BLAST-SSAHA Hybridization for Credit Card Fraud Detection

A phenomenal growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. In real life, fraudulent transactions are interspersed with genuine transactions and simple pattern matching is not often sufficient to detect them accurately. Thus, there is a need for combining both anomaly detection as well as misuse detection techniques. In this paper, we propose to use two-stage sequence alignment in which a profile analyzer (PA) first determines the similarity of an incoming sequence of transactions on a given credit card with the genuine cardholder's past spending sequences. The unusual transactions traced by the profile analyzer are next passed on to a deviation analyzer (DA) for possible alignment with past fraudulent behavior. The final decision about the nature of a transaction is taken on the basis of the observations by these two analyzers. In order to achieve online response time for both PA and DA, we suggest a new approach for combining two sequence alignment algorithms BLAST and SSAHA.

[1]  Yingjiu Li,et al.  A security-enhanced one-time payment scheme for credit card , 2004, 14th International Workshop Research Issues on Data Engineering: Web Services for e-Commerce and e-Government Applications, 2004. Proceedings..

[2]  Vishal Vatsa,et al.  A Game-Theoretic Approach to Credit Card Fraud Detection , 2005, ICISS.

[3]  J. Mullikin,et al.  SSAHA: a fast search method for large DNA databases. , 2001, Genome research.

[4]  Rüdiger W. Brause,et al.  Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.

[5]  E. Myers,et al.  Basic local alignment search tool. , 1990, Journal of molecular biology.

[6]  R. Feinberg Credit Cards as Spending Facilitating Stimuli A Conditioning Interpretation , 1986 .

[7]  M S Waterman,et al.  Identification of common molecular subsequences. , 1981, Journal of molecular biology.

[8]  B. Kahn,et al.  Shopping trip behavior: An empirical investigation , 1989 .

[9]  James T. Lindley,et al.  An analysis of the weekend effect within the monthly effect , 1995, Review of Quantitative Finance and Accounting.

[10]  Jean Arlat,et al.  IEEE Transactions on Dependable and Secure Computing , 2006 .

[11]  Chieh-Yuan Tsai,et al.  A Web services-based collaborative scheme for credit card fraud detection , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.

[12]  M Syeda,et al.  Parallel granular neural networks for fast credit card fraud detection , 2002, 2002 IEEE World Congress on Computational Intelligence. 2002 IEEE International Conference on Fuzzy Systems. FUZZ-IEEE'02. Proceedings (Cat. No.02CH37291).

[13]  D. G. Morrison,et al.  Estimating Purchase Regularity with Two Interpurchase Times , 1990 .

[14]  D. Lipman,et al.  Improved tools for biological sequence comparison. , 1988, Proceedings of the National Academy of Sciences of the United States of America.

[15]  K. Takeda The application of bioinformatics to network intrusion detection , 2005, Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology.

[16]  Christus,et al.  A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins , 2022 .

[17]  Shamik Sural,et al.  Two-Stage Credit Card Fraud Detection Using Sequence Alignment , 2006, ICISS.

[18]  Harry Timmermans,et al.  Identifying purchase-history sensitive shopper segments using scanner panel data and sequence alignment methods , 2003 .

[19]  John W. Slocum,et al.  Social Class and Income as Indicators of Consumer Credit Behavior , 1970 .

[20]  Douglas L. Reilly,et al.  Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.

[21]  Bernd Freisleben,et al.  CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).

[22]  Boleslaw K. Szymanski,et al.  Intrusion detection: a bioinformatics approach , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..