[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3565477.3569161acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
extended-abstract

Simulating SIMBox frauds for detection investigation

Published: 06 December 2022 Publication History

Abstract

SIMBox fraud is one of the most prevalent scams in cellular networks that cause a significant monetary loss to mobile operators. It consists of diverting international voice traffic from regulated routes and rerouting it as local calls in the destination country. SIMBox fraud mitigation is challenging as it requires knowledge from both regular and fraudulent parties. This paper identifies and addresses such challenges through the realistic design of a simulator, i.e., FraudSIM, enabling the generation of datasets enriched with regular and multiple fraudulent strategies-induced behaviors.

References

[1]
M. R. AlBougha. 2016. Comparing Data Mining Classification Algorithms in Detection of Simbox Fraud. Master's thesis. St. Cloud State University.
[2]
Communications Fraud Control Association. 2021. Fraud Loss Survey. Technical Report. https://cfca.org/wp-content/uploads/2021/12/CFCA-Fraud-Loss-Survey-2021-2.pdf
[3]
F. Ekman, A. Keränen, J. Karvo, and J. Ott. 2008. Working Day Movement Model. In Proceedings of ACM SIGMOBILE Mobility Models Workshop.
[4]
A. J. Kouam, A. C. Viana, and A. Tchana. 2021. SIMBox Bypass Frauds in Cellular Networks: Strategies, Evolution, Detection, and Future Directions. IEEE Communications Surveys & Tutorials 23, 4 (2021), 2295--2323.
[5]
Yves-Alexandre Montjoye, Cesar Hidalgo, Michel Verleysen, and Vincent Blondel. 2013. Unique in the Crowd: The Privacy Bounds of Human Mobility. Scientific reports 3 (03 2013), 1376.
[6]
R. Sallehuddin, S. Ibrahim, A. Zain, and A. Elmi. 2015. Detecting SIM Box Fraud by Using Support Vector Machine and Artificial Neural Network. In Jurnal Teknologi.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CoNEXT-SW '22: Proceedings of the 3rd International CoNEXT Student Workshop
December 2022
50 pages
ISBN:9781450399371
DOI:10.1145/3565477
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 December 2022

Check for updates

Author Tags

  1. CDRs
  2. cellular networks
  3. international bypass fraud

Qualifiers

  • Extended-abstract

Conference

CoNEXT '22
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 45
    Total Downloads
  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media