Assessing Mobile Network Fraud Threats and Prevention Strategies in Kenya
الملخص
Background: Mobile network technology has exponentially advanced in the last decade and with this development, fraud activities have risen in equal measure resulting in companies and customers losing huge amounts of money as a result of, especially in developing economies that lag in the regulatory frameworks when it comes to Mobile network fraud. The purpose of the study was to explore Mobile network fraud in Kenya identifying the most common types of fraud, ways which service providers and regulators are employing to prevent or reduce fraud, methods currently used to detect fraud, and gaps thereof. Finally, the effect of concept drift in the automated fraud detection process. Method: A qualitative research method was adopted for the study and using a semi-structured question guide, four focus group discussions composed of 23 participants were conducted. The criteria used for selecting and placing participants into focus groups considered the following: The expert area of the participant, years of experience in the fraud ecosystem of the participant, and the organization to which the participant is attached. The availability and willingness of the participants were also considered in the selection process. The focus group approach was selected as it facilitated balanced discussion amongst all the players in the Kenyan fraud ecosystem, harnessing the power of group dynamics as it involved the regulators and the service providers who were drawn from different organizations. Results: The mobile network fraud ecosystem was stratified into three dimensions namely Fraud prevention which looked at the policies and methods used by both regulators and service providers to reduce fraud, Fraud categorization which aimed at categorizing different types of mobile frauds, and finally the Fraud detection which looked at the current tools being used to detect fraud. From the study, it emerged that although the regulators have provided strict guidelines on the customer onboarding process, not all service providers are currently using biometric approaches while onboarding new customers as this was highlighted as the entry point of most fraud cases. The study established five major types of Mobile network fraud in Kenya: SIM swap, SIM boxing, Wangiri, Commission arbitrage, and Hoax SMS and scams. Most of this fraud is committed using either SMS or voice channels; in some cases, both channels are used. Different matrixes derived from multiple factors are used by service providers while evaluating the criticality of fraud cases though not enforced by the regulators. The study also revealed that most of the fraud detection processes amongst the service providers still use manual tools that constantly require human input. While some of the detection processes are automated, concept drift is a major challenge for automated classification models due to the constant evolution of fraud patterns. Conclusion: The study revealed gaps in Mobile Network fraud prevention processes in Kenya as service providers still use non-biometric customer validation processes that are open to forgery and exploitation. A strict customer onboarding process that is fully automated and integrated should be used to address this gap. In the fraud categorization, there is no clear universal categorization matrix to guide the service providers while assessing the criticality of fraud and in this regard, a qualitative scientific model should be developed and used by all the stakeholders as a reference point. When it comes to fraud detection, concept drift is a major challenge, and service providers in Kenya still rely on manual processes due to the dynamic nature of mobile fraud. This exposes a huge gap in the detection process and there is a need to address this by developing systems and processes that will automatically detect and react to concept drift while automating the detection processes.
التنزيلات
المراجع
Rupa et al., 2015, Cellular Network Fraud & Security, Jamming Attack and Defenses Available at: https://pdf.sciencedirectassets.com/280203/1- s2.0- S1877050916X00026/1- s2.0- S1877050916000405/main.pdf?X-Amz-Security
Ogwueleka, 2009 fraud detection in mobile communications networks using user profiling and classification techniques.
Available at: https://core.ac.uk/download/pdf/37370566.pdf
Yang et al. 2018, Mining Fraudsters and Fraudulent Strategies in Large-Scale Mobile Social Networks, Available at: https://ieeexplore.ieee.org/document/8744319
Philip et al., 2015, On arbitration, arbitrage and arbitrariness in financial markets and their governance: unpacking LIBOR and the LIBOR scandal. Available at: https://www.researchgate.net/profile/Philip-Ashton- 2/publication/275556489_On_Arbitration_Arbitrage_and_Arbitrariness_in_Financial_Markets_and_Their_Governance_Unpacking_LIBOR_and_the_LIBOR_Scandal/links/5b10028faca2723d99775354/On-Arbitration-Arbitrage-and-Arbitrariness-in-Financial-Markets-and-Their-Governance-Unpacking-LIBOR-and-the-LIBOR-Scandal.pdf
Snehal et al., 2019, Awareness of Sim Swap Attack.Available at: https://d1wqtxts1xzle7.cloudfront.net/59921743/215_Awareness_of_Sim_Swap_Attack20190703-77135-1etachf-libre.pdf?1562159287=&response-content-disposition=inline%3B+filename%3DAwareness_of_Sim_Swap_Attack.pdf&Expires=1718043928&Signature=MK9zvJb6Gps287s3jEyjpkvO9~9bEfb~dwP4l3Co2O9oqWO96DrTn7wzCH29Ua3Bm~1tOmFAxlD9IdYAgkXsfaXIgMW4okfjaR1dxmelM7qAVaWuU8VjCxgp2dOGUmc5K43DmebUySV~6s- 29e6NQOmI5deRql02yvQzRlMnanNZ-x5p7KR7ldVxQ0cidc6XhUCGCxtzVO8x~aie3Wgt0a2QCLyqi~4oCG1c8Tr7mlRFRb2mo0bB1lGWqXxTM0qjuJschVcxs-gzD2qydq-6jb1cuCwqux6~LSABs9LtazrW1UkQ3EuPbq1eXy7kw7xonn2Q1Rd4zkGcUx-bllV6Gg__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
Roger, 2023, SIM Swapping Attacks for Digital Identity Theft: A threat to financial services and beyond. Available at: https://www.researchgate.net/profile/Roger-Hallman/publication/376612643_SIM_Swapping_Attacks_for_Digital_Identity_Theft_A_threat_to_financial_services_and_beyond/links/658091b20bb2c7472bf3dd84/SIM-Swapping-Attacks-for-Digital-Identity-Theft-A-threat-to-financial-services-and-beyond.pdf
Biju, 2022, SMS Fraud Detection Using Machine Learning. Available at: https://www.researchgate.net/profile/Soumya- Prusty/publication/360371905_SMS_Fraud_Detection_Using_Machine_Learning/links/628781c5cd5c1b0b34e95817/SMS-Fraud-Detection-Using-Machine-Learning.pdf
David, 1996, Focus Groups.
Available at: https://www.researchgate.net/profile/David- Morgan- 43/publication/305389505_Focus_Groups/links/5bcaa150299bf17a1c61a4fe/Focus-Groups.pdf
Carey, 1994, Capturing the Group Effect in Focus Groups: A Special Concern in Analysis. Available at: https://journals.sagepub.com/doi/abs/10.1177/104973239400400108
ZhiYuan, 2020, Modeling Users’ Behavior Sequences with Hierarchical Explainable Network for Cross-domain Fraud Detection. Available at: https://arxiv.org/pdf/2201.01004
Tarmazakov et al., 2018 Modern approaches to prevent fraud in mobile communications networks. Available at: https://ieeexplore.ieee.org/abstract/document/8317111
J Gama et al., 2013, On evaluating stream learning algorithms. Available at: https://link.springer.com/article/10.1007/s10994-012-5320-9
Muriuki, 2017, Curbing Mobile Phone Terrorism and Financial Fraud: A Kenyan Perspective. Available at: https://www.researchgate.net/publication/317043444_Curbing_Mobile_Phone_Terrorism_and_Financial_Fraud_A_Kenyan_Perspective
Kala, 2021, Assessment of SIMBox Fraud: An Approach to National Security Threat. Available at: https://www.researchgate.net/profile/Kala- Baskar/publication/356914651_Assessment_of_SIMBox_Fraud_An_Approach_to_National_Security_Threat/links/61b71797a6251b553ab51ccc/Assessment-of-SIMBox-Fraud-An-Approach-to-National-Security-Threat.pdf
Nassir, 2020, Study to use NEO4J to analysis and detection SIM-BOX fraud. Available at: https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Study+to+use+NEO4J+to+analysis+and+detection+SIM-BOX+fraud&btnG=
Mais et al, 2018, Detection of Wangiri Telecommunication Fraud Using Ensemble Learning. Available at: https://www.researchgate.net/profile/George- Sammour/publication/333232206_Detection_of_Wangiri_Telecommunication_Fraud_Using_Ensemble_Learning/links/5d07d7f5a6fdcc35c155c208/Detection-of-Wangiri-Telecommunication-Fraud-Using-Ensemble-Learning.pdf
Jessica,2018, Detect & Protect Against Wangiri Callback Fraud.
Available at: https://www.enghousenetworks.com/enghouse- resources/blog/infographics/detect-protect-against-wangiri-callback-fraud/
Krueger, 1997, Developing Questions for Focus Groups. Available at: https://books.google.com.qa/books?hl=en&lr=&id=odtyAwAAQBAJ&oi=fnd&pg=PP1&dq=Krueger+1997&ots=gjBWeEvMPc&sig=EkX2FXV3nNefwiYrX1vO9aNparo&redir_esc=y#v=onepage&q=Krueger%201997&f=false
Geoffrey et al., 2016, Characterizing Concept Drift. Available at: https://arxiv.org/pdf/1511.03816
Tsymbal, 2004, The problem of concept drift: definitions and related work.
Available at: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=30eac73e9b482bc28b5b68cd585557de48d0618f
Sumaya et al., 2021, An Enhanced Secure Deep Learning Algorithm for Fraud Detection in Wireless Communication Available at: https://onlinelibrary.wiley.com/doi/10.1155/2021/6079582
Communication Authority of Kenya (CAK) report, 2019 Available at: https://www.ca.go.ke/sites/default/files/2023- 06/Customer_Satisfaction_Survey_Report_for_CA_June-2019.pdf
Communication Authority of Kenya (CAK), 2023 Available at: https://www.ca.go.ke/kenyan-mobile-sector-records-growth-revenue-and-investments
Braun et al., 2006, Using thematic analysis in psychology Available at: https://uwe-repository.worktribe.com/index.php/preview/1043068/thematic_analysis_revised_-_final.pdf
Aisha et al.,2016, Fraud detection system: A survey Available at: https://www.sciencedirect.com/science/article/abs/pii/S1084804516300571
Silverman, 2005, Improving the State of the Art of Qualitative Research Available at: https://www.qualitative- research.net/index.php/fqs/article/view/6/14
الحقوق الفكرية (c) 2024 James Mundia, Evans Kirimi Miriti, Stephen Mburu

هذا العمل مرخص حسب الرخصة Creative Commons Attribution 4.0 International License.