Skip to main content

An Integrated Intrusion Detection System for Credit Card Fraud Detection

  • Conference paper

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 176))

Abstract

Computer security is one of the key areas where lot of research is being done. Many intrusion detection techniques are proposed to ensure the network security, protect network resources and network infrastructures. Intrusion detection systems (IDS) attempt to detect attacks by gathering network data and analyze the information from various areas to identify the possible intrusions. This paper proposes an IDS combining three approaches such as anomaly, misuse and decision making model to produce better detection accuracy and a decreased false positive rate. The integrated IDS can be built to detect the attacks in credit card system using Hidden Markov approach in the anomaly detection module. The credit card holder’s behaviours are taken as attributes and the anomalous transactions are found by the spending profile of the user. The transactions that are considered to be anomalous or abnormal are then sent to the misuse detection system. Here, the transactions are compared with predefined attack types and then sent to the decision making model to classify it as known/unknown type of attack. Finally, the decision-making module is used to integrate the detected results and report the types of attacks in credit card system. As abnormal transactions are analyzed carefully in each of the module, the fraud rate is reduced and system is immune to attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, S.-S., Yan, K.-Q., Wang, S.-C., Liu, C.-W.: An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks (2011), doi:10.1016/j.eswa.2011.05.076

    Google Scholar 

  2. Srivastava, A., Kundu, A., Sural, S., Majumdar, A.K.: Credit Card Fraud Detection Using Hidden Markov Model. IEEE Transactions on Dependable and Secure Computing 5(1) (January-March 2008), doi:10.1109/TDSC.2007.70228

    Google Scholar 

  3. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. 41(3) (July 2009), doi:10.1145/1541880.1541882

    Google Scholar 

  4. Rabiner, L.R.: A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proc. IEEE 77(2), 257–286 (1989)

    Article  Google Scholar 

  5. Filippov, V., Mukhanov, L., Shchukin, B.: Credit Card Fraud Detection System. Institute of Control Sciences Moscow, Russia

    Google Scholar 

  6. Sherly, K.K., Nedunchezhian, R.: Boat Adaptive Credit Card Fraud detection system. IEEE Transactions (2010)

    Google Scholar 

  7. Krug̈el, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: SAC 2002: Proceedings of the 2002 ACM Symposium on APPLIED Computing. ACM, New York (2002)

    Google Scholar 

  8. Mahoney, M.V.: Network traffic anomaly detection based on packet bytes. In: SAC 2003: Proceedings of the 2003 ACM Symposium on Applied Computing, pp. 346–350. ACM, New York (2003)

    Chapter  Google Scholar 

  9. Wang, K., Stolfo, S.J.: Anomalous Payload-Based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203–222. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Ghosh, S., Reilly, D.L.: Credit Card Fraud Detection with a Neural-Network. In: Proc. 27th Hawaii Int’l Conf. System Sciences: Information Systems: Decision Support and Knowledge-Based Systems, vol. 3, pp. 621–630 (1994)

    Google Scholar 

  11. Stolfo, S.J., Fan, D.W., Lee, W., Prodromidis, A.L., Chan, P.K.: Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results. In: Proc. AAAI Workshop AI Methods in Fraud and Risk Management, pp. 83–90 (1997)

    Google Scholar 

  12. Stolfo, S.J., Fan, D.W., Lee, W., Prodromidis, A., Chan, P.K.: Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project. In: Proc. DARPA Information Survivability Conf. and Exposition, vol. 2, pp. 130–144 (2000)

    Google Scholar 

  13. Ourston, D., Matzner, S., Stump, W., Hopkins, B.: Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks. In: Proc. 36th Ann. Hawaii Int’l Conf. System Sciences, vol. 9, pp. 334–344 (2003)

    Google Scholar 

  14. Hoang, X.D., Hu, J., Bertok, P.: A Multi-layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls. In: Proc. 11th IEEE Int’l Conf. Networks, pp. 531–536 (2003)

    Google Scholar 

  15. Sherly, K.K., Nedunchezhian, R.: BOAT adaptive credit card fraud detection system. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), December 28-29, pp. 1–7 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sasirekha, M., Sumaiya Thaseen, I., Saira Banu, J. (2012). An Integrated Intrusion Detection System for Credit Card Fraud Detection. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics