BLAST-SSAHA Hybridization for Credit Card Fraud Detection

被引:31
作者
Kundu, Amlan [1 ]
Panigrahi, Suvasini [1 ]
Sural, Shamik [1 ]
Majumdar, Arun K. [2 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[2] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
关键词
Electronic commerce; credit card fraud; sequence alignment; transaction processing; unauthorized access; Markov chain; SEARCH; SEQUENCE;
D O I
10.1109/TDSC.2009.11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A phenomenal growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. In real life, fraudulent transactions are interspersed with genuine transactions and simple pattern matching is not often sufficient to detect them accurately. Thus, there is a need for combining both anomaly detection as well as misuse detection techniques. In this paper, we propose to use two-stage sequence alignment in which a profile analyzer (PA) first determines the similarity of an incoming sequence of transactions on a given credit card with the genuine cardholder's past spending sequences. The unusual transactions traced by the profile analyzer are next passed on to a deviation analyzer (DA) for possible alignment with past fraudulent behavior. The final decision about the nature of a transaction is taken on the basis of the observations by these two analyzers. In order to achieve online response time for both PA and DA, we suggest a new approach for combining two sequence alignment algorithms BLAST and SSAHA.
引用
收藏
页码:309 / 315
页数:7
相关论文
共 22 条
[1]   CARDWATCH: A neural network based database mining system for credit card fraud detection [J].
Aleskerov, E ;
Freisleben, B ;
Rao, B .
PROCEEDINGS OF THE IEEE/IAFE 1997 COMPUTATIONAL INTELLIGENCE FOR FINANCIAL ENGINEERING (CIFER), 1997, :220-226
[2]  
ALTSCHUL SF, 1990, J MOL BIOL, V215, P403, DOI 10.1006/jmbi.1990.9999
[3]  
Brause R., 1999, NEURAL DATA MINING C, P103
[4]  
Chiu CC, 2004, 2004 IEEE INTERNATIONAL CONFERNECE ON E-TECHNOLOGY, E-COMMERE AND E-SERVICE, PROCEEDINGS, P177
[5]   Intrusion detection: A bioinformatics approach [J].
Coull, S ;
Branch, J ;
Szymanski, B ;
Breimer, E .
19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, :24-33
[6]  
Ghosh S., 1994, Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences. Vol.III: Information Systems: Decision Support and Knowledge-Based Systems (Cat. No.94TH0607-2), P621, DOI 10.1109/HICSS.1994.323314
[7]  
JOHA CH, 2003, J RETAILING CONSUMER, V10, P135
[8]  
Kahn B. E., 1989, Marketing Letters, V1, P55, DOI https://doi.org/10.1007/BF00436149
[9]  
KUNDU A, 2006, P INT C INF SYST SEC, P260
[10]  
Li Y, 2004, INT C PATT RECOG, P40