Skip to main content
Top
Published in: Evolutionary Intelligence 2/2012

01-06-2012 | Special Issue

On XCSR for electronic fraud detection

Authors: Mohammad Behdad, Luigi Barone, Tim French, Mohammed Bennamoun

Published in: Evolutionary Intelligence | Issue 2/2012

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Fraud is a serious problem that costs the worldwide economy billions of dollars annually. However, fraud detection is difficult as perpetrators actively attempt to mask their actions, among typically overwhelming large volumes of, legitimate activity. In this paper, we investigate the fraud detection problem and examine how learning classifier systems can be applied to it. We describe the common properties of fraud, introducing an abstract problem which can be tuned to exhibit those characteristics. We report experiments on this abstract problem with a popular real-time learning classifier system algorithm; results from our experiments demonstrating that this approach can overcome the difficulties inherent to the fraud detection problem. Finally we apply the algorithm to a real-world problem and show that it can achieve good performance in this domain.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Australian Bureau of Statistics (2008) Personal fraud, 2007. Tech. Rep. 4528.0, Australian Bureau of Statistics Australian Bureau of Statistics (2008) Personal fraud, 2007. Tech. Rep. 4528.0, Australian Bureau of Statistics
2.
go back to reference Bacardit J, Bernadó-Mansilla E, Butz MV (2008) Learning classifier systems: looking back and glimpsing ahead. In: 10th international workshop on learning classifier systems, Springer, Berlin, pp 1–21 Bacardit J, Bernadó-Mansilla E, Butz MV (2008) Learning classifier systems: looking back and glimpsing ahead. In: 10th international workshop on learning classifier systems, Springer, Berlin, pp 1–21
3.
go back to reference Bull L (2004) Applications of learning classifier systems. Springer, BerlinMATH Bull L (2004) Applications of learning classifier systems. Springer, BerlinMATH
4.
go back to reference Bull L (2004) Learning classifier systems: a brief introduction. Applications of Learning Classifier Systems pp 3–14 Bull L (2004) Learning classifier systems: a brief introduction. Applications of Learning Classifier Systems pp 3–14
5.
go back to reference Butz MV, Wilson SW (2000) An algorithmic description of XCS. Tech. Rep. 2000017, Illinois Genetic Algorithms Laboratory Butz MV, Wilson SW (2000) An algorithmic description of XCS. Tech. Rep. 2000017, Illinois Genetic Algorithms Laboratory
6.
go back to reference Dam HH (2008) A scalable evolutionary learning classifier system for knowledge discovery in stream data mining. PhD thesis, University of New South Wales—Australian Defence Force Academy Dam HH (2008) A scalable evolutionary learning classifier system for knowledge discovery in stream data mining. PhD thesis, University of New South Wales—Australian Defence Force Academy
7.
go back to reference Dudley J, Barone L, While L (2008) Multi-objective spam filtering using an evolutionary algorithm. In: Congress on evolutionary computation, pp 123–130 Dudley J, Barone L, While L (2008) Multi-objective spam filtering using an evolutionary algorithm. In: Congress on evolutionary computation, pp 123–130
8.
go back to reference Duman E, Ozcelik MH (2011) Detecting credit card fraud by genetic algorithm and scatter search. Expert Syst Appl 38(10):13,057–13,063CrossRef Duman E, Ozcelik MH (2011) Detecting credit card fraud by genetic algorithm and scatter search. Expert Syst Appl 38(10):13,057–13,063CrossRef
9.
go back to reference Fawcett T, Haimowitz I, Provost F, Stolfo S (1998) Ai approaches to fraud detection and risk management. AI Magaz 19(2):107–108 Fawcett T, Haimowitz I, Provost F, Stolfo S (1998) Ai approaches to fraud detection and risk management. AI Magaz 19(2):107–108
10.
go back to reference Feng Y, Zhong J, Xiong Zy, Ye Cx, Wu Kg (2007) Network anomaly detection based on DSOM and ACO clustering. In: Advances in neural networks-ISNN 2007, lecture notes in computer science, vol 4492, Springer, Berlin pp 947–955 Feng Y, Zhong J, Xiong Zy, Ye Cx, Wu Kg (2007) Network anomaly detection based on DSOM and ACO clustering. In: Advances in neural networks-ISNN 2007, lecture notes in computer science, vol 4492, Springer, Berlin pp 947–955
11.
go back to reference Kou Y, Lu CT, Sirwongwattana S, Huang YP (2004) Survey of fraud detection techniques. In: Networking, sensing and control, 2004 IEEE international conference on, vol 2, pp 749–754 Kou Y, Lu CT, Sirwongwattana S, Huang YP (2004) Survey of fraud detection techniques. In: Networking, sensing and control, 2004 IEEE international conference on, vol 2, pp 749–754
12.
go back to reference Nettleton DF, Orriols-Puig A, Fornells A (2010) A study of the effect of different types of noise on the precision of supervised learning techniques. Artif Intell Rev 33(4):275–306CrossRef Nettleton DF, Orriols-Puig A, Fornells A (2010) A study of the effect of different types of noise on the precision of supervised learning techniques. Artif Intell Rev 33(4):275–306CrossRef
13.
go back to reference Nguyen TH, Foitong S, Srinil P, Pinngern O (2008) Towards adapting xcs for imbalance problems. In: PRICAI ’08, Springer, Berlin, pp 1028–1033 Nguyen TH, Foitong S, Srinil P, Pinngern O (2008) Towards adapting xcs for imbalance problems. In: PRICAI ’08, Springer, Berlin, pp 1028–1033
14.
go back to reference Oda T, White T (2005) Immunity from spam: an analysis of an artificial immune system. In: 4th International conference on artificial immune systems, Springer, Berlin, pp 276–289 Oda T, White T (2005) Immunity from spam: an analysis of an artificial immune system. In: 4th International conference on artificial immune systems, Springer, Berlin, pp 276–289
15.
go back to reference Orriols-Puig A, Bernadó-Mansilla E (2008) Evolutionary rule-based systems for imbalanced data sets. Soft Comput 13(3):213–225CrossRef Orriols-Puig A, Bernadó-Mansilla E (2008) Evolutionary rule-based systems for imbalanced data sets. Soft Comput 13(3):213–225CrossRef
16.
go back to reference Orriols-Puig A, Bernadó-Mansilla E, Goldberg DE, Sastry K, Lanzi PL (2009) Facetwise analysis of XCS for problems with class imbalances. IEEE Trans Evol Comput, submitted 3(5):1093–1119CrossRef Orriols-Puig A, Bernadó-Mansilla E, Goldberg DE, Sastry K, Lanzi PL (2009) Facetwise analysis of XCS for problems with class imbalances. IEEE Trans Evol Comput, submitted 3(5):1093–1119CrossRef
17.
go back to reference Phua C, Lee V, Smith-Miles K, Gayler R (2005) A comprehensive survey of data mining-based fraud detection research. Tech. rep., Monash University Phua C, Lee V, Smith-Miles K, Gayler R (2005) A comprehensive survey of data mining-based fraud detection research. Tech. rep., Monash University
18.
go back to reference Sculley D, Wachman GM (2007) Relaxed online SVMs for spam filtering. In: 30th annual international ACM SIGIR conference on research and development in information retrieval, ACM Publishers, pp 415–422 Sculley D, Wachman GM (2007) Relaxed online SVMs for spam filtering. In: 30th annual international ACM SIGIR conference on research and development in information retrieval, ACM Publishers, pp 415–422
19.
go back to reference Seewald AK (2007) An evaluation of naïve Bayes variants in content-based learning for spam filtering. Int Data Anal11(5):497–524 Seewald AK (2007) An evaluation of naïve Bayes variants in content-based learning for spam filtering. Int Data Anal11(5):497–524
20.
go back to reference Shafi K, Abbass HA (2007) Biologically-inspired complex adaptive systems approaches to network intrusion detection. Inform Secur Tech Rep 12(4):209–217CrossRef Shafi K, Abbass HA (2007) Biologically-inspired complex adaptive systems approaches to network intrusion detection. Inform Secur Tech Rep 12(4):209–217CrossRef
21.
