Clustering of telecommunications user profiles for fraud detection and security enhancement in large corporate networks: a case study

Απόθεσις

 

Εμφάνιση απλής εγγραφής

dc.contributor.author Hilas, Constantinos S.
dc.contributor.author Mastorocostas, Paris A.
dc.contributor.author Rekanos, Ioannis T.
dc.date.accessioned 2015-06-16T14:35:34Z
dc.date.available 2015-06-16T14:35:34Z
dc.date.issued 2015-07-01
dc.identifier.other http://www.naturalspublishing.com/files/published/ec1497291c9mqn.pdf el
dc.identifier.uri http://apothesis.teicm.gr/xmlui/handle/123456789/1320
dc.description.abstract A user’s transactions with modern networks and services produce a vast amount of user related data. The byproduct of every phone call a person makes or every web page one visits is translated into a log record with usage data. By studying these log records, the user’s behavior is revealed and one may come up with clues about user preferences, identify security issues, or discover fraudulent use of the network or the service one provides. Thus, the modeling of network users’ behavior may serve as an invaluable tool for the IT manager. In this paper, many of these issues are discussed and emphasis is given on the construction of appropriate user behavior representation in telecommunications. As an example, the application of two clustering techniques is presented, with the task to identify appropriate user behavior representations (profiles) inside a large organization’s telecommunications network, in order to spot fraudulent usage. Through this study a researcher and/or the organization’s network manager may gain more insight into the problems of user profiling and fraud detection. en
dc.format.extent 10 el
dc.language.iso en el
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές *
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/4.0/ *
dc.title Clustering of telecommunications user profiles for fraud detection and security enhancement in large corporate networks: a case study en
dc.type Άρθρο σε επιστημονικό περιοδικό el
dc.identifier.doi 10.12785/amis/090407
dc.publication.category Δημοσίευση ανοιχτής πρόσβασης el
dc.relation.journal Applied Mathematics & Information Scienses;Vol. 9, Iss. 4
dc.subject.keyword User profiling el
dc.subject.keyword Clustering applications el
dc.subject.keyword Data mining el
dc.subject.keyword Fraud detection el
dc.subject.keyword Telecommunications el


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Τύπος Προβολή

Δεν υπάρχουν αρχεία που να σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στις ακόλουθες συλλογές

Εμφάνιση απλής εγγραφής

Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές