SlideShare a Scribd company logo
Telco Fraud Detection and
Mitigation
Cu D. Nguyen, Ph.D.
Data Scientist and Security Architect
POST Luxembourg
November 2018
POST Luxembourg
Telecom
Services,
Infrastructures
& ICT
Postal/Courrier
& Logistique
Financial
Services
4371
employees
43
nationalities
My Background and Role
▶ Data Scientist and Security Architect at Post
Luxembourg
▶ Machine learning, computer security, software
engineering
▶ Security blue team:
▶ Visibility, Intelligence, and Action
▶ Innovation
▶ “Splunk> see the forest, and the trees”
Cu D. Nguyen, Ph.D.
Telco fraud – a multi-million-dollar-a-year problem
PBX hacking
▶ A telephone system within an enterprise
▶ Switching calls among local users and
share external phone lines
What is a PBX?
And when it’s hacked, what happens?
▶ Attackers/fraudsters control the PBX,
making premium rate (expensive) calls
A deep-dive into a PBX hacking fraud
Hacked phone numbers
Premium phone numbers
owned by fraudsters
A deep-dive into a PBX hacking fraud
A well-organized crime:
• 19 calling numbers from the
hacked PBX
• 1000+ destination numbers all
over the world
• Cost ~50K euros if not handled
What we’ve learned
Fraudsters are well-organized and evolving
Running AFTER them, we need to be FAST and PRECISE!
BigData
Analytics
Machine
Learning
Automation
Comprehensive Quality & Governance
▶ Filtering
▶ Anonymizing
▶ Parsing
▶ Enriching
▶ Role-based access
control
▶ Auditability
Extendibility and
Scalability
▶ Scalable in a linear
fashion
▶ Apps & TAs
Why Splunk?
hours
weeks
Splunk at Post Luxembourg
Spam/Fraud
detectors
Voice
Mobile & Fix
SMS/MMS
Block/unblock API
On Telecom Gateways
Network
CDRs
Machine learning
IT DDoS
TIDS DevOps
• 62.5M events/day
• Approx. filtered
80GB/day
Fraud management GUI
Fraud detection using machine learning
 Use historical data
for training models
(detectors)
 Use the trained
models for
classifying new data
 Frequent retraining
to catch new
patterns
Image source: http://www.cognub.com/index.php/cognitive-platform/
Fraud detection using Splunk ML Toolkit
normal cases
frauds
Features: number of calls, number of targets, destination countries, cost, duration ….
Models: Random Forest (+ statistical models)
Encouraging results
Hacked numbers being
detected and blocked
automatically
What’s next?
▶ Evolving telco frauds meet evolving solutions
▶ Faster
▶ Broader, covering more cases
▶ Smarter, being more precise and dealing with new patterns
▶ Machine learning
▶ From supervised to semi or unsupervised, in collaboration with University of Luxembourg
▶ AutoML (algorithm selection and hyperparameter tuning)
© 2018 SPLUNK INC.
Key
Takeaways

More Related Content

PPTX
SplunkLive! Stockholm 2018 - Customer presentation: Telia
PPTX
Partner Exec Summit 2018 - Frankfurt: AIOps
PDF
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
PPTX
Gartner Symposium 2018: BMW Group Presentation
PPTX
SplunkLive! Utrecht 2018 - Customer presentation: Dutch Tax Office
PPTX
How a Leading Saudi Bank Matured Security to Better Partner the Business
PPTX
Partner Exec Summit 2018 - Frankfurt: Splunk for Industrial IoT
PPTX
Splunk at Airbus
SplunkLive! Stockholm 2018 - Customer presentation: Telia
Partner Exec Summit 2018 - Frankfurt: AIOps
SplunkLive! Utrecht 2018 - Customer presentation: Irdeto
Gartner Symposium 2018: BMW Group Presentation
SplunkLive! Utrecht 2018 - Customer presentation: Dutch Tax Office
How a Leading Saudi Bank Matured Security to Better Partner the Business
Partner Exec Summit 2018 - Frankfurt: Splunk for Industrial IoT
Splunk at Airbus

What's hot (20)

PPTX
Partner Exec Summit 2018 - Frankfurt: Partner Brauchen Wir Nicht
PPTX
SplunkLIve! Warsaw IoT Session
PPTX
Splunk for ITOA Breakout Session
PDF
Splunk IT Service Intelligence Overview - AIOps Roundtable Bern
PPTX
Splunk Internet of Things Roundtable 2015
PPTX
Managing SCADA Operations and Security with Splunk Enterprise
PDF
Managing SCADA Operations and Security with Splunk Enterprise
PDF
Splunk for Industrial Data and the Internet of Things
PPTX
Splunk for ITOA Breakout Session
PPTX
Splunk for ITOA Breakout Session
PPTX
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
PPTX
Protect & Defend Your Critical Infrastructure
PPTX
Partner Exec Summit 2018 - Frankfurt: Splunk Business Flow Beta
PPTX
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
PPTX
SplunkLive! Customer Presentation - ExxonMobil
PPTX
SplunkLive! Customer Presentation – Cox Automotive
PPTX
Splunk for Monitoring and Diagnostics in the Industrial Environment
PPTX
Cisco Connect 2018 Indonesia - Building a secure data center
PPTX
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
PPTX
IoT Security
Partner Exec Summit 2018 - Frankfurt: Partner Brauchen Wir Nicht
SplunkLIve! Warsaw IoT Session
Splunk for ITOA Breakout Session
Splunk IT Service Intelligence Overview - AIOps Roundtable Bern
Splunk Internet of Things Roundtable 2015
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk Enterprise
Splunk for Industrial Data and the Internet of Things
Splunk for ITOA Breakout Session
Splunk for ITOA Breakout Session
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
Protect & Defend Your Critical Infrastructure
Partner Exec Summit 2018 - Frankfurt: Splunk Business Flow Beta
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
SplunkLive! Customer Presentation - ExxonMobil
SplunkLive! Customer Presentation – Cox Automotive
Splunk for Monitoring and Diagnostics in the Industrial Environment
Cisco Connect 2018 Indonesia - Building a secure data center
Sharon’ Besser, Net Optics VP of Technology, Net Optics, discusses Lawful Int...
IoT Security
Ad

Similar to SplunkLive! Utrecht 2018 - Customer presentation: POST Luxembourg (20)

PDF
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
PPTX
Lessons v on fraud awareness (digital forensics)
PPTX
Lessons v on fraud awareness (digital forensics) [autosaved]
PPTX
Apostu sergiu project
PPTX
Data mining in telecommunication industry
PDF
IT Network Security Services
PPTX
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
PDF
Uganda lawsociety v2digitalforensics
PPT
Securty Issues from 1999
PPTX
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
PDF
Tecomex Forensics Brochure 2014
PPT
The-Role-of-Digital-Forensics-in-Unraveling-Modern-Cybercrimes-_1_.ppt
PDF
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
PDF
PPT
Voice communication security
PPTX
iPads on your network? Take Control with Unified Policy and Management
PDF
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
PDF
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
PDF
Machine Learning and Knowledge Representation: a Synergic Approach for Busine...
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness (digital forensics) [autosaved]
Apostu sergiu project
Data mining in telecommunication industry
IT Network Security Services
World of Signals - Devices - Connectivity - Signals - RF - Cyber Security.
Uganda lawsociety v2digitalforensics
Securty Issues from 1999
Digital Forensics Training Bootcamp (Systems Engineering ) Part - Tonex Training
Tecomex Forensics Brochure 2014
The-Role-of-Digital-Forensics-in-Unraveling-Modern-Cybercrimes-_1_.ppt
Information Security Response Team Nepal_npCERT_Vice_President_Sudan_Jha.pdf
Voice communication security
iPads on your network? Take Control with Unified Policy and Management
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Machine Learning and Knowledge Representation: a Synergic Approach for Busine...
Ad

