• 제목/요약/키워드: fraud detection

검색결과 128건 처리시간 0.025초

온라인 경매에서의 신용카드 허위거래 탐지 요인에 대한 실증 연구 (An Empirical Study on the Detection of Phantom Transaction in Online Auction)

  • 채명신;조형준;이병태
    • 경영과학
    • /
    • 제21권2호
    • /
    • pp.273-289
    • /
    • 2004
  • Although the Internet is useful for transferring information, Internet auction environments make fraud more attractive to offenders, because the chance of detection and punishment is decreased. One of these frauds is the phantom transaction, which is a colluding transaction by the buyer and seller to commit the illegal discounting of a credit card. They pretend to fulfill the transaction paid by credit card, without actually selling products, and the seller receives cash from the credit card corporations. Then the seller lends it out with quite a high interest rate to the buyer, whose credit rating is so poor that he cannot borrow money from anywhere else. The purpose of this study is to empirically investigate the factors necessary to detect phantom transactions in an online auction. Based upon studies that have explored the behaviors of buyers and sellers in online auctions, the following have been suggested as independent variables: bidding numbers, bid increments, sellers' credit, auction lengths, and starting bids. In this study. we developed Internet-based data collection software and collected data on transactions of notebook computers, each of which had a winning bid of over W one million. Data analysis with a logistic regression model revealed that starting bids, sellers' credit, and auction length were significant in detecting the phantom transactions.

An Evolutionary Computing Approach to Building Intelligent Frauds Detection System

  • Kim, Jung-Won;Peter Bentley;Chol, Jong-Uk;Kim, Hwa-Soo
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2001년도 The Pacific Aisan Confrence On Intelligent Systems 2001
    • /
    • pp.97-108
    • /
    • 2001
  • Frauds detection is a difficult problem, requiring huge computer resources and complicated search activities Researchers have struggled with the problem. Even though a fee research approaches have claimed that their solution is much better than others, research community has not found 'the best solution'well fitting every fraud. Because of the evolving nature of the frauds. a novel and self-adapting method should be devised. In this research a new approach is suggested to solving frauds in insurance claims credit card transaction. Based on evolutionary computing approach, the method is itself self-adjusting and evolving enough to generate a new self of decision-makin rules. We believe that this new approach will provide a promising alternative to conventional ones, in terms of computation performance and classification accuracy.

  • PDF

GPS를 적용한 이상금융거래탐지시스템 모델

  • 이민규;손효정;성백민;김종배
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2015년도 춘계학술대회
    • /
    • pp.219-221
    • /
    • 2015
  • 스마트폰의 확산으로 금융관련 결제는 어디서나 가능하게 되었기에 편리함이 증가하였다. 하지만, 위와 같은 편리함과 동시에 사용자의 단말이 해커의 공격에 취약하거나 분실할 경우 심각한 문제가 된다. 따라서, 위와 같은 부정행위가 있을 경우 이를 자동으로 탐지하는 시스템이 필요하다. 그러므로, 본 논문은 이러한 문제점을 고려하여 스마트폰을 이용한 금융업무를 처리할때 GPS정보를 적용한 이상금융거래탐지시스템(Fraud Detection System) 모델을 제안한다.

  • PDF

Application of Reinforcement Learning in Detecting Fraudulent Insurance Claims

  • Choi, Jung-Moon;Kim, Ji-Hyeok;Kim, Sung-Jun
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.125-131
    • /
    • 2021
  • Detecting fraudulent insurance claims is difficult due to small and unbalanced data. Some research has been carried out to better cope with various types of fraudulent claims. Nowadays, technology for detecting fraudulent insurance claims has been increasingly utilized in insurance and technology fields, thanks to the use of artificial intelligence (AI) methods in addition to traditional statistical detection and rule-based methods. This study obtained meaningful results for a fraudulent insurance claim detection model based on machine learning (ML) and deep learning (DL) technologies, using fraudulent insurance claim data from previous research. In our search for a method to enhance the detection of fraudulent insurance claims, we investigated the reinforcement learning (RL) method. We examined how we could apply the RL method to the detection of fraudulent insurance claims. There are limited previous cases of applying the RL method. Thus, we first had to define the RL essential elements based on previous research on detecting anomalies. We applied the deep Q-network (DQN) and double deep Q-network (DDQN) in the learning fraudulent insurance claim detection model. By doing so, we confirmed that our model demonstrated better performance than previous machine learning models.

