Like many industries undergoing transformation, the Infrastructure/Security/Compliance function within large telecom companies is becoming more data driven. Flutura Decision Sciences has been at the forefront of some cutting edge use cases for Telecom Infrastructure/Security Intelligence. Here are 3 powerful use cases which vividly bring out new possibilities in Telecom big data
In most organisations the contact centre channel data is analyzed typically from a SLA(Service Level Agreement perspective). For example TAT (Turnaround time), Average wait time etc. But the actual transcript of the conversation can yield powerful insights regarding telecom infrastructure usage. Surge in Contact centre keyword frequency as a lead indicator to infrastructure bottlenecks.
Telecom providers are competing with each other to get greater ARPU (Average revenue per user) from data services as opposed to voice services. In this competitive environment a telecom provider launched a new but extremely viral gaming application on Mobile devices. A few days after its launch it started observing a burst of calls to the call centres and on text mining the transcript Data Scientists found a sharp spike in the keywords alluding to performance. The specific intelligence regarding keyword burst and specific time of day at which this was encountered was shared with the infrastructure planning group which then put a plan in place to throttle the bandwidth dynamically based on usage.
This is a security use case where if an investigation team wants to find out if there were multiple phones with the same person. When a call is made typically the following data points are captured - subscriber , date, time, and duration. Depending on the type of call, additional data can be gathered, including switch data, cell tower IDs, device identification (serial) numbers, as well as International Mobile Subscriber Identity (IMSI) and International Mobile Equipment Identity (IMEI) codes. The unique ID of the cell tower a handset was connected to when a connection was made is one of the most important components for collocation analysis
By examining terabytes of CDR/Tower records from the switch one can triangulate on a few collocation events. A co-location event can be defined as the same cellphone tower being used to route calls during a specific point in time. This is almost like looking for a needle in a haystack and traditional solutions would have trouble handling the massive volume of tower and switch data. But with a combination of massive Hadoop clusters and columnar database architecture, these queries can be executed at lightning speed to surface a significant few events of interest from the massive ocean of log data across devices
Telecom use case-3 : Multi device event stream analysis co-relating Firewall & IDS & Switch activity
Typically in most telecom infrastructures IDS ( Intrusion detection systems ) sit at the periphery of the network monitoring malicious activity and recording the same as log entries or alarm events into a log file. Firewalls and application logs also store a plethora of important events which if triangulated thru a central log repository to provide a comprehensive picture of any patterns which are dormant in the attack
One key components to enabling a Central Log File repository with events streaming from multiple devices which are ingested and collated centrally. Once this central log file is set up to store the torrent of event data, it can be channelized into intelligence to optimize network infrastructure and aid security of the telecom assets. Flutura Decision Sciences is convinced that setting up of a Network Intelligence team consisting of Security experts and Data Scientists who work in a collaborative fashion can yield dramatic game changing insights to catapult an organisation to the next level