Application of Anomaly Detection Techniques to Identify Fraudulent Refunds

Anomaly detection is a concept widely applied to numerous domains. Several techniques of anomaly detection have been developed over the years, in practice as well as research. The application of this concept has extended to diverse areas, from network intrusion detection to novelty detection in robot behavior. In the business world, the application of these techniques to fraud detection is of a special interest, driven by the great losses companies endure because of such fraudulent activities. This paper describes classification-based and clustering-based anomaly detection techniques and their applications, more specifically the application to the problem of certain fraudulent activities. As an illustration, the paper applies K-Means, a clustering-based algorithm, to a refund transactions dataset from a telecommunication company, with the intent of identifying fraudulent refunds.

[1]  Miklos A. Vasarhelyi,et al.  Cluster Analysis for Anomaly Detection in Accounting Data: An Audit Approach 1 , 2011 .

[2]  Patrick L. Brockett,et al.  Fraud Classification Using Principal Component Analysis of Ridits , 2002 .

[3]  Mario Vento,et al.  To reject or not to reject: that is the question-an answer in case of neural classifiers , 2000, IEEE Trans. Syst. Man Cybern. Part C.

[4]  Anil K. Jain Data clustering: 50 years beyond K-means , 2008, Pattern Recognit. Lett..

[5]  Bianca Zadrozny,et al.  Outlier detection by active learning , 2006, KDD '06.

[6]  Sushil Jajodia,et al.  Applications of Data Mining in Computer Security , 2002, Advances in Information Security.

[7]  Shashi Shekhar,et al.  Detecting graph-based spatial outliers , 2002, Intell. Data Anal..

[8]  Lionel Tarassenko,et al.  The use of novelty detection techniques for monitoring high-integrity plant , 2002, Proceedings of the International Conference on Control Applications.

[9]  P. Brockett,et al.  Using Kohonen's Self-Organizing Feature Map to Uncover Automobile Bodily Injury Claims Fraud , 1998 .

[10]  Chang-Tien Lu,et al.  Spatial Weighted Outlier Detection , 2006, SDM.

[11]  Salvatore J. Stolfo,et al.  Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.

[12]  Tom Fawcett,et al.  Activity monitoring: noticing interesting changes in behavior , 1999, KDD '99.

[13]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[14]  H. Arp Discordant observations. , 1990, Science.

[15]  Rüdiger W. Brause,et al.  Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.

[16]  L. Baker,et al.  A Hierarchical Probabilistic Model for Novelty Detection in Text , 1999, NIPS 1999.

[17]  Sanjay Ranka,et al.  Conditional Anomaly Detection , 2007, IEEE Transactions on Knowledge and Data Engineering.

[18]  F. Y. Edgeworth,et al.  XLI. On discordant observations , 1887 .

[19]  Philip Chan,et al.  Learning States and Rules for Time Series Anomaly Detection , 2004, FLAIRS.

[20]  Kate Smith-Miles,et al.  A Comprehensive Survey of Data Mining-based Fraud Detection Research , 2010, ArXiv.

[21]  David G. Stork,et al.  Pattern Classification , 1973 .

[22]  K. Mumtaz,et al.  A Novel Density based improved k-means Clustering Algorithm – Dbkmeans , 2010 .

[23]  Alfonso Valdes,et al.  Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.

[24]  Eleazar Eskin,et al.  A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .

[25]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.