Investigating the Effects of Threshold in Credit Card Fraud Detection System

Similar documents
Probabilistic Credit Card Fraud Detection System in Online Transactions

Application of Hidden Markov Model in Credit Card Fraud Detection

Credit Card Fraud Detection Using Hidden Markov Model

Fraud Detection in Online Banking Using HMM

Credit Card Fraud Detection Using Self Organised Map

A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model

Artificial Neural Network and Location Coordinates based Security in Credit Cards

A Fast Fraud Detection Approach using Clustering Based Method

Fraud Detection in Credit Card Using DataMining Techniques Mr.P.Matheswaran 1,Mrs.E.Siva Sankari ME 2,Mr.R.Rajesh 3

Credit Card Fraud Detection using Hidden Morkov Model and Neural Networks

How To Detect Credit Card Fraud

PROBLEM REDUCTION IN ONLINE PAYMENT SYSTEM USING HYBRID MODEL

FRAUD DETECTION IN MOBILE TELECOMMUNICATION

A Novel Approach for Credit Card Fraud Detection Targeting the Indian Market

Techniques for Fraud Detection

A Content based Spam Filtering Using Optical Back Propagation Technique

Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit

Enhancing Quality of Data using Data Mining Method

Internet Banking Fraud Detection using HMM and BLAST-SSAHA Hybridization

The Credit Card Fraud Detection Analysis With Neural Network Methods

HMM Based Enhanced Security System for ATM Payment [AICTE RPS sanctioned grant project, Affiliated to University of Pune, SKNCOE, Pune]

Survey on Credit Card Fraud Detection Techniques

Data Mining Approach For Subscription-Fraud. Detection in Telecommunication Sector

Intrusion Detection via Machine Learning for SCADA System Protection

RSA Adaptive Authentication For ecommerce

Meta Learning Algorithms for Credit Card Fraud Detection

Automatic Bank Fraud Detection Using Support Vector Machines

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

CHAPTER 1 INTRODUCTION

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm

Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100

Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing Classifier

Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model

AUTO CLAIM FRAUD DETECTION USING MULTI CLASSIFIER SYSTEM

Chapter 6. The stacking ensemble approach

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

Electronic Payment Fraud Detection Techniques

Introduction to Data Mining

How To Identify A Churner

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

Immune Support Vector Machine Approach for Credit Card Fraud Detection System. Isha Rajak 1, Dr. K. James Mathai 2

Data Mining Application for Cyber Credit-card Fraud Detection System

DATA MINING TECHNIQUES AND APPLICATIONS

FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION

Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification

Manjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India

Data Mining Solutions for the Business Environment

AN UPDATE RESEARCH ON CREDIT CARD ON-LINE TRANSACTIONS

International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 4, August ISSN

How To Detect Credit Card Fraud

IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES

A Survey on Outlier Detection Techniques for Credit Card Fraud Detection

ON INTEGRATING UNSUPERVISED AND SUPERVISED CLASSIFICATION FOR CREDIT RISK EVALUATION

Unsupervised Outlier Detection in Time Series Data

The Big Data methodology in computer vision systems

A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS

Online Credit Card Application and Identity Crime Detection

Insider Threat Detection Using Graph-Based Approaches

Introduction to Data Mining

Computational Intelligence in Data Mining and Prospects in Telecommunication Industry

Review Paper on Credit Card Fraud Detection

Pattern Recognition Using Feature Based Die-Map Clusteringin the Semiconductor Manufacturing Process

Recognizing The Theft of Identity Using Data Mining

not possible or was possible at a high cost for collecting the data.

Why is Internal Audit so Hard?

A Novel Classification Approach for C2C E-Commerce Fraud Detection

FRAUD DETECTION AND PREVENTION: A DATA ANALYTICS APPROACH BY SESHIKA FERNANDO TECHNICAL LEAD, WSO2

Anomaly Detection Using Unsupervised Profiling Method in Time Series Data

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD

KEITH LEHNERT AND ERIC FRIEDRICH

Inner Classification of Clusters for Online News

Addressing the Class Imbalance Problem in Medical Datasets

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

To improve the problems mentioned above, Chen et al. [2-5] proposed and employed a novel type of approach, i.e., PA, to prevent fraud.

EXTENDED ANGEL: KNOWLEDGE-BASED APPROACH FOR LOC AND EFFORT ESTIMATION FOR MULTIMEDIA PROJECTS IN MEDICAL DOMAIN

CREDIT CARD FRAUD DETECTION SYSTEM USING GENETIC ALGORITHM

CREDIT CARD FRAUD DETECTION BASED ON ONTOLOGY GRAPH

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.

Machine Learning in FX Carry Basket Prediction

A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and Using SNMP MIB Data

Data Mining + Business Intelligence. Integration, Design and Implementation

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Data Mining Application in Direct Marketing: Identifying Hot Prospects for Banking Product

The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal

Signature Segmentation from Machine Printed Documents using Conditional Random Field

Low-resolution Character Recognition by Video-based Super-resolution

Mining the Software Change Repository of a Legacy Telephony System

Data Warehousing and Data Mining in Business Applications

Detecting Credit Card Fraud

DERIVATIVE THRESHOLD ACTUATION FOR SINGLE PHASE WORMHOLE DETECTION WITH REDUCED FALSE ALARM RATE

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management

Qi Liu Rutgers Business School ISACA New York 2013

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm

An Automatic Optical Inspection System for the Diagnosis of Printed Circuits Based on Neural Networks

LOAD BALANCING AS A STRATEGY LEARNING TASK

An Overview of Knowledge Discovery Database and Data mining Techniques

Transcription:

International Journal of Engineering and Technology Volume 2 No. 7, July, 2012 Investigating the Effects of Threshold in Credit Card Fraud Detection System Alese B. K 1., Adewale O. S 1., Aderounmu G. A 2., Ismaila W.O. 3, Omidiora E. O. 3 1 Federal University of Technology, Akure., 2 Obafemi Awolowo University, Ile-Ife. 3 Ladoke Akintola University of Technology, Ogbomoso ABSTRACT In e-commerce, credit card fraud is an evolving problem. The growing number of credit card transactions provides more opportunity for thieves to steal credit card numbers and subsequently commit fraud. Credit card fraud can be perpetrated through stolen cards, counterfeit card and stolen card details. The defensive measure issuing bank can take to overcome this liability is by introducing fraud detection systems (FDSs) in their database. Although different methods have been implemented to detect fraud but application of probability and selection of threshold value add an extra advantage for FDS to detect anomalies in on-line transactions. Therefore this paper implements another method of selecting threshold values (dynamic/adaptive) based on individual cardholder spending profile. In order to increase the confidence of the threshold values the results are verified using performance metrics. The two methods were compared and the results showed that adaptive method is suitable for detecting fraud in credit card transactions. Keywords: e-commerce, fraud detection system, credit card transactions, adaptive method, performance metrics 1. INTRODUCTION Fraud is a big business. Calls, credit card numbers, and stolen accounts can be sold on the street for substantial profit. Some of the various kinds of frauds identified are; Computer Fraud, Insurance Fraud, Money Laundering; Medical fraud, Telecommunication Fraud and Credit Card Fraud. Credit card fraud is the act of making a purchase using someone else s credit card information. In e- commerce, credit card fraud is an evolving problem. The growing number of credit card transactions provides more opportunity for thieves to steal credit card numbers and subsequently commit fraud. This can be perpetrated by individuals, merchants and also lack of security that can lead to the compromise of credit card numbers stored in online databases (computer intrusion). Despite significant efforts by merchants, card issuers and law enforcement to curb fraud, online fraud continues to plague electronic commerce web sites. From the work of view for preventing credit card fraud, more research works were carried out with special emphasis on data mining and neural networks. For more information see Sam and Karl (2002) Kim and Kim (2002) Dipti, et al. (2010) and Qibei and Chunhua (2011). However, It has been stated as a fact by Sung et al (2009) that thresholding should be opted for two-class segmentation problems due to their simplicity. Early fraud detection algorithms often used thresholds to classify a task as legal/fraud. Threshold-based algorithms model group behavior based on a small number of control parameters (thresholds) that affect whether or not a particular task will be executed by a given swarm member based solely upon the intensity of the stimulus presented in comparison to the threshold currently assigned to the individual in question. There are two main classes of thresholds that have been applied in fraud detection viz; (i) Global/Fixed threshold, Albinav et al. (2008) developed a credit card fraud detection system using hidden Markov model and Fixed threshold to detect fraud; (ii) Dynamic/Adaptive threshold, in which the estimated thresholds are applicable to one or a group. Rupesh et al. (2007) developed a rule-based approach to detect anomalous telephone calls. This paper investigates the effect of adaptive threshold in detecting fraud in credit cards transactions. The rest of this paper, we will discuss the motivation of this research and the analysis and performance of threshold in section 2. Section 3 will concentrate on methodology and techniques used in producing the threshold values in credit card transactions and section 4 discuss the implementation and result of the research. Finally section 5give the conclusion of this research. 1.1 Motivation Selecting threshold value is necessary to help the fraud detection to make a good decision in identifying the anomaly. It is difficult to select the suitable threshold ISSN: 2049-3444 2012 IJET Publications UK. All rights reserved. 1328

