Investigating the Effects of Threshold in Credit Card Fraud Detection System
|
|
|
- Jessica Gregory
- 10 years ago
- Views:
Transcription
1 International Journal of Engineering and Technology Volume 2 No. 7, July, 2012 Investigating the Effects of Threshold in Credit Card Fraud Detection System Alese B. K 1., Adewale O. S 1., Aderounmu G. A 2., Ismaila W.O. 3, Omidiora E. O. 3 1 Federal University of Technology, Akure., 2 Obafemi Awolowo University, Ile-Ife. 3 Ladoke Akintola University of Technology, Ogbomoso ABSTRACT In e-commerce, credit card fraud is an evolving problem. The growing number of credit card transactions provides more opportunity for thieves to steal credit card numbers and subsequently commit fraud. Credit card fraud can be perpetrated through stolen cards, counterfeit card and stolen card details. The defensive measure issuing bank can take to overcome this liability is by introducing fraud detection systems (FDSs) in their database. Although different methods have been implemented to detect fraud but application of probability and selection of threshold value add an extra advantage for FDS to detect anomalies in on-line transactions. Therefore this paper implements another method of selecting threshold values (dynamic/adaptive) based on individual cardholder spending profile. In order to increase the confidence of the threshold values the results are verified using performance metrics. The two methods were compared and the results showed that adaptive method is suitable for detecting fraud in credit card transactions. Keywords: e-commerce, fraud detection system, credit card transactions, adaptive method, performance metrics 1. INTRODUCTION Fraud is a big business. Calls, credit card numbers, and stolen accounts can be sold on the street for substantial profit. Some of the various kinds of frauds identified are; Computer Fraud, Insurance Fraud, Money Laundering; Medical fraud, Telecommunication Fraud and Credit Card Fraud. Credit card fraud is the act of making a purchase using someone else s credit card information. In e- commerce, credit card fraud is an evolving problem. The growing number of credit card transactions provides more opportunity for thieves to steal credit card numbers and subsequently commit fraud. This can be perpetrated by individuals, merchants and also lack of security that can lead to the compromise of credit card numbers stored in online databases (computer intrusion). Despite significant efforts by merchants, card issuers and law enforcement to curb fraud, online fraud continues to plague electronic commerce web sites. From the work of view for preventing credit card fraud, more research works were carried out with special emphasis on data mining and neural networks. For more information see Sam and Karl (2002) Kim and Kim (2002) Dipti, et al. (2010) and Qibei and Chunhua (2011). However, It has been stated as a fact by Sung et al (2009) that thresholding should be opted for two-class segmentation problems due to their simplicity. Early fraud detection algorithms often used thresholds to classify a task as legal/fraud. Threshold-based algorithms model group behavior based on a small number of control parameters (thresholds) that affect whether or not a particular task will be executed by a given swarm member based solely upon the intensity of the stimulus presented in comparison to the threshold currently assigned to the individual in question. There are two main classes of thresholds that have been applied in fraud detection viz; (i) Global/Fixed threshold, Albinav et al. (2008) developed a credit card fraud detection system using hidden Markov model and Fixed threshold to detect fraud; (ii) Dynamic/Adaptive threshold, in which the estimated thresholds are applicable to one or a group. Rupesh et al. (2007) developed a rule-based approach to detect anomalous telephone calls. This paper investigates the effect of adaptive threshold in detecting fraud in credit cards transactions. The rest of this paper, we will discuss the motivation of this research and the analysis and performance of threshold in section 2. Section 3 will concentrate on methodology and techniques used in producing the threshold values in credit card transactions and section 4 discuss the implementation and result of the research. Finally section 5give the conclusion of this research. 1.1 Motivation Selecting threshold value is necessary to help the fraud detection to make a good decision in identifying the anomaly. It is difficult to select the suitable threshold ISSN: IJET Publications UK. All rights reserved. 1328
2 value for differentiating between normal activity and abnormal activity in on-line transaction. Selecting inaccurate threshold value will cause an excessive false alarm especially if the value is too low or if it is too high, it can cause the anomaly activity being considered as normal transaction. Therefore selecting an appropriated threshold is important to detect the fraud activity. Albinav et al. (2008) developed a credit card fraud detection system using hidden Markov model and Viterbi algorithm as predictive model. The estimated probability of old and new transactions from Viterbi algorithm were used to derive the probability of acceptance of the new transactions. And hence, various thresholds were used to test whether the new transactions are fraud or legal and the threshold that gave minimum false alarm was selected as base threshold. However, an important drawback is that this method treats cardholders identically; and more so, if threshold is set so that it finds fraud for a small business line, then a large business is likely to trip the threshold routinely. 1.2 Threshold Analysis and Performance Threshold methods can be classified into five viz: (i) Basic/Fixed thresholding in which a particular threshold is selected as baseline for all the instances. When using basic threshold, a threshold value has to be selected somehow and usually manually; (ii) Band thresholding is similar to basic thresholding, but has two threshold values, which are set to maximum value and minimum value; (iii) Percentile is a method for choosing the threshold value to input to the basic thresholding algorithm. The threshold is chosen to be the intensity value where the cumulative sum of object intensities is closest to the percentile; (iv) Optimal thresholding selects a threshold value that is statistically optimal, based on the contents of the object; and (v) Dynamic/Adaptive threshold, in which the estimated thresholds are applicable to one or a group (the threshold adapts). See Per (2004) Artem and Roland (2003) for more information. There have been a number of survey papers on measuring the performance of threshold like in Sung etal (2009) Mehmet and Bulent (2004) Sieracki et al (1989) and Abak et al (1997). However, in this work, four performance criteria will be used to provide evidence that shows differing performance features of fixed and adaptive thresholding methods: true positive rate, false positive rate, accuracy and precision. It is common to call true positives hits, false positive false alarms, and precision specificity. The Specificity indicates the degree of misclassification of non-fraudulent events. If a test shows high a false positive value, the specificity becomes poor. True positive rate (or fraud catching rate) is the fraction of fraudulent transactions that are correctly identified as fraudulent. False Positive rate (or false alarm rate) is the fraction of legitimate transactions that are incorrectly identified as fraudulent. 2. METHOD In this work, the detection of fraud in credit card on-line transaction is used for experimentation. The process takes several steps which include; accumulation and clustering of data; mapping of data into hidden Markov model; training of data with HMM algorithms in two forms (i) non-optimized (forward-backward) and (ii) optimized (Baum-Welsh); prediction of hidden states in (i) nonoptimized (Viterbi) and (ii) optimized (posterior-viterbi); estimation of acceptance probabilities (Ф old ); new transactions are introduced and the processes are repeated and new acceptance probabilities are estimated (Ф new ); a global/fixed threshold (0.5) for all cardholders; and a model is being derived from estimated acceptance probability for each cardholder as follows: Let the quantity Ф = /Ф old Ф new /. If Ф 0, it means that the new sequence is accepted (although it could be a fraud). The newly added transaction is determined to be fraudulent if the acceptance probability is above a computed threshold. ( 0.5) threshold new 2 3. DISCUSSION OF RESULTS In this paper, four different profiles are considered. The profiles considered are ( ), ( ), (95 3 2) and ( ). Here, (a, b, c) represents a ls profile cardholder who has been found to carry out a percent of his transactions in the low, b percent in medium, and c percent in the high range. A simulated data of is used for training with HMM and the performance metrics used are true positive rate, false positive rate, accuracy and precision. The parameter settings of Abinav et al (2008) were employed. Different types of cardholder profiles were tested with four different schemes namely; optimized parameters with dynamic thresholds (Dyn_Opt_), non-optimized parameters with dynamic thresholds (Dyn_No_Opt_), optimized parameters with fixed threshold (Fix_Opt_), and non-optimized parameters with fixed threshold (Fix_No_Opt_). From figure 1, it can be seen that at (95 3 2) cardholder profile, Dyn_Opt_tp produced the highest true positive (tp) value of about 78%, followed by Dyn_No_Opt_tp with about 76%, Fix_Opt_tp produced about 59% while Fix_No_Opt_tp produced the least of about 52%. Also the same happened at ( ) profile, with Dyn_Opt_tp produced the highest value, followed by Dyn_No_Opt_tp and closely by Fix_Opt_tp and Fix_No_Opt_tp produced the least value. But at ( ) profile, the values ISSN: IJET Publications UK. All rights reserved. 1329
3 produced were low by all schemes and Dyn_Opt_tp and Dyn_No_Opt_tp produced the same values (about 42%) and so are the values produced by Fix_Opt_tp and Fix_No_Opt_tp of about 18% each. Figure 2 depicts that the false-positive (fp) performances of the four profiles against four different schemes profile produced the relatively lowest false-positive values which are about 2.0% produced by Dyn_Opt_fp scheme, 4.1% produced by Fix_Opt_fp, 4.2% produced by Dyn_No_Opt_fp and about 4.3% produced by Fix_No_Opt_fp. The worst and highest false-positive values were produced at profiles with about 18% produced by Fix_No_Opt_fp, about 11.6% produced by Fix_Opt_fp and Dyn_No_Opt_fp, and Dyn_Opt_fp produced about 10%. profile, Dyn_Opt_pre produced about 94%, Dyn_No_Opt_pre produced about 86%, while Fix_No_Opt_pre scheme produced (about 64%) a higher precision than Fix_Opt_pre (about 62%). But at profile, Dyn_Opt_pre produced about 70%, Dyn_No_Opt_pre produced about 58%, while Fix_Opt_pre scheme produced (about 62%) a higher precision than Fix_No_Opt_pre (about 43%). Figure 3: Graph of Precision averaged over all the 15 Figure 1: Graph of True-Positive averaged over all the 15 Also figure 4 shows the graphs of accuracy (acc) of the four profiles. At profile, Dyn_Opt_acc produced about 88%, Dyn_No_Opt_acc produced about 83%, Fix_Opt_acc producing about 82%, while Fix_No_Opt_acc producing about 78%. At profile, Dyn_Opt_acc produced about 82%, Dyn_No_Opt_acc produced about 74%, Fix_Opt_acc scheme produced about 84% ( higher precision than Dyn_Opt_acc), and Fix_No_Opt_acc produced about 68%). However, at profile, Dyn_Opt_acc produced about 84%, Dyn_No_Opt_acc produced about 72%, while Fix_No_Opt_acc and Fix_Opt_acc produced about 80% respectively. At profile, Dyn_Opt_acc produced about 86%, Dyn_No_Opt_acc produced about 78%, while Fix_Opt_acc scheme produced about 80% and Fix_No_Opt_acc produced about 70%. Figure 2: Graph of False-Positive averaged over all the 15 In figure 3, profile produced the highest precision (pre) values across all the schemes with Dyn_Opt_pre producing about 97%, Dyn_No_Opt_pre and Fix_No_Opt_pre producing about 94%, while Fix_Opt_pre producing about 91%. At profile, Dyn_Opt_pre produced about 93%, Dyn_No_Opt_pre produced about 90%, while Fix_Opt_pre scheme produced (about 84%) a higher precision than Fix_No_Opt_pre (about 78%). However, at Figure 4: Graph of Accuracy averaged over all the 15 ISSN: IJET Publications UK. All rights reserved. 1330
4 4. CONCLUSION In this paper, we introduced a new approach in detecting fraud in credit card transactions using adaptive threshold value. The threshold value is obtained using the average of initial threshold (0.5) and ratio of acceptance probabilities of old and new transactions estimated from HMM algorithms. The performance of the system was tested with different cardholder profiles cum nonoptimization and optimization of HMM parameters using some selected performance metrics. Thus the adaptive thresholds gave a better performance than fixed threshold. REFERENCES [1] Abak, T., Baris U., and Sankur, B. (1997). The performance of thresholding algorithms for optical character recognition, Intl. Conf. Document Anal. Recog. ICDAR 97, pp [2] Abhinav S., Amlan K., Shamik S. and Arun K. (2008). Credit Card Fraud Detection Using Hidden Markov Model, IEEE Transactions on Dependable and Secure Computing, vol. 5, no.1, [3] Artem L. Ponomarev and Ronald L. Davis (2003): An adjustable-threshold algorithm for the identification of objects in three-dimensional images, Bioinformatics 19(11) Oxford University. Vol. 19 no , pages [4] Becker R. A., Volinsky C, and Wilks A. (2010). Fraud Detection in Telecommunications: History and Lessons Learned, TECHNOMETRICS, Vol. 52, no. 1. [5] Dipti D.P., Sunita M.K., Vijay M.W., Gokhale J. A., Prasad S. H. (2010), Efficient Scalable Multi-Level Classification Scheme for Credit Card Fraud Detection, International Journal of Computer Science and Network Security, Vol.10, No.8. [6] Faizal M. A., Mohd Zaki M., Shahrin S., Robiah Y, Siti Rahayu S., Nazrulazhar B. (2009) Threshold Verification Technique for Network Intrusion Detection System International Journal of Computer Science and Information Security, Vol. 2, No.1. [7] Kim M.J. and Kim T.S., (2002) A Neural Classifier with Fraud Density Map for Effective Credit Card Fraud Detection, Proc. International Conference on Intelligent Data Engineering and Automated Learning, Lecture Notes in Computer Science, Springer Verlag, no. 2412, pp [8] Moysan J., Corneloup G., and Sollier T., (1999). Adapting an ultrasonic image threshold method to eddy current images and defining a validation domain of the thresholding method, NDT & E Intl. 32, [9] Mehmet Sezgin, Bulent Sankur (2004): Survey over image thresholding techniques and quantitative performance evaluation Journal of Electronic Imaging. Vol. 13(1), 165 [10] Per C. H. (2004): Exercise in Computer Vision: A Comparison of Thresholding Methods. vare/xite/ [11] Rupesh K. G., and Saroj K. M. (2007). A Rule-based Approach for Anomaly Detection in Subscriber Usage Pattern,World Academy of Science, Engineering and Technology 34. [12] Qibei Lu, and Chunhua Ju (2011). Research on Credit Card Fraud Detection Model Based on Class Weighted Support Vector Machine Journal of Convergence Information Technology, Vol.6, Number 1. pp [13] Sokbae Lee, Myung Hwan Seo, and Youngki Shin. Testing for Threshold Effects in Regression Models. The Institute for Fiscal Studies Department of Economics, UCL cemmap working paper CWP36/10 [14] Sung S., Mohamed-Slim A., Hong-Chuan Y., Seniand K., (2009): Performance Evaluation of Threshold-Based Power Allocation Algorithms for Down-Link Switched-based Parallel Scheduling, IEEE Transactions on Wireless Communications, Vol. 8, No. 4. [15] Sam M., Karl T., Bram V., Bernard M.. (2002) Credit Card Fraud Detection Using Bayesian and Neural Networks First International NAISO Congress on Neuro Fuzzy Technologies, Havana.. [16] Sieracki, M. E., Reichenbach S. E. and Webb K. L. (1989). Evaluation of automated threshold selection methods for accurately sizing microscopic fluorescent cells by image analysis, Appl. Environ. Microbiol. 55, [17] Venkatesh S. and Rosin P. L., (1995). Dynamic threshold determination by local and global edge evaluation, CVGIP: Graph. Models Image Process. 57, ISSN: IJET Publications UK. All rights reserved. 1331
5 ISSN: IJET Publications UK. All rights reserved. 1332
Probabilistic Credit Card Fraud Detection System in Online Transactions
Probabilistic Credit Card Fraud Detection System in Online Transactions S. O. Falaki 1, B. K. Alese 1, O. S. Adewale 1, J. O. Ayeni 2, G. A. Aderounmu 3 and W. O. Ismaila 4 * 1 Federal University of Technology,
Application of Hidden Markov Model in Credit Card Fraud Detection
Application of Hidden Markov Model in Credit Card Fraud Detection V. Bhusari 1, S. Patil 1 1 Department of Computer Technology, College of Engineering, Bharati Vidyapeeth, Pune, India, 400011 Email: [email protected]
Credit Card Fraud Detection Using Hidden Markov Model
International Journal of Soft Computing and Engineering (IJSCE) Credit Card Fraud Detection Using Hidden Markov Model SHAILESH S. DHOK Abstract The most accepted payment mode is credit card for both online
Fraud Detection in Online Banking Using HMM
2012 International Conference on Information and Network Technology (ICINT 2012) IPCSIT vol. 37 (2012) (2012) IACSIT Press, Singapore Fraud Detection in Online Banking Using HMM Sunil Mhamane + and L.M.R.J
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model Twinkle Patel, Ms. Ompriya Kale Abstract: - As the usage of credit card has increased the credit card fraud has also increased
Artificial Neural Network and Location Coordinates based Security in Credit Cards
Artificial Neural Network and Location Coordinates based Security in Credit Cards 1 Hakam Singh, 2 Vandna Thakur Department of Computer Science Career Point University Hamirpur Himachal Pradesh,India Abstract
A Fast Fraud Detection Approach using Clustering Based Method
pp. 33-37 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html A Fast Detection Approach using Clustering Based Method Surbhi Agarwal 1, Santosh Upadhyay 2 1 M.tech Student, Mewar University,
Fraud Detection in Credit Card Using DataMining Techniques Mr.P.Matheswaran 1,Mrs.E.Siva Sankari ME 2,Mr.R.Rajesh 3
Fraud Detection in Credit Card Using DataMining Techniques Mr.P.Matheswaran 1,Mrs.E.Siva Sankari ME 2,Mr.R.Rajesh 3 1 P.G. Student, Department of CSE, Govt.College of Engineering, Thirunelveli, India.
Credit Card Fraud Detection using Hidden Morkov Model and Neural Networks
Credit Card Fraud Detection using Hidden Morkov Model and Neural Networks R.RAJAMANI Assistant Professor, Department of Computer Science, PSG College of Arts & Science, Coimbatore. Email: [email protected]
How To Detect Credit Card Fraud
Card Fraud Howard Mizes December 3, 2013 2013 Xerox Corporation. All rights reserved. Xerox and Xerox Design are trademarks of Xerox Corporation in the United States and/or other countries. Outline of
PROBLEM REDUCTION IN ONLINE PAYMENT SYSTEM USING HYBRID MODEL
PROBLEM REDUCTION IN ONLINE PAYMENT SYSTEM USING HYBRID MODEL Sandeep Pratap Singh 1, Shiv Shankar P. Shukla 1, Nitin Rakesh 1 and Vipin Tyagi 2 1 Department of Computer Science and Engineering, Jaypee
FRAUD DETECTION IN MOBILE TELECOMMUNICATION
FRAUD DETECTION IN MOBILE TELECOMMUNICATION Fayemiwo Michael Adebisi 1* and Olasoji Babatunde O 1. 1 Department of Mathematical Sciences, College of Natural and Applied Science, Oduduwa University, Ipetumodu,
A Novel Approach for Credit Card Fraud Detection Targeting the Indian Market
www.ijcsi.org 172 A Novel Approach for Credit Card Fraud Detection Targeting the Indian Market Jaba Suman Mishra 1, Soumyashree Panda 2, Ashis Kumar Mishra 3 1 Department Of Computer Science & Engineering,
Techniques for Fraud Detection
Analysis on Credit Card Fraud Detection Methods 1 Renu HCE Sonepat 2 Suman HCE Sonepat Abstract Due to the theatrical increase of fraud which results in loss of dollars worldwide each year, several modern
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit
Statistics in Retail Finance Chapter 7: Fraud Detection in Retail Credit 1 Overview > Detection of fraud remains an important issue in retail credit. Methods similar to scorecard development may be employed,
Enhancing Quality of Data using Data Mining Method
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 9, SEPTEMBER 2, ISSN 25-967 WWW.JOURNALOFCOMPUTING.ORG 9 Enhancing Quality of Data using Data Mining Method Fatemeh Ghorbanpour A., Mir M. Pedram, Kambiz Badie, Mohammad
Internet Banking Fraud Detection using HMM and BLAST-SSAHA Hybridization
Internet Banking Fraud Detection using HMM and BLAST-SSAHA Hybridization Avanti H. Vaidya 1, S. W. Mohod 2 1, 2 Computer Science and Engineering Department, R.T.M.N.U University, B.D. College of Engineering
The Credit Card Fraud Detection Analysis With Neural Network Methods
The Credit Card Fraud Detection Analysis With Neural Network Methods 1 M.Jeevana Sujitha, 2 K. Rajini Kumari, 3 N.Anuragamayi 1,2,3 Dept. of CSE, A.S.R College of Engineering & Tech., Tetali, Tanuku, AP,
HMM Based Enhanced Security System for ATM Payment [AICTE RPS sanctioned grant project, Affiliated to University of Pune, SKNCOE, Pune]
HMM Based Enhanced Security System for ATM Payment [AICTE RPS sanctioned grant project, Affiliated to University of Pune, SKNCOE, Pune] Vivek V. Jog 1, Sonal S.Dhamak 3 Vikalpa B. Landge 5, Aaradhana A.
Survey on Credit Card Fraud Detection Techniques
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 11 Nov 2015, Page No. 15010-15015 Survey on Credit Card Fraud Detection Techniques Priya Ravindra Shimpi,
Data Mining Approach For Subscription-Fraud. Detection in Telecommunication Sector
Contemporary Engineering Sciences, Vol. 7, 2014, no. 11, 515-522 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4431 Data Mining Approach For Subscription-Fraud Detection in Telecommunication
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
RSA Adaptive Authentication For ecommerce
RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers
Meta Learning Algorithms for Credit Card Fraud Detection
International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume 6, Issue 6 (March 213), PP. 16-2 Meta Learning Algorithms for Credit Card Fraud Detection
Automatic Bank Fraud Detection Using Support Vector Machines
Automatic Bank Fraud Detection Using Support Vector Machines Djeffal Abdelhamid 1, Soltani Khaoula 1, Ouassaf Atika 2 1 Computer science department, LESIA Laboratory, Biskra University, Algeria 2 Economic
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
ISSN: 2229-6956(ONLINE) ICTACT JOURNAL ON SOFT COMPUTING, JULY 2012, VOLUME: 02, ISSUE: 04 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES V. Dheepa 1 and R. Dhanapal 2 1 Research
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100
Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100 Erkan Er Abstract In this paper, a model for predicting students performance levels is proposed which employs three
Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-6, January 2013 Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing
Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model
Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model Trung Le 1, Ba Quy Tran 2, Hanh Dang Thi My 3, Thanh Hung Ngo 4 1 GSR, Information System Lab., University of
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM
AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM ABSTRACT Luis Alexandre Rodrigues and Nizam Omar Department of Electrical Engineering, Mackenzie Presbiterian University, Brazil, São Paulo [email protected],[email protected]
Chapter 6. The stacking ensemble approach
82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
Electronic Payment Fraud Detection Techniques
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 4, 137-141, 2012 Electronic Payment Fraud Detection Techniques Adnan M. Al-Khatib CIS Dept. Faculty of Information
Introduction to Data Mining
Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:
How To Identify A Churner
2012 45th Hawaii International Conference on System Sciences A New Ensemble Model for Efficient Churn Prediction in Mobile Telecommunication Namhyoung Kim, Jaewook Lee Department of Industrial and Management
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2
Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2 1Department of Computer Engineering & Application, NITTTR, Shyamla Hills, Bhopal M.P.,
Data Mining Application for Cyber Credit-card Fraud Detection System
, July 3-5, 2013, London, U.K. Data Mining Application for Cyber Credit-card Fraud Detection System John Akhilomen Abstract: Since the evolution of the internet, many small and large companies have moved
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges [email protected] Rayford B. Vaughn [email protected] 23 rd National Information Systems Security Conference
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Tina R. Patil, Mrs. S. S. Sherekar Sant Gadgebaba Amravati University, Amravati [email protected], [email protected]
Manjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Pheromone
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
AN UPDATE RESEARCH ON CREDIT CARD ON-LINE TRANSACTIONS
AN UPDATE RESEARCH ON CREDIT CARD ON-LINE TRANSACTIONS Falaki S. O. Alese B. K. Department of Computer Science, Federal University of Technology, Akure, Ondo State, Nigeria. Ismaila W. O. Department of
International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 4, August 2012 www.ijcsn.org ISSN 2277-5420.
Credit Card Fraud: The study of its impact and detection techniques 1 Khyati Chaudhary, 2 Bhawna Mallick 1 Dept. of Computer Science, GCET, Page 31 2 Dept. of Computer Science, GCET, Greater Noida Abstract
How To Detect Credit Card Fraud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES
IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES Bruno Carneiro da Rocha 1,2 and Rafael Timóteo de Sousa Júnior 2 1 Bank of Brazil, Brasília-DF, Brazil [email protected] 2 Network Engineering
A Survey on Outlier Detection Techniques for Credit Card Fraud Detection
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud
ON INTEGRATING UNSUPERVISED AND SUPERVISED CLASSIFICATION FOR CREDIT RISK EVALUATION
ISSN 9 X INFORMATION TECHNOLOGY AND CONTROL, 00, Vol., No.A ON INTEGRATING UNSUPERVISED AND SUPERVISED CLASSIFICATION FOR CREDIT RISK EVALUATION Danuta Zakrzewska Institute of Computer Science, Technical
Unsupervised Outlier Detection in Time Series Data
Unsupervised Outlier Detection in Time Series Data Zakia Ferdousi and Akira Maeda Graduate School of Science and Engineering, Ritsumeikan University Department of Media Technology, College of Information
The Big Data methodology in computer vision systems
The Big Data methodology in computer vision systems Popov S.B. Samara State Aerospace University, Image Processing Systems Institute, Russian Academy of Sciences Abstract. I consider the advantages of
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
Online Credit Card Application and Identity Crime Detection
Online Credit Card Application and Identity Crime Detection Ramkumar.E & Mrs Kavitha.P School of Computing Science, Hindustan University, Chennai ABSTRACT The credit cards have found widespread usage due
Insider Threat Detection Using Graph-Based Approaches
Cybersecurity Applications & Technology Conference For Homeland Security Insider Threat Detection Using Graph-Based Approaches William Eberle Tennessee Technological University [email protected] Lawrence
Introduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
Computational Intelligence in Data Mining and Prospects in Telecommunication Industry
Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS) 2 (4): 601-605 Scholarlink Research Institute Journals, 2011 (ISSN: 2141-7016) jeteas.scholarlinkresearch.org Journal of Emerging
Review Paper on Credit Card Fraud Detection
Review Paper on Credit Card Fraud Detection 1 Suman Research Scholar, GJUS&T Hisar HCE Sonepat 2 Nutan Mtech.CSE,HCE Sonepat Abstract Due to the theatrical increase of fraud which results in loss of dollars
Pattern Recognition Using Feature Based Die-Map Clusteringin the Semiconductor Manufacturing Process
Pattern Recognition Using Feature Based Die-Map Clusteringin the Semiconductor Manufacturing Process Seung Hwan Park, Cheng-Sool Park, Jun Seok Kim, Youngji Yoo, Daewoong An, Jun-Geol Baek Abstract Depending
Recognizing The Theft of Identity Using Data Mining
Recognizing The Theft of Identity Using Data Mining Aniruddha Kshirsagar 1, Lalit Dole 2 1,2 CSE Department, GHRCE, Nagpur, Maharashtra, India Abstract Identity fraud is the great matter of concern in
not possible or was possible at a high cost for collecting the data.
Data Mining and Knowledge Discovery Generating knowledge from data Knowledge Discovery Data Mining White Paper Organizations collect a vast amount of data in the process of carrying out their day-to-day
Why is Internal Audit so Hard?
Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets
A Novel Classification Approach for C2C E-Commerce Fraud Detection
A Novel Classification Approach for C2C E-Commerce Fraud Detection *1 Haitao Xiong, 2 Yufeng Ren, 2 Pan Jia *1 School of Computer and Information Engineering, Beijing Technology and Business University,
FRAUD DETECTION AND PREVENTION: A DATA ANALYTICS APPROACH BY SESHIKA FERNANDO TECHNICAL LEAD, WSO2
FRAUD DETECTION AND PREVENTION: A DATA ANALYTICS APPROACH BY SESHIKA FERNANDO TECHNICAL LEAD, WSO2 TABLE OF CONTENTS 1. Fraud: The Bad and the Ugly... 03 2. A New Opportunity for Fraud Detection... 03
Anomaly Detection Using Unsupervised Profiling Method in Time Series Data
Anomaly Detection Using Unsupervised Profiling Method in Time Series Data Zakia Ferdousi 1 and Akira Maeda 2 1 Graduate School of Science and Engineering, Ritsumeikan University, 1-1-1, Noji-Higashi, Kusatsu,
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
Inner Classification of Clusters for Online News
Inner Classification of Clusters for Online News Harmandeep Kaur 1, Sheenam Malhotra 2 1 (Computer Science and Engineering Department, Shri Guru Granth Sahib World University Fatehgarh Sahib) 2 (Assistant
Addressing the Class Imbalance Problem in Medical Datasets
Addressing the Class Imbalance Problem in Medical Datasets M. Mostafizur Rahman and D. N. Davis the size of the training set is significantly increased [5]. If the time taken to resample is not considered,
Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *
Send Orders for Reprints to [email protected] 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network
To improve the problems mentioned above, Chen et al. [2-5] proposed and employed a novel type of approach, i.e., PA, to prevent fraud.
