skip to main content
10.1145/3133956.3138822acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

POSTER: Actively Detecting Implicit Fraudulent Transactions

Published: 30 October 2017 Publication History

Abstract

In this work, we propose to actively detect implicit fraudulent transactions. A novel machine learning method is introduced to distinguish anomalous electronic transactions based on the historical records. The transferor will be alerted during the on-going payment when the fraud probability is recognized as large enough. Compared with elaborative rule-based approaches, our model is much more effective in fraud detection.

References

[1]
Emin Aleskerov, Bernd Freisleben, and Bharat Rao. 1997. Cardwatch: A neural network based database mining system for credit card fraud detection. In CIFEr. IEEE, 220--226.
[2]
Gerald Donald Baulier, Michael H Cahill, Virginia Kay Ferrara, and Diane Lambert. 2000. Automated fraud management in transaction-based networks. (Dec. 19 2000). US Patent 6,163,604.
[3]
Richard J Bolton and David J Hand. 2002. Statistical fraud detection: A review. Statistical science (2002), 235--249.
[4]
Richard J Bolton, David J Hand, et al. 2001. Unsupervised profiling methods for fraud detection. Credit Scoring and Credit Control VII (2001), 235--255.
[5]
R Brause, T Langsdorf, and Michael Hepp. 1999. Neural data mining for credit card fraud detection. In ICTAI. IEEE, 103--106.
[6]
Shaosheng Cao, Wei Lu, and Qiongkai Xu. 2015. Grarep: Learning graph representations with global structural information. In CIKM. ACM, 891--900.
[7]
Pedro Casas, Alessandro D'Alconzo, Giuseppe Settanni, Pierdomenico Fiadino, and Florian Skopik. 2016. POSTER:(Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data. In CCS. ACM, 1805--1807.
[8]
Tianqi Chen and Carlos Guestrin. 2016. Xgboost: A scalable tree boosting system. In SIGKDD. ACM, 785--794.
[9]
William W Cohen. 1995. Fast effective rule induction. In ICML. 115--123.
[10]
Sushmito Ghosh and Douglas L Reilly. 1994. Credit card fraud detection with a neural-network. In System Sciences, Vol. 3. IEEE, 621--630.
[11]
David J Hand. 1981. Discrimination and classification. Wiley Series in Probability and Mathematical Statistics, Chichester: Wiley, 1981 (1981).
[12]
Sanjeev Jha, Montserrat Guillen, and J Christopher Westland. 2012. Employing transaction aggregation strategy to detect credit card fraud. Expert systems with applications 39, 16 (2012), 12650--12657.
[13]
Mark J Nigrini. 1999. I've got your number. Journal of accountancy 187, 5 (1999), 79.
[14]
Raghavendra Patidar, Lokesh Sharma, et al. 2011. Credit card fraud detection using neural network. IJSCE 1, 32--38 (2011).
[15]
J Ross Quinlan. 1990. Learning logical definitions from relations. Machine learning 5, 3 (1990), 239--266.
[16]
Donald Tetro, Edward Lipton, and Andrew Sackheim. 2000. System and method for enhanced fraud detection in automated electronic credit card processing. (Aug. 1 2000). US Patent 6,095,413.
[17]
Massoud Vadoodparast, Abdul Razak Hamdan, et al. 2015. Fraudulent Electronic Transaction Detection Using Dynamic KDA Model. IJCSIS 13, 3 (2015), 90.
[18]
Christopher Whitrow, David J Hand, Piotr Juszczak, D Weston, and Niall M Adams. 2009. Transaction aggregation as a strategy for credit card fraud detection. Data Mining and Knowledge Discovery 18, 1 (2009), 30--55.

Cited By

View all
  • (2023)Themis: Detecting Anomalies from Disguised Normal Financial Activities2023 IEEE International Conference on Data Mining (ICDM)10.1109/ICDM58522.2023.00016(71-80)Online publication date: 1-Dec-2023

Index Terms

  1. POSTER: Actively Detecting Implicit Fraudulent Transactions

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
      October 2017
      2682 pages
      ISBN:9781450349468
      DOI:10.1145/3133956
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 30 October 2017

      Check for updates

      Author Tags

      1. fraudulent transaction detection
      2. machine learning
      3. transaction network

      Qualifiers

      • Poster

      Conference

      CCS '17
      Sponsor:

      Acceptance Rates

      CCS '17 Paper Acceptance Rate 151 of 836 submissions, 18%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)10
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Themis: Detecting Anomalies from Disguised Normal Financial Activities2023 IEEE International Conference on Data Mining (ICDM)10.1109/ICDM58522.2023.00016(71-80)Online publication date: 1-Dec-2023

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media