Real time detection of the fraudulent use of a telecommunications network
is accomplished by analyzing data for each call that is occurring within
the network. A signal protocol receiver is used to collect signaling
protocol for each call that is occurring within the network. The
Signaling protocol data is collected, decoded and formatted into call
information records (CIRs). The CIRs contain various operator specified
parameters for each call that is occurring within the network. The CIRs
are compared to operator defined thresholds. If any of the CIRs exceeds
the thresholds, an alert is generated. The alerts are stored in a
database where the operator can analyze them and take the appropriate
corresponding action to resolve the alert. The alerts and the CIRs are
archived in a database so that trends of fraudulent use can be detected
and prevented. This method of fraud detection provides for the effective
analyzation of every call that is occurring within the network.
Accordingly, no call goes unanalyzed and ideally no fraud goes
undetected. Additionally, the method does not impose an additional load
on the network switching equipment and therefore results in a better
quality of transmissions.