Adaptive fraud detection

被引:490
|
作者
Fawcett, T [1 ]
Provost, F [1 ]
机构
[1] NYNEX Sci & Technol, White Plains, NY 10604 USA
关键词
mud detection; rule learning; profiling; constructive induction; intrusion detection; applications;
D O I
10.1023/A:1009700419189
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One method for detecting fraud is to check for suspicious changes in user behavior. This paper describes the automatic design of user profiling methods for the purpose of fraud detection, using a series of data mining techniques. Specifically, we use a rule-learning program to uncover indicators of fraudulent behavior from a large database of customer transactions. Then the indicators are used to create a set of monitors, which profile legitimate customer behavior and indicate anomalies. Finally, the outputs of the monitors are used as features in a system that learns to combine evidence to generate high-confidence alarms. The system has been applied to the problem of detecting cellular cloning fraud based on a database of call records. Experiments indicate that this automatic approach performs better than hand-crafted methods for detecting fraud. Furthermore, this approach can adapt to the changing conditions typical of fraud detection environments.
引用
收藏
页码:291 / 316
页数:26
相关论文
共 50 条
  • [31] FLAD: Adaptive Federated Learning for DDoS attack detection
    Doriguzzi-Corin, Roberto
    Siracusa, Domenico
    COMPUTERS & SECURITY, 2024, 137
  • [32] An Adaptive Ensemble Machine Learning Model for Intrusion Detection
    Gao, Xianwei
    Shan, Chun
    Hu, Changzhen
    Niu, Zequn
    Liu, Zhen
    IEEE ACCESS, 2019, 7 : 82512 - 82521
  • [33] Intrusion detection systems using adaptive regression splines
    Mukkamala, Srinivas
    Sung, Andrew H.
    Abraham, Ajith
    Ramos, Vitorino
    ENTERPRISE INFORMATION SYSTEMS VI, 2006, : 211 - +
  • [34] Learning Intrusion Detection Based on Adaptive Bayesian Algorithm
    Farid, Dewan Md.
    Rahman, Mohammad Zahidur
    2008 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY: ICCIT 2008, VOLS 1 AND 2, 2008, : 628 - 632
  • [35] Game theoretical model for adaptive intrusion detection system
    Jan Stiborek, Jan, 1600, Springer Verlag (8670):
  • [36] Genetic-based adaptive intrusion detection system
    Li Yun-xia
    Zheng Hong
    Li Ping
    Proceedings of 2005 Chinese Control and Decision Conference, Vols 1 and 2, 2005, : 1233 - 1236
  • [37] Robust DDoS attack detection with adaptive transfer learning
    Anley, Mulualem Bitew
    Genovese, Angelo
    Agostinello, Davide
    Piuri, Vincenzo
    COMPUTERS & SECURITY, 2024, 144
  • [38] Using incremental learning method for adaptive network intrusion detection
    Yang, W
    Yun, XC
    Zhang, LJ
    Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 3932 - 3936
  • [39] An Adaptive Multi-layered Approach for DoS Detection and Mitigation
    Ramesh, Sowmya
    Selvarayan, Subhiksha
    Sunil, Kanishq
    Arumugam, Chamundeswari
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2021, PT IX, 2021, 12957 : 533 - 545
  • [40] A novel adaptive intrusion detection system based on data mining
    Yu, ZX
    Chen, JR
    Zhu, TQ
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 2390 - 2395