Skip to main content

Practical User and Entity Behavior Analytics Methods for Fraud Detection Systems in Online Banking: A Survey

  • Conference paper
  • First Online:
Biologically Inspired Cognitive Architectures 2019 (BICA 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 948))

Included in the following conference series:

Abstract

User and entity behavior analytics (UEBA) methods in fraud detection and advertising are widely used cognitive science methods in modern online banking systems. But profusion of marketing papers complicates true situation. Most of academic papers contain a systematic error: “Correct sample choice error”. Fed to the input the real data of user behavior in online banking do not nothing benefit. The paper will be submitted to the criticism of several methods on “mouse track analysis” and “keystroke dynamics” algorithms. New type of algorithms will be present: “preference-behavioral chain” methods. One “preference-behavioral chain” algorithm for social engineering detection will be presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cappelli R, Ferrara M, Maltoni D, Turroni F (2011) Fingerprint verification competition at IJCB2011. In: Proceedings of the IEEE/IAPR international conference on biometrics, pp 1–6

    Google Scholar 

  2. Huang GB, Learned-Miller E (2014) Labeled faces in the wild: updates and new reporting procedures, Report from University of Massachusetts, Amherst, UM-CS-2014-003

    Google Scholar 

  3. Greenberg G, Banse D, Doddington G, Garcia-Romero D, Godfrey J, Kinnunen T, Martin A, McCree A, Przybocki M, Reynolds D (2014) The NIST 2014 speaker recognition i-vector machine learning challenge. In: Odyssey 2014: the speaker and language recognition workshop, Joensuu, Finland

    Google Scholar 

  4. Phillips PJ, Flynn PJ, Beveridge JR, Scruggs WT, O’Toole AJ, Bolme D, Bowyer KW, Draper DA, Givens GH, Lui YM, Sahibzada H, Scallan JA, Weimer S (2009) Overview of the multiple biometrics grand challenge. LNCS, vol 5558, pp 705–714

    Google Scholar 

  5. Sayed B, Traore I, Woungang I, Obaidat MS (2013) biometric authentication using mouse gesture dynamics. IEEE Syst J 7(2):262–274

    Article  Google Scholar 

  6. Feher C, Elovici Y, Moskovitch R, Rokach L, Schclar A (2012) User identity verification via mouse dynamics. Inf Sci 201:19–36

    Article  Google Scholar 

  7. Hehman E, Stolier RM, Freeman JB (2014) Advanced mouse-tracking analytic techniques for enhancing psychological science. Group Process Intergroup Relat 18(3):384–401

    Article  Google Scholar 

  8. Young JR, Davies RS, Jenkins JL, Pfleger I (2019) Keystroke dynamics: establishing keyprints to verify users in online courses. Comput Sch 36:48–68

    Article  Google Scholar 

  9. Shanmugapriya D, Padmavathi G (2011) An efficient feature selection technique for user authentication using keystroke dynamics. Proc Int J Comput Sci Netw Secur 11:191–195

    Google Scholar 

  10. Jagadamba G, Sharmila SP, Gouda T (2013) A secured authentication system using an effective keystroke dynamics. In: Proceedings of emerging research in electronics, computer science and technology. LNEE, vol 248. Springer, pp 453–460

    Google Scholar 

  11. Monaco JV (2016) Robust keystroke biometric anomaly detection, arXiv preprint, pp 1–7

    Google Scholar 

  12. Gartner Group: Market guide for user and entity behavior analytics. https://www.gartner.com/doc/3538217/market-guide-user-entity-behavior. Accessed 20 Nov 2017

  13. Schwarz M, Lackner F, Gruss D (2019) JavaScript template attacks: automatically inferring host information for targeted exploits. In: Network and Distributed Systems Security (NDSS) Symposium 2019, San Diego, CA, USA

    Google Scholar 

  14. Boda K, Földes ÁM, Gulyás GG, Imre S (2012) User tracking on the web via cross-browser fingerprinting. Lecture Notes in Computer Science, pp 31–46

    Chapter  Google Scholar 

  15. Gómez-Boix A, Laperdrix P, Baudry B (2018) Hiding in the crowd: an analysis of the effectiveness of browser fingerprinting at large scale. In: Proceedings of the 2018 world wide web conference, pp 309–318

    Google Scholar 

  16. Cao Y, Li S, Wijmans E (2017) (Cross-)Browser fingerprinting via OS and hardware level features. In: NDSS Symposium 2017, Reports

    Google Scholar 

  17. Gaines RS, Lisowski W, Press SJ, Shapiro N (1980) Authentication by keystroke timing: some preliminary results, Technical report, DTIC Document

    Google Scholar 

  18. Breiman L (2001) Random forest. Mach Learn 45(1):5–32

    Article  Google Scholar 

  19. sklearn.ensemble.RandomForestClassifier. https://scikit-learn.org/0.20/modules/generated/sklearn.ensemble.RandomForestClassifier.html. Accessed 10 Mar 2019

  20. Gamboa H, Fred A (2004) A behavioral biometric system based on human-computer interaction. In: Proceedings of biometric technology for human identification, vol 5404

    Google Scholar 

  21. Hatfield JM (2018) Social engineering in cybersecurity: the evolution of a concept. Comput Secur 73:102–113

    Article  Google Scholar 

  22. Krombholz K, Hobel H, Huber M, Weippl E (2015) Advanced social engineering attacks. J Inf Secur Appl 22:113–122

    Google Scholar 

  23. Next-generation antivirus, Cyberreason (2017). https://www.cybereason.com/blog/what-is-next-generation-antivirus-ngav. Accessed 10 Mar 2019

  24. Slipenchuk P, Yankelevich D, Krylov P (2019, in printing) Social engineering detection in online banking by automatic user activity analysis, Group-IB, ICDM

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anna Epishkina .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Slipenchuk, P., Epishkina, A. (2020). Practical User and Entity Behavior Analytics Methods for Fraud Detection Systems in Online Banking: A Survey. In: Samsonovich, A. (eds) Biologically Inspired Cognitive Architectures 2019. BICA 2019. Advances in Intelligent Systems and Computing, vol 948. Springer, Cham. https://doi.org/10.1007/978-3-030-25719-4_11

Download citation

Publish with us

Policies and ethics