A Fast Fraud Detection Approach using Clustering Based Method



Similar documents
Credit Card Fraud Detection using Hidden Morkov Model and Neural Networks

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

Robust Outlier Detection Technique in Data Mining: A Univariate Approach

Credit Card Fraud Detection Using Hidden Markov Model

Predicting the Risk of Heart Attacks using Neural Network and Decision Tree

EXTENDED CENTROID BASED CLUSTERING TECHNIQUE FOR ONLINE SHOPPING FRAUD DETECTION

A Novel Approach for Credit Card Fraud Detection Targeting the Indian Market

Application of Hidden Markov Model in Credit Card Fraud Detection

A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model

PROBLEM REDUCTION IN ONLINE PAYMENT SYSTEM USING HYBRID MODEL

Techniques for Fraud Detection

Using Data Mining for Mobile Communication Clustering and Characterization

A Survey on Outlier Detection Techniques for Credit Card Fraud Detection

Comparison of K-means and Backpropagation Data Mining Algorithms

Fraud Detection in Online Banking Using HMM

An Overview of Knowledge Discovery Database and Data mining Techniques

Data Mining Clustering (2) Sheets are based on the those provided by Tan, Steinbach, and Kumar. Introduction to Data Mining

Credit Card Fraud Detection Using Self Organised Map

Conclusions and Future Directions

Internet Banking Fraud Detection using HMM and BLAST-SSAHA Hybridization

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set

International Journal of Advance Research in Computer Science and Management Studies

Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network

Fraud Detection in Credit Card Using DataMining Techniques Mr.P.Matheswaran 1,Mrs.E.Siva Sankari ME 2,Mr.R.Rajesh 3

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining

Survey of Clustering based Financial Fraud Detection Research

Insider Threat Detection Using Graph-Based Approaches

A Study of Detecting Credit Card Delinquencies with Data Mining using Decision Tree Model

ARTIFICIAL INTELLIGENCE (CSCU9YE) LECTURE 6: MACHINE LEARNING 2: UNSUPERVISED LEARNING (CLUSTERING)

Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit

Social Media Mining. Data Mining Essentials

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

PERFORMANCE ANALYSIS OF CLUSTERING ALGORITHMS IN DATA MINING IN WEKA

Use of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing

SEARCH ENGINE WITH PARALLEL PROCESSING AND INCREMENTAL K-MEANS FOR FAST SEARCH AND RETRIEVAL

Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup

INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY DATA MINING IN HEALTHCARE SECTOR.

Web Forensic Evidence of SQL Injection Analysis

The Credit Card Fraud Detection Analysis With Neural Network Methods

A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS

An Analysis on Density Based Clustering of Multi Dimensional Spatial Data

A QoS-Aware Web Service Selection Based on Clustering

Bisecting K-Means for Clustering Web Log data

Data Mining Application for Cyber Credit-card Fraud Detection System

Web Usage Mining: Identification of Trends Followed by the user through Neural Network

Chapter ML:XI (continued)

Azure Machine Learning, SQL Data Mining and R

DATA MINING TECHNIQUES AND APPLICATIONS

Data Mining 資 料 探 勘. 分 群 分 析 (Cluster Analysis)

Adaptive Anomaly Detection for Network Security

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus

Artificial Neural Network and Location Coordinates based Security in Credit Cards

Clustering. Data Mining. Abraham Otero. Data Mining. Agenda

Categorical Data Visualization and Clustering Using Subjective Factors

Applying Data Analysis to Big Data Benchmarks. Jazmine Olinger

DATA MINING CLUSTER ANALYSIS: BASIC CONCEPTS

Evaluating Online Payment Transaction Reliability using Rules Set Technique and Graph Model

A Review of Data Mining Techniques

Probabilistic Credit Card Fraud Detection System in Online Transactions

Utility-Based Fraud Detection

Data Mining System, Functionalities and Applications: A Radical Review

Prediction of Heart Disease Using Naïve Bayes Algorithm

A Study Of Bagging And Boosting Approaches To Develop Meta-Classifier

Chapter 6. The stacking ensemble approach

The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack

Detecting Credit Card Fraud

Distributed Framework for Data Mining As a Service on Private Cloud

Manjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India

Introduction to Data Mining

Intrusion Detection via Machine Learning for SCADA System Protection

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD

SPATIAL DATA CLASSIFICATION AND DATA MINING

IDENTIFYING BANK FRAUDS USING CRISP-DM AND DECISION TREES

Data Mining in Telecommunication

Dynamic Data in terms of Data Mining Streams

Character Image Patterns as Big Data

Data Mining Approach For Subscription-Fraud. Detection in Telecommunication Sector

How To Cluster

Automatic Bank Fraud Detection Using Support Vector Machines

Machine Learning. Chapter 18, 21. Some material adopted from notes by Chuck Dyer

Practical Data Science with Azure Machine Learning, SQL Data Mining, and R

K-means Clustering Technique on Search Engine Dataset using Data Mining Tool

1. Classification problems

Introduction to Data Mining

Information Retrieval and Web Search Engines

Comparision of k-means and k-medoids Clustering Algorithms for Big Data Using MapReduce Techniques

Pattern Recognition Using Feature Based Die-Map Clusteringin the Semiconductor Manufacturing Process

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

Statistical Models in Data Mining

An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

Using multiple models: Bagging, Boosting, Ensembles, Forests

. Learn the number of classes and the structure of each class using similarity between unlabeled training patterns

Clustering Big Data. Anil K. Jain. (with Radha Chitta and Rong Jin) Department of Computer Science Michigan State University November 29, 2012

Healthcare Measurement Analysis Using Data mining Techniques

OUTLIER ANALYSIS. Data Mining 1

Grid Density Clustering Algorithm

Investigating the Effects of Threshold in Credit Card Fraud Detection System

Clustering on Large Numeric Data Sets Using Hierarchical Approach Birch

Machine Learning using MapReduce

Transcription:

pp. 33-37 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html A Fast Detection Approach using Clustering Based Method Surbhi Agarwal 1, Santosh Upadhyay 2 1 M.tech Student, Mewar University, Chittorgarh Rajasthan 2 GCET, Gr.Noida, Uttar Pradesh Abstract: Due to rapid advancement in credit card transactions, credit card fraud has become increasingly rampant in recent years. Owing to levitate and rapid escalation of E-Commerce, cases of credit card fraud allied with it are also intensifying which results in trouncing of billions of dollars worldwide each year. Nowadays, fraud is one of the major causes of great financial losses, not only for merchants, but individual clients are also affected. Many data mining techniques have evolved in detecting various credit card fraudulent transactions. Out of the available data mining techniques, clustering has proven itself a constant applied solution for detecting fraud. Clustering process groups the data in such a way so that highly similar data come under one group. An outlier is an instance (record, transaction, etc) that does not conform to a well-defined and general pattern of the expected behavior in a certain dataset. In this paper, clustering and outlier detection techniques are used as a hybrid approach to find these mischief activities. Using clustering, the data sets are partitioned and outlier detection is used to find the fraudulent data. In proposed approach, two techniques are combined to efficiently find the outlier from the data set. The experimental results using real dataset demonstrate that proposed method takes less computational cost and performs better than the distance based method. Proposed algorithm efficiently prunes of the inliers and save huge number of extra calculations. becomes visible. Finding outliers is an important task in data mining. Outlier detection as a branch of data mining has many important applications and deserves more attention from data mining community. In recent years, conventional database querying methods are inadequate to extract useful information, and hence researches nowadays are focused to develop new techniques to meet the raised requirements. It is to be noted that the increase in dimensionality ity of data gives rise to a number of new computational challenges not only due to the increase in number of data objects but also due to the increase in number of attributes. Outlier detection is an important research problem that aims to find objects that are considerably dissimilar, exceptional and inconsistent in the database. Keywords: Credit card fraud detection, E-Commerce, clustering, outlier detection, data mining. 1. INTRODUCTION In modern world most of the people are using credit cards. It is the most popular payment mode. Detecting frauds in this online transaction is a very difficult task. So, there is a need to develop a model to detect these frauds, in the business area and also in the academics. in this context is best described by Phua et. al.[1] as the abuse of a profit organization s system without necessarily leading to direct legal consequences (Phua, V. Lee, Smith, & Gayler, 2005). Clustering helps in grouping the data into similar clusters that helps in uncomplicated retrieval of data. Cluster analysis is a technique for breaking data down into related components in such a way that patterns and order Fig. 1. Clustering Taxonomies [6] 2. LITERATURE REVIEW Credit card fraud detection has drawn a lot of research interest and a number of techniques, with special emphasis on data mining and neural networks. J.Daud Pathan et al.[2] describes the Credit card fraud detection system using Hidden Markov Model and k-clustering. In this paper HMM is used to model the sequence of operation in credit card transaction processing. If an incoming credit card transaction is not accepted by the trained HMM with sufficiently high probability, it is considered to be fraudulent. S.Raheja et al.[3] describes the

