Abstract
We propose a fraud detection method based on the user accounts visualization and threshold-type detection. The visualization technique employed in our approach is the Self-Organizing Map (SOM). Since the SOM technique in its original form visualizes only the vectors, and the user accounts are represented in our work as the matrices storing a collection of records reflecting the user sequential activities, we propose a method of the matrices visualization on the SOM grid, which constitutes the main contribution of this paper. Furthermore, we propose a method of the detection threshold setting on the basis of the SOM U-matrix. The results of the conducted experimental study on real data in the field of telecommunications fraud detection confirm the advantages and effectiveness of the proposed approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kohonen, T.: The Self-Organizing Map. Proceedings of the IEEE 28, 1464–1480 (1990)
Kohonen, T.: Self-Organized Formation of Topologically Correct Feature Maps. Biological Cybernetics 43(1), 59–69 (1982)
Kohonen, T.: Self-Organizing Maps, 3rd edn. Springer (2001)
Jha, S., Guillen, M., Westland, J.C.: Employing Transaction Aggregation Strategy to Detect Credit Card Fraud. Expert Systems with Applications 39, 12650–12657 (2012)
Bhattacharyya, S., Jha, S., Tharakunnel, K., Westland, J.C.: Data Mining for Credit Card Fraud: A Comparative Study. Decision Support Systems 50, 602–613 (2011)
Ngai, E.W.T., Hu, Y., Wong, Y.H., Chen, Y., Sun, X.: The Application of Data Mining Techniques in Financial Fraud Detection: A Classification Framework and an Academic Review of Literature. Decision Support Systems 50, 559–569 (2011)
Corchado, E., Herrero, A.: Neural Visualization of Network Traffic Data for Intrusion Detection. Applied Soft Computing 11, 2042–2056 (2011)
Kim, Y., Lee, S.J., Lim, J.I.: Fraud Detection for Information Reliability from the Internet in Forensic Accounting. Journal of Internet Technology 11(3), 323–331 (2010)
Ku, Y., Chen, Y., Chiu, C.: A Proposed Data Mining Approach for Internet Auction Fraud Detection. In: Yang, C.C., et al. (eds.) PAISI 2007. LNCS, vol. 4430, pp. 238–243. Springer, Heidelberg (2007)
Olszewski, D.: A Probabilistic Approach to Fraud Detection in Telecommunications. Knowledge-Based Systems 26, 246–258 (2012)
Farvaresh, H., Sepehri, M.M.: A Data Mining Framework for Detecting Subscription Fraud in Telecommunication. Engineering Applications of Artificial Intelligence 24(1), 182–194 (2011)
Olszewski, D.: Fraud Detection in Telecommunications Using Kullback-Leibler Divergence and Latent Dirichlet Allocation. In: Dobnikar, A., Lotrič, U., Šter, B. (eds.) ICANNGA 2011, Part II. LNCS, vol. 6594, pp. 71–80. Springer, Heidelberg (2011)
Hilas, C.S., Mastorocostas, P.A.: An Application of Supervised and Unsupervised Learning Approaches to Telecommunications Fraud Detection. Knowledge-Based Systems 21, 721–726 (2008)
Bolton, R.J., Hand, D.J.: Statistical Fraud Detection: A Review. Statistical Science 17(3), 235–255 (2002)
Kou, Y., Lu, C.T., Sinvongwattana, S., Huang, Y.P.: Survey of Fraud Detection Techniques. In: Proceedings of the 2004 IEEE International Conference on Networking, Sensing & Control (March 2004)
Heskes, T.: Self-Organizing Maps, Vector Quantization, and Mixture Modeling. IEEE Transactions on Neural Networks 12(6), 1299–1305 (2001)
Mulier, F., Cherkassky, V.: Self-Organization as an Iterative Kernel Smoothing Process. Neural Computation 7(6), 1165–1177 (1995)
Taniguchi, M., Haft, M., Hollmen, J., Tresp, V.: Fraud Detection in Communications Networks Using Neural and Probabilistic Methods. In: IEEE International Conference on Acoustics Speech and Signal Processing, ICASSP 1998, vol. 2, pp. 1241–1244. IEEE (1998)
Fawcett, T.: ROC Graphs: Notes and Practical Considerations for Data Mining Researchers. Technical Report Technical Report HPL-2003-4, HP Labs (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Olszewski, D., Kacprzyk, J., Zadrożny, S. (2013). Employing Self-Organizing Map for Fraud Detection. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds) Artificial Intelligence and Soft Computing. ICAISC 2013. Lecture Notes in Computer Science(), vol 7894. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38658-9_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-38658-9_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38657-2
Online ISBN: 978-3-642-38658-9
eBook Packages: Computer ScienceComputer Science (R0)