Applying Extensions of Evidence Theory to Detect Frauds in Financial Infrastructures

The Dempster-Shafer (DS) theory of evidence has significant weaknesses when dealing with conflicting information sources, as demonstrated by preeminent mathematicians. This problem may invalidate its effectiveness when it is used to implement decision-making tools that monitor a great number of parameters and metrics. Indeed, in this case, very different estimations are likely to happen and can produce unfair and biased results. In order to solve these flaws, a number of amendments and extensions of the initial DS model have been proposed in literature. In this work, we present a Fraud Detection System that classifies transactions in a Mobile Money Transfer infrastructure by using the data fusion algorithms derived from these new models. We tested it in a simulated environment that closely mimics a real Mobile Money Transfer infrastructure and its actors. Results show substantial improvements of the performance in terms of true positive and false positive rates with respect to the classical DS theory.

[1]  Didier Dubois,et al.  On the relevance of non-standard theories of uncertainty in modeling and pooling expert opinions , 1992 .

[2]  N. Balakrishnan,et al.  Modified evidence theory for performance enhancement of Intrusion Detection Systems , 2008, 2008 11th International Conference on Information Fusion.

[3]  Jean Dezert,et al.  Applications and Advances of DSmT for Information Fusion , 2004 .

[4]  Jianhua Li,et al.  Intrusion Detection Engine Based on Dempster-Shafer's Theory of Evidence , 2006, 2006 International Conference on Communications, Circuits and Systems.

[5]  Wilbert van Norden,et al.  Applying the PCR6 Rule of combination in real time classification systems , 2009, 2009 12th International Conference on Information Fusion.

[6]  Jean Dezert,et al.  On the behavior of Dempster's rule of combination and the foundations of Dempster-Shafer Theory , 2011, 2012 6th IEEE International Conference Intelligent Systems.

[7]  Baptiste Hemery,et al.  Synthetic logs generator for fraud detection in mobile transfer services , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).

[8]  Christophe Osswald,et al.  A new generalization of the proportional conflict redistribution rule stable in terms of decision , 2008, ArXiv.

[9]  Frédéric Dambreville,et al.  A Tripartite Architecture based on Referee Function for Generic Implementations of Evidence Combination Rules , 2010, GI Jahrestagung.

[10]  Jean Dezert,et al.  Proportional Conflict Redistribution Rule , 2004, ArXiv.

[11]  Haiping Xu,et al.  Inference of Online Auction Shills Using Dempster-Shafer Theory , 2009, 2009 Sixth International Conference on Information Technology: New Generations.

[12]  Cynthia Merritt Mobile money transfer services: The next phase in the evolution of person-to-person payments , 2011 .

[13]  Florentin Smarandache,et al.  Application of new absolute and relative conditioning rules in threat assessment , 2013, Proceedings of the 16th International Conference on Information Fusion.

[14]  Florentin Smarandache,et al.  Advances and Applications of DSmT for Information Fusion (Collected Works) , 2004 .

[15]  Frédéric Dambreville,et al.  Release ZERO.0.1 of package RefereeToolbox , 2010, ArXiv.

[16]  Deborah A. Frincke,et al.  Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory , 2005, ACM-SE 43.

[17]  Lei Gao,et al.  The Dempster-Shafer Theory: An Introduction and Fraud Risk Assessment Illustration , 2011 .

[18]  Kari Sentz,et al.  Combination of Evidence in Dempster-Shafer Theory , 2002 .

[19]  Frédéric Dambreville,et al.  Definition of Evidence Fusion Rules Based on Referee Functions , 2016 .

[20]  Xinming Ou,et al.  Prioritizing intrusion analysis using Dempster-Shafer theory , 2011, AISec '11.

[21]  Arthur P. Dempster,et al.  A Generalization of Bayesian Inference , 1968, Classic Works of the Dempster-Shafer Theory of Belief Functions.

[22]  Luigi Coppolino,et al.  Use of the Dempster-Shafer Theory for Fraud Detection: The Mobile Money Transfer Case Study , 2014, IDC.

[23]  Xu Huang,et al.  Wireless Sensor Network Internal Attacker Identification with Multiple Evidence by Dempster-Shafer Theory , 2012, ICA3PP.

[24]  Shamik Sural,et al.  Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks , 2007, ACISP.

[25]  Lotfi A. Zadeh,et al.  On the Validity of Dempster''s Rule of Combination of Evidence , 1979 .

[26]  Thomas M. Chen,et al.  Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.