1 / 27

Fraud Management System

ABOUT COMPANY. TATA CONSULTANCY SERVICES is an IT services, business solution and outsourcing organization that delivers real results to global business, ensuring a level of certainty no other firm can match.

emery
Download Presentation

Fraud Management System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ABOUT COMPANY • TATA CONSULTANCY SERVICES is an IT services, business solution and outsourcing organization that delivers real results to global business, ensuring a level of certainty no other firm can match. • A part of TATA Group, India’s largest industrial corporation, TCS has over 1,08,000 IT Consultants in 47 countries. • The mission of company is “To help customers achieve their business objectives by providing innovative, best in class consulting, IT solutions and services. ” Fraud Management System

  2. This is the project for telecom companies. • FMS provides advanced fraud detection and analysis capabilities in real-time . • A development model for software engineering is chosen based on the nature of the project and application. • Its also use Tomcat server which released under the Apache Software License. • This project enhanced our programming skills in Core JAVA and Struts, Spring, Hibernate(frame work). FRAUD MANAGEMENT SYSTEM Fraud Management System

  3. There are many software model. Fraud management system follow the spiral model. • The spiral model originally proposed by Bohem, is an evolutionary software process model. • It provide the potential for rapid development of incremental versions of the software and software is developed in a series of incremental release. Project Development Model Fraud Management System

  4. About Tomcat Server Apache Tomcat is developed in an open environment and released under the Apache Software License. Apache Tomcat is an open source software implementation of the Java Servlet and Java Server pages technologies. Apache Tomcat is planned to be a collaboration of the best-of-breed developers from around the world. Fraud Management System

  5. What is JAVA? The Java platform has attracted more than 6.5 million software developers. Java technology's versatility, efficiency, platform portability, and security make it the ideal technology for network computing. From laptops to datacenters, game consoles to scientific supercomputers, cell phones to the Internet, Java is everywhere! Fraud Management System

  6. Java Servlet technology provides Web developers with a simple, consistent mechanism for extending the functionality of a Web server and for accessing existing business systems. • A servlet can almost be thought of as an applet that runs on the server side--without a face. • Java servlets make many Web applications possible. What is Java Servlet? Fraud Management System

  7. Java Server Pages (JSP) technology provides a simplified, fast way to create dynamic web content. • JSP technology enables rapid development of web-based applications that are server- and platform-independent. • The JSP Standard Tag Library (JSTL) is a collection of tag libraries that implement general-purpose functionality common to many Web applications. What is Java Server Pages? Fraud Management System

  8. Java Server Faces (JSF) is being developed as JSR 127 under the Java Community Process, with the creating a standard framework for user interface components to be used in web applications. • Struts would have a very clean integration with JSF, so that you can use JSF components in your user interface. • struts-config.xml configuration file add in your application. What is Struts? Fraud Management System

  9. What is Spring? Spring is a layered Java/J2EE application platform, based on code published in Expert J2EE Design and Development by Rod Johnson (Wrox, 2002). Spring includes: The most complete lightweight container, A common abstraction layer for transaction management,   A JDBC abstraction layer Integration with Top link, Hibernate, JDO, and iBATIS SQL Maps:   AOP functionality, A flexible MVC web application framework, Fraud Management System

  10. NHibernate is a port of Hibernate Core for Java to the .NET Framework. • XML description of entities and relationships, NHibernate automatically generates SQL for loading and storing the objects. What is Hibernate? Fraud Management System

  11. NHibernate key features: • Natural programming model • Native .NET • Support for fine-grained object models • No build-time byte code enhancement • The query options • Custom SQL • Support for "conversations" • Free/open source Fraud Management System

  12. About Fraud Management System • The main objectives for Fraud Management System are: • To effectively detect , analyze and control various possible Frauds in fixed GSM network. • To be able to detect and prevent frauds likely to arise in future on account of introduction of new services. • To track the behavior of a customer suspected to be Fraudulent. Fraud Management System

  13. About system Architecture • The whole system is basically divided into two parts and each part is on different machine servers for better performance: • Front End(User Interface for configuration and ticket analysis) • Back End (Process of analyzing CDRs and firing rules to generate Alarms) Fraud Management System

  14. Front End(User Interface for configuration and ticket analysis) • The front end is designed very user friendly and has followed the flow in 3 layers: • Presentation Layer • Business Layer • Data Access Layer • The whole screen code follows the flow from Presentation Layer to Data Access Layer. So that we use 3 different and efficient framework: • Struts Framework • Spring Framework • Hibernate Framework Fraud Management System

  15. The back process is executed on a different server machine and the component in it work in parallel. Back End (Process of analyzing CDRs and firing rules to generate Alarms) Network Element Converter OP Window Configured DB Table File Directory based on streams Formatter Rule Engine and AL module Front End Screen Fraud Management System

  16. Administrator of system schedules job for converter-formatter and rule engine to execute job. • These component start executing and get files from specific folder and execute job till the end of files. Fraud detection & ticket generation Rule Engine Scheduler JBPM Flow management (taking analyst input for fraud ticket) User Behavior analysis module (AI part 1) Neural Learning (AI part 2) Converter-Formatter Fraud Management System

  17. On the basis of their process alarms are generated. • Then analyzed the alarms and generate frauds and its ticket if some threshold crosses. • Finally the ticket is passed to the ticket workflow, which will ultimately show the ticket to analyst and asks for the conformation to declare it as a fraudulent ticket or not. Fraud Management System

  18. Telecommunication fraud is an act of obtaining telecommunication services and the instruments, equipments or devices with no intention for paying for them or abuse of services. • Fraudsters’ motivation is either to make money or reduce cost to acquire mystery to mask criminal activities or obtain the sheer thrill of challenging the network security. What are Telecom Frauds? Fraud Management System

  19. Usage Frauds • Technical Fraud • Criminal Intention/Security Issues • Activation Frauds • Unauthorized operations on customer account(Internal Fraud) • Subscriber data difference between network elements and billing. Types of Telecom Frauds Fraud Management System

  20. Usage Frauds • Misuse of another subscribers services • Fraudster creating clip on network on subscriber’s line during and outside normal working hours • Running unauthorized private exchange • Fraudster using residential line for artificial inflation of traffic to revenue share numbers • Fraudster using auto dialers to generate unsolicited revenue Fraud Management System

  21. Bypassing the network operator by use of international callback services to make cheap international calls. • Conference call Fraud used in conjunction with call selling activities. • Call forwarding Fraud. • Fraudster illegal use of public telephone booth, payphones. • Fraudster using hacking techniques to identify International Toll-free numbers suitable for abuse. • Interconnect Fraud. • Fraudster using test/services lines. • Non-stopping call(Network Fraud) Technical Fraud Fraud Management System

  22. Criminal Intention/Security Issues • Subscriber calling more than a specified number of countries (Destination call spreading) • Calls made to certain specified numbers, number range, suspicion area or countries Fraud Management System

  23. Dealer suddenly opening large number of lines. • Incomplete or incorrect customer details. • Customer details very similar to previous fraudsters. • Employee or dealer agent fraudulently altering customer details or provisioned services. • Called/calling number in screening list. Activation Frauds Fraud Management System

  24. Unauthorized operations on customer account • Adjustment in credit/discount for a subscriber. • Change of applicable tariff plan or billing data. • Incorrect application of payments. • Manipulation of credit limit for a subscriber. • Removal of suspensions, adding unauthorized. • Services/line Fraud Management System

  25. Subscriber data difference between network elements and billing. • Subscriber not in billing system. • Subscriber using a class of service for which he/she is suspended. Fraud Management System

  26. ….Thank you for your kind attention…. Queries ? ? Fraud Management System

More Related