Transaction Fraud Detection Based on Total Order Relation and Behavior Diversity

With the popularization of online shopping, transaction fraud is growing seriously. Therefore, the study on fraud detection is interesting and significant. An important way of detecting fraud is to extract the behavior profiles (BPs) of users based on their historical transaction records, and then to verify if an incoming transaction is a fraud or not in view of their BPs. Markov chain models are popular to represent BPs of users, which is effective for those users whose transaction behaviors are stable relatively. However, with the development and popularization of online shopping, it is more convenient for users to consume via the Internet, which diversifies the transaction behaviors of users. Therefore, Markov chain models are unsuitable for the representation of these behaviors. In this paper, we propose logical graph of BP (LGBP) which is a total order-based model to represent the logical relation of attributes of transaction records. Based on LGBP and users’ transaction records, we can compute a path-based transition probability from an attribute to another one. At the same time, we define an information entropy-based diversity coefficient in order to characterize the diversity of transaction behaviors of a user. In addition, we define a state transition probability matrix to capture temporal features of transactions of a user. Consequently, we can construct a BP for each user and then use it to verify if an incoming transaction is a fraud or not. Our experiments over a real data set illustrate that our method is better than three state-of-the-art ones.

[1]  Rong-Chang Chen,et al.  Personalized Approach Based on SVM and ANN for Detecting Credit Card Fraud , 2005, 2005 International Conference on Neural Networks and Brain.

[2]  Fadi A. Thabtah,et al.  Phishing detection based Associative Classification data mining , 2014, Expert Syst. Appl..

[3]  V. Dheepa,et al.  Behavior Based Credit Card Fraud Detection Using Support Vector Machines , 2012, SOCO 2012.

[4]  L. M. R. J. Lobo,et al.  Internet banking fraud detection using HMM , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[5]  Orlando Belo,et al.  Usage signatures analysis an alternative method for preventing fraud in E-Commerce applications , 2014, 2014 International Conference on Data Science and Advanced Analytics (DSAA).

[6]  Yehuda Vardi,et al.  A Hybrid High-Order Markov Chain Model for Computer Intrusion Detection , 2001 .

[7]  Bhusari,et al.  Application of Hidden Markov Model in Credit Card Fraud Detection , 2011 .

[8]  Orlando Belo,et al.  Applying User Signatures on Fraud Detection in Telecommunications Networks , 2011, ICDM.

[9]  Markus Jakobsson,et al.  Implicit Authentication through Learning User Behavior , 2010, ISC.

[10]  Corinna Cortes,et al.  Signature-Based Methods for Data Streams , 2001, Data Mining and Knowledge Discovery.

[11]  Richard Ford,et al.  On the definition and classification of cybercrime , 2006, Journal in Computer Virology.

[12]  Kate Smith-Miles,et al.  A Comprehensive Survey of Data Mining-based Fraud Detection Research , 2010, ArXiv.

[13]  Abhinav Srivastava,et al.  Credit Card Fraud Detection Using Hidden Markov Model , 2008, IEEE Transactions on Dependable and Secure Computing.

[14]  Olumide Owolabi,et al.  Hybrid Methods for Credit Card Fraud Detection Using K-means Clustering with Hidden Markov Model and Multilayer Perceptron Algorithm , 2016 .

[15]  Niall M. Adams,et al.  Transaction aggregation as a strategy for credit card fraud detection , 2009, Data Mining and Knowledge Discovery.

[16]  Monique Snoeck,et al.  APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions , 2015, Decis. Support Syst..

[17]  Jon T. S. Quah,et al.  Real Time Credit Card Fraud Detection using Computational Intelligence , 2007, 2007 International Joint Conference on Neural Networks.

[18]  Amos Azaria,et al.  Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data , 2014, IEEE Transactions on Computational Social Systems.

[19]  A. Karr,et al.  Computer Intrusion: Detecting Masquerades , 2001 .

[20]  Rüdiger W. Brause,et al.  Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.

[21]  Changjun Jiang,et al.  Credit Card Fraud Detection: A Novel Approach Using Aggregation Strategy and Feedback Mechanism , 2018, IEEE Internet of Things Journal.

[22]  Shamik Sural,et al.  Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning , 2009, Inf. Fusion.

[23]  Twinkle Patel,et al.  A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model , 2014 .

[24]  Aihua Shen,et al.  Application of Classification Models on Credit Card Fraud Detection , 2007, 2007 International Conference on Service Systems and Service Management.

[25]  Thomas J. Carter,et al.  An introduction to information theory and entropy , 2007 .

[26]  Wil M. P. van der Aalst,et al.  Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.

[27]  Yuliang Zheng An Authentication and Security Protocol for Mobile Computing , 1996, IFIP World Conference on Mobile Communications.

[28]  Shamik Sural,et al.  BLAST-SSAHA Hybridization for Credit Card Fraud Detection , 2009, IEEE Transactions on Dependable and Secure Computing.

[29]  Reza Ebrahimi Atani,et al.  A Survey of Credit Card Fraud Detection Techniques: Data and Technique Oriented Perspective , 2016, ArXiv.

[30]  Anazida Zainal,et al.  Fraud detection system: A survey , 2016, J. Netw. Comput. Appl..

[31]  Mahmoud Reza Hashemi,et al.  Mining information from credit card time series for timelier fraud detection , 2010, 2010 5th International Symposium on Telecommunications.

[32]  Salvatore J. Stolfo,et al.  Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[33]  Rahul Johari,et al.  A New Framework for Credit Card Transactions Involving Mutual Authentication between Cardholder and Merchant , 2011, 2011 International Conference on Communication Systems and Network Technologies.