Skip to main content

A Game-Theoretic Approach to Credit Card Fraud Detection

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3803))

Abstract

Intrusion prevention mechanisms are largely insufficient for protection of databases against Information Warfare attacks by authorized users and has drawn interest towards intrusion detection. We visualize the conflicting motives between an attacker and a detection system as a multi-stage game between two players, each trying to maximize his payoff. We consider the specific application of credit card fraud detection and propose a fraud detection system based on a game-theoretic approach. Not only is this approach novel in the domain of Information Warfare, but also it improvises over existing rule-based systems by predicting the next move of the fraudster and learning at each step.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chiueh, T., Pilania, D.: Design, Implementation and Evaluation of a Repairable Database Management System. In: Proceedings of ACSAC 2004, pp. 179–188 (2004)

    Google Scholar 

  2. Chung, C.Y., Gertz, M., Levitt, K.: DEMIDS: A Misuse Detection System for Database Systems. In: Third International IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems, pp. 159–178 (1999)

    Google Scholar 

  3. Lee, V.C.S., Stankovic, J.A., Son, H.S.: Intrusion Detection in Real-Time Database Systems via Time Signatures. In: Proc. Sixth IEEE Real Time Technology and Applications Symposium (RTAS 2000), pp. 124–133 (2000)

    Google Scholar 

  4. Hu, Y., Panda, B.: Identification of Malicious Transactions in Database Systems. In: Seventh Int. Database Engineering and Applications Symposium (IDEAS), China, pp. 329–335 (2003)

    Google Scholar 

  5. Hamilton, S.N., Miller, W.L., Ott, A., Saydjari, O.S.: The Role of Game Theory in Information Warfare. In: Fourth Information Survivability Workshop (2002)

    Google Scholar 

  6. Hamilton, S.N., Miller, W.L., Ott, A., Saydjari, O.S.: Challenges in Applying Game Theory to the Domain of Information Warfare. In: Fourth Information Survivability Workshop (2002)

    Google Scholar 

  7. Liu, P., Li, L.: A Game-Theoretic Approach for Attack Prediction, Technical Report, PSU-S2-2002-01, Penn State University (2002)

    Google Scholar 

  8. Complete Website and e-commerce solutions (April 20, 2005), http://www.haveninternet.com/welcome.htm

  9. Merchant account credit card processing (April 20, 2005), http://www.aaa-merchant-account.com/

  10. Clearly Business âǍŞ Card Fraud (April 20, 2005), http://www.clearlybusiness.com/cb/articles/

  11. Online fraud is 12 times higher than offline fraud (April 20, 2005), http://sellitontheweb.com/ezine/news0434.shtml

  12. Li, Y., Zhang, X.: A Security-Enhanced One-Time Payment Scheme for Credit Card. In: 14th International Workshop on RIDEâǍŹ 2004, pp. 40–47 (2004)

    Google Scholar 

  13. Peters, M.E.: Emerging eCommerce Credit and Debit Card Protocols. In: Proc. 3rd International Symposium on Electronic Commerce, pp. 39–46 (2002)

    Google Scholar 

  14. Low, S.H., Maxemchuk, N.F., Paul, S.: Anonymous credit cards and their collusion analysis. IEEE/ACM Transactions on Networking, 809–816 (1996)

    Google Scholar 

  15. Ghosh, S., Reilly, D.L.: Credit card fraud detection with a neural network. In: Proc. 27th Annual Hawaii International Conference on System Sciences, pp. 621–630 (1994)

    Google Scholar 

  16. Aleskerov, E., Freisleben, B., Rao, B.: CARDWATCH: A Neural Network Based Database Mining System for Credit Card Fraud Detection. In: Proc. Computational Intelligence for Financial Engineering (CIFEr), pp. 220–226 (1997)

    Google Scholar 

  17. Chan, P.K., Fan, W., Prodromidis, A.L., Stolfo, S.J.: Distributed Data Mining in Credit Card Fraud Detection. IEEE Intelligent Systems, 67–74 (1999)

    Google Scholar 

  18. Syeda, M., Zhang, Y.Q., Pan, Y.: Parallel Granular Neural Networks for Fast Credit Card Fraud Detection. In: Proc. FUZZ-IEEE 2002 Int. Conference, pp. 572–577 (2002)

    Google Scholar 

  19. Game Theory (April 26, 2005), http://plato.stanford.edu/entries/game-theory/

  20. Kydd, A.: Formal Theory for Political Science âǍŞ Lecture Notes (2002)

    Google Scholar 

  21. Ferguson, T.S., Melolidakis, C.: On the Inspection Game. Naval Research Logistics 45, 327–334 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  22. Kodialam, M., Lakshman, T.V.: Detecting network intrusions via sampling: A Game-theoretic Approach. In: Proc. IEEE INFOCOM 2003, pp. 1880–1889 (2003)

    Google Scholar 

  23. Maschler, M.: A price leadership method for solving the inspectorâǍŹs non-constant sum game. Naval Research Logistics Quarterly 13, 11–33 (1966)

    Article  MATH  Google Scholar 

  24. âǍIJTit for TatâǍİ (April 28, 2005), http://www.abc.net.au/science/slab/tittat/story.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vatsa, V., Sural, S., Majumdar, A.K. (2005). A Game-Theoretic Approach to Credit Card Fraud Detection. In: Jajodia, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2005. Lecture Notes in Computer Science, vol 3803. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11593980_20

Download citation

  • DOI: https://doi.org/10.1007/11593980_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30706-8

  • Online ISBN: 978-3-540-32422-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics