Have a personal or library account? Click to login

Establishing software-defined network for fraud detection on energy fraud and traffic classification test case(s)

Open Access
|Aug 2025

Figures & Tables

Figure 1:

Software-defined network controller architecture. SDN, Software-Defined Networking.
Software-defined network controller architecture. SDN, Software-Defined Networking.

Figure 2:

SDN controller overlooking Metro domain, Core domain, and Center domain. SDN, Software-Defined Networking; VPN, Virtual Private Network.
SDN controller overlooking Metro domain, Core domain, and Center domain. SDN, Software-Defined Networking; VPN, Virtual Private Network.

Figure 3:

Layered Software-Defined Network on a virtual platform for service provisioning. VNF, Virtual Network Function.
Layered Software-Defined Network on a virtual platform for service provisioning. VNF, Virtual Network Function.

Figure 4:

Detailed layered Software-Defined Network setup. CNF, Container Network Function; SDN, Software-Defined Networking; VNF, Virtual Network Function.
Detailed layered Software-Defined Network setup. CNF, Container Network Function; SDN, Software-Defined Networking; VNF, Virtual Network Function.

Figure 5:

7-day user stats on average of a sample of ().
7-day user stats on average of a sample of ().

Figure 6:

7-day user stats showing network abuse.
7-day user stats showing network abuse.

Figure 7:

Billing flow—High level.
Billing flow—High level.

Figure 8:

Traffic Classification Framework.
Traffic Classification Framework.

Figure 9:

Online Cloud Fraud prediction.
Online Cloud Fraud prediction.

Figure 10:

ATLAS showing activities within 24 hr.
ATLAS showing activities within 24 hr.

Figure 11:

Summary report of High Alert.
Summary report of High Alert.

j_ijssis-2025-0043_tab_003

The components are shown below
CBPConvergent Billing Point implements rating, charging, and accounting functions and supports both online charging and offline charging, also providing real-time QoS control, and this is triggered based on the threshold configured in the tariff.
DCC ProxyThe function supports the specific demands of Diameter Charging—a dedicated online mediation instance, to take control of any internal routing of Diameter traffic based on subscriber.
GGSNManages data sessions and integrates with Online Charging System for real-time data rating and charging.
F5F5 Distributed Cloud Services Billing service enables a subscriber to understand usage reports, quotas, and pricing, obtain usage reports, and switch between subscription plans.

Fraud detection methods

Classification methodDescriptionLimitationReference
XGBoostThe method uses a gradient-boosting framework to build full-scale decision trees and implement parallel decision trees.Trends to overfit the data.Sheng and Yu (2022), Bao, (2020)
ADABoostThe technique handles binary classification problems and improves predictability by the conversion of a larger number of weak learners into strong learners.The requirement of a dataset devoid of most of the noise.Yulita et al. (2021), Chang and Fan (2019)
Naive BayesThe method is based on Bayes’ theorem to predict the outcome by the probability of occurrence.The downfall is faced by the zero-frequency issue, which is the missing variable as zero.Vijay and Verma (2023), Hairani et al. (2021)
Decision Tree ClassifierThe algorithm uses classification and regression problems, and it works on a tree-based structure, which serves as the classifier of the dataset.High in computation of resources and changes in data affect the outcome.Zulfikar et al. (2018), Indumathi et al. (2021)
Random Forest classifierThe technique allows aggregation of several Decision Tree classifiers to improve the predictive capability of the algorithms.The issue on the massive amount of computational resources and the time required between periods.Mishra et al. (2020), Lu et al. (2019)
KNNThe method is used for classification on a distance-based approach to locate all unknown data points.The downfall does not work on high dimensionality or large records.Lu et al. (2015), Altay (2022)
Logistic RegressionThe techniques are used for dichotomous and dependent variables.The issue is on overfitting the count of features and recorded observations.Doss and Gunasekaran (2023), Bheemesh and Deepa (2023)

Overview of cloud key services

ServiceDescriptionAWSAzureGCP
ComputingVirtual machines and scalable computing resourcesEC2Virtual machinesCompute engine
Object storageStorage for unstructured data in objectsS3Blob storageCloud storage
Block storageStorage for data in blocks, similar to traditional hard drivesEBSDisk storagePersistent disk
Database (relational)Managed relational database servicesRDSSQL databaseCloud SQL
Database (NoSQL)Managed NoSQL database servicesDynamoDBCosmos DBFirestore/datastore
CDNGlobal distribution of content to reduce latency and improve performanceCloudFrontAzure CDNCloud CDN
Serverless computingRunning code without managing server infrastructureLambdaFunctionsCloud functions
Big data processingProcessing and analyzing large datasetsEMRHDInsightDataproc
Machine learningProvision of services and tools for machine learningSageMakerMachine Learning StudioAI platform
Identity and access managementManagement of users and permissionsIAMAzure ADCloud IAM
Monitoring and loggingMonitoring and logging of applications and infrastructureCloudWatchAzure monitorStackdriver (operations)
NetworkingManagement of networks and their securityVPCVirtual networkVPC
Container orchestrationManagement and orchestration of containersEKSAKSGKE
Data warehousingStorage and analysis of large amounts of structured dataRedshiftSynapse analyticsBigQuery
Backup and disaster recoveryBackup and recovery of dataBackupAzure backupBackup
Language: English
Submitted on: Jan 22, 2025
Published on: Aug 22, 2025
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2025 Elisha Indarjit, Vipin Balyan, Marco Adonis, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.