Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.1.133

Effective Normalization Method for Fraud Detection Using a Decision Tree  

Park, Jae Hoon (Graduate School of Information Security, Korea University)
Kim, Huy Kang (Graduate School of Information Security, Korea University)
Kim, Eunjin (Department of International Industrial Information, Kyonggi University)
Abstract
Ever sophisticated e-finance fraud techniques have led to an increasing number of reported phishing incidents. Financial authorities, in response, have recommended that we enhance existing Fraud Detection Systems (FDS) of banks and other financial institutions. FDSs are systems designed to prevent e-finance accidents through real-time access and validity checks on client transactions. The effectiveness of an FDS depends largely on how fast it can analyze and detect abnormalities in large amounts of customer transaction data. In this study we detect fraudulent transaction patterns and establish detection rules through e-finance accident data analyses. Abnormalities are flagged by comparing individual client transaction patterns with client profiles, using the ruleset. We propose an effective flagging method that uses decision trees to normalize detection rules. In demonstration, we extracted customer usage patterns, customer profile informations and detection rules from the e-finance accident data of an actual domestic(Korean) bank. We then compared the results of our decision tree-normalized detection rules with the results of a sequential detection and confirmed the efficiency of our methods.
Keywords
Fraud Detection System; Banking System; e-finance accident; Decision Tree; Normalization;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Dr. Howard Rubin, "Economics of Computing -The Internal Combustion Mainframe [Expanded Version]," Technology Economics, pp.1-2, 2010.
2 The Phishing Fraud Occurrence and Damage Reimbursement Status, the Financial Supervisory Service, May. 2014.
3 The Electronic Financial Transaction Act Article 9, May. 2013.
4 Financial Security Comprehensive Plan, the Financial Services Commission, Nov. 2013.
5 The Electronic Banking Fraud Prevention Service Enforcement, Sep. 2014.
6 Financial Security Researchers, Fraud Detction System Technical Guide , Aug. 2014.
7 The 3rd revised text for X.sap-7: Technical capabilities of fraud detection and response for services with high assurance level requirements (TD0250), Apr. 2013.
8 Busan Financial News, http://busan.fnnews.com/news/201410091642138054
9 Herald Business, http://biz.heraldcorp.com/view.php?ud=20141007000984
10 ChosunBiz, http://biz.chosun.com/site/data/html_dir/2014/05/24/2014052401547.html
11 Digital Daily, http://www.ddaily.co.kr/news/article.html?no=111498
12 Digital Daily, http://www.ddaily.co.kr/cloud/news/article.html?no=122299
13 E. Ngai, et al. "The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature," Decision Support Systems vol. 50, no. 3, pp. 559-569, 2011.   DOI
14 S. Jha, et al. "Employing transaction aggregation strategy to detect credit card fraud." Expert systems with applications vol. 39, no. 16, pp. 12650-12657, May. 2012.   DOI
15 Shen Aihua, "Application of Classification Models on Credit Card Fraud Detection," International Conference on Service Systems and Service Management, Jun. 2007.
16 C. Whitrow, et al. "Transaction aggregation as a strategy for credit card fraud detection," Data Mining and Knowledge Discovery, vol. 18, no. 1, pp. 30-55, 2009.   DOI
17 J.S. Kim, "Trading for over phishing detection assay fraud prevention," Information Security Journal, 23(6), pp. 41-48, Dec. 2013.
18 J.H. Jang, "A Study on Fraud Detection Technique using Financial Transaction Analysis in Internet Banking," Chung-ang Univ., Feb. 2012.
19 J.T.S. Quah and M. Sriganesh, "Real-time credit card fraud detection using computational intelligence," Expert systems with applications, vol. 35, no. 4, pp. 1721-1732, Dec. 2007.   DOI
20 Hojin Seo, Eunjin Kim, and Huy Kang Kim. "A novel biometric identification based on a users input pattern analysis for intelligent mobile devices," International Journal of Advanced Robotic Systems, Sep. 2012.
21 WEKA 3.6.11 : Data Mining Software in Java,[Online]. Available: http://www.cs.waikato.ac.nz/ml/weka/
22 Path lengths and CPU time, http://www-01.ibm.com/support/knowledgecenter/#!/SSAUTT_4.1.0/com.ibm.db2tools.anl41.doc.ug/topics/anluc_pathcputime.htm