Adaptive fraud detection

被引:490
|
作者
Fawcett, T [1 ]
Provost, F [1 ]
机构
[1] NYNEX Sci & Technol, White Plains, NY 10604 USA
关键词
mud detection; rule learning; profiling; constructive induction; intrusion detection; applications;
D O I
10.1023/A:1009700419189
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One method for detecting fraud is to check for suspicious changes in user behavior. This paper describes the automatic design of user profiling methods for the purpose of fraud detection, using a series of data mining techniques. Specifically, we use a rule-learning program to uncover indicators of fraudulent behavior from a large database of customer transactions. Then the indicators are used to create a set of monitors, which profile legitimate customer behavior and indicate anomalies. Finally, the outputs of the monitors are used as features in a system that learns to combine evidence to generate high-confidence alarms. The system has been applied to the problem of detecting cellular cloning fraud based on a database of call records. Experiments indicate that this automatic approach performs better than hand-crafted methods for detecting fraud. Furthermore, this approach can adapt to the changing conditions typical of fraud detection environments.
引用
收藏
页码:291 / 316
页数:26
相关论文
共 50 条
  • [21] An Adaptive Anomaly Detection Algorithm Based on CFSFDP
    Ren, Weiwu
    Di, Xiaoqiang
    Du, Zhanwei
    Zhao, Jianping
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 2057 - 2073
  • [22] An Investigation of Real-Valued Accuracy-Based Learning Classifier Systems for Electronic Fraud Detection
    Behdad, Mohammad
    Barone, Luigi
    French, Tim
    Bennamoun, Mohammed
    GECCO-2010 COMPANION PUBLICATION: PROCEEDINGS OF THE 12TH ANNUAL GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2010, : 1893 - 1900
  • [23] An intelligent intrusion detection and response system using network quarantine channels: Adaptive policies and alert filters
    Hooper, Emmanuel
    2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY, WORKSHOPS PROCEEDINGS, 2006, : 45 - 48
  • [24] Modeling an Intrusion Detection System Based on Adaptive Immunology
    Alaparthy, Vishwa
    Morgera, Salvatore D.
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2019, 11 (02) : 42 - 55
  • [25] Intrusion detection inter-component adaptive negotiation
    Feiertag, R
    Rho, S
    Benzinger, L
    Wu, S
    Redmond, T
    Zhang, C
    Levitt, K
    Peticolas, D
    Heckman, M
    Staniford, S
    McAlerney, J
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2000, 34 (04): : 605 - 621
  • [26] An adaptive intrusion detection and prevention system for Internet of Things
    Bakhsh, Sheikh Tahir
    Alghamdi, Saleh
    Alsemmeari, Rayan A.
    Hassan, Syed Raheel
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (11)
  • [27] Intrusion detection based on adaptive RBF neural network
    Zhong, Jiang
    Li, Zhiguo
    Feng, Yong
    Ye, Cunxiao
    ISDA 2006: SIXTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, 2006, : 1081 - +
  • [28] Adaptive Virtual Protocol Stacks for intrusion detection applications
    McGann, DD
    Kim, Y
    Czernikowski, R
    Heliotis, J
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2001, : 190 - 195
  • [29] An Adaptive and Collaborative Method Based on GMRA for Intrusion Detection
    Teng, Shaohua
    Zhang, Yongzhi
    Zhang, Wei
    Liang, Lu
    COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, CHINESECSCW 2021, PT I, 2022, 1491 : 72 - 84
  • [30] Improving Intrusion Detection with Adaptive Support Vector Machines
    Macek, N.
    Dordevic, B.
    Timcenko, V.
    Bojovic, M.
    Milosavljevic, M.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2014, 20 (07) : 57 - 60