DocumentCode :
1415363
Title :
Resilient Identity Crime Detection
Author :
Phua, Clifton ; Smith-Miles, Kate ; Lee, Vincent ; Gayler, Ross
Author_Institution :
Data Min. Dept., Inst. for Infocomm Res. (PR), Singapore, Singapore
Volume :
24
Issue :
3
fYear :
2012
fDate :
3/1/2012 12:00:00 AM
Firstpage :
533
Lastpage :
546
Abstract :
Identity crime is well known, prevalent, and costly; and credit application fraud is a specific case of identity crime. The existing nondata mining detection system of business rules and scorecards, and known fraud matching have limitations. To address these limitations and combat identity crime in real time, this paper proposes a new multilayered detection system complemented with two additional layers: communal detection (CD) and spike detection (SD). CD finds real social relationships to reduce the suspicion score, and is tamper resistant to synthetic social relationships. It is the whitelist-oriented approach on a fixed set of attributes. SD finds spikes in duplicates to increase the suspicion score, and is probe-resistant for attributes. It is the attribute-oriented approach on a variable-size set of attributes. Together, CD and SD can detect more types of attacks, better account for changing legal behavior, and remove the redundant attributes. Experiments were carried out on CD and SD with several million real credit applications. Results on the data support the hypothesis that successful credit application fraud patterns are sudden and exhibit sharp spikes in duplicates. Although this research is specific to credit application fraud detection, the concept of resilience, together with adaptivity and quality data discussed in the paper, are general to the design, implementation, and evaluation of all detection systems.
Keywords :
computer crime; data mining; fraud; business rules; communal detection; credit application fraud detection; fraud matching; legal behavior; multilayered detection system; nondata mining detection system; resilient identity crime detection; spike detection; synthetic social relationships; whitelist-oriented approach; Algorithm design and analysis; Credit cards; Data mining; Law; Real time systems; Resilience; Data mining-based fraud detection; anomaly detection.; data stream mining; security;
fLanguage :
English
Journal_Title :
Knowledge and Data Engineering, IEEE Transactions on
Publisher :
ieee
ISSN :
1041-4347
Type :
jour
DOI :
10.1109/TKDE.2010.262
Filename :
5677523
Link To Document :
بازگشت