On the communal analysis suspicion. scoring for identity crime in streaming credit applications

被引:13
作者
Phua, Clifton
Gayler, Ross [2 ]
Lee, Vincent [1 ]
Smith-Miles, Kate [3 ]
机构
[1] Monash Univ, Clayton Sch Informat Technol, Clayton, Vic 3800, Australia
[2] Veda Advantage, Melbourne, Vic 3000, Australia
[3] Deakin Univ, Sch Engn & Informat Technol, Burwood, Vic, Australia
基金
澳大利亚研究理事会;
关键词
Risk analysis; Credit application fraud detection; Communal scoring; Multi-attribute directed graph; Dynamic application data streams; Anomaly detection;
D O I
10.1016/j.ejor.2008.02.015
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
This paper describes a rapid technique: communal analysis Suspicion scoring (CASS), for generating numeric suspicion scores on streaming credit applications based on implicit links to each other, over both time and space. CASS includes pair-wise communal scoring of identifier attributes for applications, definition of categories of suspiciousness for application-pairs, the incorporation of temporal and spatial weights, and smoothed k-wise scoring or multiple linked application-pairs. Results on mining several hundred thousand real credit applications demonstrate that CASS reduces false alarm rates while maintaining reasonable hit rates. CASS is scalable for this large data sample, and can rapidly detect early symptoms of identity crime. In addition, new insights have been observed from the relationships between applications. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:595 / 612
页数:18
相关论文
共 18 条
[1]  
BAXTER R, 2003, P ACM SIGKDD 03 WORK, P25
[2]   Adaptive name matching in information integration [J].
Bilenko, M ;
Mooney, R ;
Cohen, W ;
Ravikumar, P ;
Fienberg, S .
IEEE INTELLIGENT SYSTEMS, 2003, 18 (05) :16-23
[3]  
CHAPMAN S, 2005, SIMMETRICS OPEN SOUR
[4]   Computational methods for dynamic graphs [J].
Cortes, C ;
Pregibon, D ;
Volinsky, C .
JOURNAL OF COMPUTATIONAL AND GRAPHICAL STATISTICS, 2003, 12 (04) :950-970
[5]  
CORTES C, 1999, P 5 ACM SIGKDD INT C, P327
[6]   Adaptive fraud detection [J].
Fawcett, T ;
Provost, F .
DATA MINING AND KNOWLEDGE DISCOVERY, 1997, 1 (03) :291-316
[7]   Authoritative sources in a hyperlinked environment [J].
Kleinberg, JM .
JOURNAL OF THE ACM, 1999, 46 (05) :604-632
[8]  
Kubica J.M., 2003, Proceedings of the Twentieth International Conference on Machine Learning, ICML 2003, P392
[9]  
Levitt StevenD., 2005, Freakonomics: A Rogue Economist Explores the Hidden Side of Everything
[10]  
MACSKASSY S, 2005, P INT C INT AN