Credit Card Fraud Detection: A Hybrid Approach Using Fuzzy Clustering & Neural Network

被引:33
作者
Behera, Tanmay Kumar [1 ]
Panigrahi, Suvasini [1 ]
机构
[1] Veer Surendra Sai Univ Technol, Dept CSE & IT, Burla 768018, Odisha, India
来源
2015 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING ICACCE 2015 | 2015年
关键词
Fraud; credit card; suspicion score; fuzzy clustering; neural network; ALGORITHM;
D O I
10.1109/ICACCE.2015.33
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the rapid progress of the e-commerce and online banking, use of credit cards has increased considerably leading to a large number of fraud incidents. In this paper, we have proposed a novel approach towards credit card fraud detection in which the fraud detection is done in three phases. The first phase does the initial user authentication and verification of card details. If the check is successfully cleared, then the transaction is passed to the next phase where fuzzy c-means clustering algorithm is applied to find out the normal usage patterns of credit card users based on their past activity. A suspicion score is calculated according to the extent of deviation from the normal patterns and thereby the transaction is classified as legitimate or suspicious or fraudulent. Once a transaction is found to be suspicious, neural network based learning mechanism is applied to determine whether it was actually a fraudulent activity or an occasional deviation by a genuine user. Extensive experimentation with stochastic models shows that the combined use of clustering technique along with learning helps in detecting fraudulent activities effectively while minimizing the generation of false alarms.
引用
收藏
页码:494 / 499
页数:6
相关论文
共 15 条
[1]   CARDWATCH: A neural network based database mining system for credit card fraud detection [J].
Aleskerov, E ;
Freisleben, B ;
Rao, B .
PROCEEDINGS OF THE IEEE/IAFE 1997 COMPUTATIONAL INTELLIGENCE FOR FINANCIAL ENGINEERING (CIFER), 1997, :220-226
[2]   FCM - THE FUZZY C-MEANS CLUSTERING-ALGORITHM [J].
BEZDEK, JC ;
EHRLICH, R ;
FULL, W .
COMPUTERS & GEOSCIENCES, 1984, 10 (2-3) :191-203
[3]   Distributed data mining in credit card fraud detection [J].
Chan, PK ;
Fan, W ;
Prodromidis, AL ;
Stolfo, SJ .
IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1999, 14 (06) :67-74
[4]  
Chiu CC, 2004, 2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, P177
[5]   Detecting credit card fraud by genetic algorithm and scatter search [J].
Duman, Ekrem ;
Ozcelik, M. Hamdi .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (10) :13057-13063
[6]  
Ghosh S., 1994, Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences. Vol.III: Information Systems: Decision Support and Knowledge-Based Systems (Cat. No.94TH0607-2), P621, DOI 10.1109/HICSS.1994.323314
[7]  
Liu P., 2002, TECHNICAL REPORT
[8]  
Maes S., 2002, P 1 INT NAIS C NEUR, V261, P270
[9]   A SCALED CONJUGATE-GRADIENT ALGORITHM FOR FAST SUPERVISED LEARNING [J].
MOLLER, MF .
NEURAL NETWORKS, 1993, 6 (04) :525-533
[10]   Fuzzy C-Means (FCM) Clustering Algorithm: A Decade Review from 2000 to 2014 [J].
Nayak, Janmenjoy ;
Naik, Bighnaraj ;
Behera, H. S. .
COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 2, 2015, 32 :133-149