Title :
BLAST-SSAHA Hybridization for Credit Card Fraud Detection
Author :
Kundu, Amlan ; Panigrahi, Suvasini ; Sura, Shamik ; Majumdar, Arun K.
Author_Institution :
Sch. of Inf. Technol., Indian Inst. of Technol., Kharagpur, India
Abstract :
A phenomenal growth in the number of credit card transactions, especially for online purchases, has recently led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit card issuing banks to minimize their losses. In real life, fraudulent transactions are interspersed with genuine transactions and simple pattern matching is not often sufficient to detect them accurately. Thus, there is a need for combining both anomaly detection as well as misuse detection techniques. In this paper, we propose to use two-stage sequence alignment in which a profile analyzer (PA) first determines the similarity of an incoming sequence of transactions on a given credit card with the genuine cardholder´s past spending sequences. The unusual transactions traced by the profile analyzer are next passed on to a deviation analyzer (DA) for possible alignment with past fraudulent behavior. The final decision about the nature of a transaction is taken on the basis of the observations by these two analyzers. In order to achieve online response time for both PA and DA, we suggest a new approach for combining two sequence alignment algorithms BLAST and SSAHA.
Keywords :
credit transactions; file organisation; fraud; search problems; sequences; smart cards; BLAST-SSAHA hybridization; anomaly detection; basic local alignment search tool; credit card fraud detection system; credit card transaction; deviation analyzer; hashing algorithm; misuse detection technique; online purchase; profile analyzer; two-stage sequence alignment algorithm; Bioinformatics; Business; Counting circuits; Credit cards; Databases; Delay; Globalization; Internet; Neural networks; Pattern matching; Electronic commerce; Markov chain.; credit card fraud; sequence alignment; transaction processing; unauthorized access;
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
DOI :
10.1109/TDSC.2009.11