Real-Time Fraud Detection in Telecom Charging Systems Using AI

Authors

  • Vahitha Banu Independent Researcher, India. Author

DOI:

https://doi.org/10.56472/ICCSAIML25-163

Keywords:

Telecom Charging Systems, Fraud Detection, Artificial Intelligence, Machine Learning, Real-Time Analytics, Call Detail Records (CDRs), Variational Autoencoder-Generative Adversarial Network (VAE-GAN), Anomaly Detection, Behavioral Analytics, Device Fingerprinting

Abstract

Building upon the proposed VAE‑GAN architecture, our system incorporates dynamic feature enrichment by integrating device fingerprinting and behavioral analytics into the anomaly detection pipeline. Specifically, device-specific metadata such as SIM usage patterns, handset IMEI clustering, and network access behaviors are continuously fed into the VAE encoder, enabling the model to learn a richer representation of “normal” subscriber activity. The adversarial component (GAN discriminator) then sharpens the detection boundary by contrasting these learned patterns against synthetically generated anomalies. Such a dual-encoder framework not only improves the detection of subtle fraud variants like SIM box bypass or IRSF, but also enables the framework to adapt in-stream as fraudsters shift tactics. Preliminary results on CDR datasets show a marked increase in precision (up to ~93%) and recall (~90%) outperforming conventional autoencoder‑only models while maintaining low latency suitable for real-time telecom charging environments . Moreover, by leveraging continuous retraining on incoming call streams, the system exhibits resilience to concept drift, ensuring sustained performance in dynamic telecom ecosystems

Downloads

Download data is not yet available.

References

[1] Airtel launches India's first AI powered real-time 'fraud detection' tool: What it is and how it works. The Times of India.

[2] MRM Reethu, LNR Mudunuri, S Banala,(2024) "Exploring the Big Five Personality Traits of Employees in Corporates," in FMDB Transactions on Sustainable Management Letters 2 (1), 1-13

[3] S. Panyaram, “Integrating Artificial Intelligence with Big Data for RealTime Insights and Decision-Making in Complex Systems,” FMDB Transactions on Sustainable Intelligent Networks., vol.1, no.2, pp. 85–95, 2024.

[4] Swathi Chundru, Siva Subrahmanyam Balantrapu, Praveen Kumar Maroju, Naved Alam, Pushan Kumar Dutta, Pawan Whig, (2024/12/1), AGSQTL: adaptive green space quality transfer learning for urban environmental monitoring, 8th IET Smart Cities Symposium (SCS 2024), 2024, 551-556, IET.

[5] Kodi, D. (2023). “A Pythonic Approach to API Data Management: Fetching, Processing, and Displaying Data for Business Intelligence”. International Journal of Emerging Research in Engineering and Technology, 4(2), 33–42. https://doi.org/10.63282/3050-922X/IJERET-V4I2P104

[6] Optimizing Telecom Fraud Detection with Federated Learning. NStarX Inc. NStarX Inc.

[7] B. C. C. Marella, “Data Synergy: Architecting Solutions for Growth and Innovation,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 11, no. 9, pp. 10551–10560, Sep. 2023.

[8] Venu Madhav Aragani, 2025, “Optimizing the Performance of Generative Artificial Intelligence, Recent Approaches to Engineering Large Language Models”, IEEE 3rd International Conference On Advances In Computing, Communication and Materials.

[9] Pulivarthy, P., & Whig, P. (2025). Bias and fairness addressing discrimination in AI systems. In Ethical dimensions of AI development (pp. 103–126). IGI Global. Available online: https://www.igi-global.com/chapter/bias-and-fairness-addressing-discrimination-in-ai-systems/359640 (accessed on 27 February 2025).

[10] RK Puvvada . “SAP S/4HANA Finance on Cloud: AI-Powered Deployment and Extensibility” - IJSAT-International Journal on Science and …16.1 2025:1-14.

[11] Detecting Telecom Fraud with Machine Learning. Pingax.

[12] Gopichand Vemulapalli Subash Banala Lakshmi Narasimha Raju Mudunuri, Gopi Chand Vegineni ,Sireesha Addanki ,Padmaja Pulivarth, (2025/4/16). Enhancing Decision-Making: From Raw Data to Strategic Insights for Business Growth. ICCCT'25– Fifth IEEE International Conference on Computing & Communication Technologies. IEEE.

[13] S. Panyaram, "Automation and Robotics: Key Trends in Smart Warehouse Ecosystems," International Numeric Journal of Machine Learning and Robots, vol. 8, no. 8, pp. 1-13, 2024.

[14] Bhagath Chandra Chowdari Marella, “From Silos to Synergy: Delivering Unified Data Insights across Disparate Business Units”, International Journal of Innovative Research in Computer and Communication Engineering, vol.12, no.11, pp. 11993-12003, 2024.

[15] Fighting Telecom Fraud with Machine Learning. AI Shield.

[16] A. K. K, G. C. Vegineni, C. Suresh, B. C. Chowdari Marella, S. Addanki and P. Chimwal, "Development of Multi Objective Approach for Validation of PID Controller for Buck Converter," 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT), Bhimtal, Nainital, India, 2025, pp. 1186-1190, doi: 10.1109/CE2CT64011.2025.10939724.

[17] Sudheer Panyaram, (2025/5/18). Intelligent Manufacturing with Quantum Sensors and AI A Path to Smart Industry 5.0. International Journal of Emerging Trends in Computer Science and Information Technology. 140-147.

[18] Puvvada, R. K. "The Impact of SAP S/4HANA Finance on Modern Business Processes: A Comprehensive Analysis." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11.2 (2025): 817-825.

[19] Padmaja Pulivarthy. (2024/12/3). Harnessing Serverless Computing for Agile Cloud Application Development,” FMDB Transactionson Sustainable Computing Systems. 2,( 4), 201-210, FMDB.

[20] Mohanarajesh Kommineni (2024) “Investigate Methods for Visualizing the Decision-Making Processes of a Complex AI System, Making Them More Understandable and Trustworthy in financial data analysis” International Transactions in Artificial Intelligence, Pages 1-21

[21] BRIGHT -- Graph Neural Networks in Real-Time Fraud Detection

[22] L. Thammareddi, V. R. Anumolu, K. R. Kotte, B. C. Chowdari Marella, K. Arun Kumar and J. Bisht, "Random Security Generators with Enhanced Cryptography for Cybersecurity in Financial Supply Chains," 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT), Bhimtal, Nainital, India, 2025, pp. 1173-1178, doi: 10.1109/CE2CT64011.2025.10939785.

[23] Empowering the Future: The Rise of Electric Vehicle Charging Hubs - Sree Lakshmi Vineetha Bitragunta - IJLRP Volume 5, Issue 11, November 2024, PP-1-10, DOI 10.5281/zenodo.14945815.

[24] Leveraging Machine Learning Algorithms for Real-Time Fraud Detection in Digital Payment Systems. International Journal of Multidisciplinary Innovation

[25] Kotte, K. R., & Panyaram, S. (2025). Supply Chain 4.0: Advancing Sustainable Business. Driving Business Success Through Eco-Friendly Strategies, 303.

[26] Pulivarthy, P. (2023). ML-driven automation optimizes routine tasks like backup and recovery, capacity planning and database provisioning. Excel International Journal of Technology, Engineering and Management, 10(1), 22–31. https://doi.uk.com/7.000101/EIJTEM

[27] Kirti Vasdev. (2025). “Enhancing Network Security with GeoAI and Real-Time Intrusion Detection”. International Journal on Science and Technology, 16(1), 1–8. https://doi.org/10.5281/zenodo.14802799

[28] Marella, Bhagath Chandra Chowdari, and Gopi Chand Vegineni. "Automated Eligibility and Enrollment Workflows: A Convergence of AI and Cybersecurity." AI-Enabled Sustainable Innovations in Education and Business, edited by Ali Sorayyaei Azar, et al., IGI Global, 2025, pp. 225-250. https://doi.org/10.4018/979-8-3373-3952-8.ch010

[29] Puvvada, R. K. "SAP S/4HANA Cloud: Driving Digital Transformation Across Industries." International Research Journal of Modernization in Engineering Technology and Science 7.3 (2025): 5206-5217.

[30] A High Gain DC-DC Converter with Maximum Power Point Tracking System for PV Applications - Sree Lakshmi Vineetha Bitragunta, Lakshmi Triveni Mallampati, Vijayavani Velagaleti - IJSAT Volume 10, Issue 2, PP- 1-2, April-June 2019. DOI 10.5281/zenodo.14473958

[31] Venu Madhav Aragani and Mohanarajesh Kommineni Sudheer Panyaram,Sunil Kumar Sehrawat, Swathi Chundru, Praveen Kumar Maroju, (2025), AI and Robotics: A Symbiotic Relationship in Digital Manufacturing, IEEE.

