improving identity crime detection using scheduling for fast response multi-pattern matching over streaming events

G. Gunasekaran,Mareeswari.V

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:3         Issue:1         Year: 26 June,2014         Pages:375-385

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. Credit card fraud is the specific crime in banking system. The credit card crime has been growing rapidly for the last few years. The process of making profit through credit card in the economy has been decreased about 8.2 crore annually in India. To avoid and predict the fraudulent activities on credit card application, in this paper a method of detecting the fraud over credit card on behalf of the cibil score. As datamining provides various ways to retrieve an appropriate data from the storage, here in proposed system an efficient way of matching the data provided by the applicants of credit card along with the cibil list to predict the fraudsters. The existing process of fraud detection has the drawbacks of effectiveness and scalability for multiple variants of data, the Scheduling for Fast Response multi-pattern matching algorithm used to match the large amount of attributes, In order to predict the fraudulent applicants with an appropriate time constraints. Together with the communal detection (CD) and spike detection (SD) algorithm that removes the redundant attributes and generates the credit score for cibil list or black list. The cibil score varies about 300 to 900, it has been recorded in the credit history and by considering its range the credits are provided to the lender or customer, and they are added to the white list.

Kewords

Data mining-based fraud detection, security, data stream mining, anomaly detection, Event-based (EBS) and Run-based (RBS) Scheduling.

Reference

[1]. R.Bolton and D.Hand,“Unsupervised Profiling Methods for Fraud Detection,” Statistical Science, vol. 17, no. 3, pp. 235-255, 2001. [2]. G.Gordon, D.Rebovich, K.Gordon, “Identity Fraud Trends and Patterns: Building a Data-Based Foundation for Proactive Enforcement,” Center for Identity Management and Information Protection, Utica College, 2007. [3]. Clifton Phua, Kate Smith-Miles, Vincent Cheng-Sion Lee and Ross Gayler, “Resilient Identity Crime Detection,” IEEE Transactions On Knowledge And Data Engineering, Vol. 24, No. 3, March 2012. [4]. J. Neville, O. Simsek, D. Jensen, J. Komoroske, K. Palmer, and H.Goldberg, “Using Relational Knowledge Discovery to Prevent Securities Fraud,” Proc. 11th ACM SIGKDD Int’l Conf. Knowledge Discovery in Data Mining (KDD ’05), 2005, doi: 10.1145/1081870.1081922. [5]. B. Schneier,, Schneier on Security. Wiley, 2008. [6]. Suvasini Panigrahi, Amlan Kundu, “Credit card fraud detection: A fusion approach using Dempster–Shafer theory and Bayesian learning” Int’l Journal on Information fusion, Elsevier vol 10, issue 4, 2009. [7]. A. Bifet and R. Kirkby Massive Online Analysis, Technical Manual, Univ. of Waikato, 2009. [8]. Ying Yan, Jin Zhang, Ming-Chien Shan, “Scheduling for Fast Response Multi-pattern Matching over Streaming Events,” ICDE Conference, 978-1-4244-5446-4/10 , 2010 IEEE. [9]. T.Oscherwtiz, “Sythetic Identity Fraud: Unseen Identity Challenge,” Bank Security News, vol.3, p.7, 2005. [10]. R.Caruana and A.Niculescu-Mizil, “Data Mining in Metric Space: An Empirical Analysis of Supervised Learning Performance Criteria,” Proc. 10th ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD ‘04), 2004, doi: 10.1145/1014052.1014063. [11]. E.Ramkumar and P. Kavitha, “Online Credit Card Application and Identity Crime Detection,” Int’l Journal of Engg. Research and Technology (IJERT) vol. 2 Issue 2, Feb-2013. [12]. Hideaki Tanaka, Shigeyuki Tsukao, Daiki Yamashita, TakahideNiimura, Ryuichi Yokoyama, “Multiple Criteria Assessment of Substation Conditions by Pair-Wise Comparison of Analytic Hierarchy Process,” IEEE Transactions On Power Delivery, Vol. 25, No. 4, October 2010. [13]. IDAnalytics, “ID Score-Risk: Gain Greater Visibility into Individual Identity Risk,” Unpublished, 2008. [14]. B. Head, “Biometrics Gets in the Picture,” Information Age, pp. 10-11, Aug.-Sept. 2006. [15]. J. Jonas, “Non-Obvious Relationship Awareness (NORA),” Proc. Identity Mashup, 2006. [16]. B. Schneier, Beyond Fear: Thinking Sensibly about Security in an Uncertain World. Copernicus, 2003. [17]. W. Wong, “Data Mining for Early Disease Outbreak Detection,” PhD thesis, Carnegie Mellon Univ., 2004. [18]. S. Romanosky, R. Sharp, and A. Acquisti, “Data Breaches and Identity Theft: When Is Mandatory Disclosure Optimal?,” Proc. Ninth Workshop Economics of Information Security (WEIS), 2010.