Adaptive fraud detection

被引:489
作者
Fawcett, T [1 ]
Provost, F [1 ]
机构
[1] NYNEX Sci & Technol, White Plains, NY 10604 USA
关键词
mud detection; rule learning; profiling; constructive induction; intrusion detection; applications;
D O I
10.1023/A:1009700419189
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One method for detecting fraud is to check for suspicious changes in user behavior. This paper describes the automatic design of user profiling methods for the purpose of fraud detection, using a series of data mining techniques. Specifically, we use a rule-learning program to uncover indicators of fraudulent behavior from a large database of customer transactions. Then the indicators are used to create a set of monitors, which profile legitimate customer behavior and indicate anomalies. Finally, the outputs of the monitors are used as features in a system that learns to combine evidence to generate high-confidence alarms. The system has been applied to the problem of detecting cellular cloning fraud based on a database of call records. Experiments indicate that this automatic approach performs better than hand-crafted methods for detecting fraud. Furthermore, this approach can adapt to the changing conditions typical of fraud detection environments.
引用
收藏
页码:291 / 316
页数:26
相关论文
共 33 条
  • [1] [Anonymous], 1996, P 2 INT C KNOWLEDGE
  • [2] ARONIS J, 1996, P 2 INT C KNOWL DISC, P355
  • [3] Aronis J. M., 1997, Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, P119
  • [4] BUCHANAN BG, 1978, PATTERN DIRECTED INF, P297
  • [5] Chatfield C., 1984, ANAL TIME SERIES INT
  • [6] CLEARWATER SH, 1990, PROCEEDINGS OF THE 2ND INTERNATIONAL IEEE CONFERENCE ON TOOLS FOR ARTIFICIAL INTELLIGENCE, P24, DOI 10.1109/TAI.1990.130305
  • [7] DAVIS A, 1993, 13 INT C ART INT EXP, V2, P155
  • [8] DEMARIA R, 1996, CELLULAR BUSINESS, P24
  • [9] DZEROSKI S, 1996, ADV KNOWLEDGE DISCOV, P117
  • [10] EZAWA K, 1996, IEEE EXPERT, P45