value for differentiating between normal activity and abnormal activity in on-line transaction. Selecting inaccurate threshold value will cause an excessive false alarm especially if the value is too low or if it is too high, it can cause the anomaly activity being considered as normal transaction. Therefore selecting an appropriated threshold is important to detect the fraud activity. Albinav et al. (2008) developed a credit card fraud detection system using hidden Markov model and Viterbi algorithm as predictive model. The estimated probability of old and new transactions from Viterbi algorithm were used to derive the probability of acceptance of the new transactions. And hence, various thresholds were used to test whether the new transactions are fraud or legal and the threshold that gave minimum false alarm was selected as base threshold. However, an important drawback is that this method treats cardholders identically; and more so, if threshold is set so that it finds fraud for a small business line, then a large business is likely to trip the threshold routinely. 1.2 Threshold Analysis and Performance Threshold methods can be classified into five viz: (i) Basic/Fixed thresholding in which a particular threshold is selected as baseline for all the instances. When using basic threshold, a threshold value has to be selected somehow and usually manually; (ii) Band thresholding is similar to basic thresholding, but has two threshold values, which are set to maximum value and minimum value; (iii) Percentile is a method for choosing the threshold value to input to the basic thresholding algorithm. The threshold is chosen to be the intensity value where the cumulative sum of object intensities is closest to the percentile; (iv) Optimal thresholding selects a threshold value that is statistically optimal, based on the contents of the object; and (v) Dynamic/Adaptive threshold, in which the estimated thresholds are applicable to one or a group (the threshold adapts). See Per (2004) Artem and Roland (2003) for more information. There have been a number of survey papers on measuring the performance of threshold like in Sung etal (2009) Mehmet and Bulent (2004) Sieracki et al (1989) and Abak et al (1997). However, in this work, four performance criteria will be used to provide evidence that shows differing performance features of fixed and adaptive thresholding methods: true positive rate, false positive rate, accuracy and precision. It is common to call true positives hits, false positive false alarms, and precision specificity. The Specificity indicates the degree of misclassification of non-fraudulent events. If a test shows high a false positive value, the specificity becomes poor. True positive rate (or fraud catching rate) is the fraction of fraudulent transactions that are correctly identified as fraudulent. False Positive rate (or false alarm rate) is the fraction of legitimate transactions that are incorrectly identified as fraudulent. 2. METHOD In this work, the detection of fraud in credit card on-line transaction is used for experimentation. The process takes several steps which include; accumulation and clustering of data; mapping of data into hidden Markov model; training of data with HMM algorithms in two forms (i) non-optimized (forward-backward) and (ii) optimized (Baum-Welsh); prediction of hidden states in (i) nonoptimized (Viterbi) and (ii) optimized (posterior-viterbi); estimation of acceptance probabilities (Ф old ); new transactions are introduced and the processes are repeated and new acceptance probabilities are estimated (Ф new ); a global/fixed threshold (0.5) for all cardholders; and a model is being derived from estimated acceptance probability for each cardholder as follows: Let the quantity Ф = /Ф old Ф new /. If Ф 0, it means that the new sequence is accepted (although it could be a fraud). The newly added transaction is determined to be fraudulent if the acceptance probability is above a computed threshold. ( 0.5) threshold new 2 3. DISCUSSION OF RESULTS In this paper, four different profiles are considered. The profiles considered are (55 35 10), (70 20 10), (95 3 2) and (34 33 33). Here, (a, b, c) represents a ls profile cardholder who has been found to carry out a percent of his transactions in the low, b percent in medium, and c percent in the high range. A simulated data of 16000 is used for training with HMM and the performance metrics used are true positive rate, false positive rate, accuracy and precision. The parameter settings of Abinav et al (2008) were employed. Different types of cardholder profiles were tested with four different schemes namely; optimized parameters with dynamic thresholds (Dyn_Opt_), non-optimized parameters with dynamic thresholds (Dyn_No_Opt_), optimized parameters with fixed threshold (Fix_Opt_), and non-optimized parameters with fixed threshold (Fix_No_Opt_). From figure 1, it can be seen that at (95 3 2) cardholder profile, Dyn_Opt_tp produced the highest true positive (tp) value of about 78%, followed by Dyn_No_Opt_tp with about 76%, Fix_Opt_tp produced about 59% while Fix_No_Opt_tp produced the least of about 52%. Also the same happened at (70 20 10) profile, with Dyn_Opt_tp produced the highest value, followed by Dyn_No_Opt_tp and closely by Fix_Opt_tp and Fix_No_Opt_tp produced the least value. But at (55 35 10) profile, the values ISSN: 2049-3444 2012 IJET Publications UK. All rights reserved. 1329

