Detection and Prevention of Premium Number Fraud in Mobile Computing
Main Article Content
Abstract
The Fraud Detection is identifying unauthorized use of Telecommunication. There are different types of call frauds and the SMS Frauds from premium numbers, which include Wangari Calls and Wangari Call Backs. A Research Conducted taking a Scenarios of Ireland and India. The work carried out in detecting calling card fraud -- the fraudulent use of a calling card account in order to avoid paying for calls, concentrated on Fraud Detection, Prevention and Deterrence. The Different Possible Procedures to Block the entire Problem Premium numbers in the Network is projected. In paper we also discussed Mobile Computing Architecture and different data mining techniques that are used to collect data, demonstrating how the frauds will be predicated and various fraud detection techniques are discussed. The Design and implementation of a software tool is described along with the tool architecture and how the inner workings are interrelated. The conclusion is given for the Prevention and Protection with Experimental Results and Graphical Analysis of Tool Performance. The Final Objective of this Paper is restricting or blocking access to a series of premium numbers that have been used for a recent scam where customers see a ‘missed call’ and on dialing the number are charged at international premium rates.
Keywords: Wangari Calls, Mobile Computing, SMS Frauds, Call Frauds, Premium Numbers.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.