Abstract
Abstract
Pijush Kanti Kumar, Uses Supervised High accuracy (99%) Potential issues with
Samrat Ray, Intelligent Learning with k-NN and SVM; generalization; may require
Lakshmanan Kumar Algorithms to detect early detection of scam significant computational
Sankaralingam, scam calls, training calls; helps protect resources for real-time
Athilingam models on 5925 data innocent people from processing; the applicability
Ramamoorthy, points and comparing fraud; employs NLP may be region-specific.
Padmanabhan the performance of techniques for data
Kumar, Anurag Dutta various ML algorithms. preprocessing to achieve
higher accuracy.
Haolin Li, Shuyang Introduces a new fraud Provides top Can be complex to
Jiang, Lifeng Zhang, detection method called performance on fraud implement; may need a lot of
Siyuan Du, RAGFormer, which uses detection tasks; captures computing power; might not
Guangnan Ye, a combination of two both the meaning and work as well if the data is
Hongfeng Chai techniques: a structure of data missing important details.
Transformer to effectively; works well
understand semantic on real-world credit card
features and a Graph fraud detection.
Neural Network (GNN)
to understand the
structure of the data.
Rizik Al-Sayyed, Emphasizes the Improves accuracy and May require additional tools
Esra’a Alhenawi, importance of data efficiency in detecting and expertise for
Hadeel Alazzam, visualization in fraud fraud; helps identify visualization; might not
Ala’a Wrikat & Dima detection. Analyzes the issues early; enhances address all types of fraud if
Suleiman PAYSIM dataset to understanding of data used alone.
show how visualizing patterns and anomalies.
data can help identify
anomalies and assess
data suitability before
deeper investigation.
Main Idea Advantages Disadvantages
Author Name
Birhanu, Misrak The research focuses on The model offers near However, it is complex
developing a near real- real-time SIM-box to implement, requiring
time model to detect SIM- fraud detection with extensive setup, and
box fraud in Ethio 100% accuracy and focuses mainly on
Telecom by analyzing comprehensive data Random Forest and
Call Detail Records analysis, enhancing Neural Networks,
(CDRs) using machine fraud detection. limiting algorithm
learning. The data is diversity.
preprocessed and stored in
a SQL Server, with
Random Forest and
Neural Networks
achieving 100% accuracy
in detecting fraudulent
subscribers.
Viktoras The paper focuses on The study uses The approach relies on
Chadyšas, identifying suspicious univariate outlier univariate methods,
Andrej Bugajev, customers with potential detection methods to which may not capture
Rima Kriauzienė fraudulent behavior in pinpoint unusual complex fraud patterns,
& mobile virtual network customer behavior, and requires setting
Olegas operators (MVNOs) by providing specific appropriate threshold
Vasilecas applying univariate outlier attributes and threshold values, which could
detection methods to call values that help potentially lead to false
detail records and compile lists of positives or missed
payment data, with a goal suspicious users and fraud cases.
of supporting fraud support fraud detection
experts in customer efforts.
evaluation.
Main Idea Advantages Disadvantages
Author Name
Fatema Tuz The study addresses the The research The study's focus on
Johora, Rakibul challenge of detecting demonstrates the machine learning
Hasan, Sayeda banking fraud in the effectiveness of models requires careful
Farjana Farabi, digital era by employing machine learning implementation and
machine learning models, such as logistic fine-tuning, and the
Jahanara Akter,
algorithms to analyze regression and decision reliance on algorithms
Md Abdullah fraudulent transactions, trees, in detecting may not fully address
Al Mahmud emphasizing the banking fraud with high all cyber threats or
limitations of traditional accuracy and AUC adapt to rapidly
rule-based methods and values, enhancing fraud evolving fraud tactics.
the impact of increased detection capabilities
online activity during the and security in the
COVID-19 pandemic. financial sector.
Zagroz Aziz The study focuses on The use of K-means The study relies on
and Robert enhancing mobile network clustering on CDR data historical CDR data and
Bestak security by using K-means achieves 96% accuracy may not fully account
clustering to analyze call in anomaly detection, for rapidly evolving
detail records (CDRs) for providing a scalable threats or emerging
anomaly detection and and efficient approach patterns, potentially
prediction, aiming to to enhance network limiting its adaptability
identify hidden patterns reliability and security, to new security
and improve proactive particularly for 5G challenges.
security measures. networks.
Biresh Kumar; The research develops a The system aims to The continuous
Shivam Kumar comprehensive fraud balance precision and evolution of fraud
Gupta; detection and prevention recall, reducing false tactics requires ongoing
Manorama system using advanced positives and negatives, adaptation of the
ML techniques in Python, and highlights the system, and the
Patnaik
addressing fraud across versatility of machine effectiveness of the
several domains by learning in tackling approach may be
focusing on data fraud across various limited by the need for
processing, model industries. constant updates and
training, and real-time integration of new
integration. methods.
Existing system
Real-time detection of fraudulent telephone calls is a critical aspect
of protecting individuals and businesses from scams, phishing, and
other malicious activities. Various systems and technologies have
been developed to address this issue, particularly in the
telecommunications and financial sectors. Here are some of the
existing systems and approaches for real-time detection of
fraudulent telephone calls:
1. STIR/SHAKEN Framework
Description: STIR (Secure Telephone Identity Revisited) and
SHAKEN (Signature-based Handling of Asserted information using
tokens) are frameworks developed to combat caller ID spoofing in
real-time. They ensure that the caller ID information displayed
during a call is verified by the originating carrier.
Examples:
3. Voice Biometrics
Description: Voice biometrics systems analyze a caller’s voice
characteristics in real-time to authenticate their identity. These
systems are often used by banks and call centers to prevent fraud.
Examples:
Nuance Gatekeeper: A voice biometric system that verifies users
in real-time based on their voice, reducing the risk of identity fraud.
Examples:
Examples:
Examples:
Hiya: Provides real-time call screening, blocking, and fraud
detection for mobile carriers and users by analyzing call data and
applying machine learning.
Truecaller: A widely used app that identifies and blocks spam and
fraudulent calls in real-time, relying on crowdsourced data and real-
time reporting.
Examples:
Key Components:
Proposed Enhancements:
Integrating voice biometrics or natural language processing
(NLP) techniques to analyse speech patterns.
Implementing a feedback loop for continuous learning from
new fraud data.
By combining these elements, your system could outperform
many existing solutions, particularly in environments requiring
real-time, accurate fraud detection tailored to specific use
cases.
Conclusion
1. Proposed fraud detection system offers several
compelling advantages over existing solutions. By
leveraging machine learning models such as
Random Forest and XGBoost, your system
effectively handles large datasets and complex
patterns, providing high accuracy in identifying
fraudulent calls. The real-time detection capability
ensures that suspicious activities are flagged
immediately, enhancing response times and
reducing potential fraud losses.
References
3. Voice Biometrics:
C. J. H. Hayes and J. P. G. Perrett, "Voice Biometrics for
Authentication," IEEE Transactions on Audio, Speech, and
Language Processing, vol. 20, no. 2, pp. 430-440, 2012.
M. M. S. Sharma and G. K. B. Singh, "Voice Authentication
Systems: A Review," International Journal of Computer
Applications, vol. 95, no. 11, pp. 39-43, 2014.
4. STIR/SHAKEN Framework: