SlideShare une entreprise Scribd logo
1  sur  17
Using Apache Hadoop To Drive
Down Fraud for Communication
Service Providers
Hadoop Based, Real-Time Fraud Analytics Platform for Telcos
April 2016
2© Cloudera, Inc. All rights reserved.
Your Speakers
Vijay Raja
Solutions Marketing Manager
Cloudera
Dr. Ian Howells
Chief Marketing Officer
Argyle Data
3© Cloudera, Inc. All rights reserved.
Agenda
• Telco Fraud Basics
• Fraud & Associated Impact on Telcos
• Traditional or Legacy Approach to Fraud
• Hadoop Based Approach to Fraud
• Cloudera – Argyle Data Solution
• Demo – Fraud Solution
• Q&A
4© Cloudera, Inc. All rights reserved.
Revenue Threats & Fraud are a Global Problem
Profit/Risk Not Geography Matters - The Global Attacker
• Web Premium Rate Number
• Auto-Forward
• High Speed Computer
• 100’s of Simultaneous Calls
• 220 minutes/minute
• Victims
• New York - $166,000 weekend
• Albany - $200,000 3 Days
• 34 Years Worth of Calls
• To Gambia, Somalia, Maldives
5© Cloudera, Inc. All rights reserved.
Premium Rate Service Fraud
The Wangiri Attack – “One Ring & Cut”
Premium Rate Number/ Line
Fraudsters can easily set up a Premium
Rate Number in any part of the world
Drive unsuspecting users to
the Premium rate line
High Cost Calls
Premium Rate ($1 - $4/min)
High Interconnect Fees
Missed Calls from
masked numbers
More Calls = More
Revenues
6© Cloudera, Inc. All rights reserved.
Fraud & Associated Financial Impact for Telcos
Mobile and fixed-line carriers
lose $38B per year to fraud &
revenue threats
Premium rate service fraud
cost victims $3.8B globally
last year
Roaming Fraud cost the industry
$6.1B globally last year
Source- Communications Fraud Control Association (CFCA)
7© Cloudera, Inc. All rights reserved.
Fraud Types & Methods
Premium Rate Service Fraud
Roaming Fraud
International Revenue Share Fraud
Subscription Fraud
Domestic Revenue Share Fraud
Wangiri Attack
SMS Phishing
PBX Hacking
Identity Theft
……
FRAUD TYPE FRAUD METHOD
Increasing Complexity of Fraud Types & Nature of Attacks
8© Cloudera, Inc. All rights reserved.
Legacy Systems Don’t Work Anymore…
The Legacy Defense Approach The New Sophisticated Global Attack Threat
• Batch File Ingestion
• Discover Threats Too Late
• Rules Based
• Don’t Discover Zero-Day Attack Methods
• False Positive Overload
• Data Silos
• No Crime 360 Signals
• Flat World Forensics
• Discover Incident not Crime Rings
• High Cost Proprietary Architecture
• Limited Data due to cost constraints
9© Cloudera, Inc. All rights reserved.
Legacy Defense Approach vs. Hadoop & Machine Learning
The Legacy Defense Approach
• Batch File Ingestion
• Discover Threats Too Late
• Rules Based
• Don’t Discover Zero-Day Attack Methods
• False Positive Overload
• Data Silos
• No Crime 360 Signals
• Flat world Forensics
• Discover Incident not Crime Rings
• High Cost Proprietary Architecture
• Limited Data due to cost constraints
The Hadoop & Machine Learning Approach
• Real-Time Packet Ingestion
• Discover in Seconds vs. Hours or Days
• Real-Time Anomaly Detection
• Discover 250% to 350% More Fraud
• 20 to 30 Times Less False Positives
• Hadoop based Enterprise Data Hub
• Discover Crime 360 Signals
• Graph based Visual Analytics
• Discover Crime Rings
• Native Hadoop Architecture
• Unlimited Data Storage & Analytics
10© Cloudera, Inc. All rights reserved.
Polling Question
What are your plans for using Hadoop for Fraud Analytics
o We already use Hadoop today for Fraud Analytics
o We currently use Hadoop, but not for Fraud
o We would look to potentially utilizing Hadoop for Fraud
o We have no plans for Hadoop
o Not Applicable/ Don’t Know
11© Cloudera, Inc. All rights reserved.
Real-Time Fraud Analytics Solution
DPI/File Ingestion – Files, Packets & Database Feature Enrichment
Mobile Call Fixed Call VoIP Call Data BSS Systems
ISUP, TD.35,
TD.57, MAP,
SMS, BSSAP
ISUP,
Diameter
SIP, H.323,
Diameter
Viber, Whatsapp
GTP,
Diameter
Billing, CRM,
Others
BSS
Data Sources
12© Cloudera, Inc. All rights reserved.
Real-Time Fraud Analytics Solution
Security and Administration
Ingest
Sqoop, Flume
Transform
MapReduce, Hive, Pig,
Spark
Analytic Database
Impala
Search
Solr
Machine Learning
SAS, R, Spark, Mahout
NoSQL Database
HBase
Streaming
Spark Streaming
Unlimited Storage HDFS, Hbase, Kudu
YARN, Cloudera Manager, Cloudera Navigator
Cloudera Enterprise Hadoop Platform
Process Discover Model Serve
DPI/File Ingestion – Files, Packets & Database Feature Enrichment
Mobile Call Fixed Call VoIP Call Data BSS Systems
ISUP, TD.35,
TD.57, MAP,
SMS, BSSAP
ISUP,
Diameter
SIP, H.323,
Diameter
Viber, Whatsapp
GTP,
Diameter
Billing, CRM,
Others
BSS
Data Sources
13© Cloudera, Inc. All rights reserved.
Real-Time Fraud Analytics Solution
Security and Administration
Ingest
Sqoop, Flume
Transform
MapReduce, Hive, Pig,
Spark
Analytic Database
Impala
Search
Solr
Machine Learning
SAS, R, Spark, Mahout
NoSQL Database
HBase
Streaming
Spark Streaming
Unlimited Storage HDFS, Hbase, Kudu
YARN, Cloudera Manager, Cloudera Navigator
Cloudera Enterprise Hadoop Platform
Process Discover Model Serve
DPI/File Ingestion – Files, Packets & Database Feature Enrichment
Mobile Call Fixed Call VoIP Call Data BSS Systems
ISUP, TD.35,
TD.57, MAP,
SMS, BSSAP
ISUP,
Diameter
SIP, H.323,
Diameter
Viber, Whatsapp
GTP,
Diameter
Billing, CRM,
Others
BSS
Data Sources
Fraud Threat Analytics
Machine Learning
Profit/ SLA
Threat Analytics
Forensic Analytics
(Graph)
Argyle Data - Fraud Analytics Platform
14© Cloudera, Inc. All rights reserved.
Domestic Fraud
Wangiri Attack
Forensics
Crime Ring Discovery
Roaming Fraud
SLA Revenue Clawback
Live Demo - Three Fraud Scenarios - Brazilian Operator
15© Cloudera, Inc. All rights reserved.
Real-Time Fraud Analytics - Demo
16© Cloudera, Inc. All rights reserved.
Solution Benefits – Cloudera|Argyle Data
• Discover fraud in seconds versus hours or days
• 250% to 350% better fraud discovery
• 20 to 30 times less false positives
• Prevents millions in revenue leakage
• Visual patterns that make fraud, profit or SLA
threats obvious
• Interactive dashboards that discover crime rings
and flows otherwise not detectable Wangiri Attack – Visual Graphic
17© Cloudera, Inc. All rights reserved.
Thank you

Contenu connexe

Tendances

Intuitive Real-Time Analytics with Search
Intuitive Real-Time Analytics with SearchIntuitive Real-Time Analytics with Search
Intuitive Real-Time Analytics with SearchCloudera, Inc.
 
Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%
Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%
Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%Cloudera, Inc.
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceCloudera, Inc.
 
Data Drive Applications_Webinar
Data Drive Applications_WebinarData Drive Applications_Webinar
Data Drive Applications_WebinarSean Spediacci
 
Enterprise Hadoop in the Cloud. In Minutes. | How to Run Cloudera Enterprise ...
Enterprise Hadoop in the Cloud. In Minutes. | How to Run Cloudera Enterprise ...Enterprise Hadoop in the Cloud. In Minutes. | How to Run Cloudera Enterprise ...
Enterprise Hadoop in the Cloud. In Minutes. | How to Run Cloudera Enterprise ...Cloudera, Inc.
 
Unlock Hadoop Success with Cloudera Navigator Optimizer
Unlock Hadoop Success with Cloudera Navigator OptimizerUnlock Hadoop Success with Cloudera Navigator Optimizer
Unlock Hadoop Success with Cloudera Navigator OptimizerCloudera, Inc.
 
Data Science and Machine Learning for the Enterprise
Data Science and Machine Learning for the EnterpriseData Science and Machine Learning for the Enterprise
Data Science and Machine Learning for the EnterpriseCloudera, Inc.
 
Big data journey to the cloud rohit pujari 5.30.18
Big data journey to the cloud   rohit pujari 5.30.18Big data journey to the cloud   rohit pujari 5.30.18
Big data journey to the cloud rohit pujari 5.30.18Cloudera, Inc.
 
How Data Drives Business at Choice Hotels
How Data Drives Business at Choice HotelsHow Data Drives Business at Choice Hotels
How Data Drives Business at Choice HotelsCloudera, Inc.
 
Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...
Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...
Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...Cloudera, Inc.
 
Simplifying Real-Time Architectures for IoT with Apache Kudu
Simplifying Real-Time Architectures for IoT with Apache KuduSimplifying Real-Time Architectures for IoT with Apache Kudu
Simplifying Real-Time Architectures for IoT with Apache KuduCloudera, Inc.
 
Building a Data Hub that Empowers Customer Insight (Technical Workshop)
Building a Data Hub that Empowers Customer Insight (Technical Workshop)Building a Data Hub that Empowers Customer Insight (Technical Workshop)
Building a Data Hub that Empowers Customer Insight (Technical Workshop)Cloudera, Inc.
 
Self-service Big Data Analytics on Microsoft Azure
Self-service Big Data Analytics on Microsoft AzureSelf-service Big Data Analytics on Microsoft Azure
Self-service Big Data Analytics on Microsoft AzureCloudera, Inc.
 
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...Cloudera, Inc.
 
Managing Successful Data Projects: Technology Selection and Team Building
Managing Successful Data Projects: Technology Selection and Team BuildingManaging Successful Data Projects: Technology Selection and Team Building
Managing Successful Data Projects: Technology Selection and Team BuildingCloudera, Inc.
 
Secure Data - Why Encryption and Access Control are Game Changers
Secure Data - Why Encryption and Access Control are Game ChangersSecure Data - Why Encryption and Access Control are Game Changers
Secure Data - Why Encryption and Access Control are Game ChangersCloudera, Inc.
 
Cloudera Data Science Workbench: sparklyr, implyr, and More - dplyr Interfac...
 Cloudera Data Science Workbench: sparklyr, implyr, and More - dplyr Interfac... Cloudera Data Science Workbench: sparklyr, implyr, and More - dplyr Interfac...
Cloudera Data Science Workbench: sparklyr, implyr, and More - dplyr Interfac...Cloudera, Inc.
 
Making Self-Service BI a Reality in the Enterprise
Making Self-Service BI a Reality in the EnterpriseMaking Self-Service BI a Reality in the Enterprise
Making Self-Service BI a Reality in the EnterpriseCloudera, Inc.
 
Part 1: Lambda Architectures: Simplified by Apache Kudu
Part 1: Lambda Architectures: Simplified by Apache KuduPart 1: Lambda Architectures: Simplified by Apache Kudu
Part 1: Lambda Architectures: Simplified by Apache KuduCloudera, Inc.
 

Tendances (20)

Intuitive Real-Time Analytics with Search
Intuitive Real-Time Analytics with SearchIntuitive Real-Time Analytics with Search
Intuitive Real-Time Analytics with Search
 
Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%
Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%
Kelley Blue Book Uses Big Data to Increase User Engagement Over 100%
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services Experience
 
Data Drive Applications_Webinar
Data Drive Applications_WebinarData Drive Applications_Webinar
Data Drive Applications_Webinar
 
Enterprise Hadoop in the Cloud. In Minutes. | How to Run Cloudera Enterprise ...
Enterprise Hadoop in the Cloud. In Minutes. | How to Run Cloudera Enterprise ...Enterprise Hadoop in the Cloud. In Minutes. | How to Run Cloudera Enterprise ...
Enterprise Hadoop in the Cloud. In Minutes. | How to Run Cloudera Enterprise ...
 
Unlock Hadoop Success with Cloudera Navigator Optimizer
Unlock Hadoop Success with Cloudera Navigator OptimizerUnlock Hadoop Success with Cloudera Navigator Optimizer
Unlock Hadoop Success with Cloudera Navigator Optimizer
 
Data Science and Machine Learning for the Enterprise
Data Science and Machine Learning for the EnterpriseData Science and Machine Learning for the Enterprise
Data Science and Machine Learning for the Enterprise
 
Big data journey to the cloud rohit pujari 5.30.18
Big data journey to the cloud   rohit pujari 5.30.18Big data journey to the cloud   rohit pujari 5.30.18
Big data journey to the cloud rohit pujari 5.30.18
 
How Data Drives Business at Choice Hotels
How Data Drives Business at Choice HotelsHow Data Drives Business at Choice Hotels
How Data Drives Business at Choice Hotels
 
Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...
Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...
Introducing Cloudera Navigator Optimizer: Offload Assessments and Active Data...
 
Simplifying Real-Time Architectures for IoT with Apache Kudu
Simplifying Real-Time Architectures for IoT with Apache KuduSimplifying Real-Time Architectures for IoT with Apache Kudu
Simplifying Real-Time Architectures for IoT with Apache Kudu
 
Building a Data Hub that Empowers Customer Insight (Technical Workshop)
Building a Data Hub that Empowers Customer Insight (Technical Workshop)Building a Data Hub that Empowers Customer Insight (Technical Workshop)
Building a Data Hub that Empowers Customer Insight (Technical Workshop)
 
Self-service Big Data Analytics on Microsoft Azure
Self-service Big Data Analytics on Microsoft AzureSelf-service Big Data Analytics on Microsoft Azure
Self-service Big Data Analytics on Microsoft Azure
 
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
Hadoop Distributed File System (HDFS) Encryption with Cloudera Navigator Key ...
 
Managing Successful Data Projects: Technology Selection and Team Building
Managing Successful Data Projects: Technology Selection and Team BuildingManaging Successful Data Projects: Technology Selection and Team Building
Managing Successful Data Projects: Technology Selection and Team Building
 
Secure Data - Why Encryption and Access Control are Game Changers
Secure Data - Why Encryption and Access Control are Game ChangersSecure Data - Why Encryption and Access Control are Game Changers
Secure Data - Why Encryption and Access Control are Game Changers
 
Big Data Fundamentals
Big Data FundamentalsBig Data Fundamentals
Big Data Fundamentals
 
Cloudera Data Science Workbench: sparklyr, implyr, and More - dplyr Interfac...
 Cloudera Data Science Workbench: sparklyr, implyr, and More - dplyr Interfac... Cloudera Data Science Workbench: sparklyr, implyr, and More - dplyr Interfac...
Cloudera Data Science Workbench: sparklyr, implyr, and More - dplyr Interfac...
 
Making Self-Service BI a Reality in the Enterprise
Making Self-Service BI a Reality in the EnterpriseMaking Self-Service BI a Reality in the Enterprise
Making Self-Service BI a Reality in the Enterprise
 
Part 1: Lambda Architectures: Simplified by Apache Kudu
Part 1: Lambda Architectures: Simplified by Apache KuduPart 1: Lambda Architectures: Simplified by Apache Kudu
Part 1: Lambda Architectures: Simplified by Apache Kudu
 

En vedette

Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to MeasureLookout
 
Рositive Hack Days V. Противодействие платёжному фроду на сети оператора связи
Рositive Hack Days V. Противодействие платёжному фроду на сети оператора связиРositive Hack Days V. Противодействие платёжному фроду на сети оператора связи
Рositive Hack Days V. Противодействие платёжному фроду на сети оператора связиDenis Gorchakov
 
Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...IBM Sverige
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security OperationsPriyanka Aash
 
Transforming incident Response to Intelligent Response using Graphs
Transforming incident Response to Intelligent Response using GraphsTransforming incident Response to Intelligent Response using Graphs
Transforming incident Response to Intelligent Response using GraphsRam Shankar Siva Kumar
 
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...jzadeh
 
Machine learning Mindmap
Machine learning MindmapMachine learning Mindmap
Machine learning MindmapYee Jie NG
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepIBM Security
 
Jim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for CybersecurityJim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for Cybersecurityidsecconf
 
Data Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data ScienceData Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data ScienceMichael Roytman
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat DetectionNapier University
 
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Alex Pinto
 
(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big DataAmazon Web Services
 
Computer security - A machine learning approach
Computer security - A machine learning approachComputer security - A machine learning approach
Computer security - A machine learning approachSandeep Sabnani
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsPriyanka Aash
 
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Cybereason
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisPriyanka Aash
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Priyanka Aash
 

En vedette (20)

Merging fraud in a full IP environment
Merging fraud in a full IP environmentMerging fraud in a full IP environment
Merging fraud in a full IP environment
 
Mobile Threats, Made to Measure
Mobile Threats, Made to MeasureMobile Threats, Made to Measure
Mobile Threats, Made to Measure
 
Рositive Hack Days V. Противодействие платёжному фроду на сети оператора связи
Рositive Hack Days V. Противодействие платёжному фроду на сети оператора связиРositive Hack Days V. Противодействие платёжному фроду на сети оператора связи
Рositive Hack Days V. Противодействие платёжному фроду на сети оператора связи
 
Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...Current Threat Landscape, Global Trends and Best Practices within Financial F...
Current Threat Landscape, Global Trends and Best Practices within Financial F...
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security Operations
 
Transforming incident Response to Intelligent Response using Graphs
Transforming incident Response to Intelligent Response using GraphsTransforming incident Response to Intelligent Response using Graphs
Transforming incident Response to Intelligent Response using Graphs
 
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
us-15-Zadeh-From-False-Positives-To-Actionable-Analysis-Behavioral-Intrusion-...
 
Machine learning Mindmap
Machine learning MindmapMachine learning Mindmap
Machine learning Mindmap
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
 
Jim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for CybersecurityJim Geovedi - Machine Learning for Cybersecurity
Jim Geovedi - Machine Learning for Cybersecurity
 
Data Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data ScienceData Science ATL Meetup - Risk I/O Security Data Science
Data Science ATL Meetup - Risk I/O Security Data Science
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat Detection
 
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
 
(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data
 
Computer security - A machine learning approach
Computer security - A machine learning approachComputer security - A machine learning approach
Computer security - A machine learning approach
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security Controls
 
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet Analysis
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies
 

Similaire à Using Hadoop to Drive Down Fraud for Telcos

Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Niel Dunnage
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoopNiel Dunnage
 
Ask Bigger Questions with Cloudera and Apache Hadoop - Big Data Day Paris 2013
Ask Bigger Questions with Cloudera and Apache Hadoop - Big Data Day Paris 2013Ask Bigger Questions with Cloudera and Apache Hadoop - Big Data Day Paris 2013
Ask Bigger Questions with Cloudera and Apache Hadoop - Big Data Day Paris 2013Publicis Sapient Engineering
 
Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Cloudera, Inc.
 
IoT-Enabled Predictive Maintenance
IoT-Enabled Predictive MaintenanceIoT-Enabled Predictive Maintenance
IoT-Enabled Predictive MaintenanceCloudera, Inc.
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the UnionCloudera, Inc.
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Cloudera, Inc.
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
Get Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber SolutionGet Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber SolutionCloudera, Inc.
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...BigDataEverywhere
 
Cloudera 助力台灣大數據產業的發展
Cloudera 助力台灣大數據產業的發展Cloudera 助力台灣大數據產業的發展
Cloudera 助力台灣大數據產業的發展Etu Solution
 
Key Considerations for Putting Hadoop in Production SlideShare
Key Considerations for Putting Hadoop in Production SlideShareKey Considerations for Putting Hadoop in Production SlideShare
Key Considerations for Putting Hadoop in Production SlideShareMapR Technologies
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max PrincetonTimothy Spann
 
Analytics, Everywhere. Keys to Effective Analytics and Data Discovery
Analytics, Everywhere. Keys to Effective Analytics and Data DiscoveryAnalytics, Everywhere. Keys to Effective Analytics and Data Discovery
Analytics, Everywhere. Keys to Effective Analytics and Data DiscoveryDLT Solutions
 
Hadoop Application Architectures - Fraud Detection
Hadoop Application Architectures - Fraud  DetectionHadoop Application Architectures - Fraud  Detection
Hadoop Application Architectures - Fraud Detectionhadooparchbook
 
A Community Approach to Fighting Cyber Threats
A Community Approach to Fighting Cyber ThreatsA Community Approach to Fighting Cyber Threats
A Community Approach to Fighting Cyber ThreatsCloudera, Inc.
 
TCFPro24 Building Real-Time Generative AI Pipelines
TCFPro24 Building Real-Time Generative AI PipelinesTCFPro24 Building Real-Time Generative AI Pipelines
TCFPro24 Building Real-Time Generative AI PipelinesTimothy Spann
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsMichael Scheidell
 
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...Cloudera, Inc.
 

Similaire à Using Hadoop to Drive Down Fraud for Telcos (20)

Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2Fighting cyber fraud with hadoop v2
Fighting cyber fraud with hadoop v2
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
 
Ask Bigger Questions with Cloudera and Apache Hadoop - Big Data Day Paris 2013
Ask Bigger Questions with Cloudera and Apache Hadoop - Big Data Day Paris 2013Ask Bigger Questions with Cloudera and Apache Hadoop - Big Data Day Paris 2013
Ask Bigger Questions with Cloudera and Apache Hadoop - Big Data Day Paris 2013
 
Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18Build a modern platform for anti-money laundering 9.19.18
Build a modern platform for anti-money laundering 9.19.18
 
IoT-Enabled Predictive Maintenance
IoT-Enabled Predictive MaintenanceIoT-Enabled Predictive Maintenance
IoT-Enabled Predictive Maintenance
 
2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union2016 Cybersecurity Analytics State of the Union
2016 Cybersecurity Analytics State of the Union
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Get Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber SolutionGet Started with Cloudera’s Cyber Solution
Get Started with Cloudera’s Cyber Solution
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
 
Cloudera 助力台灣大數據產業的發展
Cloudera 助力台灣大數據產業的發展Cloudera 助力台灣大數據產業的發展
Cloudera 助力台灣大數據產業的發展
 
Key Considerations for Putting Hadoop in Production SlideShare
Key Considerations for Putting Hadoop in Production SlideShareKey Considerations for Putting Hadoop in Production SlideShare
Key Considerations for Putting Hadoop in Production SlideShare
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max Princeton
 
Analytics, Everywhere. Keys to Effective Analytics and Data Discovery
Analytics, Everywhere. Keys to Effective Analytics and Data DiscoveryAnalytics, Everywhere. Keys to Effective Analytics and Data Discovery
Analytics, Everywhere. Keys to Effective Analytics and Data Discovery
 
Hadoop Application Architectures - Fraud Detection
Hadoop Application Architectures - Fraud  DetectionHadoop Application Architectures - Fraud  Detection
Hadoop Application Architectures - Fraud Detection
 
A Community Approach to Fighting Cyber Threats
A Community Approach to Fighting Cyber ThreatsA Community Approach to Fighting Cyber Threats
A Community Approach to Fighting Cyber Threats
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
TCFPro24 Building Real-Time Generative AI Pipelines
TCFPro24 Building Real-Time Generative AI PipelinesTCFPro24 Building Real-Time Generative AI Pipelines
TCFPro24 Building Real-Time Generative AI Pipelines
 
Governance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile AppsGovernance and Security in Cloud and Mobile Apps
Governance and Security in Cloud and Mobile Apps
 
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
Turning Petabytes of Data into Profit with Hadoop for the World’s Biggest Ret...
 

Plus de Cloudera, Inc.

Partner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptxPartner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptxCloudera, Inc.
 
Cloudera Data Impact Awards 2021 - Finalists
Cloudera Data Impact Awards 2021 - Finalists Cloudera Data Impact Awards 2021 - Finalists
Cloudera Data Impact Awards 2021 - Finalists Cloudera, Inc.
 
2020 Cloudera Data Impact Awards Finalists
2020 Cloudera Data Impact Awards Finalists2020 Cloudera Data Impact Awards Finalists
2020 Cloudera Data Impact Awards FinalistsCloudera, Inc.
 
Edc event vienna presentation 1 oct 2019
Edc event vienna presentation 1 oct 2019Edc event vienna presentation 1 oct 2019
Edc event vienna presentation 1 oct 2019Cloudera, Inc.
 
Machine Learning with Limited Labeled Data 4/3/19
Machine Learning with Limited Labeled Data 4/3/19Machine Learning with Limited Labeled Data 4/3/19
Machine Learning with Limited Labeled Data 4/3/19Cloudera, Inc.
 
Data Driven With the Cloudera Modern Data Warehouse 3.19.19
Data Driven With the Cloudera Modern Data Warehouse 3.19.19Data Driven With the Cloudera Modern Data Warehouse 3.19.19
Data Driven With the Cloudera Modern Data Warehouse 3.19.19Cloudera, Inc.
 
Introducing Cloudera DataFlow (CDF) 2.13.19
Introducing Cloudera DataFlow (CDF) 2.13.19Introducing Cloudera DataFlow (CDF) 2.13.19
Introducing Cloudera DataFlow (CDF) 2.13.19Cloudera, Inc.
 
Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Cloudera, Inc.
 
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19Cloudera, Inc.
 
Leveraging the cloud for analytics and machine learning 1.29.19
Leveraging the cloud for analytics and machine learning 1.29.19Leveraging the cloud for analytics and machine learning 1.29.19
Leveraging the cloud for analytics and machine learning 1.29.19Cloudera, Inc.
 
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19Cloudera, Inc.
 
Leveraging the Cloud for Big Data Analytics 12.11.18
Leveraging the Cloud for Big Data Analytics 12.11.18Leveraging the Cloud for Big Data Analytics 12.11.18
Leveraging the Cloud for Big Data Analytics 12.11.18Cloudera, Inc.
 
Modern Data Warehouse Fundamentals Part 3
Modern Data Warehouse Fundamentals Part 3Modern Data Warehouse Fundamentals Part 3
Modern Data Warehouse Fundamentals Part 3Cloudera, Inc.
 
Modern Data Warehouse Fundamentals Part 2
Modern Data Warehouse Fundamentals Part 2Modern Data Warehouse Fundamentals Part 2
Modern Data Warehouse Fundamentals Part 2Cloudera, Inc.
 
Modern Data Warehouse Fundamentals Part 1
Modern Data Warehouse Fundamentals Part 1Modern Data Warehouse Fundamentals Part 1
Modern Data Warehouse Fundamentals Part 1Cloudera, Inc.
 
Extending Cloudera SDX beyond the Platform
Extending Cloudera SDX beyond the PlatformExtending Cloudera SDX beyond the Platform
Extending Cloudera SDX beyond the PlatformCloudera, Inc.
 
Federated Learning: ML with Privacy on the Edge 11.15.18
Federated Learning: ML with Privacy on the Edge 11.15.18Federated Learning: ML with Privacy on the Edge 11.15.18
Federated Learning: ML with Privacy on the Edge 11.15.18Cloudera, Inc.
 
Analyst Webinar: Doing a 180 on Customer 360
Analyst Webinar: Doing a 180 on Customer 360Analyst Webinar: Doing a 180 on Customer 360
Analyst Webinar: Doing a 180 on Customer 360Cloudera, Inc.
 
Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18Cloudera, Inc.
 

Plus de Cloudera, Inc. (20)

Partner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptxPartner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptx
 
Cloudera Data Impact Awards 2021 - Finalists
Cloudera Data Impact Awards 2021 - Finalists Cloudera Data Impact Awards 2021 - Finalists
Cloudera Data Impact Awards 2021 - Finalists
 
2020 Cloudera Data Impact Awards Finalists
2020 Cloudera Data Impact Awards Finalists2020 Cloudera Data Impact Awards Finalists
2020 Cloudera Data Impact Awards Finalists
 
Edc event vienna presentation 1 oct 2019
Edc event vienna presentation 1 oct 2019Edc event vienna presentation 1 oct 2019
Edc event vienna presentation 1 oct 2019
 
Machine Learning with Limited Labeled Data 4/3/19
Machine Learning with Limited Labeled Data 4/3/19Machine Learning with Limited Labeled Data 4/3/19
Machine Learning with Limited Labeled Data 4/3/19
 
Data Driven With the Cloudera Modern Data Warehouse 3.19.19
Data Driven With the Cloudera Modern Data Warehouse 3.19.19Data Driven With the Cloudera Modern Data Warehouse 3.19.19
Data Driven With the Cloudera Modern Data Warehouse 3.19.19
 
Introducing Cloudera DataFlow (CDF) 2.13.19
Introducing Cloudera DataFlow (CDF) 2.13.19Introducing Cloudera DataFlow (CDF) 2.13.19
Introducing Cloudera DataFlow (CDF) 2.13.19
 
Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19
 
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
Shortening the Sales Cycle with a Modern Data Warehouse 1.30.19
 
Leveraging the cloud for analytics and machine learning 1.29.19
Leveraging the cloud for analytics and machine learning 1.29.19Leveraging the cloud for analytics and machine learning 1.29.19
Leveraging the cloud for analytics and machine learning 1.29.19
 
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
Modernizing the Legacy Data Warehouse – What, Why, and How 1.23.19
 
Leveraging the Cloud for Big Data Analytics 12.11.18
Leveraging the Cloud for Big Data Analytics 12.11.18Leveraging the Cloud for Big Data Analytics 12.11.18
Leveraging the Cloud for Big Data Analytics 12.11.18
 
Modern Data Warehouse Fundamentals Part 3
Modern Data Warehouse Fundamentals Part 3Modern Data Warehouse Fundamentals Part 3
Modern Data Warehouse Fundamentals Part 3
 
Modern Data Warehouse Fundamentals Part 2
Modern Data Warehouse Fundamentals Part 2Modern Data Warehouse Fundamentals Part 2
Modern Data Warehouse Fundamentals Part 2
 
Modern Data Warehouse Fundamentals Part 1
Modern Data Warehouse Fundamentals Part 1Modern Data Warehouse Fundamentals Part 1
Modern Data Warehouse Fundamentals Part 1
 
Extending Cloudera SDX beyond the Platform
Extending Cloudera SDX beyond the PlatformExtending Cloudera SDX beyond the Platform
Extending Cloudera SDX beyond the Platform
 
