Protecting E-Commerce Systems From Online Fraud



Similar documents
Online Load Balancing and Correlated Randomness

An RSA-based (t, n) threshold proxy signature scheme with freewill identities

Personalized Web Search by User Interest Hierarchy

Constrained Renewable Resource Allocation in Fuzzy Metagraphs via Min- Slack

How To Write A Recipe Card

Authenticated Encryption. Jeremy, Paul, Ken, and Mike

Modern Portfolio Theory (MPT) Statistics

Reputation Management for DHT-based Collaborative Environments *

ANALYSIS OF ORDER-UP-TO-LEVEL INVENTORY SYSTEMS WITH COMPOUND POISSON DEMAND

The example is taken from Sect. 1.2 of Vol. 1 of the CPN book.

No 28 Xianning West Road, Xi an No 70 Yuhua East Road, Shijiazhuang.

Non-Linear and Unbalanced Three-Phase Load Static Compensation with Asymmetrical and Non Sinusoidal Supply

FACULTY SALARIES FALL NKU CUPA Data Compared To Published National Data


QUANTITATIVE METHODS CLASSES WEEK SEVEN

ESA Support to ESTB Users

ERLANG C FORMULA AND ITS USE IN THE CALL CENTERS

Control of Perceived Quality of Service in Multimedia Retrieval Services: Prediction-based mechanism vs. compensation buffers

by John Donald, Lecturer, School of Accounting, Economics and Finance, Deakin University, Australia

A Probabilistic Approach to Latent Cluster Analysis

Life Analysis for the Main bearing of Aircraft Engines

The influence of advertising on the purchase of pharmaceutical products

Keywords Cloud Computing, Service level agreement, cloud provider, business level policies, performance objectives.

Adverse Selection and Moral Hazard in a Model With 2 States of the World

A Project Management framework for Software Implementation Planning and Management

is knowing the car market inside out.

Game of Platforms: Strategic Expansion into Rival (Online) Territory

Section 3: Logistic Regression

Analysis of Credit Card Fraud Detection Techniques

Continuity Cloud Virtual Firewall Guide

EFFECT OF GEOMETRICAL PARAMETERS ON HEAT TRANSFER PERFORMACE OF RECTANGULAR CIRCUMFERENTIAL FINS

A Formal Model for Data Flow Diagram Rules

VOL. 25, NÚM. 54, EDICIÓN JUNIO 2007 PP

Sci.Int.(Lahore),26(1), ,2014 ISSN ; CODEN: SINTE 8 131

Buffer Management Method for Multiple Projects in the CCPM-MPL Representation

Parallel and Distributed Programming. Performance Metrics

Modelling Exogenous Variability in Cloud Deployments

Enterprise Resource Planning (ERP) Systems

Abstract. Introduction. Statistical Approach for Analyzing Cell Phone Handoff Behavior. Volume 3, Issue 1, 2009

Rural and Remote Broadband Access: Issues and Solutions in Australia

ITIL & Service Predictability/Modeling Plexent

Managing the Outsourcing of Two-Level Service Processes: Literature Review and Integration

An IAC Approach for Detecting Profile Cloning in Online Social Networks

Mininum Vertex Cover in Generalized Random Graphs with Power Law Degree Distribution

A Note on Approximating. the Normal Distribution Function

Logistic Regression for Insured Mortality Experience Studies. Zhiwei Zhu, 1 Zhi Li 2

Gold versus stock investment: An econometric analysis

Category 7: Employee Commuting

Hardware Modules of the RSA Algorithm

5 2 index. e e. Prime numbers. Prime factors and factor trees. Powers. worked example 10. base. power

Facts About Chronc Fatgu Syndrom - sample thereof

Analyzing Failures of a Semi-Structured Supercomputer Log File Efficiently by Using PIG on Hadoop

A Multi-Heuristic GA for Schedule Repair in Precast Plant Production

CARE QUALITY COMMISSION ESSENTIAL STANDARDS OF QUALITY AND SAFETY. Outcome 10 Regulation 11 Safety and Suitability of Premises

CCD CHARGE TRANSFER EFFICIENCY (CTE) DERIVED FROM SIGNAL VARIANCE IN FLAT FIELD IMAGES The CVF method

Sharp bounds for Sándor mean in terms of arithmetic, geometric and harmonic means

Lecture 3: Diffusion: Fick s first law

LG has introduced the NeON 2, with newly developed Cello Technology which improves performance and reliability. Up to 320W 300W

Product Overview. Version 1-12/14

Global Sourcing: lessons from lean companies to improve supply chain performances

TELL YOUR STORY WITH MYNEWSDESK The world's leading all-in-one brand newsroom and multimedia PR platform

Econ 371: Answer Key for Problem Set 1 (Chapter 12-13)

Bank Incentives, Economic Specialization, and Financial Crises in Emerging Economies

Mathematics. Mathematics 3. hsn.uk.net. Higher HSN23000

CPS 220 Theory of Computation REGULAR LANGUAGES. Regular expressions

Real-Time Evaluation of Campaign Performance

Term Structure of Interest Rates: The Theories

Expert-Mediated Search

Planning and Managing Copper Cable Maintenance through Cost- Benefit Modeling

Contents Stochastic Ray Tracing

Fetch. Decode. Execute. Memory. PC update

embedded e e in numbers, facts and figures

(Analytic Formula for the European Normal Black Scholes Formula)

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Have Debit Cards Changed Thai Consumer Shopping Behavior?

Traffic Flow Analysis (2)

UNIVERSITY OF NAIROBI SCHOOL OF COMPUTING & INFORMATICS IMPROVING APPLICATION OF KNOWLEDGE MANAGEMENT SYSTEMS IN ORGANIZATIONS:

An Broad outline of Redundant Array of Inexpensive Disks Shaifali Shrivastava 1 Department of Computer Science and Engineering AITR, Indore

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

Long run: Law of one price Purchasing Power Parity. Short run: Market for foreign exchange Factors affecting the market for foreign exchange

Teaching Computer Networking with the Help of Personal Computer Networks

Remember you can apply online. It s quick and easy. Go to Title. Forename(s) Surname. Sex. Male Date of birth D

Moving Securely Around Space: The Case of ESA

union scholars program APPLICATION DEADLINE: FEBRUARY 28 YOU CAN CHANGE THE WORLD... AND EARN MONEY FOR COLLEGE AT THE SAME TIME!

Tax Collection, Transfers, and Corruption: the Russian Federation at the Crossroads 1)

Secure User Data in Cloud Computing Using Encryption Algorithms

What is Candidate Sampling

Key Management System Framework for Cloud Storage Singa Suparman, Eng Pin Kwang Temasek Polytechnic

A Graph-based Proactive Fault Identification Approach in Computer Networks

Online Price Competition within and between Heterogeneous Retailer Groups

Repulsive Force

Transcription:

Protctng E-Commrc Systms From Onln Fraud Frst Author P.PhanAlkhya Studnt, Dpartmnt of Computr Scnc and Engnrng, QIS Collg of Engnrng & Tchnology, ongol, Andhra Pradsh, Inda. Scond Author Sk.Mahaboob Basha Assstant Profssor, Dpartmnt of Computr Scnc and Engnrng, QIS Collg of Engnrng &Tchnology, ongol, Andhra Pradsh, Inda. Abstract- Du to th advnt of Intrnt tchnologs, E- commrc wdly adaptd mod of busnss n modrn tms. Wth th growth of E-commnc doman crdt card usag has bcom a common phnomnon. Ths has gvn chanc to advrsars to commt fraud. In th ral world, thr wr plnty of nstancs of fraud cass. It has ts mpact on fnancal outfts that ssu crdt cards, th E-commrc busnss ntts and also th customrs of th E-commrc applcatons. To ovrcom ths problm and to buld confdnc n th stakholdrs of th E- commrc many tchnqus cam nto xstnc. As smpl pattrn matchng mthods ar nadquat to solv th problm many modrn tchnqus cam nto xstnc. Thy ar basd on Gntc programmng, Squnc Algnmnt, Machn larnng, Fuzzy logc, Data mnng and Artfcal ntllgnc. Ths tchnqus ar capabl of dtctng fraudulnt transactons. In ths papr w xplor varous tchnqus bng usd. W also buld a prototyp applcaton whch dmonstrats th ffcncy of Gntc Programmng to dtct crdt card fraud. Th mprcal rsults rvald that th proposd soluton s ffctv. Kywords Crdt card fraud dtcton, fraud dtcton tchnqus, E-commrc INTRODUCTION Crdt card fraud dtcton s an actv and contnuous rsarch ara as t nvolvs montary transactons. Th rsarch s mportant n th lght of wb tchnologs that support E-commrc applcatons n buldng and managng. Morovr busnsss n th world ar gong onln. Th onln busnsss ar abl to rach global markts and thy rach global customrs. Th E-commrc applcatons mak t possbl to shop tms anytm and anywhr. Thr ar no tm and gographcal rstrctons. Ths has plnty of advantags for both consumrs and busnsss. Thr ar many knds n E-commrc. B2B (Busnss to Busnss), B2C (Busnss to Consumr) and C2C (Consumr to Consumr) ar th thr popular forms of E-commrc applcatons. Th transactons n E- commrc mght hav fraudulnt transactons along wth gnun ons. It s ssntal to hav a systm that can dtct fraudulnt transactons. Varous tchnqus such as Hddn Markov Modl, Artfcal Intllgnc, Squnc Algnmnt, and Gntc Programmng cam nto xstnc to combat ths problm. In ths papr w mplmnt Gntc Algorthm (GA) n ordr to dtct crdt card fraud. Th GA has provson for valuatng populatons contnuously untl a bst ft s found. Th oprators lk cross ovr and mutaton hlp n ISSN: 2231-2803 http://www.jcttjournal.org Pag3549

accurat prdcton of fraud cass. W also bult a prototyp applcaton that dmonstrats th ffcncy of th proposd soluton. Th xprmntal rsults rvald that th applcaton s vry usful n ral tm systms. Th rmandr of th papr s organzd as follows. Scton II rvws rlvant ltratur. Scton III prsnts som of th fraud dtcton tchnqus. Scton IV provds dtals about th proposd fraud dtcton tchnqu and also th prototyp dtals. Scton V shows xprmntal rsults whl scton VI concluds th papr. Th Dmpstr Shafr thory and Baysan larnng approach s th combnaton of two approachs [17], [18], [19]. Th vdncs from past and corrct ar combnd n ordr to dtct fraud. Informaton fuson s th approach followd by ths hybrd tchnqu. Fgur 1 shows th ovrvw of ths hybrd approach. RELATED WORKS Crdt card fraud dtcton has bcom an nvtabl part of E-commrc applcatons. As th applcatons nvolv montary transactons, fraud dtcton tchnqus ar ndspnsabl. Lot of rsarch has bn mad n ths ara [1], [2], and [3]. Many algorthms cam nto xstnc to dtct crdt card fraud [4], [2]. Th algorthms nclud fuzzy logc [5], squnc algnmnt algorthm [6], [7], data mnng tchnqus [8], [9], machn larnng and artfcal ntllgnc approachs [10], [11], [12]. Thr ar othr tchnqus such as Wb Srvcs Basd CCFD, CCFD wth Artfcal Immun Systm [13], [14], Cardwatch [15], Baysan Blf Ntworks [4], Intruson Dtcton [13], Cas Basd Rasonng for CCFD [4], Advancd Fraud Dtcton [16], CCFD basd on computatonal ntllgnc [13], CCFD usng slf-organzng maps [13]. Many ar basd on pattrn matchng, Mta larnng and artfcal ntllgnc. In ths papr w compar som of th tchnqus whch ar good for CCFD. COMPARISON OF CCFD SYSTEMS In ths scton w compar varous crdt card fraud dtcton tchnqus such as Dmpstr Shafr thory and Baysan larnng, Hddn Markov Modl (HMM) and Gntc Programmng (GP). Dmpstr Shafr thory and Baysan larnng approach Fg. 1 Hybrd approach for CCFD (xcrpt from [16]) As sn n fgur 1, ths approach has four componnts. Thy ar rul basd fltr, Baysan larnr, transacton hstory databas and Dmpstr-Shafr addr. Th vdncs found from multpl componnts ar fusd and th dtcton s mad. Ths approach s mor accurat but consums mor rsourcs bsds bng slow. CCFD usng Hddn Markov Modl (HMM) Ths modl s usd to analyz crdt card transactons. It nds tranng data and also tst data n ordr to dtct fraud. It uss K-mans data mnng algorthm ntrnally. Th K-mans algorthm taks all crdt card transactons ISSN: 2231-2803 http://www.jcttjournal.org Pag3550