34 Surbhi Agarwal, Santosh Upadhyay Credit Card Detection By Improving K-Means.In this paper the series of operation is modeled in credit card transaction processing using a K-Means and LUHN algorithm and how it can be used for detecting frauds is also covered. Luhn algorithm is instructed with the behavior of card holder. If an incoming credit card transaction is not accepted by the k- mean with sufficient high probability, it is considered to be fraudulent then confirmation is given by Luhn algorithm. Fig. 2. Financial Detection Review Framework L.V. Bijuraj[4] describes Clustering and its applications. The paper covered all the types and methods of clustering by giving certain examples. In this paper, use of clustering in text mining has been discussed. Text mining usually involves the process of structuring the input text (usually parsing, along with the addition of some derived linguistic features and the removal of others, and subsequent insertion into a database), deriving patterns within the structured data, and finally evaluation and interpretation of the output. J. S. Mishra et al.[5] describes A Novel Approach for Credit Card Detection Targeting the Indian Market. In this paper it is shown how a fraud can be reported instantly while the fraudulent transaction is in process. Andrei Sorin SABAU [6] describes Survey of clustering based financial fraud detection research. This paper surveys clustering techniques used in fraud detection over the last ten years. Fig. 2 shows various data mining techniques and types of financial fraud. Ms. S. D. Pachgade et al.[7] describes Outlier Detection over Data Set Using Cluster-Based and Distance-Based Approach.Proposed Method for outlier detection uses hybrid approach. Purpose of approach is first to apply clustering algorithm that is k-means which partition the dataset into number of clusters and then find outliers from the each resulting clusters using distance based method. M. A. Vasarhelyi et al. [8] describes Application of Anomaly Detection Techniques to Identify ulent Refunds. This paper describes classificationbased and clustering-based anomaly detection techniques and their applications. As an illustration, the paper applies K-Means, a clusteringbased algorithm, to a refund transactions dataset from a telecommunication company, with the intent of identifying fraudulent refunds. N. L. Khac et al.[9] decribes Application of Data Mining for Anti-money Laundering Detection: A Case Study. Dr. R. Dhanapal et al.[10] describes the Analysis of credit card fraud detection methods. In this paper, three methods to detect fraud are presented. Firstly, clustering model is used to classify the legal and fraudulent transaction using data clusterization of regions of parameter value. Secondly, Gaussian mixture model is used to model the probability density of credit card user s past behavior so that the probability of current behavior can be calculated to detect any abnormalities from the past behavior. Lastly, Bayesian networks are used to describe the statistics of a particular user and the statistics of different fraud scenarios. A.Kundu et al.[11] describes Credit card fraud detection using hidden markov model. In this paper, the sequence of operations in credit card transaction processing is modeled using a Hidden Markov Model (HMM) and how it can be used for the detection of frauds. An HMM is initially trained with the normal behavior of a cardholder. If an incoming credit card transaction is not accepted by the trained HMM with sufficiently high probability, it is considered to be fraudulent. At the same time, it is ensured that genuine transactions are not rejected. Detailed experimental results are presented to show the effectiveness of the approach and comparing it with other techniques available in the literature. 3. CLUSTERING BASED FFD SURVEY As a result of the research methodology, 10 articles were selected for inclusion. They have been grouped based on application domain, clustering technique and case study dataset. Papers are ordered on publishing year and clustering technique in Table 1. 4. PROPOSED WORK A Detection System (FDS) runs at a credit card issuing bank. Each incoming transaction is submitted to the FDS for verification. FDS receives the card details and the value of purchase to verify whether the transaction is genuine or not. The types of goods That is bought in that transactions are not known to the FDS. It tries to find any outlier in the transaction based on the spending profile of the cardholder, amount, month, day (Monday as first day, Tuesday as second day, and so on.), shipping address, and billing address, etc. If the FDS confirms

A Fast Detection Approach using Clustering Based Method 35 the transaction to be malicious, it raises an alarm, and the issuing bank declines the transaction. The concerned card holder may then be contacted and alerted about the possibility that the card is compromised. In this section, we explain how K-means clustering can be used for Credit card fraud detection. Phase II- outlier or anomaly detection by Distance-based approach 5. SYSTEM ARCHITECTURE We have proposed our work in two phases- Phase I- clustering using K-means Author J.Daud Pathan et al.[2] S.Raheja et al.[3] Table 1. Surveyed articles Year Application Clustering Domain Technique 2014 Credit Card 2014 Credit Card L.V.Bijuraj[4] 2013 Clustering Applications J.S.Mishra et al.[5] A.Sorin SABAU [6] Ms. S.D.Pachgade et al.[7] M.A.Vasarhelyi et al.[8] N.L. Khac et al. [9] Dr. R.Dhanapal et al.[10] A.Kundu et al.[11] 2013 Credit Card 2012 Financial 2012 Medical Diagnosis 2011 Refund 2010 Money Laundering 2009 Credit card fraud 2008 Credit Card HMM and K- Clustering Modified K-Means, Luhn algorithm K-Means, DBSCAN clustering HMM Dataset Online Transaction Credit Card Numbers Protein & fat contents Online payment K-means, Internal and hierarchical external clustering data against organization Cluster Based and distance based K-means Cancer dataset, liver disorder dataset Refund transaction data K-means Transaction Data Clustering model, Probability density estimation, Bayesian networks HMM Training Data Credit card issuing bank 5.1 Input Data Set Fig. 3. System Architecture Collecting dataset from different transactions 5.2 Cluster Based Approach Clustering is a popular technique used to group similar data points or objects in groups or clusters. Clustering is an important tool for outlier analysis. Cluster based approach is here act as data reduction. First, clustering technique is used to group the data having similar characteristics. And then calculate the centroids for each group. 5.3 Distance Based Approach Distance based technique is used to calculate maximum distance value for each cluster. If this maximum distance is greater than some threshold which is given by the user then it will declare as outlier, otherwise as a real object or inliers. Distance-based methods are much more flexible and robust. They are defined for any data type for which we have a distance measure and do not require a detailed understanding of the application domain 5.4 Outlier Detection: Outlier detection is an extremely important task in a wide variety of application domains. Outlier detection is a task that finds objects that are dissimilar or inconsistent with respect to the remaining data or which are far away from their cluster centroids. Fig. 4. Clustering of scattered data

36 Surbhi Agarwal, Santosh Upadhyay Find the cluster which has minimum distance between its centroid and NT point and that will be the nearest cluster. ii) Find radius of nearest cluster. iii) Radius value is set as threshold value by the user. Compare threshold value with dnt. If new transaction is greater than threshold then it will declare as outlier. Let NT be the new transaction occurred. Th be the threshold value set by the user. Cd be the max distance among centroids. if NT<Th then normal elseif NT<Cd then normal else outlier Fig. 5. K-means clustering process 6. THE K-MEANS CLUSTERING AND DISTANCE- BASED ALGORITHM PROCESS K-Means clustering generates a specific number of disjoint, flat (non-hierarchical) clusters. It is well suited to generating globular clusters. The K-Means method is numerical, unsupervised, non-deterministic and iterative. K-means clustering and outlier detection is combined to generate a hybrid approach. The steps for hybrid approach are- The dataset is partitioned into K clusters and the data points are randomly assigned to the clusters resulting in clusters that have roughly the same number of data points. For each data point: 1. Calculate the distance from the data point to each cluster. 2. If the data point is closest to its own cluster, leave it where it is. If the data point is not closest to its own cluster, move it into the closest cluster. 3. Repeat the above step until a complete pass through all the data points results in no data point moving from one cluster to another. At this point the clusters are stable and the clustering process ends. 4. Calculate threshold value for each cluster- i) Find distance of nearest centroid from NT point, say dnt. A) Finding nearest cluster- Determine all k-distances between NT and k-cluster centroids. 7. RESULT We use synthetic data to evaluate our work. 7.1 Performance Measure Two indicators, Detection Rate and False Alarm Rate, are used to measure the accuracy of the method. The Detection Rate shows the number of true outliers that have been successfully detected divided by the total number of outliers present in the dataset. The False Alarm Rate is defined as the number of normal instances incorrectly labelled as outliers divided by the total number of normal instances. A good method should provide a high Detection Rate together with a low False Alarm Rate. ROC (Receiver Operating Characteristics) curves are plotted depicting the relationship between False Alarm Rate and Detection Rate for one fixed test set combination. ROC curves are a way of visualizing the trade-offs between detection and false alarm rate. 7.2 Dataset Preparation The dataset was obtained by simulating a large number of different transactions while purchasing. The goal was to produce a good training set for learning methods that use labelled data. As a result, the proportion of transactions to normal ones in the dataset is very large as compared to data that one would expect to observe in practice.unsupervised anomaly detection algorithms are sensitive to the ratio of outliers in the dataset. If the number of outliers is too high, each outlier will not show up as anomalous. 7.3 Results We have calculated Detection Rate and False Alarm Rate for all the samples. The results shown in table 2 and the corresponding ROC (Receiver Operating Characteristics)

A Fast Detection Approach using Clustering Based Method 37 curves shown in figure 6 is a representation of most frequently found result. Number of Clusters Table 2. Result Fig. 6. Graph between number of clusters and rate 8. CONCLUSION Detection Rate (%) False Alarm Rate (%) 250 98.4 16.688 160 92.0 13.251 110 89.8 10.614 50 87.2 5.651 19 83.0 1.86 8 60.6 0.481 This paper aims to detect outliers which are grossly different from or inconsistent with the remaining dataset. Existing outlier detection methods are ineffective on scattered realworld datasets due to implicit data patterns and parameter setting issues. We proposed an efficient outlier detection method. We first group the data (having similar characteristics) into number of clusters. Due to reduction in size of dataset, the computation time is reduced considerably. Then we take threshold value from user and calculate outliers according to given threshold value for each cluster. We get outliers within a cluster. Hybrid approach takes less computation time. Approach only deals with numerical data, so future work requires modifications that can make applicable for text mining also. The approach needs to be implemented on more complex datasets. Future work requires approach applicable for varying datasets. REFERENCES [1] Phua, C., Lee, V., Smith, K., & Gayler, R. (2005). A comprehensive survey of data mining-based fraud detection research. Artificial Intelligence Review, 1 14. Retrieved November 26, 2010, from http://arxiv.org/pdf/1009.6119. [2] Mohd A.Z. Khan, J.D. Pathan and A.H.E. Ahmed, "Credit Card Detection System Using Hidden Markov Model and K- Clustering", IJARCCE, vol. 3, Pages 5458-5461, February 2014. [3] M. Singh, Aashima, S. Raheja, Credit Card Detection by Improving K-Means, IJETR, Vol-2, Issue-5, May 2014. [4] L. V. Bijuraj, Clustering and its Applications, NCNHIT 2013. [5] J. S. Mishra, S. Panda, A. K. Mishra, A Novel Approach for Credit Card Detection Targeting the Indian Market, IJCSI, Vol. 10, Issue 3, No 2, May 2013. [6] A. Sorin SABAU, Survey of clustering based Financial Detection Research, Informatica Economica vol. 16, no. 1/2012. [7] Ms. S. D. Pachgade, Ms. S. S. Dhande, Outlier Detection over Data Set Using Cluster-Based and Distance-Based Approach, IJARCSSE, Vol 2, Issue 6, June 2012. [8] M. A. Vasarhelyi, H.Issa, Application of Anomaly Detection Techniques to Identify ulent Refunds, 2011. [9] Nhien An Le Khac and M. T. Kechadi, Application of Data Mining for Anti-money Laundering Detection: A Case Study, ICDMW, pp. 577-584, 2010. [10] V.Dheepa, Dr. R. Dhanapal, Analysis of Credit Card Detection Methods IJRTE, vol 2, No. 3, November 2009. [11] A. Srivastava, A. Kundu, S. Sural, A. K. Majumdar, Credit Card Detection Using Hidden Markov Model, IEEE Transactions on Dependable and Secure Computing, vol. 5, NO. 1, January-March 2008.