ARTIFICIALLY INFLATED TRAFFIC IN A2P MESSAGING: WINDOW-BASED DETECTION MODELS AND PREFIX-LEVEL ANALYSIS FOR FRAUD MITIGATION
DOI:
https://doi.org/10.18372/2310-5461.69.20735Keywords:
AIT, fraud detection, SMS, CPaaS, prefix clustering, rolling windows, entropy, IGDP, PDGAbstract
The article examines the growing problem of Artificially Inflated Traffic (AIT) in Application-to-Person (A2P) SMS delivery and introduces an interpretable, metadata-driven framework for detecting and mitigating such fraud in real time. The study highlights how AIT exploits legitimate messaging pathways, generating rapid or distributed bursts of outbound traffic toward sequential or closely grouped MSISDN ranges. These patterns impose substantial financial losses on enterprises and CPaaS providers while degrading delivery efficiency metrics.
To address these vulnerabilities, the paper proposes a prefix-level analytical approach based on fixed and rolling time-window aggregation, message-count and unique-MSISDN thresholds, and entropy-based evaluation of MSISDN distributions. The methodological toolkit includes large-scale empirical dataset analysis, comparative evaluation of detection latency and blocking efficiency, and integration of outcomes with previously introduced delivery performance metrics—the Intelligent Guaranteed Delivery Index (IGDP) and Price–Delivery Gap (PDG).
Experimental results show that fixed-window analysis achieves up to 96% mitigation for high-intensity AIT bursts, while rolling windows enable earlier detection of short-lived anomalies. The study also reveals that threshold-based detection models may misclassify legitimate marketing campaigns, emphasizing the need for auxiliary features such as sender behavior profiling, content-aware classification, and multi-resolution anomaly scoring. The paper concludes that transparent statistical models provide a robust baseline for AIT defense and outlines practical recommendations for enhancing fraud resilience in large-scale CPaaS infrastructures.
References
ITU. ICT Facts and Figures 2024. Geneva : International Telecommunication Union, 2024. URL: https://www.itu.int/itu-d/reports/statistics/facts-figures-2024/ (дата звернення: 13.12.2025).
GSMA Intelligence. The Mobile Economy 2024. London : GSM Association, 2024. URL: https://www.gsma.com/solutions-and-impact/connectivity-for-good/mobile-economy/the-mobile-economy-2024/ (дата звернення: 13.12.2025).
3GPP TR 23.840. SMS Evolution and Migration Specifications. 3rd Generation Partnership Project, 2023. URL: https://www.3gpp.org/dynareport/23840.htm (дата звернення: 13.12.2025).
Juniper Research. A2P Messaging Market Forecast 2023–2027. 2023. URL: https://www.juniperresearch.com/ (дата звернення: 13.12.2025).
GSMA Fraud and Security Group. SS7 Interconnect Security Monitoring and Firewall Guidelines (FS.11). Version 3.0. 2021. URL: https://www.gsma.com/ (дата звернення: 13.12.2025).
AdaptiveMobile Security. SS7 and Diameter Vulnerability Landscape: Threat Intelligence Report 2022. Dublin, 2022. URL: https://www.enea.com/solutions/signaling-security/ (дата звернення: 13.12.2025).
Communications Fraud Control Association (CFCA). Global Fraud Loss Survey 2023. CFCA, 2023. URL: https://cfca.org/telecommunications-fraud-increased-12-in-2023-equating-to-an-estimated-38-95-billion-lost-to-fraud/ (дата звернення: 18.12.2025).
Proofpoint. SMS Pumping Fraud: Threat Landscape Report 2024. Sunnyvale, 2024. URL: https://www.proofpoint.com/us/resources/threat-reports/state-of-phish (дата звернення: 18.12.2025).
Mobile Ecosystem Forum (MEF). Business Messaging Fraud Report 2023. MEF, 2023. URL: https://mobileecosystemforum.com/mef-anti-fraud-yearbook-2024/ (дата звернення: 18.12.2025).
Grand View Research. A2P Messaging Market Size, Share & Trends Analysis Report, 2025–2030. San Francisco, 2024. Report ID: GVR-1-68038-842-8. URL: https://www.grandviewresearch.com/ (дата звернення: 19.12.2025).
Grand View Research. North America A2P Messaging Market Outlook 2030. San Francisco, 2024. URL: https://www.grandviewresearch.com/ (дата звернення: 19.12.2025).
MarketsandMarkets. A2P Messaging Market — Global Forecast to 2029. Pune, 2024. Report Code: TC 2585. URL: https://www.marketsandmarkets.com/ (дата звернення: 20.12.2025).
GSMA Fraud and Security Group. SMS Firewalls and Anti-Fraud Best Practices (FS.19). Version 2.0. London: GSMA, 2023. URL: https://www.gsma.com/ (дата звернення: 20.12.2025).
Communications Fraud Control Association (CFCA). Artificially Inflated Traffic and SMS Pumping Fraud Overview. CFCA, 2023. URL: https://cfca.org/ (дата звернення: 20.12.2025).
Mobile Ecosystem Forum (MEF). AIT and SMS Pumping: Industry Overview. MEF, 2023. URL: https://mobileecosystemforum.com/enterprise-mobile-messaging-fraud-framework/ (дата звернення: 20.12.2025).
Juniper Research. Mobile Messaging Market Trends and Enterprise Use Cases 2024. Basingstoke, 2024. URL: https://www.juniperresearch.com/ (дата звернення: 20.12.2025).
AdaptiveMobile Security. Messaging Abuse and A2P Fraud Trends. Threat Report Series 2022–2024. Dublin, 2024. URL: https://www.enea.com/ (дата звернення: 20.12.2025).
Одарченко М. В. Сучасні виклики безпеці послуг SMS та сигнальних мереж. Київ: Національний авіаційний університет, 2024. 120 с.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Science-based technologies

This work is licensed under a Creative Commons Attribution 4.0 International License.
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.




