Skip to main content
Erschienen in: Evolutionary Intelligence 2/2012

01.06.2012 | Special Issue

On XCSR for electronic fraud detection

verfasst von: Mohammad Behdad, Luigi Barone, Tim French, Mohammed Bennamoun

Erschienen in: Evolutionary Intelligence | Ausgabe 2/2012

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Fraud is a serious problem that costs the worldwide economy billions of dollars annually. However, fraud detection is difficult as perpetrators actively attempt to mask their actions, among typically overwhelming large volumes of, legitimate activity. In this paper, we investigate the fraud detection problem and examine how learning classifier systems can be applied to it. We describe the common properties of fraud, introducing an abstract problem which can be tuned to exhibit those characteristics. We report experiments on this abstract problem with a popular real-time learning classifier system algorithm; results from our experiments demonstrating that this approach can overcome the difficulties inherent to the fraud detection problem. Finally we apply the algorithm to a real-world problem and show that it can achieve good performance in this domain.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Australian Bureau of Statistics (2008) Personal fraud, 2007. Tech. Rep. 4528.0, Australian Bureau of Statistics Australian Bureau of Statistics (2008) Personal fraud, 2007. Tech. Rep. 4528.0, Australian Bureau of Statistics
2.
Zurück zum Zitat Bacardit J, Bernadó-Mansilla E, Butz MV (2008) Learning classifier systems: looking back and glimpsing ahead. In: 10th international workshop on learning classifier systems, Springer, Berlin, pp 1–21 Bacardit J, Bernadó-Mansilla E, Butz MV (2008) Learning classifier systems: looking back and glimpsing ahead. In: 10th international workshop on learning classifier systems, Springer, Berlin, pp 1–21
3.
Zurück zum Zitat Bull L (2004) Applications of learning classifier systems. Springer, BerlinMATH Bull L (2004) Applications of learning classifier systems. Springer, BerlinMATH
4.
Zurück zum Zitat Bull L (2004) Learning classifier systems: a brief introduction. Applications of Learning Classifier Systems pp 3–14 Bull L (2004) Learning classifier systems: a brief introduction. Applications of Learning Classifier Systems pp 3–14
5.
Zurück zum Zitat Butz MV, Wilson SW (2000) An algorithmic description of XCS. Tech. Rep. 2000017, Illinois Genetic Algorithms Laboratory Butz MV, Wilson SW (2000) An algorithmic description of XCS. Tech. Rep. 2000017, Illinois Genetic Algorithms Laboratory
6.
Zurück zum Zitat Dam HH (2008) A scalable evolutionary learning classifier system for knowledge discovery in stream data mining. PhD thesis, University of New South Wales—Australian Defence Force Academy Dam HH (2008) A scalable evolutionary learning classifier system for knowledge discovery in stream data mining. PhD thesis, University of New South Wales—Australian Defence Force Academy
7.
Zurück zum Zitat Dudley J, Barone L, While L (2008) Multi-objective spam filtering using an evolutionary algorithm. In: Congress on evolutionary computation, pp 123–130 Dudley J, Barone L, While L (2008) Multi-objective spam filtering using an evolutionary algorithm. In: Congress on evolutionary computation, pp 123–130
8.
Zurück zum Zitat Duman E, Ozcelik MH (2011) Detecting credit card fraud by genetic algorithm and scatter search. Expert Syst Appl 38(10):13,057–13,063CrossRef Duman E, Ozcelik MH (2011) Detecting credit card fraud by genetic algorithm and scatter search. Expert Syst Appl 38(10):13,057–13,063CrossRef
9.
Zurück zum Zitat Fawcett T, Haimowitz I, Provost F, Stolfo S (1998) Ai approaches to fraud detection and risk management. AI Magaz 19(2):107–108 Fawcett T, Haimowitz I, Provost F, Stolfo S (1998) Ai approaches to fraud detection and risk management. AI Magaz 19(2):107–108
10.
Zurück zum Zitat Feng Y, Zhong J, Xiong Zy, Ye Cx, Wu Kg (2007) Network anomaly detection based on DSOM and ACO clustering. In: Advances in neural networks-ISNN 2007, lecture notes in computer science, vol 4492, Springer, Berlin pp 947–955 Feng Y, Zhong J, Xiong Zy, Ye Cx, Wu Kg (2007) Network anomaly detection based on DSOM and ACO clustering. In: Advances in neural networks-ISNN 2007, lecture notes in computer science, vol 4492, Springer, Berlin pp 947–955
11.
Zurück zum Zitat Kou Y, Lu CT, Sirwongwattana S, Huang YP (2004) Survey of fraud detection techniques. In: Networking, sensing and control, 2004 IEEE international conference on, vol 2, pp 749–754 Kou Y, Lu CT, Sirwongwattana S, Huang YP (2004) Survey of fraud detection techniques. In: Networking, sensing and control, 2004 IEEE international conference on, vol 2, pp 749–754
12.
Zurück zum Zitat Nettleton DF, Orriols-Puig A, Fornells A (2010) A study of the effect of different types of noise on the precision of supervised learning techniques. Artif Intell Rev 33(4):275–306CrossRef Nettleton DF, Orriols-Puig A, Fornells A (2010) A study of the effect of different types of noise on the precision of supervised learning techniques. Artif Intell Rev 33(4):275–306CrossRef
13.
Zurück zum Zitat Nguyen TH, Foitong S, Srinil P, Pinngern O (2008) Towards adapting xcs for imbalance problems. In: PRICAI ’08, Springer, Berlin, pp 1028–1033 Nguyen TH, Foitong S, Srinil P, Pinngern O (2008) Towards adapting xcs for imbalance problems. In: PRICAI ’08, Springer, Berlin, pp 1028–1033
14.
Zurück zum Zitat Oda T, White T (2005) Immunity from spam: an analysis of an artificial immune system. In: 4th International conference on artificial immune systems, Springer, Berlin, pp 276–289 Oda T, White T (2005) Immunity from spam: an analysis of an artificial immune system. In: 4th International conference on artificial immune systems, Springer, Berlin, pp 276–289
15.
Zurück zum Zitat Orriols-Puig A, Bernadó-Mansilla E (2008) Evolutionary rule-based systems for imbalanced data sets. Soft Comput 13(3):213–225CrossRef Orriols-Puig A, Bernadó-Mansilla E (2008) Evolutionary rule-based systems for imbalanced data sets. Soft Comput 13(3):213–225CrossRef
16.
Zurück zum Zitat Orriols-Puig A, Bernadó-Mansilla E, Goldberg DE, Sastry K, Lanzi PL (2009) Facetwise analysis of XCS for problems with class imbalances. IEEE Trans Evol Comput, submitted 3(5):1093–1119CrossRef Orriols-Puig A, Bernadó-Mansilla E, Goldberg DE, Sastry K, Lanzi PL (2009) Facetwise analysis of XCS for problems with class imbalances. IEEE Trans Evol Comput, submitted 3(5):1093–1119CrossRef
17.
Zurück zum Zitat Phua C, Lee V, Smith-Miles K, Gayler R (2005) A comprehensive survey of data mining-based fraud detection research. Tech. rep., Monash University Phua C, Lee V, Smith-Miles K, Gayler R (2005) A comprehensive survey of data mining-based fraud detection research. Tech. rep., Monash University
18.
Zurück zum Zitat Sculley D, Wachman GM (2007) Relaxed online SVMs for spam filtering. In: 30th annual international ACM SIGIR conference on research and development in information retrieval, ACM Publishers, pp 415–422 Sculley D, Wachman GM (2007) Relaxed online SVMs for spam filtering. In: 30th annual international ACM SIGIR conference on research and development in information retrieval, ACM Publishers, pp 415–422
19.
Zurück zum Zitat Seewald AK (2007) An evaluation of naïve Bayes variants in content-based learning for spam filtering. Int Data Anal11(5):497–524 Seewald AK (2007) An evaluation of naïve Bayes variants in content-based learning for spam filtering. Int Data Anal11(5):497–524
20.
Zurück zum Zitat Shafi K, Abbass HA (2007) Biologically-inspired complex adaptive systems approaches to network intrusion detection. Inform Secur Tech Rep 12(4):209–217CrossRef Shafi K, Abbass HA (2007) Biologically-inspired complex adaptive systems approaches to network intrusion detection. Inform Secur Tech Rep 12(4):209–217CrossRef
21.
