首页> 外文学位 >Securing Large Cellular Networks via A Data Oriented Approach: Applications to SMS Spam and Voice Fraud Defenses.
【24h】

Securing Large Cellular Networks via A Data Oriented Approach: Applications to SMS Spam and Voice Fraud Defenses.

机译:通过面向数据的方法保护大型蜂窝网络:SMS垃圾邮件和语音欺诈防御的应用。

获取原文
获取原文并翻译 | 示例

摘要

In this thesis, we share our experience and approach in building operational defense systems against SMS spam and voice fraud in large-scale cellular networks. Our approach is data oriented, i.e., we collect real data from a large national cellular network and exert significant efforts in analyzing and making sense of the data, especially to understand the characteristics of fraudsters and the communication patterns between fraudsters and victims. On top of the data analysis results, we can identify the best predictive features that can alert us of emerging fraud activities. Usually, these features represent unwanted communication patterns which are derived from the original feature space. Using these features, we apply advanced machine learning techniques to train accurate detection models. To ensure the validity of the proposed approaches, we build and deploy the defense systems in operational cellular networks and carry out both extensive off-line evaluation and long-term online trial. To evaluate the system performance, we adopt both direct measurement using known fraudster blacklist provided by fraud agents and indirect measurement by monitoring the change of victim report rates. In both problems, the proposed approaches demonstrate promising results which outperform customer feedback based defenses that have been widely adopted by cellular carriers today.;More specifically, using a year (June 2011 to May 2012) of user reported SMS spam messages together with SMS network records collected from a large US based cellular carrier, we carry out a comprehensive study of SMS spamming. Our analysis shows various characteristics of SMS spamming activities. and also reveals that spam numbers with similar content exhibit strong similarity in terms of their sending patterns, tenure, devices and geolocations. Using the insights we have learned from our analysis, we propose several novel spam defense solutions. For example, we devise a novel algorithm for detecting related spam numbers. The algorithm incorporates user spam reports and identifies additional (unreported) spam number candidates which exhibit similar sending patterns at the same network location of the reported spam number during the nearby time period. The algorithm yields a high accuracy of 99.4% on real network data. Moreover, 72% of these spam numbers are detected at least 10 hours before user reports.;From a different angle, we present the design of Greystar, a defense solution against the growing SMS spam traffic in cellular networks. By exploiting the fact that most SMS spammers select targets randomly from the finite phone number space, Greystar monitors phone numbers from the gray phone space (which are associated with data only devices like data cards and modems and machine-to-machine communication devices like point-of-sale machines and electricity meters) to alert emerging spamming activities. Greystar employs a novel statistical model for detecting spam numbers based on their footprints on the gray phone space. Evaluation using five month SMS call detail records from a large US cellular carrier shows that Greystar can detect thousands of spam numbers each month with very few false alarms and 15% of the detected spam numbers have never been reported by spam recipients. Moreover, Greystar is much faster than victim spam reports. By deploying Greystar we can reduce 75% spam messages during peak hours.;To defend against voice-related fraud activities, we develop a novel methodology for detecting voice-related fraud activities using only call records. More specifically, we advance the notion of voice call graphs to represent voice calls from domestic callers to foreign recipients and propose a Markov Clustering based method for isolating dominant fraud activities from these international calls. Using data collected over a two year period from one of the largest cellular networks in the US, we evaluate the efficacy of the proposed fraud detection algorithm and conduct systematic analysis of the identified fraud activities. Our work sheds light on the unique characteristics and trends of fraud activities in cellular networks, and provides guidance on improving and securing hardware/software architecture to prevent these fraud activities. (Abstract shortened by UMI.).
机译:在本文中,我们分享了在大型蜂窝网络中构建针对SMS垃圾邮件和语音欺诈的操作防御系统的经验和方法。我们的方法是面向数据的,即我们从大型国家蜂窝网络中收集真实数据,并在分析和理解数据方面做出了巨大的努力,尤其是了解欺诈者的特征以及欺诈者与受害者之间的通信方式。在数据分析结果的基础上,我们可以确定最佳预警功能,这些功能可以提醒我们新出现的欺诈活动。通常,这些特征表示从原始特征空间派生的不需要的通信模式。利用这些功能,我们应用了先进的机器学习技术来训练准确的检测模型。为确保所提出方法的有效性,我们在运营蜂窝网络中构建和部署了防御系统,并进行了广泛的离线评估和长期在线试验。为了评估系统性能,我们采用了由欺诈代理提供的已知欺诈者黑名单进行的直接测量,以及通过监视受害者报告率的变化进行的间接测量。在这两个问题中,所提出的方法均显示出令人鼓舞的结果,其效果优于今天已被蜂窝运营商广泛采用的基于客户反馈的防御措施。更具体地说,使用一年(2011年6月至2012年5月)的用户报告的SMS垃圾邮件消息和SMS网络从一家大型美国蜂窝运营商收集的记录中,我们对SMS垃圾邮件进行了全面研究。我们的分析显示了SMS垃圾邮件活动的各种特征。并且还发现,内容相似的垃圾邮件在发送方式,使用期限,设备和地理位置方面都具有高度相似性。利用我们从分析中学到的见解,我们提出了几种新颖的垃圾邮件防御解决方案。例如,我们设计了一种用于检测相关垃圾邮件数量的新颖算法。该算法合并了用户垃圾邮件报告,并标识了其他(未报告)的垃圾邮件号码候选者,这些候选者在附近的时间段内在所报告的垃圾邮件号码的相同网络位置处呈现出相似的发送模式。该算法在真实网络数据上产生99.4%的高精度。此外,这些垃圾邮件数量的72%在用户报告之前至少10小时被检测到。从另一个角度来看,我们提出了Greystar的设计,这是一种针对蜂窝网络中不断增长的SMS垃圾邮件流量的防御解决方案。通过利用大多数SMS垃圾邮件发送者从有限的电话号码空间中随机选择目标这一事实,Greystar从灰色电话空间中监视电话号码(灰色电话空间与仅数据设备(如数据卡和调制解调器以及点对点的机器对机器通信设备相关联)销售机器和电表)来提醒新出现的垃圾邮件活动。 Greystar采用了一种新颖的统计模型,可以根据垃圾邮件在灰色电话空间上的足迹来检测垃圾邮件的数量。使用来自一家大型美国移动运营商的五个月SMS通话详细记录进行的评估显示,Greystar每月可以检测到数千个垃圾邮件,而很少有错误警报,并且垃圾邮件接收者从未报告过检测到的垃圾邮件号码的15%。此外,Greystar比受害者的垃圾邮件报告要快得多。通过部署Greystar,我们可以在高峰时段减少75%的垃圾邮件。为了防御与语音相关的欺诈活动,我们开发了一种新颖的方法来仅使用呼叫记录来检测与语音相关的欺诈活动。更具体地说,我们提出了语音呼叫图的概念,以表示从国内呼叫者到外国接收者的语音呼叫,并提出了一种基于马尔可夫聚类的方法,用于从这些国际呼叫中隔离主要欺诈活动。使用两年来从美国最大的蜂窝网络之一收集的数据,我们评估了所提出的欺诈检测算法的功效,并对所发现的欺诈活动进行了系统分析。我们的工作揭示了蜂窝网络中欺诈活动的独特特征和趋势,并提供了有关改进和保护硬件/软件体系结构以防止这些欺诈活动的指导。 (摘要由UMI缩短。)。

著录项

  • 作者

    Jiang, Nan.;

  • 作者单位

    University of Minnesota.;

  • 授予单位 University of Minnesota.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2013
  • 页码 117 p.
  • 总页数 117
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号