Nature-Inspired Techniques in the Context of Fraud Detection

被引:38
作者
Behdad, Mohammad [1 ]
Barone, Luigi [1 ]
Bennamoun, Mohammed [1 ]
French, Tim [1 ]
机构
[1] Univ Western Australia, Dept Comp Sci & Software Engn, Perth, WA 6009, Australia
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS | 2012年 / 42卷 / 06期
关键词
Evolutionary computation; fraud; pattern analysis; security; ARTIFICIAL IMMUNE-SYSTEM; NETWORK INTRUSION DETECTION; PRINCIPAL COMPONENT ANALYSIS; NEURAL-NETWORKS; GENETIC ALGORITHMS; CLASSIFIER SYSTEM; SPAM; MODEL; OPTIMIZATION; RULES;
D O I
10.1109/TSMCC.2012.2215851
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Electronic fraud is highly lucrative, with estimates suggesting these crimes to be worth millions of dollars annually. Because of its complex nature, electronic fraud detection is typically impractical to solve without automation. However, the creation of automated systems to detect fraud is very difficult as adversaries readily adapt and change their fraudulent activities which are often lost in the magnitude of legitimate transactions. This study reviews the most popular types of electronic fraud and the existing nature-inspired detection methods that are used for them. The common characteristics of electronic fraud are examined in detail along with the difficulties and challenges that these present to computational intelligence systems. Finally, open questions and opportunities for further work, including a discussion of emerging types of electronic fraud, are presented to provide a context for ongoing research.
引用
收藏
页码:1273 / 1290
页数:18
相关论文
共 190 条
[1]   Intrusion detection using a fuzzy genetics-based learning algorithm [J].
Abadeh, M. Sanlee ;
Habibi, J. ;
Lucas, C. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) :414-428
[2]  
Abbass H. A., 2004, 2004031 U ILL URB CH
[3]  
Abu-Nimeh S., 2007, P ANT WORK GROUPS 2, P60, DOI DOI 10.1145/1299015.1299021
[4]   Bayesian additive regression trees-based spam detection for enhanced email privacy [J].
Abu-Nimeh, Saeed ;
Nappa, Dario ;
Wang, Xinlei ;
Nair, Suku .
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, :1044-1051
[5]  
Almeida T. A., 2010, P 2010 ACM S APPL CO, P1854
[6]  
Androutsopoulos I., 2000, P EUR C MACH LEARN, P9
[7]  
[Anonymous], 2010, PROC 12 INT C INF IN
[8]  
[Anonymous], 2000, P NAT INF SYST SEC C
[9]  
[Anonymous], 2004, ANT COLONY OPTIMIZAT
[10]  
[Anonymous], KDDCUP 1999 DATASET