Federated Learning: ML with Privacy on the Edge 11.15.18
Federated Learning: ML with Privacy on the Edge 11.15.18Federated Learning: ML with Privacy on the Edge 11.15.18
Federated Learning: ML with Privacy on the Edge 11.15.18
 
Analyst Webinar: Doing a 180 on Customer 360
Analyst Webinar: Doing a 180 on Customer 360Analyst Webinar: Doing a 180 on Customer 360
Analyst Webinar: Doing a 180 on Customer 360
 
Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18Introducing the data science sandbox as a service 8.30.18
Introducing the data science sandbox as a service 8.30.18
 
Cloudera SDX
Cloudera SDXCloudera SDX
Cloudera SDX
 

Dernier

Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROmotivationalword821
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 

Dernier (20)

Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTRO
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 

Using Hadoop to Drive Down Fraud for Telcos

  • 1. Using Apache Hadoop To Drive Down Fraud for Communication Service Providers Hadoop Based, Real-Time Fraud Analytics Platform for Telcos April 2016
  • 2. 2© Cloudera, Inc. All rights reserved. Your Speakers Vijay Raja Solutions Marketing Manager Cloudera Dr. Ian Howells Chief Marketing Officer Argyle Data
  • 3. 3© Cloudera, Inc. All rights reserved. Agenda • Telco Fraud Basics • Fraud & Associated Impact on Telcos • Traditional or Legacy Approach to Fraud • Hadoop Based Approach to Fraud • Cloudera – Argyle Data Solution • Demo – Fraud Solution • Q&A
  • 4. 4© Cloudera, Inc. All rights reserved. Revenue Threats & Fraud are a Global Problem Profit/Risk Not Geography Matters - The Global Attacker • Web Premium Rate Number • Auto-Forward • High Speed Computer • 100’s of Simultaneous Calls • 220 minutes/minute • Victims • New York - $166,000 weekend • Albany - $200,000 3 Days • 34 Years Worth of Calls • To Gambia, Somalia, Maldives
  • 5. 5© Cloudera, Inc. All rights reserved. Premium Rate Service Fraud The Wangiri Attack – “One Ring & Cut” Premium Rate Number/ Line Fraudsters can easily set up a Premium Rate Number in any part of the world Drive unsuspecting users to the Premium rate line High Cost Calls Premium Rate ($1 - $4/min) High Interconnect Fees Missed Calls from masked numbers More Calls = More Revenues
  • 6. 6© Cloudera, Inc. All rights reserved. Fraud & Associated Financial Impact for Telcos Mobile and fixed-line carriers lose $38B per year to fraud & revenue threats Premium rate service fraud cost victims $3.8B globally last year Roaming Fraud cost the industry $6.1B globally last year Source- Communications Fraud Control Association (CFCA)
  • 7. 7© Cloudera, Inc. All rights reserved. Fraud Types & Methods Premium Rate Service Fraud Roaming Fraud International Revenue Share Fraud Subscription Fraud Domestic Revenue Share Fraud Wangiri Attack SMS Phishing PBX Hacking Identity Theft …… FRAUD TYPE FRAUD METHOD Increasing Complexity of Fraud Types & Nature of Attacks
  • 8. 8© Cloudera, Inc. All rights reserved. Legacy Systems Don’t Work Anymore… The Legacy Defense Approach The New Sophisticated Global Attack Threat • Batch File Ingestion • Discover Threats Too Late • Rules Based • Don’t Discover Zero-Day Attack Methods • False Positive Overload • Data Silos • No Crime 360 Signals • Flat World Forensics • Discover Incident not Crime Rings • High Cost Proprietary Architecture • Limited Data due to cost constraints
  • 9. 9© Cloudera, Inc. All rights reserved. Legacy Defense Approach vs. Hadoop & Machine Learning The Legacy Defense Approach • Batch File Ingestion • Discover Threats Too Late • Rules Based • Don’t Discover Zero-Day Attack Methods • False Positive Overload • Data Silos • No Crime 360 Signals • Flat world Forensics • Discover Incident not Crime Rings • High Cost Proprietary Architecture • Limited Data due to cost constraints The Hadoop & Machine Learning Approach • Real-Time Packet Ingestion • Discover in Seconds vs. Hours or Days • Real-Time Anomaly Detection • Discover 250% to 350% More Fraud • 20 to 30 Times Less False Positives • Hadoop based Enterprise Data Hub • Discover Crime 360 Signals • Graph based Visual Analytics • Discover Crime Rings • Native Hadoop Architecture • Unlimited Data Storage & Analytics
  • 10. 10© Cloudera, Inc. All rights reserved. Polling Question What are your plans for using Hadoop for Fraud Analytics o We already use Hadoop today for Fraud Analytics o We currently use Hadoop, but not for Fraud o We would look to potentially utilizing Hadoop for Fraud o We have no plans for Hadoop o Not Applicable/ Don’t Know
  • 11. 11© Cloudera, Inc. All rights reserved. Real-Time Fraud Analytics Solution DPI/File Ingestion – Files, Packets & Database Feature Enrichment Mobile Call Fixed Call VoIP Call Data BSS Systems ISUP, TD.35, TD.57, MAP, SMS, BSSAP ISUP, Diameter SIP, H.323, Diameter Viber, Whatsapp GTP, Diameter Billing, CRM, Others BSS Data Sources
  • 12. 12© Cloudera, Inc. All rights reserved. Real-Time Fraud Analytics Solution Security and Administration Ingest Sqoop, Flume Transform MapReduce, Hive, Pig, Spark Analytic Database Impala Search Solr Machine Learning SAS, R, Spark, Mahout NoSQL Database HBase Streaming Spark Streaming Unlimited Storage HDFS, Hbase, Kudu YARN, Cloudera Manager, Cloudera Navigator Cloudera Enterprise Hadoop Platform Process Discover Model Serve DPI/File Ingestion – Files, Packets & Database Feature Enrichment Mobile Call Fixed Call VoIP Call Data BSS Systems ISUP, TD.35, TD.57, MAP, SMS, BSSAP ISUP, Diameter SIP, H.323, Diameter Viber, Whatsapp GTP, Diameter Billing, CRM, Others BSS Data Sources
  • 13. 13© Cloudera, Inc. All rights reserved. Real-Time Fraud Analytics Solution Security and Administration Ingest Sqoop, Flume Transform MapReduce, Hive, Pig, Spark Analytic Database Impala Search Solr Machine Learning SAS, R, Spark, Mahout NoSQL Database HBase Streaming Spark Streaming Unlimited Storage HDFS, Hbase, Kudu YARN, Cloudera Manager, Cloudera Navigator Cloudera Enterprise Hadoop Platform Process Discover Model Serve DPI/File Ingestion – Files, Packets & Database Feature Enrichment Mobile Call Fixed Call VoIP Call Data BSS Systems ISUP, TD.35, TD.57, MAP, SMS, BSSAP ISUP, Diameter SIP, H.323, Diameter Viber, Whatsapp GTP, Diameter Billing, CRM, Others BSS Data Sources Fraud Threat Analytics Machine Learning Profit/ SLA Threat Analytics Forensic Analytics (Graph) Argyle Data - Fraud Analytics Platform
  • 14. 14© Cloudera, Inc. All rights reserved. Domestic Fraud Wangiri Attack Forensics Crime Ring Discovery Roaming Fraud SLA Revenue Clawback Live Demo - Three Fraud Scenarios - Brazilian Operator
  • 15. 15© Cloudera, Inc. All rights reserved. Real-Time Fraud Analytics - Demo
  • 16. 16© Cloudera, Inc. All rights reserved. Solution Benefits – Cloudera|Argyle Data • Discover fraud in seconds versus hours or days • 250% to 350% better fraud discovery • 20 to 30 times less false positives • Prevents millions in revenue leakage • Visual patterns that make fraud, profit or SLA threats obvious • Interactive dashboards that discover crime rings and flows otherwise not detectable Wangiri Attack – Visual Graphic
  • 17. 17© Cloudera, Inc. All rights reserved. Thank you

Notes de l'éditeur

  1. Telco Fraud is a $38 Billion industry today – huge market and it is a global problem – It is not a third world problem http://www.nytimes.com/2014/10/20/technology/dial-and-redial-phone-hackers-stealing-billions-.html?_r=0 Hackers had broken into the phone network of the company, Foreman Seeley Fountain Architecture, and routed $166,000 worth of calls from the firm to premium-rate telephone numbers in Gambia, Somalia and the Maldives. It would have taken 34 years for the firm to run up those charges legitimately, according to a complaint it filed with the Federal Communications Commission. The firm, in Norcross, Ga., was the victim of an age-old fraud that has found new life now that most corporate phone lines run over the Internet. http://www.ibtimes.com/inside-story-how-pakistan-took-down-fbis-most-wanted-cybercriminal-1860808 http://www.premiumrateinternational.com/countries.php
  2. IRSF- International revenue share fraud (IRSF) - involves artificially inflating traffic to a foreign number. IRSF, is usually combined with premium rate service fraud. ISRF is driven by both connection charges and by the number of minutes consumed. Certain countries have particularly high interconnection fees and are a focus for IRSF. These fees are highest in the Caribbean (including Cuba) and many small countries in the Pacific.   Two individuals were arrested recently for gaining access to business telephone systems and using the systems to place international telephone calls to premium rate numbers. This cost the victims more than US$50 million.
  3. Every year, the telco industry loses $38 Billion to fraud and Roaming Fraud takes the biggest hit: about $6 billion globally and almost $2 billion in North America and Western Europe. Criminals are adopting newer techniques to perpetrate fraud quickly and more efficiently than ever before. A cyberfraud gang can set up, go to work and disappear in 24 hours or less, often before an operator even knows the fraud or arbitrage attack is happening. Modern, sophisticated attacks are mutating and continually evolving. ---------------------------------- Roaming Fraud: When roaming, the call data is collected by the visiting network, which can be a nearby operator just as easily as it could be one half way across the world. The call detail record (CDR) for these roaming charges doesn’t arrive to the home network until days sometimes weeks later, leaving a large window of opportunity for fraudulent attacks. Domestic revenue share fraud pertains to the abuse of carrier interconnect agreements and is very similar to international revenue share fraud and premium rate service fraud. In all three scenarios, there is an artificial inflation of traffic to a premium rate phone number. The scheme is fairly simple: A fraudster gets hold of a premium rate service number – a phone number where a portion of the charges goes to the operator and not only the phone carrier like with regular phone numbers – and inflates the traffic to the service to generate more revenue. Roaming fraud is the responsibility of the home network of the subscriber, providing that the visiting network meets its Service Level Agreement (SLA) commitments (typically 4 hours). This time window is critical, because: If the SLA is met the financial responsibility is in the hands of the home network. If the SLA is not met the financial responsibility is in the hands of the visiting network.
  4. Many carriers are trying to defend themselves with legacy approaches and technologies that don’t work anymore. Legacy systems rely on: • Batch processing – Typically discovers threats 24 – 48 hours after it has occurred – discovers threats too late- Goal for operators should be to reduce the window from 24 hours to discovering fraud within seconds or minutes… • They are Rules based - and discover only old known, patterns of fraud – Cannot detect net new attacks or they overload the analyst with false positives – So the real attack may be 1000 on the list of alerts • Silos of data that sits across multiple systems – Legacy systems are able to look at only a fraction of data and can never really give you a 360 degree view of fraud. In terms of data we are talking about an Average of 35 – 60 Billion CDRs a day & 1.5 Trillion events/ day for a Tier 1 Mobile organization So how do you look for fraud signals in this mountain of data and bring out meaningful threat analytics? This is really where a Hadoop & Machine learning comes into picture. Using Hadoop you can utilize all of your data and you look for fraud signals in more data, more often and in real-time This is where Hadoop & machine Learning really excels in– You Need a Big Data platform to look at this scale of data in real-time and drive Machine learning & real-time analytics on this data. Existing systems simply don’t work anymore. They either: • Fail - Don’t discover new threats or “zero-day” fraud attacks • Overwhelm – Bombard users with false positives • Operate in Batch – Discovering fraud threats too late Scale of Data in Telcos - Average of 35 Billion CDRs a day – for a NA Service Provider 1.5 Trillion events/ day – This is really where a Big Data Platform or an Enterprise Data Hub comes into picture
  5. You can discover Fraud that you didn't’t know existed earlier You can also discover net new attacks
  6. At this point I want to open up to a polling question, to try and understand from you – where you are with respect to the IoT journey within your organization. We’ll give it about 20sec so that everyone can answer – I already see a lot of responses coming in ------------------- Very consistent with what we see in the market In line with what we hear from our customers as well.
  7. This is where Hadoop & machine Learning really excels in– You Need a Big Data platform to look at this scale of data in real-time and drive Machine learning & real-time analytics on this data. Cloudera has teamed up with Argyle Data to deliver a next generation, native-Hadoop, real-time, fraud analytics platform that is tailored for today’s Communication Service Providers. This enables is CSPs to take advantage of all the data they have at their disposal to easily and effectively identify fraud and revenue threats in real-time. Real-Time Data Ingest: we can look at data from a multitude of sources including - mobile call packets, fixed call packets, VoIP and Data packets (including TD.35, CDR, TAP 3, ISUP, BSSAP, MAP, Diameter packets) straight from the switch – and effectively combine these data to uncover fraud. Looking at more data in real-time across multiple sources or silos enables better fraud detection. All of this data is stored in a an Cloudera enterprise data hub, where you can combine, Process, Analyze all this data to detect anomalies. The Argyle Solution sits on top – tightly integrated with Cloudera – extensively utilize Impala and also Sentry for security. Argyle Data Solution- The first is the Fraud analytics application – used for real-time fraud detection, the second is around profit threat or SLA analytics (important because most fraud happens in roaming and there is an SLA between Service providers when a subscriber is roaming) and the third one is Forensic Analytics – this basically enables you look at an attack and see if it is an individual doing the damage or if there is a crime ring involved. The application lets you detect crime rings in a very intuitive and visual fashion and it has the ability to show 1,2,3or 4 degrees of separation (like in LinkedIN) to discover crime rings. Real- Time Machine Learning & Anomaly Detection: As entries are stored, probabilities are generated by comparing the new entries with historic patterns in real-time enabling quicker fraud detection Real- Time Analytics: Machine learning driven threat scoring prioritizes fraud threat attacks, allowing analysts to effectively use their time inspecting real threats. Real-time fraud alerts are sent based on anomalies detected by the machine learning system Real- Time Threat Visualization: Platform combines massive amounts of roaming data, real-time network data, and business data into one simple easy-to-use graph analysis dashboard – makes fraud detection easy & obvious.
  8. This is where Hadoop & machine Learning really excels in– You Need a Big Data platform to look at this scale of data in real-time and drive Machine learning & real-time analytics on this data. Cloudera has teamed up with Argyle Data to deliver a next generation, native-Hadoop, real-time, fraud analytics platform that is tailored for today’s Communication Service Providers. This enables is CSPs to take advantage of all the data they have at their disposal to easily and effectively identify fraud and revenue threats in real-time. Real-Time Data Ingest: we can look at data from a multitude of sources including - mobile call packets, fixed call packets, VoIP and Data packets (including TD.35, CDR, TAP 3, ISUP, BSSAP, MAP, Diameter packets) straight from the switch – and effectively combine these data to uncover fraud. Looking at more data in real-time across multiple sources or silos enables better fraud detection. All of this data is stored in a an Cloudera enterprise data hub, where you can combine, Process, Analyze all this data to detect anomalies. The Argyle Solution sits on top – tightly integrated with Cloudera – extensively utilize Impala and also Sentry for security. Argyle Data Solution- The first is the Fraud analytics application – used for real-time fraud detection, the second is around profit threat or SLA analytics (important because most fraud happens in roaming and there is an SLA between Service providers when a subscriber is roaming) and the third one is Forensic Analytics – this basically enables you look at an attack and see if it is an individual doing the damage or if there is a crime ring involved. The application lets you detect crime rings in a very intuitive and visual fashion and it has the ability to show 1,2,3or 4 degrees of separation (like in LinkedIN) to discover crime rings. Real- Time Machine Learning & Anomaly Detection: As entries are stored, probabilities are generated by comparing the new entries with historic patterns in real-time enabling quicker fraud detection Real- Time Analytics: Machine learning driven threat scoring prioritizes fraud threat attacks, allowing analysts to effectively use their time inspecting real threats. Real-time fraud alerts are sent based on anomalies detected by the machine learning system Real- Time Threat Visualization: Platform combines massive amounts of roaming data, real-time network data, and business data into one simple easy-to-use graph analysis dashboard – makes fraud detection easy & obvious.
  9. This is where Hadoop & machine Learning really excels in– You Need a Big Data platform to look at this scale of data in real-time and drive Machine learning & real-time analytics on this data. Cloudera has teamed up with Argyle Data to deliver a next generation, native-Hadoop, real-time, fraud analytics platform that is tailored for today’s Communication Service Providers. This enables is CSPs to take advantage of all the data they have at their disposal to easily and effectively identify fraud and revenue threats in real-time. Real-Time Data Ingest: we can look at data from a multitude of sources including - mobile call packets, fixed call packets, VoIP and Data packets (including TD.35, CDR, TAP 3, ISUP, BSSAP, MAP, Diameter packets) straight from the switch – and effectively combine these data to uncover fraud. Looking at more data in real-time across multiple sources or silos enables better fraud detection. All of this data is stored in a an Cloudera enterprise data hub, where you can combine, Process, Analyze all this data to detect anomalies. The Argyle Solution sits on top – tightly integrated with Cloudera – extensively utilize Impala and also Sentry for security. Argyle Data Solution- The first is the Fraud analytics application – used for real-time fraud detection, the second is around profit threat or SLA analytics (important because most fraud happens in roaming and there is an SLA between Service providers when a subscriber is roaming) and the third one is Forensic Analytics – this basically enables you look at an attack and see if it is an individual doing the damage or if there is a crime ring involved. The application lets you detect crime rings in a very intuitive and visual fashion and it has the ability to show 1,2,3or 4 degrees of separation (like in LinkedIN) to discover crime rings. Real- Time Machine Learning & Anomaly Detection: As entries are stored, probabilities are generated by comparing the new entries with historic patterns in real-time enabling quicker fraud detection Real- Time Analytics: Machine learning driven threat scoring prioritizes fraud threat attacks, allowing analysts to effectively use their time inspecting real threats. Real-time fraud alerts are sent based on anomalies detected by the machine learning system Real- Time Threat Visualization: Platform combines massive amounts of roaming data, real-time network data, and business data into one simple easy-to-use graph analysis dashboard – makes fraud detection easy & obvious.
  10. A live dashboard showing Roaming Fraud in Colombia