Credit Card Fraud Detection with Artificial Immune System

  • Manoel Fernando Alonso Gadi
  • Xidi Wang
  • Alair Pereira do Lago
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5132)


We apply Artificial Immune Systems(AIS) [4] for credit card fraud detection and we compare it to other methods such as Neural Nets(NN) [8] and Bayesian Nets(BN) [2], Naive Bayes(NB) and Decision Trees(DT) [13]. Exhaustive search and Genetic Algorithm(GA) [7] are used to select optimized parameters sets, which minimizes the fraud cost for a credit card database provided by a Brazilian card issuer. The specifics of the fraud database are taken into account, such as skewness of data and different costs associated with false positives and negatives. Tests are done with holdout sample sets, and all executions are run using Weka [18], a publicly available software. Our results are consistent with the early result of Maes in [12] which concludes that BN is better than NN, and this occurred in all our evaluated tests. Although NN is widely used in the market today, the evaluated implementation of NN is among the worse methods for our database. In spite of a poor behavior if used with the default parameters set, AIS has the best performance when parameters optimized by GA are used.


Genetic Algorithm Decision Tree Bayesian Network Genetic Algorithm Optimization Fraud Detection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Brownlee, J.: Artificial immune recognition system (airs) - a review and analysis. Technical report, Victoria, Australia: Centre for Intelligent Systems and Complex Processes (CISCP), Faculty of Information and Communication Technologies (ICT), Swinburne University of Technology (January 2005)Google Scholar
  2. 2.
    Charniak, E.: Bayesians networks without tears. AI Magazine (1991)Google Scholar
  3. 3.
    DasGupta, D.: Artficial Immune Systems and Their Applications. Springer, New York (1998)Google Scholar
  4. 4.
    de Castro, L.N., Timmis, J.: Artificial Immune Systems: A Novel Paradigm to Pattern Recognition. University of Paisley (2002)Google Scholar
  5. 5.
    Elkan, C.: The foundations of cost-sensitive learning. In: IJCAI, pp. 973–978 (2001)Google Scholar
  6. 6.
    Fan, W., Stolfo, S.J., Zhang, J., Chan, P.K.: AdaCost: misclassification cost-sensitive boosting. In: Proc. 16th International Conf. on Machine Learning, pp. 97–105. Morgan Kaufmann, San Francisco (1999)Google Scholar
  7. 7.
    Holland, J.: Adaptation in Natural and Artificial Systems, 1st edn. MIT press, Cambridge (1975)Google Scholar
  8. 8.
    Hopfield, J.J.: Neural networks and physical systems with emergent collective computational abilities. In: Proceedings of the National Academy of Science, vol. 79, pp. 2554–2558 (1982)Google Scholar
  9. 9.
    Kim, J., Zeigler, B.P.: A framework for multiresolution optimization in a parallel/distributed environment: simulation of hierarchical gas. J. Parallel Distrib. Comput. 32(1), 90–102 (1996)CrossRefGoogle Scholar
  10. 10.
    Klarreich, E.: Inspired by immunity. Nature (415), 468–470 (2002)CrossRefGoogle Scholar
  11. 11.
    Maes, S., Tuyls, K., Vanschoenwinkel, B.: Machine learning techniques for fraud detection (2000)Google Scholar
  12. 12.
    Maes, S., Tuyls, K., Vanschoenwinkel, B., Manderick, B.: Credit card fraud detection using bayesian and neural networks. In: Proceedings of NF 2002, Havana, Cuba, January 16-19 (2002)Google Scholar
  13. 13.
    Murthy, S.K., Ohlebusch, E., Kurtz, S.: Automatic construction of decision trees from data: A multi-disciplinary survey. In: Data Mining and Knowledge Discovery, USA, vol. 2, pp. 345–389. Kluwer Academic Publishers, Dordrecht (1998)Google Scholar
  14. 14.
    Phua, C., Lee, V., Smith, K., Gayler, R.: A comprehensive survey of data mining-based fraud detection research. Artificial Intelligence Review (submitted for publication, 2005)Google Scholar
  15. 15.
    Schapire, R.E., Singer, Y.: Improved boosting using confidence-rated predictions. Machine Learning 37(3), 297–336 (1999)zbMATHCrossRefGoogle Scholar
  16. 16.
    Stolfo, S., Fan, W., Lee, W., Prodromidis, A., Chan, P.: Credit card fraud detection using meta-learning: Issues and initial results, 1997. In: Working notes of AAAI Workshop on AI Approaches to Fraud Detection and Risk Management (1997)Google Scholar
  17. 17.
    Watkins, A., Timmis, J., Boggess, L.: Artificial immune recognition system (AIRS): An immune-inspired supervised machine learning algorithm. Genetic Programming and Evolvable Machines 5(3), 291–317 (2004)CrossRefGoogle Scholar
  18. 18.
    Witten, I.H., Franku, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Elsevier, Amsterdam (2005)zbMATHGoogle Scholar
  19. 19.
    Witten, I.H., Franku, E.: Software documentation: Weka (2008), Weka-3-4-11.doc/weka/classifiers/functions/MultilayerPerceptron.html

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Manoel Fernando Alonso Gadi
    • 1
    • 2
  • Xidi Wang
    • 3
  • Alair Pereira do Lago
    • 1
  1. 1.Departamento de Ciência de Computação Instituto de Matemática e EstatísticaUniversidade de São PauloSão PauloBrazil
  2. 2.Grupo Santander, Abbey National plcMilton KeynesUnited Kingdom
  3. 3.CitibankSão PauloBrazil

Personalised recommendations