Isolating and analyzing fraud activities in a large cellular network via voice call graph analysis

  • Authors:
  • Nan Jiang;Yu Jin;Ann Skudlark;Wen-Ling Hsu;Guy Jacobson;Siva Prakasam;Zhi-Li Zhang

  • Affiliations:
  • University of Minnesota, Minneapolis, MN, USA;AT&T Labs, Florham Park, NJ, USA;AT&T Labs, Florham Park, NJ, USA;AT&T Labs, Florham Park, NJ, USA;AT&T Labs, Florham Park, NJ, USA;AT&T Labs, Florham Park, NJ, USA;University of Minnesota, Minneapolis, MN, USA

  • Venue:
  • Proceedings of the 10th international conference on Mobile systems, applications, and services
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

With widespread adoption and growing sophistication of mobile devices, fraudsters have turned their attention from landlines and wired networks to cellular networks. While security threats to wireless data channels and applications have attracted the most attention, voice-related fraud activities also represent a serious threat to mobile users. In particular, we have seen increasing numbers of incidents where fraudsters deploy malicious apps, e.g., disguised as gaming apps to entice users to download; when invoked, these apps automatically - and without users' knowledge - dial certain (international) phone numbers which charge exorbitantly high fees. Fraudsters also frequently utilize social engineering (e.g., SMS or email spam, Facebook postings) to trick users into dialing these exorbitant fee-charging numbers. In this paper, we develop a novel methodology for detecting voice-related fraud activities using only call records. More specifically, we advance the notion of voice call graphs to represent voice calls from domestic callers to foreign recipients and propose a Markov Clustering based method for isolating dominant fraud activities from these international calls. Using data collected over a two year period from one of the largest cellular networks in the US, we evaluate the efficacy of the proposed fraud detection algorithm and conduct systematic analysis of the identified fraud activities. Our work sheds light on the unique characteristics and trends of fraud activities in cellular networks, and provides guidance on improving and securing hardware/software architecture to prevent these fraud activities.