Skip to main content

Employing Self-Organizing Map for Fraud Detection

  • Conference paper
Artificial Intelligence and Soft Computing (ICAISC 2013)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7894))

Included in the following conference series:

Abstract

We propose a fraud detection method based on the user accounts visualization and threshold-type detection. The visualization technique employed in our approach is the Self-Organizing Map (SOM). Since the SOM technique in its original form visualizes only the vectors, and the user accounts are represented in our work as the matrices storing a collection of records reflecting the user sequential activities, we propose a method of the matrices visualization on the SOM grid, which constitutes the main contribution of this paper. Furthermore, we propose a method of the detection threshold setting on the basis of the SOM U-matrix. The results of the conducted experimental study on real data in the field of telecommunications fraud detection confirm the advantages and effectiveness of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kohonen, T.: The Self-Organizing Map. Proceedings of the IEEE 28, 1464–1480 (1990)

    Article  Google Scholar 

  2. Kohonen, T.: Self-Organized Formation of Topologically Correct Feature Maps. Biological Cybernetics 43(1), 59–69 (1982)

    Article  MathSciNet  MATH  Google Scholar 

  3. Kohonen, T.: Self-Organizing Maps, 3rd edn. Springer (2001)

    Google Scholar 

  4. Jha, S., Guillen, M., Westland, J.C.: Employing Transaction Aggregation Strategy to Detect Credit Card Fraud. Expert Systems with Applications 39, 12650–12657 (2012)

    Article  Google Scholar 

  5. Bhattacharyya, S., Jha, S., Tharakunnel, K., Westland, J.C.: Data Mining for Credit Card Fraud: A Comparative Study. Decision Support Systems 50, 602–613 (2011)

    Article  Google Scholar 

  6. Ngai, E.W.T., Hu, Y., Wong, Y.H., Chen, Y., Sun, X.: The Application of Data Mining Techniques in Financial Fraud Detection: A Classification Framework and an Academic Review of Literature. Decision Support Systems 50, 559–569 (2011)

    Article  Google Scholar 

  7. Corchado, E., Herrero, A.: Neural Visualization of Network Traffic Data for Intrusion Detection. Applied Soft Computing 11, 2042–2056 (2011)

    Article  Google Scholar 

  8. Kim, Y., Lee, S.J., Lim, J.I.: Fraud Detection for Information Reliability from the Internet in Forensic Accounting. Journal of Internet Technology 11(3), 323–331 (2010)

    Google Scholar 

  9. Ku, Y., Chen, Y., Chiu, C.: A Proposed Data Mining Approach for Internet Auction Fraud Detection. In: Yang, C.C., et al. (eds.) PAISI 2007. LNCS, vol. 4430, pp. 238–243. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. Olszewski, D.: A Probabilistic Approach to Fraud Detection in Telecommunications. Knowledge-Based Systems 26, 246–258 (2012)

    Article  Google Scholar 

  11. Farvaresh, H., Sepehri, M.M.: A Data Mining Framework for Detecting Subscription Fraud in Telecommunication. Engineering Applications of Artificial Intelligence 24(1), 182–194 (2011)

    Article  Google Scholar 

  12. Olszewski, D.: Fraud Detection in Telecommunications Using Kullback-Leibler Divergence and Latent Dirichlet Allocation. In: Dobnikar, A., Lotrič, U., Šter, B. (eds.) ICANNGA 2011, Part II. LNCS, vol. 6594, pp. 71–80. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  13. Hilas, C.S., Mastorocostas, P.A.: An Application of Supervised and Unsupervised Learning Approaches to Telecommunications Fraud Detection. Knowledge-Based Systems 21, 721–726 (2008)

    Article  Google Scholar 

  14. Bolton, R.J., Hand, D.J.: Statistical Fraud Detection: A Review. Statistical Science 17(3), 235–255 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  15. Kou, Y., Lu, C.T., Sinvongwattana, S., Huang, Y.P.: Survey of Fraud Detection Techniques. In: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control (March 2004)

    Google Scholar 

  16. Heskes, T.: Self-Organizing Maps, Vector Quantization, and Mixture Modeling. IEEE Transactions on Neural Networks 12(6), 1299–1305 (2001)

    Article  Google Scholar 

  17. Mulier, F., Cherkassky, V.: Self-Organization as an Iterative Kernel Smoothing Process. Neural Computation 7(6), 1165–1177 (1995)

    Article  Google Scholar 

  18. Taniguchi, M., Haft, M., Hollmen, J., Tresp, V.: Fraud Detection in Communications Networks Using Neural and Probabilistic Methods. In: IEEE International Conference on Acoustics Speech and Signal Processing, ICASSP 1998, vol. 2, pp. 1241–1244. IEEE (1998)

    Google Scholar 

  19. Fawcett, T.: ROC Graphs: Notes and Practical Considerations for Data Mining Researchers. Technical Report Technical Report HPL-2003-4, HP Labs (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Olszewski, D., Kacprzyk, J., Zadrożny, S. (2013). Employing Self-Organizing Map for Fraud Detection. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds) Artificial Intelligence and Soft Computing. ICAISC 2013. Lecture Notes in Computer Science(), vol 7894. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38658-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38658-9_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38657-2

  • Online ISBN: 978-3-642-38658-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics