Skip to main content

An Effective Hybrid Fraud Detection Method

  • Conference paper
  • First Online:
Knowledge Science, Engineering and Management (KSEM 2015)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9403))

Abstract

The rapid growth of data makes it possible for us to study human behavior patterns. Knowing the patterns of human behavior is of great use to help us detect the unusual fraud human behavior. Existing fraud detection methods can be divided into two categories: pattern based and outlier detection based methods. However, because of the sparsity and complex granularity of big data, these methods have high false positive in fraud detection. In this paper, we propose an effective hybrid fraud detection method. We propose SSIsomap which improves isomap to cluster behaviors into behavior classes and propose SimLOF which improves LOF to conduct outlier detection, then we use Dempster-Shafer evidence Theory for combining behavior pattern evidence and outlier evidence, which yields a degree of belief of fraud to the new coming claim. The experiment result shows our method has significantly higher accuracy than exsiting methods in medical insurance fraud detection.

Supported by the National Natural Science Foundation of China under Grant No.61303005, the Science and Technology Development Plan Project of Shandong Province No. 2014GGX101019 and No. 2014GGX101047, the Fundamental Research Funds of Shandong University No.2014JC025, the National Key Technologies R&D Program No.2012BAH54F02 and No.2012BAH54F04.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Huang, Z., Dong, W., Ji, L., et al.: Discovery of clinical pathway patterns from event logs using probabilistic topic models. Journal of Biomedical Informatics 47, 39–57 (2014)

    Article  Google Scholar 

  2. Tsai, Y.H., Ko, C.H., Lin, K.C.: Using Common KADS Method to Build Prototype System in Medical Insurance Fraud Detection. Journal of Networks 9(7), 1798–1802 (2014)

    Article  Google Scholar 

  3. Li, X., Cao, H., Chen, E., Xiong, H., Tian, J.: BP-Growth: Searching Strategies for Efficient Behavior Pattern Mining. In: 13th International Conference on Mobile Data Management (MDM 2012), pp. 238–247 (2012)

    Google Scholar 

  4. Fano, A.E.: Fraud detection method and system: U.S. Patent 8,725,524, 13 May 2014

    Google Scholar 

  5. Joudaki, H., Rashidian, A., Minaei-Bidgoli, B., et al.: Using Data Mining to Detect Health Care Fraud and Abuse: A Review of Literature. Global Journal of Health Science 7(1), 194 (2014)

    Article  Google Scholar 

  6. Dua, P., Bais, S.: Supervised Learning Methods for Fraud Detection in HealthcareInsurance. In: Dua, S., Rajendra, U., Dua, P. (eds.) Machine Learning in Healthcare Informatics. Intelligent Systems Reference Library, vol. 56, pp. 261–285. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  7. Yagnik Ankur, N., Singh, A.S.: Oulier Analysis Using Frequent Pattern Mining CA Review. International Journal of Computer Science and Information Technologies 5(1), 47–50 (2014)

    Google Scholar 

  8. Musal, R.M.: Two models to investigate Medicare fraud within unsupervised databases. Expert Systems with Applications 37(12), 8628–8633 (2010)

    Article  Google Scholar 

  9. Yang, W.S., Hwang, S.Y.: A process-mining framework for the detection of healthcare fraud and abuse. Expert Systems with Applications 31(1), 56–68 (2006)

    Article  MathSciNet  Google Scholar 

  10. An, W., Liang, M., Liu, H.: An improved one-class support vector machine classifier for outlier detection. Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 229(3), 580–588 (2015)

    Google Scholar 

  11. Yang, W., Su, Q.: Process mining for clinical pathway: literature review and future directions. In: 2014 11th International Conference on Service Systems and Service Management (ICSSSM), pp. 1–5. IEEE (2014)

    Google Scholar 

  12. Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press (1976)

    Google Scholar 

  13. Bergroth, L., Hakonen, H., Raita, T.: A Survey of longest common subsequence algorithms. In: Proceedings of Seventh International Symposium on String Processing and Information Retrieval, SPIRE 2000, pp. 39–48. IEEE (2000)

    Google Scholar 

  14. Breunig, M.M., Kriegel, H.P., Ng, R.T., et al.: LOF: identifying density-based local outliers. In: ACM Sigmod Record, vol. 29(2), pp. 93–104. ACM (2000)

    Google Scholar 

  15. Tenenbaum, J.B., De Silva, V., Langford, J.C.: A global geometric framework for nonlinear dimensionality reduction. Science 290(5500), 2319–2323 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qingzhong Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sun, C., Li, Q., Cui, L., Yan, Z., Li, H., Wei, W. (2015). An Effective Hybrid Fraud Detection Method. In: Zhang, S., Wirsing, M., Zhang, Z. (eds) Knowledge Science, Engineering and Management. KSEM 2015. Lecture Notes in Computer Science(), vol 9403. Springer, Cham. https://doi.org/10.1007/978-3-319-25159-2_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25159-2_51

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25158-5

  • Online ISBN: 978-3-319-25159-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics