Abstract
We propose a semi-supervised online banking fraud analysis and decision support approach. During a training phase, it builds a profile for each customer based on past transactions. At runtime, it supports the analyst by ranking unforeseen transactions that deviate from the learned profiles. It uses methods whose output has a immediate statistical meaning that provide the analyst with an easy-to-understand model of each customer’s spending habits. First, we quantify the anomaly of each transaction with respect to the customer historical profile. Second, we find global clusters of customers with similar spending habits. Third, we use a temporal threshold system that measures the anomaly of the current spending pattern of each customer, with respect to his or her past spending behavior. As a result, we mitigate the undertraining due to the lack of historical data for building of well-trained profiles (of fresh users), and the users that change their (spending) habits over time. Our evaluation on real-world data shows that our approach correctly ranks complex frauds as “top priority”.
Chapter PDF
Similar content being viewed by others
References
Aggelis, V.: Offline Internet Banking Fraud Detection. In: ARES, pp. 904–905. IEEE Computer Society (2006)
Amer, M., Goldstein, M.: Nearest-Neighbor and Clustering based Anomaly Detection Algorithms for RapidMiner, 1–12 (August 2012)
Bay, S.D., Pazzani, M.J.: Detecting Group Differences: Mining Contrast Sets. Data Mining and Knowledge Discovery 5(3), 213–246 (2001)
Bolton, R.J.: David: Statistical fraud detection: A review. Statistical Science 17 (2002)
Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. 41, 15:1–15:58 (2009)
Fossi, M., Egan, G., Haley, K., Johnson, E., Mack, T., Adams, T., Blackbird, J., Low, M.K., Mazurek, D., McKinney, D., Wood, P.: Symantec Internet Security Threat Report trends for 2010. Technical report, Symantec (April 2011)
Goldstein, M., Dengel, A.: Histogram-Based Outlier Score (HBOS): A Fast Unsupervised Anomaly Detection Algorithm (2012)
Haley, K., Wood, P.: et al.: Internet Security Threat Report 2013, 18 (2013)
Han, J., Kamber, M.: Data mining: concepts and techniques, 2nd edn. Morgan Kaufmann (2006)
Kovach, S., Ruggiero, W.: Online banking fraud detection based on local and global behavior. In: ICDS 2011: The Fifth Intl. Conf. on Digital Society, pp. 166–171 (2011)
Mahalanobis, P.C.: On the generalized distance in statistics. In: Proc. of the National Institute of Science of India, 49–55 (1936)
Mhamane, S., Lobo, L.: Internet banking fraud detection using HMM. In: 2012 Third Intl. Conf. on Computing Communication Networking Technologies (ICCCNT), pp. 1–4 (2012)
Noto, K., Brodley, C., Slonim, D.: FRaC: a feature-modeling approach for semi-supervised and unsupervised anomaly detection. Data Min. Knowl. Discov. 25(1), 109–133 (2012)
Phua, C., Lee, V.C.S., Smith-Miles, K., Gayler, R.W.: A Comprehensive Survey of Data Mining-based Fraud Detection Research. CoRR abs/1009.6119 (2010)
Wei, W., Li, J., Cao, L., Ou, Y., Chen, J.: Effective detection of sophisticated online banking fraud on extremely imbalanced data. World Wide Web 16(4), 449–475 (2013)
Xu, X., Jäger, J., Kriegel, H.P.: A Fast Parallel Clustering Algorithm for Large Spatial Databases. Data Min. Knowl. Discov. 3(3), 263–290 (1999)
Yamanishi, K., Takeuchi, J.I., Williams, G., Milne, P.: On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms. Data Min. Knowl. Discov. 8(3), 275–300 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Carminati, M., Caron, R., Maggi, F., Epifani, I., Zanero, S. (2014). BankSealer: An Online Banking Fraud Analysis and Decision Support System. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds) ICT Systems Security and Privacy Protection. SEC 2014. IFIP Advances in Information and Communication Technology, vol 428. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55415-5_32
Download citation
DOI: https://doi.org/10.1007/978-3-642-55415-5_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55414-8
Online ISBN: 978-3-642-55415-5
eBook Packages: Computer ScienceComputer Science (R0)