go back to reference Shafi K, Kovacs T, Abbass HA, Zhu W (2009) Intrusion detection with evolutionary learning classifier systems. Nat Comput 8(1):3–27MathSciNetMATHCrossRef Shafi K, Kovacs T, Abbass HA, Zhu W (2009) Intrusion detection with evolutionary learning classifier systems. Nat Comput 8(1):3–27MathSciNetMATHCrossRef
22.
go back to reference Sigaud O, Wilson SW (2007) Learning classifier systems: a survey. Soft Comput A Fusion Found Methodol Appl 11(11):1065–1078MATH Sigaud O, Wilson SW (2007) Learning classifier systems: a survey. Soft Comput A Fusion Found Methodol Appl 11(11):1065–1078MATH
24.
go back to reference Stone C, Bull L (2003) For real! XCS with continuous-valued inputs. Evol Comput 11(3):299–336CrossRef Stone C, Bull L (2003) For real! XCS with continuous-valued inputs. Evol Comput 11(3):299–336CrossRef
25.
go back to reference Tamee K, Rojanavasu P, Udomthanapong S, Pinngern O (2008) Using self-organizing maps with learning classifier system for intrusion detection. In: PRICAI ’08, Springer, Berlin, pp 1071–1076 Tamee K, Rojanavasu P, Udomthanapong S, Pinngern O (2008) Using self-organizing maps with learning classifier system for intrusion detection. In: PRICAI ’08, Springer, Berlin, pp 1071–1076
26.
go back to reference Toosi AN, Kahani M (2007) A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput Commun 30(10):2201–2212CrossRef Toosi AN, Kahani M (2007) A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput Commun 30(10):2201–2212CrossRef
27.
go back to reference Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11,994–12,000 Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11,994–12,000
28.
go back to reference Urbanowicz RJ, Moore JH (2009) Learning classifier systems: a complete introduction, review, and roadmap. J Artif Evol App 2009:1–1125CrossRef Urbanowicz RJ, Moore JH (2009) Learning classifier systems: a complete introduction, review, and roadmap. J Artif Evol App 2009:1–1125CrossRef
29.
go back to reference Vanderlooy S, Sprinkhuizen-Kuyper I, Smirnov E (2006) Reliable classifiers in ROC space. In: 15th BENELEARN machine learning conference, pp 27–36 Vanderlooy S, Sprinkhuizen-Kuyper I, Smirnov E (2006) Reliable classifiers in ROC space. In: 15th BENELEARN machine learning conference, pp 27–36
30.
go back to reference Vatsa V, Sural S, Majumdar A (2005) A game-theoretic approach to credit card fraud detection. Lect Notes Comput Sci 3803:263–276CrossRef Vatsa V, Sural S, Majumdar A (2005) A game-theoretic approach to credit card fraud detection. Lect Notes Comput Sci 3803:263–276CrossRef
31.
go back to reference Weiss GM (2004) Mining with rarity: a unifying framework. ACM SIGKDD Explor Newslett 6(1):7–19CrossRef Weiss GM (2004) Mining with rarity: a unifying framework. ACM SIGKDD Explor Newslett 6(1):7–19CrossRef
32.
go back to reference Wilson SW (1995) Classifier fitness based on accuracy. Evol Comput 3(2):149–175CrossRef Wilson SW (1995) Classifier fitness based on accuracy. Evol Comput 3(2):149–175CrossRef
33.
go back to reference Wilson SW (2000) Get real! XCS with continuous-valued inputs. In: Learning classifier systems, from foundations to applications, Springer, Berlin pp 209–222 Wilson SW (2000) Get real! XCS with continuous-valued inputs. In: Learning classifier systems, from foundations to applications, Springer, Berlin pp 209–222
34.
go back to reference Yue D, Wu X, Wang Y, Li Y, Chu CH (2007) A review of data mining-based financial fraud detection research. In: Wireless communications, networking and mobile computing, pp 5519–5522 Yue D, Wu X, Wang Y, Li Y, Chu CH (2007) A review of data mining-based financial fraud detection research. In: Wireless communications, networking and mobile computing, pp 5519–5522
Metadata
Title
On XCSR for electronic fraud detection
Authors
Mohammad Behdad
Luigi Barone
Tim French
Mohammed Bennamoun
Publication date
01-06-2012
Publisher
Springer-Verlag
Published in
Evolutionary Intelligence / Issue 2/2012
Print ISSN: 1864-5909
Electronic ISSN: 1864-5917
DOI
https://doi.org/10.1007/s12065-012-0076-5

Other articles of this Issue 2/2012

Evolutionary Intelligence 2/2012 Go to the issue

Premium Partner