Zurück zum Zitat Shafi K, Kovacs T, Abbass HA, Zhu W (2009) Intrusion detection with evolutionary learning classifier systems. Nat Comput 8(1):3–27MathSciNetMATHCrossRef Shafi K, Kovacs T, Abbass HA, Zhu W (2009) Intrusion detection with evolutionary learning classifier systems. Nat Comput 8(1):3–27MathSciNetMATHCrossRef
22.
Zurück zum Zitat Sigaud O, Wilson SW (2007) Learning classifier systems: a survey. Soft Comput A Fusion Found Methodol Appl 11(11):1065–1078MATH Sigaud O, Wilson SW (2007) Learning classifier systems: a survey. Soft Comput A Fusion Found Methodol Appl 11(11):1065–1078MATH
24.
Zurück zum Zitat Stone C, Bull L (2003) For real! XCS with continuous-valued inputs. Evol Comput 11(3):299–336CrossRef Stone C, Bull L (2003) For real! XCS with continuous-valued inputs. Evol Comput 11(3):299–336CrossRef
25.
Zurück zum Zitat Tamee K, Rojanavasu P, Udomthanapong S, Pinngern O (2008) Using self-organizing maps with learning classifier system for intrusion detection. In: PRICAI ’08, Springer, Berlin, pp 1071–1076 Tamee K, Rojanavasu P, Udomthanapong S, Pinngern O (2008) Using self-organizing maps with learning classifier system for intrusion detection. In: PRICAI ’08, Springer, Berlin, pp 1071–1076
26.
Zurück zum Zitat Toosi AN, Kahani M (2007) A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput Commun 30(10):2201–2212CrossRef Toosi AN, Kahani M (2007) A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput Commun 30(10):2201–2212CrossRef
27.
Zurück zum Zitat Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11,994–12,000 Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11,994–12,000
28.
Zurück zum Zitat Urbanowicz RJ, Moore JH (2009) Learning classifier systems: a complete introduction, review, and roadmap. J Artif Evol App 2009:1–1125CrossRef Urbanowicz RJ, Moore JH (2009) Learning classifier systems: a complete introduction, review, and roadmap. J Artif Evol App 2009:1–1125CrossRef
29.
Zurück zum Zitat Vanderlooy S, Sprinkhuizen-Kuyper I, Smirnov E (2006) Reliable classifiers in ROC space. In: 15th BENELEARN machine learning conference, pp 27–36 Vanderlooy S, Sprinkhuizen-Kuyper I, Smirnov E (2006) Reliable classifiers in ROC space. In: 15th BENELEARN machine learning conference, pp 27–36
30.
Zurück zum Zitat Vatsa V, Sural S, Majumdar A (2005) A game-theoretic approach to credit card fraud detection. Lect Notes Comput Sci 3803:263–276CrossRef Vatsa V, Sural S, Majumdar A (2005) A game-theoretic approach to credit card fraud detection. Lect Notes Comput Sci 3803:263–276CrossRef
31.
Zurück zum Zitat Weiss GM (2004) Mining with rarity: a unifying framework. ACM SIGKDD Explor Newslett 6(1):7–19CrossRef Weiss GM (2004) Mining with rarity: a unifying framework. ACM SIGKDD Explor Newslett 6(1):7–19CrossRef
32.
Zurück zum Zitat Wilson SW (1995) Classifier fitness based on accuracy. Evol Comput 3(2):149–175CrossRef Wilson SW (1995) Classifier fitness based on accuracy. Evol Comput 3(2):149–175CrossRef
33.
Zurück zum Zitat Wilson SW (2000) Get real! XCS with continuous-valued inputs. In: Learning classifier systems, from foundations to applications, Springer, Berlin pp 209–222 Wilson SW (2000) Get real! XCS with continuous-valued inputs. In: Learning classifier systems, from foundations to applications, Springer, Berlin pp 209–222
34.
Zurück zum Zitat Yue D, Wu X, Wang Y, Li Y, Chu CH (2007) A review of data mining-based financial fraud detection research. In: Wireless communications, networking and mobile computing, pp 5519–5522 Yue D, Wu X, Wang Y, Li Y, Chu CH (2007) A review of data mining-based financial fraud detection research. In: Wireless communications, networking and mobile computing, pp 5519–5522
Metadaten
Titel
On XCSR for electronic fraud detection
verfasst von
Mohammad Behdad
Luigi Barone
Tim French
Mohammed Bennamoun
Publikationsdatum
01.06.2012
Verlag
Springer-Verlag
Erschienen in
Evolutionary Intelligence / Ausgabe 2/2012
Print ISSN: 1864-5909
Elektronische ISSN: 1864-5917
DOI
https://doi.org/10.1007/s12065-012-0076-5

Weitere Artikel der Ausgabe 2/2012

Evolutionary Intelligence 2/2012 Zur Ausgabe

Premium Partner