Intrusion detection for distributed applications
Communications of the ACM
Security and Privacy: Promising Advances
IEEE Software
CONPAR 94 - VAPP VI Proceedings of the Third Joint International Conference on Vector and Parallel Processing: Parallel Processing
Safety and security of programmable network infrastructures
IEEE Communications Magazine
Security and fraud detection in mobile and wireless networks
Handbook of wireless networks and mobile computing
Behavior-based intrusion detection in mobile phone systems
Journal of Parallel and Distributed Computing - Problems in parallel and distributed computing: Solutions based on evolutionary paradigms
Strategies for enhancing routing security in protocols for mobile ad hoc networks
Journal of Parallel and Distributed Computing - Special issue on Routing in mobile and wireless ad hoc networks
Intrusion detection techniques for mobile wireless networks
Wireless Networks
An artificial immune based intrusion detection model for computer and telecommunication systems
Parallel Computing - Special issue: Parallel and nature-inspired computational paradigms and applications
Expert Systems with Applications: An International Journal
A survey on fraud and service misuse in voice over IP (VoIP) networks
Information Security Tech. Report
Hi-index | 0.00 |
With the increasing popularity of wireless and mobile networks, and the needs in the rapidly changing telecommunications industry, the security issue for mobile users could be even more serious than we expect. In this paper, we present an on-line security system for fraud detection of impostors and improper use of mobile phone operations based on a neural netw ork classifier, It acts solely on the recent information and past history of the mobile phone owner activities, and classifies the telephone users into classes according to their usage logs. Such logs contain the relevant characteristics for every call made by the user. As soon as the system identifies a fraud, it notifies both the carrier telecom and the victim about it immediately and not at the end of the monthly bill cycle. In our implementation, we make use of Kohonen model because of its simplicity and its flexibility to adapt to pattern changes. Our results indicate that our system reduces significantly the telecom carrier's profit losses as well as the damage that might be passed to the clients. This might help the carriers to reduce significantly the cost of phone calls and will turn to the users' advantage.