Proceedings of the 5th WSEAS Int. Conference on Information Security and Privacy, Venice, Italy, November 20-22, 2006 46 Back Propagation Networks for Credit Card Fraud Prediction Using Stratified Personalized
EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN
EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN Sridhar S Associate Professor, Department of Information Science and Technology, Anna University,
CREDIT CARD FRAUD DETECTION SYSTEM USING GENETIC ALGORITHM
CREDIT CARD FRAUD DETECTION SYSTEM USING GENETIC ALGORITHM ABSTRACT: Due to the rise and rapid growth of E-Commerce, use of credit cards for online purchases has dramatically increased and it caused an
CREDIT CARD FRAUD DETECTION BASED ON ONTOLOGY GRAPH
CREDIT CARD FRAUD DETECTION BASED ON ONTOLOGY GRAPH Ali Ahmadian Ramaki 1, Reza Asgari 2 and Reza Ebrahimi Atani 3 1 Department of Computer Engineering, Guilan University, Rasht, Iran [email protected]
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
Machine Learning in FX Carry Basket Prediction
Machine Learning in FX Carry Basket Prediction Tristan Fletcher, Fabian Redpath and Joe D Alessandro Abstract Artificial Neural Networks ANN), Support Vector Machines SVM) and Relevance Vector Machines
A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and Using SNMP MIB Data
International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 279 284 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S A Dynamic Flooding Attack Detection
Data Mining + Business Intelligence. Integration, Design and Implementation
Data Mining + Business Intelligence Integration, Design and Implementation ABOUT ME Vijay Kotu Data, Business, Technology, Statistics BUSINESS INTELLIGENCE - Result Making data accessible Wider distribution
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Data Mining Application in Direct Marketing: Identifying Hot Prospects for Banking Product
Data Mining Application in Direct Marketing: Identifying Hot Prospects for Banking Product Sagarika Prusty Web Data Mining (ECT 584),Spring 2013 DePaul University,Chicago [email protected] Keywords:
The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal
The need for a secure & trusted payment instrument in e-commerce Ali AlMeshal In Physical/Real World Hand over card Visual check Swipe in POS Online authorization Receipt with signature panel Sign or Pin
Signature Segmentation from Machine Printed Documents using Conditional Random Field
2011 International Conference on Document Analysis and Recognition Signature Segmentation from Machine Printed Documents using Conditional Random Field Ranju Mandal Computer Vision and Pattern Recognition
Low-resolution Character Recognition by Video-based Super-resolution
2009 10th International Conference on Document Analysis and Recognition Low-resolution Character Recognition by Video-based Super-resolution Ataru Ohkura 1, Daisuke Deguchi 1, Tomokazu Takahashi 2, Ichiro
Mining the Software Change Repository of a Legacy Telephony System
Mining the Software Change Repository of a Legacy Telephony System Jelber Sayyad Shirabad, Timothy C. Lethbridge, Stan Matwin School of Information Technology and Engineering University of Ottawa, Ottawa,
Data Warehousing and Data Mining in Business Applications
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
Detecting Credit Card Fraud
Case Study Detecting Credit Card Fraud Analysis of Behaviometrics in an online Payment environment Introduction BehavioSec have been conducting tests on Behaviometrics stemming from card payments within
DERIVATIVE THRESHOLD ACTUATION FOR SINGLE PHASE WORMHOLE DETECTION WITH REDUCED FALSE ALARM RATE
DERIVATIVE THRESHOLD ACTUATION FOR SINGLE PHASE WORMHOLE DETECTION WITH REDUCED FALSE ALARM RATE K.Aathi Dharshini 1 C.Susil Kumar 2 E.Babu Thirumangai Alwar 3 1,2 Department of Electronics and Communication
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
Qi Liu Rutgers Business School ISACA New York 2013
Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING
A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of
Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm
Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm Martin Hlosta, Rostislav Stríž, Jan Kupčík, Jaroslav Zendulka, and Tomáš Hruška A. Imbalanced Data Classification
An Automatic Optical Inspection System for the Diagnosis of Printed Circuits Based on Neural Networks
An Automatic Optical Inspection System for the Diagnosis of Printed Circuits Based on Neural Networks Ahmed Nabil Belbachir 1, Alessandra Fanni 2, Mario Lera 3 and Augusto Montisci 2 1 Vienna University
LOAD BALANCING AS A STRATEGY LEARNING TASK
LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