and numbr of clustrs as nput and gnrats clustrs that ar usd n HMM. All th transactons ar dvdd nto low, mdum and hgh, th thr clustrs. Onc th clustrs ar formd thy ar kpt n a HMM. Th HMM s usd for vry nw transacton. Th amount n nw transacton should blong to thr low, or mdum or hgh. If not th transacton s suspctd to b fraudulnt and th corrspondng popl or organzatons ar alrtd. Th gnral ovrvw of HMM s as shown blow. th crdt card, and crdt card book balanc. Th ovrvw of th GP approach s as shown n fgur 3. Fg. 3 Ovrvw of proposd archtctur for GP As can b sn n fgur 3, th data of crdt cards s takn from data warhous. Thn th data s subjctd to ruls ngn. Th ruls ngn contans fraud cas ruls. Th fltr and prorty componnts tak car of fltrng and prorty sttng. Th gntc algorthm s rsponsbl to dtct fraud. Fg. 2 Ovrvw of HMM Modl (xcrpt from [16]) CCFD usng GP Gntc programmng s wdly usd for solvng varous problms. In ths papr w mplmntd a Gntc Algorthm to dtct crdt card fraud. Ths algorthm maks us of xstng transactons of crdt cards. It uss multpl crtra to dtct fraud. Th crtra nclud crdt card usag frquncy, crdt card usag locaton, ovrdraft on PROTOTYPE IMPLEMENTATION A prototyp applcaton has bn bult n Java platform. Th applcaton s dvlopd wth Graphcal Usr Intrfac (GUI) to b usr-frndly. Th nvronmnt usd to buld th applcaton ncluds a PC wth 4GB RAM, Cor 2 dual procssor runnng Wndows XP opratng systm. NtBans s usd as IDE. Th mportant applcaton scrns ar prsntd n fgur 4 and 5. ISSN: 2231-2803 http://www.jcttjournal.org Pag3551

ths papr. Th rsults hlp n undrstandng th fraud transactons and thy can b usd to tran th systm furthr n ordr to mak nw ruls and achv hghr accuracy of fraud dtcton. EXPERIMENTAL RESUTLS W compard th rsults of our approach wth that of Artfcal ntllgnc, Hddn Markov Modl, Squnc Algnmnt, and Machn Larnng. Th comparson s mad n trms of tru postvs and fals postvs. Hghst tru postvs and last fals postvs ar achvd by GP. Fg. 4 Datast usd for xprmnts As sn n fgur 4, th datast contans crdt card transacton dtals for numbr of nstancs. Ths data s usd by GA proposd n ths papr. Th GA maks us of th componnts as dscrbd n fgur 3 n ordr to dtct fraudulnt transactons. Th rsults of dtcton ar shown n fgur 5. T r u 120 100 P o s80 t60 v40 s20 Comparson of CCFD Tchnqus CCFD Tchnqus 0 Fg. 6 Prformanc of CCFD tchnqus wth rspct to tru postvs As can b sn n fgur 6, th prformanc of Gntc Programmng s 100%. It has achvd 100% tru postvs whn compard wth othr tchnqus such as AI, HMM, SA and machn larnng. Fg. 5 Rsults of Fraud Dtcton As can b sn n fgur 5, basd on varous crtra mntond arlr, th fraud dtcton s don. Th crtra ar usd as part of gntc programmng modl proposd n ISSN: 2231-2803 http://www.jcttjournal.org Pag3552