[32] Chib, S., Devarajan, H. R., Chundru, S., Pulivarthy, P., Isaac, R. A., & Oku, K. (2025, February). Standardized Post-Quantum Cryptography and Recent Developments in Quantum Computers. In 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies (CE2CT) (pp. 1018-1023). IEEE.

[33] A Novel AI-Blockchain-Edge Framework for Fast and Secure Transient Stability Assessment in Smart Grids, Sree Lakshmi Vineetha Bitragunta, International Journal for Multidisciplinary Research (IJFMR), Volume 6, Issue 6, November-December 2024, PP-1-11.

[34] S. Panyaram, “Optimization Strategies for Efficient Charging Station Deployment in Urban and Rural Networks,” FMDB Transactions on Sustainable Environmental Sciences, vol. 1, no. 2, pp. 69–80, 2024.

[35] RK Puvvada . “SAP S/4HANA Finance on Cloud: AI-Powered Deployment and Extensibility” - IJSAT-International Journal on Science and …16.1 2025 :1-14.

[36] V. M. Aragani, “Reshaping the Global Financial Landscape: The Role of CBDCs, Blockchain, and Artificial Intelligence,” AVE Trends In Intelligent Technoprise Letters, vol. 1, no. 3, pp. 126–135, 2024.

[37] Kirti Vasdev. (2025). “Churn Prediction in Telecommunications Using Geospatial and Machine Learning Techniques”. International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences, 13(1), 1–7. https://doi.org/10.5281/zenodo.14607920

[38] Kommineni, M., & Chundru, S. (2025). Sustainable Data Governance Implementing Energy-Efficient Data Lifecycle Management in Enterprise Systems. In Driving Business Success Through Eco-Friendly Strategies (pp. 397-418). IGI Global Scientific Publishing.

[39] Puvvada, R. K. (2025). Enterprise Revenue Analytics and Reporting in SAP S/4HANA Cloud. European Journal of Science, Innovation and Technology, 5(3), 25-40.

[40] Mr. G. Rajassekaran Padmaja Pulivarthy,Mr. Mohanarajesh Kommineni,Mr. Venu Madhav Aragani, (2025), Real Time Data Pipeline Engineering for Scalable Insights, IGI Global.

[41] Maroju, P.K.; Bhattacharya, P. Understanding Emotional Intelligence: The Heart of Human-Centered Technology. In Humanizing Technology with Emotional Intelligence; IGI Global Scientific Publishing: Hershey, PA, USA, 2025; pp. 1–18.

[42] Divya K, “Efficient CI/CD Strategies: Integrating Git with automated testing and deployment”, World Journal of Advanced Research and Reviews: an International ISSN Approved Journal, vol.20, no.2, pp. 1517-1530, 2023.

[43] Lakshmi Narasimha Raju Mudunuri, Pronaya Bhattacharya, “Ethical Considerations Balancing Emotion and Autonomy in AI Systems,” in Humanizing Technology With Emotional Intelligence, IGI Global, USA, pp. 443-456, 2025.

[44] Khan, S., Noor, S., Awan, H.H. et al. “Deep-ProBind: binding protein prediction with transformer-based deep learning model”. BMC Bioinformatics 26, 88 (2025). https://doi.org/10.1186/s12859-025-06101-8.

[45] A. Garg, M. Pandey, and A. R. Pathak, “A Multi-Layered AI-IoT Framework for Adaptive Financial Services”, IJETCSIT, vol. 5, no. 3, pp. 47–57, Oct. 2024, doi: 10.63282/3050-9246.IJETCSIT-V5I3P105

[46] Venkata SK Settibathini. Enhancing User Experience in SAP Fiori for Finance: A Usability and Efficiency Study. International Journal of Machine Learning for Sustainable Development, 2023/8, 5(3), PP 1-13, https://ijsdcs.com/index.php/IJMLSD/article/view/467

Published

2025-05-18

How to Cite

1.
Banu V. Real-Time Fraud Detection in Telecom Charging Systems Using AI. IJETCSIT [Internet]. 2025 May 18 [cited 2025 Sep. 13];:571-82. Available from: https://ijetcsit.org/index.php/ijetcsit/article/view/303

Similar Articles

41-50 of 241

You may also start an advanced similarity search for this article.