IEEE Transactions on Software Engineering - Special issue on computer security and privacy
A survey of intrusion detection techniques
Computers and Security
Hancock: a language for extracting signatures from data streams
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining
Efficient identification of Web communities
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining
Data Mining and Knowledge Discovery
Surfing Wavelets on Streams: One-Pass Summaries for Approximate Aggregate Queries
Proceedings of the 27th International Conference on Very Large Data Bases
One-Pass Wavelet Decompositions of Data Streams
IEEE Transactions on Knowledge and Data Engineering
Data streams: algorithms and applications
Foundations and Trends® in Theoretical Computer Science
Applying a user-centered metric to identify active blogs
CHI '07 Extended Abstracts on Human Factors in Computing Systems
Entropy of search logs: how hard is search? with personalization? with backoff?
WSDM '08 Proceedings of the 2008 International Conference on Web Search and Data Mining
An Economic Model of Click Fraud in Publisher Networks
International Journal of Electronic Commerce
An Economic Model of Click Fraud in Publisher Networks
International Journal of Electronic Commerce
Visualizing "typical" and "exotic" Internet traffic data
Computational Statistics & Data Analysis
Modelling call detail records from a mobile telecommunications network
ASM '07 The 16th IASTED International Conference on Applied Simulation and Modelling
Toward user patterns for online security: Observation time and online user identification
Decision Support Systems
Tracking hidden groups using communications
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
Web user behavioral profiling for user identification
Decision Support Systems
A data mining framework for detecting subscription fraud in telecommunication
Engineering Applications of Artificial Intelligence
Finding social roles in Wikipedia
Proceedings of the 2011 iConference
Using predictable mobility patterns to support scalable and secure MANETs of handheld devices
MobiArch '11 Proceedings of the sixth international workshop on MobiArch
Unsupervised clustering of multidimensional distributions using earth mover distance
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Applying user signatures on fraud detection in telecommunications networks
ICDM'11 Proceedings of the 11th international conference on Advances in data mining: applications and theoretical aspects
A prescription fraud detection model
Computer Methods and Programs in Biomedicine
Establishing fraud detection patterns based on signatures
ICDM'06 Proceedings of the 6th Industrial Conference on Data Mining conference on Advances in Data Mining: applications in Medicine, Web Mining, Marketing, Image and Signal Mining
Stock fraud detection using peer group analysis
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
A survey on fraud and service misuse in voice over IP (VoIP) networks
Information Security Tech. Report
Analyzing the composition of cities using spatial clustering
Proceedings of the 2nd ACM SIGKDD International Workshop on Urban Computing
Hi-index | 0.01 |
We have been developing signature-based methods in the telecommunications industry for the past 5 years. In this paper, we describe our work as it evolved due to improvements in technology and our aggressive attitude toward scale. We discuss the types of features that our signatures contain, nuances of how these are updated through time, our treatment of outliers, and the trade-off between time-driven and event-driven processing. We provide a number of examples, all drawn from the application of signatures to toll fraud detection.