Fraud Detection with Data Mining IN COLLABORATION WITH “IDEAMART( DIALOG AXIATA PLC)” Roshanth Gardiarachchi (Dialog) Sampath Deegalla UoP Mohammed Fawsan.

Slides:



Advertisements
Similar presentations
Serving the information needs of the disaster reduction community Pre-conference event: SADKN Craig Duncan, Senior Coordinator Sarah Wade Hutman, Managing.
Advertisements

Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Stonesoft Roadmap WHAT FEATURES WILL COME IN
SP.a.M /\ TØ by Keno Albrecht Nicolas Burri Roger Wattenhofer Spamato An Extendable Spam Filter System.
SmartSoft Network Solutions, Inc.  Project Presentation  21/12/2005.
T-FLEX DOCs PLM, Document and Workflow Management.
Access 2007 Product Review. With its improved interface and interactive design capabilities that do not require deep database knowledge, Microsoft Office.
GenSpace: Exploring Social Networking Metaphors for Knowledge Sharing and Scientific Collaborative Work Chris Murphy, Swapneel Sheth, Gail Kaiser, Lauren.
DATA WAREHOUSING.
Enterprise Search With SharePoint Portal Server V2 Steve Tullis, Program Manager, Business Portal Group 3/5/2003.
Kerio Connect 7.1 More Than Just a Mail Server
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Collaborative Workflow Management with Alerts: An Integrated Retailing System for Garments Brands Donald S.F. Wong Department of Computing, Hong Kong Polytechnic.
Business User Experience Data Infrastructure and BI Platform Analysis Services Reporting Services Integration Services Master Data Services.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Spam? Not any more !! Detecting spam s using neural networks ECE/CS/ME 539 Project presentation Submitted by Sivanadyan, Thiagarajan.
Live Chat “Over 60% of U.S. online shoppers prefer Live Chat to have their questions answered prior to purchase.” † † Source: “Optimizing the e-commerce.
Chapter 11 Managing Knowledge. Dimensions of Knowledge.
Spam Filtering Techniques Arnold Perez Joseph Tilley.
Introduction to Edmodo Train-the-Trainer. Another Testimonial… From: Thomas, Natasha R. Sent: Thursday, November 29, :59 AM To: Charters, Maria.
SharePoint Server 2013 Features and Scenarios for IT Professionals First Lastname, Title March, 2014 Software Assurance Planning Services.
Work Package 3 SEE cluster policy learning platform.
The 2nd International Conference of e-Learning and Distance Education, 21 to 23 February 2011, Riyadh, Saudi Arabia Prof. Dr. Torky Sultan Faculty of Computers.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Presenter: NAME Date: MM/DD/YYYY CUSTOMER NAME iHARVEST A STANDARDS-BASED ENTERPRISE ANALYTIC SERVICE THAT ORGANIZES, ANALYZES, AND.
M2M Cloud-based Platform M2M Market The total M2M connections will grow from 62 million in 2010 to 2.1 billion in 2020, with an annual rate of 36%. M2M.
The impact of -borne threats Why companies should recognise and embrace the need for change.
Home Control Protocol for Smart Devices Hojin Park WG!-N1505.
CS525: Big Data Analytics Machine Learning on Hadoop Fall 2013 Elke A. Rundensteiner 1.
CERN LASER Alarm System Katarina Sigerud, CERN ACS workshop, 9 October 2005.
The Internet contains an infinite number of high- quality, interesting, intriguing, and well-designed sites, and surfing on the Web is usually a source.
Cloud Database Service Approach to the Management of Sensor Data Zhenguo Cui( ) Cyber-Infrastructure Research Lab Konkuk University.
Aduro LMS Prepared By: Ramya Ravi AM.EN.P2ELT13013.
1 4/23/2007 Introduction to Grid computing Sunil Avutu Graduate Student Dept.of Computer Science.
Integrating Virtual Environment and GIS for 3D Virtual City Development and Urban Planning Bin Chen, Fengru Huang, Yu Fang Peking University.
Anthony Bettini Founder & CEO Appthority – The Authority in App Security.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.
Using RouteGraphs as an Appropriate Data Structure for Navigational Tasks SFB/IQN-Kolloquium Christian Mandel, A1-[RoboMap] Overview Goal scenario.
Unit 1 Reading  Para. 1  What is efficient reading?  Reading effectively includes understanding the ideas the writer is trying to send, organizing those.
BOĞAZİÇİ UNIVERSITY DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS MATLAB AS A DATA MINING ENVIRONMENT.
Intelligent Database Systems Lab Presenter : Chang,Chun-Chih Authors : David Milne *, Ian H. Witten 2012, AI An open-source toolkit for mining Wikipedia.
Twitter Games: How Successful Spammers Pick Targets Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta School of Informatics and Computing, Indiana University.
1 Part 7: State of the Art and Future u Are we in a sorry state? u How to keep us Safe? u Software trust management u Hardware trust management u Evasive.
Digital Media Workshop. Craig Burton Burton Business Solutions – Phone –
SHOPS is funded by the U.S. Agency for International Development. Abt Associates leads the project in collaboration with Banyan Global Jhpiego Marie Stopes.
Show me the data! Actionable insight from open courses.
Ex Libris Developers Network Develop. Experiment. Collaborate.
Digital Media and Communications SCON. Craig Burton Burton Business Solutions –
The Claromentis Digital Workplace An Introduction
Cable Modems NAT Routers and all that A home setup – a network stub.
1© 2015 IBM Corporation Unlocking the power of the API economy Client Briefing Nov.
Ompetitiveness of the nations is an economic development framework based on the integration of macro and micro economy. It is a way by which firms and.
Images of what, who, when, why, how, or where MISSION: Your current objectives or description of activities MOVING FORWARD: How your objectives might change.
Von Welch Emerging NCSA Security R&D NSF CyberSecurity Summit September 28th, 2004 Von Welch
Top 5 Open Source Firewall Software for Linux User
Machine Learning overview Chapter 18, 21
Android App Development Outsourcing.
App Development Cost
Cost of App Development
Cost of creating an app
Mobile App Development Outsourcing. Table Of Contents 1. Company profile 2. Work Flow of Mobile App Development Outsourcing 3.3. Features of Mobile App.
Android App Development Cost. Table Of Contents 1. Company profile 2. Benefits of Android App Development Services 3.3. Android App Development Features.
How to Learn Your Client
Mining and Analyzing Data from Open Source Software Repository
Use of Biometric Technology in Payments to avoid Frauds
Knowledge Transfer via Multiple Model Local Structure Mapping
Knowledge Sharing Mechanism in Social Networking for Learning
T-FLEX DOCs PLM, Document and Workflow Management.
Conclusion and Handing Over
Presentation transcript:

Fraud Detection with Data Mining IN COLLABORATION WITH “IDEAMART( DIALOG AXIATA PLC)” Roshanth Gardiarachchi (Dialog) Sampath Deegalla UoP Mohammed Fawsan UoP

What is Ideamart?  IdeaMart is a platform presented by Dialog Axiata PLC to developers and content providers to use the Dialog network based features via shared API’s and monetize their content/ideas.  

Problems faced By the IdeaMart Community

Hey Fawzan, We want to catch these scams. Shall we monitor apps individually? Well…. No, I have a better idea.

Solutions  Creating an efficient Spam Filter for SMS  Unlike s, SMS has very less information. So we are trying to apply the same techniques as s with modifications.  REST API to integrate the Spam Filter with IdeaMart  Data Visualization & Statistics

Methodology

Integration

Training & Testing SMS Log (5574 Messages) Testing SMS Log Training SMS Log Training Model Results Knowledg e Base Testing Model Expand the Knowledge Base

Conclusion & Future Work Spam Filter 92% √

Conclusion & Future Work Spam Filter 92% √ Rest API √

Conclusion & Future Work Rest API √ Domain Knowledge Spam Filter 92% √ Combining Multiple Messages Data Visualization

Thank You