable interface | |
| US20040203750A1 (en) | Transport of records of roaming usage of mobile telecommunications networks | |
| KR101059558B1 (en) | Voice phishing filtering system | |
| US20060206941A1 (en) | Communications system with distributed risk management | |
| US20250133167A1 (en) | Relationship graphs for telecommunication network fraud detection | |
| Rao et al. | Unblocking stolen mobile devices using SS7-MAP vulnerabilities: Exploiting the relationship between IMEI and IMSI for EIR access | |
| US6856982B1 (en) | System, intelligent network service engine and method for detecting a fraudulent call using real time fraud management tools | |
| US6801607B1 (en) | System and method for preventing fraudulent calls using a common billing number | |
| EP3366017B1 (en) | Detection method against charging fraud | |
| Macia-Fernandez et al. | Fraud in roaming scenarios: An overview | |
| Chandra et al. | Detection and Prevention of Premium Number Fraud in Mobile Computing. | |
| US9166885B2 (en) | Lawful identification of unknown terminals | |
| Cortesão et al. | Fraud management systems in telecommunications: a practical approach | |
| EP1701500A1 (en) | Communications system with distributed risk management | |
| US6590967B1 (en) | Variable length called number screening | |
| CN102572840B (en) | A kind of method utilizing monitoring signaling technology to differentiate novel malicious callback service | |
| Kala | A study on internet bypass fraud: national security threat | |
| Masrub et al. | Sim boxing problem: Almadar Aljadid case study | |
| Airn | Analysis and detection of SIM box | |
| US10291772B2 (en) | Telephony communications system for detecting abuse in a public telephone network | |
| Jacobs et al. | Telecommunications fraud | |
| EP1211863A2 (en) | Fraud management system and method for collecting and distributing fraudulent information to multiple network service providers | |
| Wong | Mobile phone fraud—Are GSM networks secure? | |
| Worku | Short Message Service Fraud Mitigation Taxonomy: The Case of ethio telecom | |
| TR201612555A1 (en) | A METHOD FOR DETERMINING FRAUD IN INTERNATIONAL TELECOM CALLS BY ANALYSIS OF DOMESTIC SEARCH RECORDS |