The Community for Technology Leaders
RSS Icon
Issue No.04 - October-December (2009 vol.6)
pp: 309-315
Amlan Kundu , Indian Institute of Technology, Kharagpur
Suvasini Panigrahi , Indian Institute of Technology, Kharagpur
Shamik Sural , Indian Institute of Technology, Kharagpur
Arun K. Majumdar , Indian Institute of Technology, Kharagpur
A phenomenal growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. In real life, fraudulent transactions are interspersed with genuine transactions and simple pattern matching is not often sufficient to detect them accurately. Thus, there is a need for combining both anomaly detection as well as misuse detection techniques. In this paper, we propose to use two-stage sequence alignment in which a profile analyzer (PA) first determines the similarity of an incoming sequence of transactions on a given credit card with the genuine cardholder's past spending sequences. The unusual transactions traced by the profile analyzer are next passed on to a deviation analyzer (DA) for possible alignment with past fraudulent behavior. The final decision about the nature of a transaction is taken on the basis of the observations by these two analyzers. In order to achieve online response time for both PA and DA, we suggest a new approach for combining two sequence alignment algorithms BLAST and SSAHA.
Electronic commerce, credit card fraud, sequence alignment, transaction processing, unauthorized access, Markov chain.
Amlan Kundu, Suvasini Panigrahi, Shamik Sural, Arun K. Majumdar, "BLAST-SSAHA Hybridization for Credit Card Fraud Detection", IEEE Transactions on Dependable and Secure Computing, vol.6, no. 4, pp. 309-315, October-December 2009, doi:10.1109/TDSC.2009.11
[1] A. Richard, “Credit Cards as Spending Facilitating Stimuli: A Conditioning Interpretation,” J. Consumer Research, vol. 13, no. 3, pp. 348-356, 1986.
[2] S. Ghosh and D.L. Reilly, “Credit Card Fraud Detection with a Neural-Network,” Proc. Int'l Conf. System Science, pp. 621-630, 1994.
[3] E. Aleskerov, B. Freisleben, and B. Rao, “CARDWATCH: A Neural Network Based Database Mining System for Credit Card Fraud Detection,” Proc. IEEE/IAFE Conf. Computational Intelligence for Financial Eng. (CIFEr), pp. 220-226, 1997.
[4] R. Brause, T. Langsdorf, and M. Hepp, “Neural Data Mining for Credit Card Fraud Detection,” Proc. Int'l Conf. Tools with Artificial Intelligence, pp.103-106, 1999.
[5] M. Syeda, Y.Q. Zhang, and Y. Pan, “Parallel Granular Neural Networks for Fast Credit Card Fraud Detection,” Proc. IEEE Int'l Conf. Fuzzy Systems, pp.572-577, 2002.
[6] C. Chiu and C. Tsai, “A Web Services-Based Collaborative Scheme for Credit Card Fraud Detection,” Proc. IEEE Int'l Conf. e-Technology, e-Commerce and e-Service, pp. 177-181, 2004.
[7] V. Vatsa, S. Sural, and A.K. Majumdar, “A Game-Theoretic Approach to Credit Card Fraud Detection,” Proc. Int'l Conf. Information Systems Security, pp. 263-276, 2005.
[8] J.W. Slocum and H. Lee, “Mathews, Social Class and Income as Indicators of Consumer Credit Behavior,” J. Marketing, vol. 34, no. 2, pp. 69-74, 1970.
[9] R. Wheat and D.G. Morrison, “Estimating Purchase Regularity with Two Interpurchase Times,” J. Marketing Research, vol. 27, no. 1, pp. 87-93, 1990.
[10] B.E. Kahn and D.C. Schmittlein, “Shopping Trip Behavior: An Empirical. Investigation,” Marketing Letters, vol. 1, no. 1, pp. 55-69, 1989.
[11] K. Liano and J.T. Lindley, “An Analysis of the Weekend Effect within the Monthly Effect,” Rev. of Quantitative Finance and Accounting, vol. 5, no. 4, pp.419-426, 1995.
[12] C.H. Joha, H.J.P. Timmermansa, and P.T.L. Popkowski-Leszczyc, “Identifying Purchase-History Sensitive Shopper Segments Using Scanner Panel Data and Sequence Alignment Methods,” J. of Retailing and Consumer Services, vol. 10, no. 3, pp. 135-144, 2003.
[13] S.B. Needleman and C.D. Wunsch, “A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins,” J.Molecular Biology, vol. 48, no. 3, pp. 443-453, 1970.
[14] T.F. Smith and M.S. Waterman, “Identification of Common Molecular Subsequences,” J. Molecular Biology, vol. 147, no. 1, pp. 195-197, 1981.
[15] S.F. Altschul, W. Gish, W. Miller, W. Myers, and J. Lipman, “Basic Local Alignment Search Tool,” J. Molecular Biology, vol. 215, pp. 403-410, 1990.
[16] W.R. Pearson and D.J. Lipman, “Improved Tools for Biological Sequence Comparison,” Proc. Nat'l Academy of Sciences, vol. 85, no. 8, pp. 2444-2448, 1988.
[17] Z. Ning, A.J. Cox, and J.C. Mullikin, “SSAHA: A Fast Search Method for Large DNA Databases,” Genome Research, vol. 11, no. 10, pp. 1725-1729, 2001.
[18] K. Takeda, “The Application of Bioinformatics to Network Intrusion Detection,” Proc. Int'l Carnahan Conf. Security Technology (CCST), pp.130-132, 2005.
[19] S. Coull, J. Branch, B. Szymanski, and E. Breimer, “Intrusion Detection: A Bioinformatics Approach,” Proc. Ann. Computer Security Applications Conf. (ACSAC), pp. 24-33, 2003.
[20] A. Kundu, S. Sural, and A.K. Majumdar, “Two-Stage Credit Card Fraud Detection Using Sequence Alignment,” Proc. Int'l Conf. Information Systems Security, pp. 260-275, 2006.
[21] Y. Li and X. Zhang, “A Security-Enhanced One-Time Payment Scheme for Credit Card,” Proc. Int'l Workshop Web Services for e-Commerce and e-Government Applications, pp. 40-47, 2004.
[22] S. Maes, K. Tuyls, B. Vanschoenwinkel, and B. Manderick, “Credit Card Fraud Detection Using Bayesian and Neural Networks,” Proc. Int'l NAISO Congress on Neuro Fuzzy Technologies, 2002.
38 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool