Hybridization of SOM and PSO for Detecting Fraud in Credit Card

Fraud Detection is a detection of criminal activity that generally occurs in commercial organization. Detection of such fraud can prevent a great economic loss. Credit card fraud depends upon usage of card, its unusual transactions behavior or any unauthorized activity on a credit card. Clustering process can divide the data into subsets and it can be very helpful in credit card fraud detection where outlier may be more interesting than common cases. Self-organizing Map SOM is unsupervised clustering technique which is very efficient and handling large and high dimensional dataset. Particle Swarm Optimization PSO is another stochastic optimization technique based on intelligent of swarms. In the present study, we combine these two methods and present a new hybrid approach self-organizing Particle Swarm Optimization SOPSO in detection of credit card fraud. In order to apply our method, we demonstrated an example and its results are compared with previous techniques. Some challenges shown in the previous researches such as time and space complexity, false positive rate and supervised techniques. Our approach is efficient as it implements one of the optimization technique and unsupervised approach which results in less time and space complexity and false positive rate is very low. Domain independency is also achieved in our approach.

[1]  Anthony Brabazon,et al.  Self-organising swarm (SOSwarm) , 2008, Soft Comput..

[2]  José R. Dorronsoro,et al.  Neural fraud detection in credit card operations , 1997, IEEE Trans. Neural Networks.

[3]  Niall M. Adams,et al.  Transaction aggregation as a strategy for credit card fraud detection , 2009, Data Mining and Knowledge Discovery.

[4]  Princely Ifinedo,et al.  Socio-Economic Correlates of Information Security Threats and Controls in Global Financial Services Industry: An Analysis , 2015, Int. J. Inf. Syst. Serv. Sect..

[5]  Rahul De',et al.  Predictive Models in Cybercrime Investigation: An Application of Data Mining Techniques , 2010, Int. J. Inf. Syst. Serv. Sect..

[6]  Sushil Jajodia,et al.  Data warehousing and data mining techniques for intrusion detection systems , 2006, Distributed and Parallel Databases.

[7]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[8]  J. M. Serrano,et al.  Association rules applied to credit card fraud detection , 2009, Expert Syst. Appl..

[9]  Ekrem Duman,et al.  Improving a credit card fraud detection system using genetic algorithm , 2010, 2010 International Conference on Networking and Information Technology.

[10]  Xiaojin Zhu,et al.  --1 CONTENTS , 2006 .

[11]  Vadlamani Ravi,et al.  Machine Learning Techniques Applied to Profile Mobile Banking Users in India , 2013, Int. J. Inf. Syst. Serv. Sect..

[12]  Niall M. Adams,et al.  Plastic card fraud detection using peer group analysis , 2008, Adv. Data Anal. Classif..

[13]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[14]  Ali A. Ghorbani,et al.  Improved competitive learning neural networks for network intrusion and fraud detection , 2012, Neurocomputing.

[15]  Jon T. S. Quah,et al.  Real-time credit card fraud detection using computational intelligence , 2008, Expert Syst. Appl..

[16]  Ekrem Duman,et al.  Detecting credit card fraud by genetic algorithm and scatter search , 2011, Expert Syst. Appl..

[17]  Teuvo Kohonen,et al.  The self-organizing map , 1990 .

[18]  Andrew W. Moore,et al.  Bayesian Network Anomaly Pattern Detection for Disease Outbreaks , 2003, ICML.

[19]  Vladimir Zaslavsky,et al.  Credit Card Fraud Detection Using Self-Organizing Maps , 2006 .

[20]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[21]  Gennadiy Burlak,et al.  Biometric Data Mining Applied to On-line Recognition Systems , 2011 .

[22]  Russell C. Eberhart,et al.  Gene clustering using self-organizing maps and particle swarm optimization , 2003, Proceedings International Parallel and Distributed Processing Symposium.

[23]  Yong Hu,et al.  The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature , 2011, Decis. Support Syst..

[24]  U. M. Feyyad Data mining and knowledge discovery: making sense out of data , 1996 .

[25]  Zhongxian Wang,et al.  Data Mining in Nonprofit Organizations, Government Agencies, and Other Institutions , 2010, Int. J. Inf. Syst. Serv. Sect..

[26]  Kate A. Smith,et al.  Introduction to Neural Networks and Data Mining for Business Applications , 2000 .