produced were low by all schemes and Dyn_Opt_tp and Dyn_No_Opt_tp produced the same values (about 42%) and so are the values produced by Fix_Opt_tp and Fix_No_Opt_tp of about 18% each. Figure 2 depicts that the false-positive (fp) performances of the four profiles against four different schemes. 95 3 2 profile produced the relatively lowest false-positive values which are about 2.0% produced by Dyn_Opt_fp scheme, 4.1% produced by Fix_Opt_fp, 4.2% produced by Dyn_No_Opt_fp and about 4.3% produced by Fix_No_Opt_fp. The worst and highest false-positive values were produced at 34 33 33 profiles with about 18% produced by Fix_No_Opt_fp, about 11.6% produced by Fix_Opt_fp and Dyn_No_Opt_fp, and Dyn_Opt_fp produced about 10%. profile, Dyn_Opt_pre produced about 94%, Dyn_No_Opt_pre produced about 86%, while Fix_No_Opt_pre scheme produced (about 64%) a higher precision than Fix_Opt_pre (about 62%). But at 34 33 33 profile, Dyn_Opt_pre produced about 70%, Dyn_No_Opt_pre produced about 58%, while Fix_Opt_pre scheme produced (about 62%) a higher precision than Fix_No_Opt_pre (about 43%). Figure 3: Graph of Precision averaged over all the 15 Figure 1: Graph of True-Positive averaged over all the 15 Also figure 4 shows the graphs of accuracy (acc) of the four profiles. At 95 3 2 profile, Dyn_Opt_acc produced about 88%, Dyn_No_Opt_acc produced about 83%, Fix_Opt_acc producing about 82%, while Fix_No_Opt_acc producing about 78%. At 70 20 10 profile, Dyn_Opt_acc produced about 82%, Dyn_No_Opt_acc produced about 74%, Fix_Opt_acc scheme produced about 84% ( higher precision than Dyn_Opt_acc), and Fix_No_Opt_acc produced about 68%). However, at 55 35 10 profile, Dyn_Opt_acc produced about 84%, Dyn_No_Opt_acc produced about 72%, while Fix_No_Opt_acc and Fix_Opt_acc produced about 80% respectively. At 34 33 33 profile, Dyn_Opt_acc produced about 86%, Dyn_No_Opt_acc produced about 78%, while Fix_Opt_acc scheme produced about 80% and Fix_No_Opt_acc produced about 70%. Figure 2: Graph of False-Positive averaged over all the 15 In figure 3, 95 3 2 profile produced the highest precision (pre) values across all the schemes with Dyn_Opt_pre producing about 97%, Dyn_No_Opt_pre and Fix_No_Opt_pre producing about 94%, while Fix_Opt_pre producing about 91%. At 70 20 10 profile, Dyn_Opt_pre produced about 93%, Dyn_No_Opt_pre produced about 90%, while Fix_Opt_pre scheme produced (about 84%) a higher precision than Fix_No_Opt_pre (about 78%). However, at 55 35 10 Figure 4: Graph of Accuracy averaged over all the 15 ISSN: 2049-3444 2012 IJET Publications UK. All rights reserved. 1330

4. CONCLUSION In this paper, we introduced a new approach in detecting fraud in credit card transactions using adaptive threshold value. The threshold value is obtained using the average of initial threshold (0.5) and ratio of acceptance probabilities of old and new transactions estimated from HMM algorithms. The performance of the system was tested with different cardholder profiles cum nonoptimization and optimization of HMM parameters using some selected performance metrics. Thus the adaptive thresholds gave a better performance than fixed threshold. REFERENCES [1] Abak, T., Baris U., and Sankur, B. (1997). The performance of thresholding algorithms for optical character recognition, Intl. Conf. Document Anal. Recog. ICDAR 97, pp. 697 700. [2] Abhinav S., Amlan K., Shamik S. and Arun K. (2008). Credit Card Fraud Detection Using Hidden Markov Model, IEEE Transactions on Dependable and Secure Computing, vol. 5, no.1, 37-48. [3] Artem L. Ponomarev and Ronald L. Davis (2003): An adjustable-threshold algorithm for the identification of objects in three-dimensional images, Bioinformatics 19(11) Oxford University. Vol. 19 no. 11 2003, pages 1431 1435. [4] Becker R. A., Volinsky C, and Wilks A. (2010). Fraud Detection in Telecommunications: History and Lessons Learned, TECHNOMETRICS, Vol. 52, no. 1. [5] Dipti D.P., Sunita M.K., Vijay M.W., Gokhale J. A., Prasad S. H. (2010), Efficient Scalable Multi-Level Classification Scheme for Credit Card Fraud Detection, International Journal of Computer Science and Network Security, Vol.10, No.8. [6] Faizal M. A., Mohd Zaki M., Shahrin S., Robiah Y, Siti Rahayu S., Nazrulazhar B. (2009) Threshold Verification Technique for Network Intrusion Detection System International Journal of Computer Science and Information Security, Vol. 2, No.1. [7] Kim M.J. and Kim T.S., (2002) A Neural Classifier with Fraud Density Map for Effective Credit Card Fraud Detection, Proc. International Conference on Intelligent Data Engineering and Automated Learning, Lecture Notes in Computer Science, Springer Verlag, no. 2412, pp. 378383. [8] Moysan J., Corneloup G., and Sollier T., (1999). Adapting an ultrasonic image threshold method to eddy current images and defining a validation domain of the thresholding method, NDT & E Intl. 32, 79 84. [9] Mehmet Sezgin, Bulent Sankur (2004): Survey over image thresholding techniques and quantitative performance evaluation Journal of Electronic Imaging. Vol. 13(1), 165 [10] Per C. H. (2004): Exercise in Computer Vision: A Comparison of Thresholding Methods. http://www.ifi.uio.no/forskning/grupper/dsb/program vare/xite/ [11] Rupesh K. G., and Saroj K. M. (2007). A Rule-based Approach for Anomaly Detection in Subscriber Usage Pattern,World Academy of Science, Engineering and Technology 34. [12] Qibei Lu, and Chunhua Ju (2011). Research on Credit Card Fraud Detection Model Based on Class Weighted Support Vector Machine Journal of Convergence Information Technology, Vol.6, Number 1. pp. 62-68. [13] Sokbae Lee, Myung Hwan Seo, and Youngki Shin. Testing for Threshold Effects in Regression Models. The Institute for Fiscal Studies Department of Economics, UCL cemmap working paper CWP36/10 [14] Sung S., Mohamed-Slim A., Hong-Chuan Y., Seniand K., (2009): Performance Evaluation of Threshold-Based Power Allocation Algorithms for Down-Link Switched-based Parallel Scheduling, IEEE Transactions on Wireless Communications, Vol. 8, No. 4. [15] Sam M., Karl T., Bram V., Bernard M.. (2002) Credit Card Fraud Detection Using Bayesian and Neural Networks First International NAISO Congress on Neuro Fuzzy Technologies, Havana.. [16] Sieracki, M. E., Reichenbach S. E. and Webb K. L. (1989). Evaluation of automated threshold selection methods for accurately sizing microscopic fluorescent cells by image analysis, Appl. Environ. Microbiol. 55, 2762 2772. [17] Venkatesh S. and Rosin P. L., (1995). Dynamic threshold determination by local and global edge evaluation, CVGIP: Graph. Models Image Process. 57, 146 160. ISSN: 2049-3444 2012 IJET Publications UK. All rights reserved. 1331

ISSN: 2049-3444 2012 IJET Publications UK. All rights reserved. 1332