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
PDF
Splunk Security Update | Public Sector Summit Germany 2025
PDF
Building Resilience with Energy Management for the Public Sector
PDF
IT-Lagebild: Observability for Resilience (SVA)
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
PDF
.conf Go 2023 - Data analysis as a routine
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
PDF
.conf Go 2023 - Raiffeisen Bank International
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk Leadership Forum Wien - 20.05.2025
Splunk Security Update | Public Sector Summit Germany 2025
Building Resilience with Energy Management for the Public Sector
IT-Lagebild: Observability for Resilience (SVA)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Security - Mit Sicherheit zum Erfolg (Telekom)
One Cisco - Splunk Public Sector Summit Germany April 2025
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - De NOC a CSIRT (Cellnex)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Transforming Manufacturing operations through Intelligent Integrations
PDF
cuic standard and advanced reporting.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
PDF
Advanced IT Governance
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
PDF
Sensors and Actuators in IoT Systems using pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Transforming Manufacturing operations through Intelligent Integrations
cuic standard and advanced reporting.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
Advanced IT Governance
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding
Big Data Technologies - Introduction.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
madgavkar20181017ppt McKinsey Presentation.pdf
Sensors and Actuators in IoT Systems using pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Review of recent advances in non-invasive hemoglobin estimation

SplunkLive! Utrecht 2018 - Customer presentation: POST Luxembourg

  • 1. Telco Fraud Detection and Mitigation Cu D. Nguyen, Ph.D. Data Scientist and Security Architect POST Luxembourg November 2018
  • 2. POST Luxembourg Telecom Services, Infrastructures & ICT Postal/Courrier & Logistique Financial Services 4371 employees 43 nationalities
  • 3. My Background and Role ▶ Data Scientist and Security Architect at Post Luxembourg ▶ Machine learning, computer security, software engineering ▶ Security blue team: ▶ Visibility, Intelligence, and Action ▶ Innovation ▶ “Splunk> see the forest, and the trees” Cu D. Nguyen, Ph.D.
  • 4. Telco fraud – a multi-million-dollar-a-year problem
  • 5. PBX hacking ▶ A telephone system within an enterprise ▶ Switching calls among local users and share external phone lines What is a PBX? And when it’s hacked, what happens? ▶ Attackers/fraudsters control the PBX, making premium rate (expensive) calls
  • 6. A deep-dive into a PBX hacking fraud Hacked phone numbers Premium phone numbers owned by fraudsters
  • 7. A deep-dive into a PBX hacking fraud A well-organized crime: • 19 calling numbers from the hacked PBX • 1000+ destination numbers all over the world • Cost ~50K euros if not handled
  • 8. What we’ve learned Fraudsters are well-organized and evolving Running AFTER them, we need to be FAST and PRECISE! BigData Analytics Machine Learning Automation
  • 9. Comprehensive Quality & Governance ▶ Filtering ▶ Anonymizing ▶ Parsing ▶ Enriching ▶ Role-based access control ▶ Auditability Extendibility and Scalability ▶ Scalable in a linear fashion ▶ Apps & TAs Why Splunk? hours weeks
  • 10. Splunk at Post Luxembourg Spam/Fraud detectors Voice Mobile & Fix SMS/MMS Block/unblock API On Telecom Gateways Network CDRs Machine learning IT DDoS TIDS DevOps • 62.5M events/day • Approx. filtered 80GB/day Fraud management GUI
  • 11. Fraud detection using machine learning  Use historical data for training models (detectors)  Use the trained models for classifying new data  Frequent retraining to catch new patterns Image source: http://www.cognub.com/index.php/cognitive-platform/
  • 12. Fraud detection using Splunk ML Toolkit normal cases frauds Features: number of calls, number of targets, destination countries, cost, duration …. Models: Random Forest (+ statistical models)
  • 13. Encouraging results Hacked numbers being detected and blocked automatically
  • 14. What’s next? ▶ Evolving telco frauds meet evolving solutions ▶ Faster ▶ Broader, covering more cases ▶ Smarter, being more precise and dealing with new patterns ▶ Machine learning ▶ From supervised to semi or unsupervised, in collaboration with University of Luxembourg ▶ AutoML (algorithm selection and hyperparameter tuning)
  • 15. © 2018 SPLUNK INC. Key Takeaways