Skip to main content

Two-Stage Credit Card Fraud Detection Using Sequence Alignment

  • Conference paper
Book cover Information Systems Security (ICISS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4332))

Included in the following conference series:

Abstract

A phenomenal growth in the number of credit card transactions, especially for on-line purchases, has also led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit card companies in order to minimize their losses. In real life, fraudulent transactions could be interspersed with genuine transactions and simple pattern matching techniques are not often sufficient to detect the fraudulent transactions efficiently. In this paper, we propose a hybrid approach in which anomaly detection and misuse detection models are combined. Sequence alignment is used to determine similarity of an incoming sequence of transactions to both a genuine card holder’s sequence as well as to sequences generated by a validated fraud model. The scores from these two stages are combined to determine if a transaction is genuine or not. We use stochastic models for studying the performance of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Global Consumer Attitude Towards Online Shopping (April 28, 2006), http://www2.acnielsen.com/reports/documents/2005_cc_onlineshopping.pdf

  2. Statistics for General and Online Card Fraud (April 22, 2006), http://www.epaynews.com/statistics/fraud.html

  3. Business news on Preventing card fraud BBC NEWS (March 8, 2005), http://news.bbc.co.uk/2/hi/business/3256799.stm

  4. Ghosh, S., Reilly, D.L.: Credit Card Fraud Detection with a Neural-Network. In: Proceedings of the Annual International Conference on System Science, pp. 621–630 (1994)

    Google Scholar 

  5. Stolfo, S.J., Fan, D.W., Lee, W., Prodromidis, A.L.: Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results. In: Proceedings of the Workshop on AI Methods in Fraud and Risk Management (1997)

    Google Scholar 

  6. Aleskerov, E., Freisleben, B., Rao, B.: CARDWATCH: A Neural Network Based Database Mining System for Credit Card Fraud Detection. In: Proceedings of the IEEE/IAFE, pp. 220–226 (1997)

    Google Scholar 

  7. Fan, W., Prodromidis, A.L., Stolfo, S.J.: Distributed Data Mining in Credit Card Fraud Detection. In: Proceedings of IEEE Intelligent Systems, pp. 67–74 (1999)

    Google Scholar 

  8. Brause, R., Langsdorf, T., Hepp, M.: Neural Data Mining for Credit Card Fraud Detection. In: International Conference on Tools with Articial Intelligence, pp. 103–106 (1999)

    Google Scholar 

  9. Chiu, C., Tsai, C.: A Web Services-Based Collaborative Scheme for Credit Card Fraud Detection. In: Proceedings of the IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 177–181 (2004)

    Google Scholar 

  10. Phua, C., Lee, V., Smith, K., Gayler, R.: A Comprehensive Survey of Data Mining-based Fraud Detection Research. In: Proceedings of the Articial Intelligence (2005)

    Google Scholar 

  11. Vatsa, V., Sural, S., Majumdar, A.K.: A Game- Theoretic Approach to Credit Card Fraud Detection. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2005. LNCS, vol. 3803, pp. 263–276. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  12. Takeda, K.: The application of bioinformatics to network intrusion detection, Security Technology. In: 39th Annual International Conference (CCST) IEEE, pp. 130–132 (2005)

    Google Scholar 

  13. Coul, S., Branch, J., Szymanski, B., Breimer, E.: Intrusion Detection: A Bioinformatics Approach. In: Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC) IEEE, pp. 24–33 (2003)

    Google Scholar 

  14. Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology, 443–453 (1970)

    Google Scholar 

  15. Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. Journal of Molecular Biology, 195–197 (1981)

    Google Scholar 

  16. Altschul, S.F., Gish, W., Miller, W., Myers, W., Lipman, J.: Basic Local Alignment Search Tool. Journal of Molecular Biology, 403–410 (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kundu, A., Sural, S., Majumdar, A.K. (2006). Two-Stage Credit Card Fraud Detection Using Sequence Alignment. In: Bagchi, A., Atluri, V. (eds) Information Systems Security. ICISS 2006. Lecture Notes in Computer Science, vol 4332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11961635_18

Download citation

  • DOI: https://doi.org/10.1007/11961635_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68962-1

  • Online ISBN: 978-3-540-68963-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics