• Title/Summary/Keyword: Fraud transaction

Search Result 70, Processing Time 0.027 seconds

A Study on the Transaction Security of Electronic Payment (전자결제의 보안성에 관한 연구)

  • 홍선의
    • The Journal of Information Technology
    • /
    • v.1 no.1
    • /
    • pp.173-188
    • /
    • 1998
  • In this paper we discussed various types of electronic payment schemes that are emerging. Threats vary from malicious hackers attempting to crash a system, to threats to data or transaction integrity. An understanding of the various types of threats can assist a security manager in selecting appropriate cost-effective controls to protect valuable information resources. An overview of many of today's common threats presented in this paper will be useful to mangers studying their own threat environments with a view toward developing solutions specific to their organization. To ensure security on the Internet, several methods have been developed and deployed. They include authentication of users and servers, encryption, and data integrity. Transaction security is critical : without it, information transmitted over the Internet is susceptible to fraud and other misuse. So computer systems represents an Intermediary with the potential to access the flow of information between a user. Security is needed to ensure that intermediaries cannot eavesdrop on transactions, or copy/modify data. Online firms must take additional precautions to prevent security breaches. To protect consumer information, they must maintain physical security of their servers and control access to software passwords and private keys. Techniques such as secret and public-key encryption and digital signatures play a crucial role in developing consumer confidence in electronic commerce.

  • PDF

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

Real Estate Transaction System in Private Blockchain Environment (프라이빗 블록체인 환경에서의 부동산 거래 시스템)

  • Kim, Seugh-Ho;Kang, Hyeok;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.11-16
    • /
    • 2022
  • Efforts to incorporate blockchain into various fields are continuing as cryptocurrency transactions become more active. Blockchain has the characteristic that once recorded facts cannot be modified or deleted. Due to these characteristics, the use in the field of recording and proving certain facts, such as voting or proof of ownership, is attracting attention. In this paper, users who want to participate in the transaction process using private blockchain, one of the types of blockchain, are divided into real estate brokers, building owners, and purchasers (lessors), and roles are assigned to each user. In addition, we would like to propose a system to increase reliability through the participation of institutions. Through this, we intend to not only present a real estate transaction system that prevents damage from real estate fraud related to false sales and fraudulent contracts, but also enhances reliability and contributes to finding ways to utilize blockchain in the future.

An Evolutionary Computing Approach to Building Intelligent Frauds Detection System

  • Kim, Jung-Won;Peter Bentley;Chol, Jong-Uk;Kim, Hwa-Soo
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.97-108
    • /
    • 2001
  • Frauds detection is a difficult problem, requiring huge computer resources and complicated search activities Researchers have struggled with the problem. Even though a fee research approaches have claimed that their solution is much better than others, research community has not found 'the best solution'well fitting every fraud. Because of the evolving nature of the frauds. a novel and self-adapting method should be devised. In this research a new approach is suggested to solving frauds in insurance claims credit card transaction. Based on evolutionary computing approach, the method is itself self-adjusting and evolving enough to generate a new self of decision-makin rules. We believe that this new approach will provide a promising alternative to conventional ones, in terms of computation performance and classification accuracy.

  • PDF

A Secure Credit Card Transaction Method Based on Kerberos

  • Kim, Jung-Eun;Kim, Yoo-Hwan
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.51-70
    • /
    • 2011
  • This paper introduces a new credit card payment scheme called No Number Credit Card that can significantly reduce the possibility of credit card fraud. The proposed payment system is loosely based on Kerberos, a cryptographic framework that has stood the test of time. In No Number Credit Card, instead of card numbers, only payment tokens are exchanged between the customers and merchants. The tokens are generated based on the payment amount, payment type, client information, and merchant information. However, it does not contain the credit card number, so the merchant or a database hacker cannot acquire and illegally use any credit card numbers. The No Number Credit Card system is ideal for online e-commerce transactions and can be used with any credit card that users possess. It can be used with minor modifications to the current card payment system. We provide the principles of its operation through scenario analysis, a sample implementation, and a security analysis

An Evolutionary Computing Approach to Building Intelligent Frauds Detection Systems

  • Kim, Jung-Won;Peter Bentley;Park, Jong-Uk
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.06a
    • /
    • pp.293-304
    • /
    • 2001
  • frauds detection is a difficult problem, requiring huge computer resources and complicated search activities. researchers have struggled with the problem. Even though a flew research approaches have claimed that their solution is much bettor than others, research community has not found 'the best solution'well fitting every fraud. Because of the evolving nature of the frauds, a Revel and self-adapting method should be devised. In this research a new approach is suggested to solving frauds in insurance claims and credit card transaction. Based on evolutionary computing approach, the method is itself self-adjusting and evolving enough to generate a new set of decision-making rules. We believe that this new approach will provide a promising alternative to conventional ones, in terms of computation performance and classification accuracy.

  • PDF

A Study on Improvement of Used-goods Market Platform Using Blockchain (블록체인을 이용한 중고거래 플랫폼 개선방안 연구)

  • Lee, Kyoung-Nam;Jeon, Gyeahyung
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.133-145
    • /
    • 2018
  • This study was investigated the necessity and possibility of using block-chain technology in online used-goods trading platform. Current online used-goods trading platforms operate a safety trading system, but it is difficult to utilize due to relatively high commission rate. As a result, people mainly use the method of meeting and purchasing in person, which is a relatively costly method. This study discusses how to build a platform to solve or mitigate problems such as privacy, information distortion and omission, fraud, etc. In the platform proposed in this study, it is possible to solve the major fraud and personal information protection problems that may occur in the transaction proceeding by appropriately reflecting the types and characteristics of the block-chain technology. In future work, we will discuss legal framework and technology development plan to apply the proposed platform in this study.

An Offline Electronic Payment System Based on an Untraceable Blind Signature Scheme

  • Kutubi, Md. Abdullah Al Rahat;Alam, Kazi Md. Rokibul;Tahsin, Rafaf;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2628-2645
    • /
    • 2017
  • This paper proposes a new offline electronic payment (e-payment) system that satisfies the major security requirements of e-payment, i.e. anonymity, unlinkability, unforgeability, double spending control, conditional traceability, and fraud prevention. The central idea is the use of Hwang et al.'s RSA-based untraceable blind signature (BS), which disables the link between the e-coin and its owner and ensures the anonymity of both the customer and the merchant. It attaches an expiration, a deposit and the transaction dates to each e-coin in order to manage the database of the bank effectively, to correctly calculate the interest on the e-coin and to aid arbitration if a dishonest customer attempts to double-spend the coin. It also ensures the anonymity of the customer as long as the coin is spent legitimately. Only when a fraudulent e-coin transaction is detected can the bank, with the help of the central authority (a trusted entity), determine the identity of the dishonest customer. The system is referred to as offline since the bank does not need to be concurrently involved in transactions between a customer and a merchant. Finally, analyses of the performance of the prototype and the primary security requirements of the proposed system are also presented.

Why Should I Ban You! : X-FDS (Explainable FDS) Model Based on Online Game Payment Log (X-FDS : 게임 결제 로그 기반 XAI적용 이상 거래탐지 모델 연구)

  • Lee, Young Hun;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.25-38
    • /
    • 2022
  • With the diversification of payment methods and games, related financial accidents are causing serious problems for users and game companies. Recently, game companies have introduced an Fraud Detection System (FDS) for game payment systems to prevent financial incident. However, FDS is ineffective and cannot provide major evidence based on judgment results, as it requires constant change of detection patterns. In this paper, we analyze abnormal transactions among payment log data of real game companies to generate related features. One of the unsupervised learning models, Autoencoder, was used to build a model to detect abnormal transactions, which resulted in over 85% accuracy. Using X-FDS (Explainable FDS) with XAI-SHAP, we could understand that the variables with the highest explanation for anomaly detection were the amount of transaction, transaction medium, and the age of users. Based on X-FDS, we derive an improved detection model with an accuracy of 94% was finally derived by fine-tuning the importance of features that adversely affect the proposed model.

The problems regarding negotiation of an Acceptance and Deferred Payment Credit under the UCP 600 (UCP 600 적용상 인수 및 연지급신용장 매입에 관한 문제점)

  • Kim, Jong-Rack;Yang, Eui-Dong
    • International Commerce and Information Review
    • /
    • v.11 no.3
    • /
    • pp.287-309
    • /
    • 2009
  • There were many changes regarding Negotiation of document under UCP 600. First of all, the definition of Negotiation was changed. The UCP 500 stated "Negotiation means the giving of value for drafts and documents by the bank authorized to negotiation", but the UCP 600 defines "negotiation" as following "negotiation means the purchase by the nominated bank of drafts and/or documents under a complying presentation". Under the UCP 600 the meaning of negotiation was more clear than UCP 500. Second UCP 600 permits all deferred payment credits be discountable or negotiable. This amended rule equated the deferred payment credit with banker's acceptance credit which was contrary with the nature and the practice of former deferred payment credit transaction. Third, UCP 600 has also provided for reimbursement rights for nominated banks and a conceptual basis for protecting nominated banks against beneficiary fraud. In this paper, the problems regarding negotiation of document under UCP600 was studied and the solutions for the problems occurring in appling UCP 600 in practical field was provided.

  • PDF