Adaptive fraud detection

被引:490
|
作者
Fawcett, T [1 ]
Provost, F [1 ]
机构
[1] NYNEX Sci & Technol, White Plains, NY 10604 USA
关键词
mud detection; rule learning; profiling; constructive induction; intrusion detection; applications;
D O I
10.1023/A:1009700419189
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One method for detecting fraud is to check for suspicious changes in user behavior. This paper describes the automatic design of user profiling methods for the purpose of fraud detection, using a series of data mining techniques. Specifically, we use a rule-learning program to uncover indicators of fraudulent behavior from a large database of customer transactions. Then the indicators are used to create a set of monitors, which profile legitimate customer behavior and indicate anomalies. Finally, the outputs of the monitors are used as features in a system that learns to combine evidence to generate high-confidence alarms. The system has been applied to the problem of detecting cellular cloning fraud based on a database of call records. Experiments indicate that this automatic approach performs better than hand-crafted methods for detecting fraud. Furthermore, this approach can adapt to the changing conditions typical of fraud detection environments.
引用
收藏
页码:291 / 316
页数:26
相关论文
共 50 条
  • [41] An Adaptive Approach to Granular Real-Time Anomaly Detection
    Huang, Chin-Tser
    Janies, Jeff
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2009,
  • [42] A New Intrusion Detection Method Based on Adaptive Feature Extraction
    Wu, Ya-Li
    Li, Guo-Ting
    Fu, Yu-Long
    Wang, Xiao-Peng
    PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 8643 - 8648
  • [43] A Collaborative and Adaptive Intrusion Detection Based on SVMs and Decision Trees
    Teng, Luyao
    Teng, Shaohua
    Tang, Feiyi
    Zhu, Haibin
    Zhang, Wei
    Liu, Dongning
    Liang, Lu
    2014 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOP (ICDMW), 2014, : 898 - 905
  • [44] SVM-DT-Based Adaptive and Collaborative Intrusion Detection
    Shaohua Teng
    Naiqi Wu
    Haibin Zhu
    Luyao Teng
    Wei Zhang
    IEEE/CAAJournalofAutomaticaSinica, 2018, 5 (01) : 108 - 118
  • [45] SVM-DT-Based Adaptive and Collaborative Intrusion Detection
    Teng, Shaohua
    Wu, Naiqi
    Zhu, Haibin
    Teng, Luyao
    Zhang, Wei
    IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2018, 5 (01) : 108 - 118
  • [46] SHIELDNET: An Adaptive Detection Mechanism against Vehicular Botnets in VANETs
    Garip, Mevlut Turker
    Lin, Jonathan
    Reiher, Peter
    Gerla, Mario
    2019 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2019,
  • [47] Adaptive Alarm Filtering by Causal Correlation Consideration in Intrusion Detection
    Lin, Heng-Sheng
    Pao, Hsing-Kuo
    Mao, Ching-Hao
    Lee, Hahn-Ming
    Chen, Tsuhan
    Lee, Yuh-Jye
    NEW ADVANCES IN INTELLIGENT DECISION TECHNOLOGIES, 2009, 199 : 437 - +
  • [48] Research on Immune based Adaptive Intrusion Detection System Model
    Deng, Lei
    Gao, De-yuan
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 488 - 491
  • [49] Adaptive ensembles of autoencoders for unsupervised IoT network intrusion detection
    Siddiqui, Abdul Jabbar
    Boukerche, Azzedine
    COMPUTING, 2021, 103 (06) : 1209 - 1232
  • [50] Adaptive, model-based monitoring for cyber attack detection
    Valdes, A
    Skinner, K
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2000, 1907 : 80 - 92