F a l s Fg. 7 Prformanc of CCFD tchnqus wth rspct to fals postvs Comparson of CCFD Tchnqus P o s t v s 25 20 15 10 5 0 Machn Larnng Squnc Algnmnt HMM AI GP As can b sn n fgur 7, th prformanc of Gntc Programmng s mor. It has achvd vry lss prcntag of fals postvs whn compard wth othr tchnqus such as AI, HMM, SA and machn larnng. CONCLUSIONS AND FUTURE WORK CCFD Tchnqus In ths papr w studd th problm of crdt card fraud n E-commrc applcatons. W xplord varous approachs to solv th problm. Th knowldg of varous approachs can mprov th scop of protctng E-commrc applcatons. Fnally w mplmntd gntc algorthm for crdt card fraud dtcton. As th advrsars chang thr mans of attack vry tm, t s mportant to hav constant vgl on th mthods thy us and updat th tchnqus accordngly. In ths papr buld a prototyp applcaton n Java platform n ordr to dmonstrat th proof of concpt. Th applcaton uss gntc algorthm to dtct crdt card fraud. Data mnng and othr tchnqus ar avalabl to solv ths problm. Howvr, w prfrrd GA as t s ffcnt n dtctng crdt card fraud. Th xprmntal rsults rval that th proposd applcaton s usful and can b usd n ral world systms. REFERENCES [1] Tj Paul Bhatla, Vkram Prabhu & Amt Dua Undrstandng Crdt Card Frauds, 2003. [2] Lnda Dlamar, Hussn Abdou, John Ponton, Crdt card fraud and dtcton tchnqus: a rvw, Banks and Bank Systms, pp. 57-68, 2009. [3] Barry Masuda, Crdt Card Fraud Prvnton: A Succssful Rtal Stratgy, crm prvnton, Vol. 6, 1986. [4] Ezawa.K. & Norton.S, Constructng Baysan Ntworks to Prdct Uncollctbl Tlcommuncatons Accounts, IEEE Exprt, Octobr;45-51, 1996. [5] Ptr J. Bntly, Jungwon Km, Gl-Ho Jung and Jong-Uk Cho, Fuzzy Darwnan Dtcton of Crdt Card Fraud, In th 14th Annual Fall Symposum of th Koran Informaton Procssng Socty, 14 th Octobr 2000. [6] Amlan Kundu, S. Sural, A.K. Majumdar, Two-Stag Crdt Card Fraud Dtcton Usng Squnc Algnmnt, Lctur Nots n Computr Scnc, Sprngr Vrlag, Procdngs of th Intrnatonal Confrnc on Informaton Systms Scurty, Vol. 4332/2006, pp.260-275, 2006. [7] Amlan Kundu, Suvasn Pangrah, Shamk Sural and Arun K.Majumdar, BLAST-SSAHA Hybrdzaton for Crdt Card Fraud Dtcton, IEEE Transactons On Dpndabl And Scur Computng, vol. 6, Issu no. 4, pp.309-315, Octobr-Dcmbr 2009. [8] Phlp K. Chan,W Fan, Andras L. Prodromds, Salvator J. Stolfo, Dstrbutd Data Mnng n Crdt Card Fraud Dtcton, IEEE Intllgnt Systms ISSN, Vol. 14, Issu No. 6, Pags: 67 74, Novmbr 1999. [9] C. Phua, V. L, K. Smth, R. Gaylr, A Comprhnsv Survy of Data Mnng-basd Fraud Dtcton Rsarch, Artfcal Intllgnc Rvw, 2005. [10] Ray-I Chang, Lang-Bn La, Wn-D Su, Jn-Chh Wang, Jn-Shang Kouh, Intruson Dtcton by Backpropagaton Nural Ntworks wth Sampl-Qury and Attrbut-Qury, Rsarch IndaPublcatons, pp.6-10, Novmbr 26, 2006. [11] Ghosh, D.L. Rlly, Crdt Card Fraud Dtcton wth a Nural-Ntwork, Procdngs of th Intrnatonal Confrnc on Systm Scnc, pp.621-630, 1994. ISSN: 2231-2803 http://www.jcttjournal.org Pag3553

[12] R. Braus, T. Langsdorf, M. Hpp, Nural Data Mnng for Crdt Card Fraud Dtcton, Intrnatonal Confrnc on Tools wth Artfcal Intllgnc, pp.103-106,1999. [13] Fan, W. Mllr, M.Stolfo, S.L & P Chan, Usng Artfcal Anomals to Dtct Unknown and Known Ntwork Intrusons, Proc. of ICDM01, pp.504-507, 2001. [14] Manol Frnando Alonso Gad, Xd Wang, Alar Prra do Lago, Crdt Card Fraud Dtcton wth Artfcal Immun Systm, Lctur Nots n Computr Scnc, Vol. 5132/2008, pp.119-131, 2008. [15] E. Alskrov, B. Frslbn, B. Rao, CARDWATCH: A Nural Ntwork Basd Databas Mnng Systm for Crdt Card Fraud Dtcton, Procdngs of IEEE/IAFE Confrnc on Computatonal Intllgnc for Fnancal Engnrng (CIFEr), pp.220-226, 1997. [16] S. Bnson Edwn Raj and A. Ann Porta, Analyss on Crdt Card Fraud Dtcton Mthods, ICCCET, 2001, p1-5 [17] M. Mhd, S. Zar, A. Anou and M. Bnsbt, A Baysan Ntworks n Intruson Dtcton Systms, Intrnatonal Journal of Computatonal Intllgnc Rsarch, Issu No. 1, pp.0973-1873 Vol. 3, 2007. [18] Lam, Bacchus, Larnng baysan blf ntworks: An approach basdon th MDL prncpl, Computatonal Intllgnc, Vol. 10, Issu No. 3, pp.269 293, August 1994. [19] Sam Mas, Karl Tuyls, Bram Vanschonwnkl, Brnard Mandrck, Crdt card fraud dtcton usng Baysan and nural ntworks, Intractv mag-gudd nurosurgry, pp.261-270, 1993. ISSN: 2231-2803 http://www.jcttjournal.org Pag3554