Nature-Inspired Techniques in the Context of Fraud Detection

被引:38
作者
Behdad, Mohammad [1 ]
Barone, Luigi [1 ]
Bennamoun, Mohammed [1 ]
French, Tim [1 ]
机构
[1] Univ Western Australia, Dept Comp Sci & Software Engn, Perth, WA 6009, Australia
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS | 2012年 / 42卷 / 06期
关键词
Evolutionary computation; fraud; pattern analysis; security; ARTIFICIAL IMMUNE-SYSTEM; NETWORK INTRUSION DETECTION; PRINCIPAL COMPONENT ANALYSIS; NEURAL-NETWORKS; GENETIC ALGORITHMS; CLASSIFIER SYSTEM; SPAM; MODEL; OPTIMIZATION; RULES;
D O I
10.1109/TSMCC.2012.2215851
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Electronic fraud is highly lucrative, with estimates suggesting these crimes to be worth millions of dollars annually. Because of its complex nature, electronic fraud detection is typically impractical to solve without automation. However, the creation of automated systems to detect fraud is very difficult as adversaries readily adapt and change their fraudulent activities which are often lost in the magnitude of legitimate transactions. This study reviews the most popular types of electronic fraud and the existing nature-inspired detection methods that are used for them. The common characteristics of electronic fraud are examined in detail along with the difficulties and challenges that these present to computational intelligence systems. Finally, open questions and opportunities for further work, including a discussion of emerging types of electronic fraud, are presented to provide a context for ongoing research.
引用
收藏
页码:1273 / 1290
页数:18
相关论文
共 190 条
[61]   Evolutionary algorithms in control systems engineering: a survey [J].
Fleming, PJ ;
Purshouse, RC .
CONTROL ENGINEERING PRACTICE, 2002, 10 (11) :1223-1241
[62]  
Franco M.A., 2010, P 12 ANN GEN EV COMP, P1039, DOI DOI 10.1145/1830483.1830672
[63]   Sparse inverse covariance estimation with the graphical lasso [J].
Friedman, Jerome ;
Hastie, Trevor ;
Tibshirani, Robert .
BIOSTATISTICS, 2008, 9 (03) :432-441
[64]   Detecting phishing web pages with visual similarity assessment based on Earth Mover's Distance (EMD) [J].
Fu, Anthony Y. ;
Wenyin, Liu ;
Deng, Xiaotie .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (04) :301-311
[65]   Noise detection and elimination in data preprocessing: Experiments in medical domains [J].
Gamberger, D ;
Lavrac, N ;
Dzeroski, S .
APPLIED ARTIFICIAL INTELLIGENCE, 2000, 14 (02) :205-223
[66]  
Gao HH, 2005, PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, P3871
[67]   Evolutionary Undersampling for Classification with Imbalanced Datasets: Proposals and Taxonomy [J].
Garcia, Salvador ;
Herrera, Francisco .
EVOLUTIONARY COMPUTATION, 2009, 17 (03) :275-306
[68]   Reducing Internet auction fraud [J].
Gavish, Bezalel ;
Tucci, Christopher L. .
COMMUNICATIONS OF THE ACM, 2008, 51 (05) :89-97
[69]   Intrusion detection in computer networks by a modular ensemble of one-class classifiers [J].
Giacinto, Giorgio ;
Perdisci, Roberto ;
Del Rio, Mauro ;
Roli, Fabio .
INFORMATION FUSION, 2008, 9 (01) :69-82
[70]   Application of artificial neural networks in the diagnosis of urological dysfunctions [J].
Gil, David ;
Johnsson, Magnus ;
Chamizo, Juan Manuel Garcia ;
Paya, Antonio Soriano ;
Fernandez, Daniel Ruiz .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (03) :5754-5760