건축공간 환경관리 지원을 위한 AI·IoT 기반 이상패턴 검출에 관한 연구 (A Study on Detection of Abnormal Patterns Based on AI·IoT to Support Environmental Management of Architectural Spaces)

  • 강태욱
    • 한국BIM학회 논문집
    • /
    • 제13권3호
    • /
    • pp.12-20
    • /
    • 2023
  • Deep learning-based anomaly detection technology is used in various fields such as computer vision, speech recognition, and natural language processing. In particular, this technology is applied in various fields such as monitoring manufacturing equipment abnormalities, detecting financial fraud, detecting network hacking, and detecting anomalies in medical images. However, in the field of construction and architecture, research on deep learning-based data anomaly detection technology is difficult due to the lack of digitization of domain knowledge due to late digital conversion, lack of learning data, and difficulties in collecting and processing field data in real time. This study acquires necessary data through IoT (Internet of Things) from the viewpoint of monitoring for environmental management of architectural spaces, converts them into a database, learns deep learning, and then supports anomaly patterns using AI (Artificial Infelligence) deep learning-based anomaly detection. We propose an implementation process. The results of this study suggest an effective environmental anomaly pattern detection solution architecture for environmental management of architectural spaces, proving its feasibility. The proposed method enables quick response through real-time data processing and analysis collected from IoT. In order to confirm the effectiveness of the proposed method, performance analysis is performed through prototype implementation to derive the results.

Need for internal control of public sector

  • Mohammadi, Shaban
    • 융합경영연구
    • /
    • 제3권1호
    • /
    • pp.33-39
    • /
    • 2015
  • Managers are always trying to be the best internal controls in their organizations copper approximate because they know that be effective internal control over previous systems, to fulfill the mission of the organization and minimize unexpected events will be extremely difficult. On the other hand, the existence of internal controls to increase efficiency, reduce head loss, assets and achieving a reasonable assurance of the reliability of financial statements and compliance with laws and regulations will be. Internal control, not an event, but a series of operations and activities on the basis of output. Internal controls help to achieve the goal of minimizing the problems of implementing appropriate internal controls. Internal control is an integral component of corporate governance that will provide reasonable assurance of achieving the organization's objectives. preventing, detecting errors and fraud goes to work. Responsibility for the prevention and detection of fraud and error in the public sector is the responsibility of managers. Managers of internal control and consistently applying appropriate accounting systems, this responsibility will play (Lin et al., 2011). Since the public sector organizations differ from each other, thus establishing internal controls cant be the same for all organizations and agencies of the public sector. Establish specific controls on each system to factors such as size, type of operation and organizational goals that the system is designed, it depends. On the other hand, rapid advances in information technology, the need to update internal control guidelines in relation to Create a new computer system so as to ensure that the activities of managers and effective control Should be updated if necessary.

Biometric verified authentication of Automatic Teller Machine (ATM)

  • Jayasri Kotti
    • Advances in environmental research
    • /
    • 제12권2호
    • /
    • pp.113-122
    • /
    • 2023
  • Biometric authentication has become an essential part of modern-day security systems, especially in financial institutions like banks. A face recognition-based ATM is a biometric authentication system, that uses facial recognition technology to verify the identity of bank account holders during ATM transactions. This technology offers a secure and convenient alternative to traditional ATM transactions that rely on PIN numbers for verification. The proposed system captures users' pictures and compares it with the stored image in the bank's database to authenticate the transaction. The technology also offers additional benefits such as reducing the risk of fraud and theft, as well as speeding up the transaction process. However, privacy and data security concerns remain, and it is important for the banking sector to instrument solid security actions to protect customers' personal information. The proposed system consists of two stages: the first stage captures the user's facial image using a camera and performs pre-processing, including face detection and alignment. In the second stage, machine learning algorithms compare the pre-processed image with the stored image in the database. The results demonstrate the feasibility and effectiveness of using face recognition for ATM authentication, which can enhance the security of ATMs and reduce the risk of fraud.

합성곱신경망 기반의 StyleGAN 이미지 탐지모델 (A StyleGAN Image Detection Model Based on Convolutional Neural Network)

  • 김지연;홍승아;김하민
    • 한국멀티미디어학회논문지
    • /
    • 제22권12호
    • /
    • pp.1447-1456
    • /
    • 2019
  • As artificial intelligence technology is actively used in image processing, it is possible to generate high-quality fake images based on deep learning. Fake images generated using GAN(Generative Adversarial Network), one of unsupervised learning algorithms, have reached levels that are hard to discriminate from the naked eye. Detecting these fake images is required as they can be abused for crimes such as illegal content production, identity fraud and defamation. In this paper, we develop a deep-learning model based on CNN(Convolutional Neural Network) for the detection of StyleGAN fake images. StyleGAN is one of GAN algorithms and has an excellent performance in generating face images. We experiment with 48 number of experimental scenarios developed by combining parameters of the proposed model. We train and test each scenario with 300,000 number of real and fake face images in order to present a model parameter that improves performance in the detection of fake faces.

패턴사전과 비정형성을 통한 이상치 탐지방법 적용 (Anomaly Detection via Pattern Dictionary Method and Atypicality in Application)

  • 오세홍;박종성;윤영삼
    • 센서학회지
    • /
    • 제32권6호
    • /
    • pp.481-486
    • /
    • 2023
  • Anomaly detection holds paramount significance across diverse fields, encompassing fraud detection, risk mitigation, and sensor evaluation tests. Its pertinence extends notably to the military, particularly within the Warrior Platform, a comprehensive combat equipment system with wearable sensors. Hence, we propose a data-compression-based anomaly detection approach tailored to unlabeled time series and sequence data. This method entailed the construction of two distinctive features, typicality and atypicality, to discern anomalies effectively. The typicality of a test sequence was determined by evaluating the compression efficacy achieved through the pattern dictionary. This dictionary was established based on the frequency of all patterns identified in a training sequence generated for each sensor within Warrior Platform. The resulting typicality served as an anomaly score, facilitating the identification of anomalous data using a predetermined threshold. To improve the performance of the pattern dictionary method, we leveraged atypicality to discern sequences that could undergo compression independently without relying on the pattern dictionary. Consequently, our refined approach integrated both typicality and atypicality, augmenting the effectiveness of the pattern dictionary method. Our proposed method exhibited heightened capability in detecting a spectrum of unpredictable anomalies, fortifying the stability of wearable sensors prevalent in military equipment, including the Army TIGER 4.0 system.

데이터마이닝을 이용한 건강보험 상해요인 조사 대상 선정 모형 개발 -건강보험 지역가입자 상해상병 진료건을 중심으로- (Development of the Fraud Detection Model for Injury in National Health Insurance using Data Mining -Focusing on Injury Claims of Self-employed Insured of National Health Insurance)

  • 박일수;박소정;한준태;강성홍
    • 디지털융복합연구
    • /
    • 제11권10호
    • /
    • pp.593-608
    • /
    • 2013
  • 상해상병으로 청구되는 건수가 증가함에 따라 조사 대상을 보다 정교하게 선정하여 상해요인 조사 대상을 줄이면서 환수율 및 환수금액을 올릴 수 있는 방안을 마련할 필요가 있다. 이를 위해서 2006~2011년까지의 상해요인 조사자료를 수집하여 의사결정나무 모형을 활용하여 지역가입자 상해상병 진료건에 대한 부당환수 조사대상 선정모형을 개발하였다. 최종 개발된 모형결과에 따르면, 조사대상 유형은 18개로 분류되었고, 이러한 분류결과는 실제 조사가 시행될 시, 모형을 적용하지 않았을 때 보다 최고 12.8배 높은 부당환수결정율을 나타낼 수 있을 것으로 분석되었다. 또한, 본 연구에서 개발된 조사 대상자 선정 모형을 실제 업무에 적용하기 위해서는 조사물량 대비 국민건강보험공단의 조사인력 및 운영 계획을 보다 면밀히 검토해야만 모형 적용의 효과성이 극대화 될 수 있을 것으로 판단된다.