2001/11/27IDS Lab Seminar1 Adaptive Fraud Detection Advisor: Dr. Hsu Graduate: Yung-Chu Lin Source: Fawcett, Tom and Foster Provost, Journal of Data Mining.

Slides:



Advertisements
Similar presentations
UNIVERSITY COLLEGE DUBLIN DUBLIN CITY UNIVERSITY This material is based upon work supported by Science Foundation Ireland under Grant No. 03/IN3/1361 TEMPORAL.
Advertisements

Web Mining.
Smart Card Authentication. Outline for Today Introduction of Smart Card Authentication Different Authentication Techniques Explain Authentication Techniques.
Enhancing Security Using Mobile Based Anomaly Detection in Cellular Mobile Networks Bo Sun, Fei Yu, KuiWu, Yang Xiao, and Victor C. M. Leung. Presented.
PAPER PRESENTATION BY V.Priyanka CSE-A Roll no. 13K41A0548.
© AN ATM COUNTER.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
 Firewalls and Application Level Gateways (ALGs)  Usually configured to protect from at least two types of attack ▪ Control sites which local users.
DATA MINING CS157A Swathi Rangan. A Brief History of Data Mining The term “Data Mining” was only introduced in the 1990s. Data Mining roots are traced.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
/16/2015 9:20:53 PM 9. Role-Based Access Control (RBAC) Role Classification Algorithm Prof. Bharat Bhargava Center for Education and Research in.
Data Mining By Archana Ketkar.
September 2003 Fraud Formalization and Detection Bharat Bhargava, Yuhui Zhong, Yunhua Lu Center for Education and Research in Information Assurance and.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
seminar on Intrusion detection system
Jacinto C. Nascimento, Member, IEEE, and Jorge S. Marques
Adaptive Fraud Detection
Major Tasks in Data Preprocessing(Ref Chap 3) By Prof. Muhammad Amir Alam.
Chapter 5 Data mining : A Closer Look.
A smarter way for corporations to communicate worldwide.
Lecture 11 Intrusion Detection (cont)
TURKISH STATISTICAL INSTITUTE INFORMATION TECHNOLOGIES DEPARTMENT (Muscat, Oman) DATA MINING.
Overview of Distributed Data Mining Xiaoling Wang March 11, 2003.
Automatic Gender Identification using Cell Phone Calling Behavior Presented by David.
IT TECHNOLOGIES By :Garcia, Nikko Shawn M.. Mobile Phone Cloning How is it Done ?
GeoPKDD Geographic Privacy-aware Knowledge Discovery and Delivery Kick-off meeting Pisa, March 14, 2005.
Dr. Awad Khalil Computer Science Department AUC
FALL 2012 DSCI5240 Graduate Presentation By Xxxxxxx.
Where Are the Nuggets in System Audit Data? Wenke Lee College of Computing Georgia Institute of Technology.
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Discovering Outlier Filtering Rules from Unlabeled Data Author: Kenji Yamanishi & Jun-ichi Takeuchi Advisor: Dr. Hsu Graduate: Chia- Hsien Wu.
BUSINESS B1 Information Security.
1 A Bayesian Method for Guessing the Extreme Values in a Data Set Mingxi Wu, Chris Jermaine University of Florida September 2007.
Data Mining Approaches for Intrusion Detection Wenke Lee and Salvatore J. Stolfo Computer Science Department Columbia University.
Using Identity Credential Usage Logs to Detect Anomalous Service Accesses Daisuke Mashima Dr. Mustaque Ahamad College of Computing Georgia Institute of.
© Synergetics Portfolio Security Aspecten.
+ Adaptive Fraud Detection by Tom Fawcett and Foster Provost Tom Fawcett Foster ProvostTom Fawcett Foster Provost Presented by: David Sander.
Automatic Gain Control Response Delay and Acquisition in Direct- Sequence Packet Radio Communications Sure 2007 Stephanie Gramc Dr. Noneaker.
A Power Independent Detection (PID) Method for Ultra Wide Band Impulse Radio Networks Alaeddine EL-FAWAL Joint work with Jean-Yves Le Boudec UWB4SN 2005:
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Data Mining By Dave Maung.
POLICY ENGINE Research: Design & Language IRT Lab, Columbia University.
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
Data Mining Algorithms for Large-Scale Distributed Systems Presenter: Ran Wolff Joint work with Assaf Schuster 2003.
Adaptive Mining Techniques for Data Streams using Algorithm Output Granularity Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady Zaslavsky In Proceedings.
PHONE CLONING TECHNOLOGY
Mining A Stream of Transactions for Customer Patterns Author: Diane Lambert Advisor: Dr. Hsu Graduate: Yan-cheng Lin.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Fuzzy integration of structure adaptive SOMs for web content.
Intelligent Database Systems Lab Advisor : Dr. Hsu Graduate : Chien-Shing Chen Author : Juan D.Velasquez Richard Weber Hiroshi Yasuda 國立雲林科技大學 National.
Intelligent Database Systems Lab Presenter: CHANG, SHIH-JIE Authors: Luca Cagliero, Paolo Garza 2013.DKE. Improving classification models with taxonomy.
Predicting the Location and Time of Mobile Phone Users by Using Sequential Pattern Mining Techniques Mert Özer, Ilkcan Keles, Ismail Hakki Toroslu, Pinar.
Efficient Rule-Based Attribute-Oriented Induction for Data Mining Authors: Cheung et al. Graduate: Yu-Wei Su Advisor: Dr. Hsu.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
DATA MINING It is a process of extracting interesting(non trivial, implicit, previously, unknown and useful ) information from any data repository. The.
Adaptive Fraud Detection Paper By: Tom Fawcett And Foster Provost Presentation By: Qijun Chen.
ADAPTIVE FRAUD DETECTION by Tom Fawcett and Foster Provost Tom Fawcett Foster ProvostTom Fawcett Foster Provost Presented by: Eric DeWind.
Digital Preservation Initiatives in the United States A Summary Deanna B. Marcum.
Intelligent Database Systems Lab N.Y.U.S.T. I. M. Learning Portfolio Analysis and Mining for SCORM Compliant Environment Pattern Recognition (PR, 2010)
Data Mining – Introduction (contd…) Compiled By: Umair Yaqub Lecturer Govt. Murray College Sialkot.
Clickprints on the Web: Are there Signatures in Web Browsing Data?
Dr. Hongqin FAN Department of Building and Real Estate
User Modeling for Personal Assistant
Data Based Decision Making
CACTUS-Clustering Categorical Data Using Summaries
Adaptive Fraud Detection
Authors Bo Sun, Fei Yu, Kui Wu, Yang Xiao, and Victor C. M. Leung.
Case Study: Choosing an Exercise Mode in a Heart Rate Monitor
Presentation transcript:

2001/11/27IDS Lab Seminar1 Adaptive Fraud Detection Advisor: Dr. Hsu Graduate: Yung-Chu Lin Source: Fawcett, Tom and Foster Provost, Journal of Data Mining and Knowledge Discovery, Volume 1, Issue 3, September 1997, pp

2001/11/27IDS Lab Seminar2 Outline Motivation & objective Definition What ’ s cloning fraud Detriment of cloning fraud Strategies for dealing with cloning fraud The need to be adaptive Problems of learning algorithms The detector constructor framework How framework work Experiments Conclusion

2001/11/27IDS Lab Seminar3 Motivation Cellular fraud costs hundreds of millions of dollars per year Existing methods are ad hoc

2001/11/27IDS Lab Seminar4 Objective Presenting a framework/system for automatically generating detectors

2001/11/27IDS Lab Seminar5 Definition A customer ’ s account = MIN + ESN MIN (Mobile Identification Number) ESN (Electronic Serial Number) Bandit: a cloned phone user Carrier: the cellular service provider

2001/11/27IDS Lab Seminar6 What ’ s Cloning Fraud A customer ’ s MIN and ESN not belonging to the customer A bandit makes virtually unlimited calls The attraction of free and untraceable communication  popular

2001/11/27IDS Lab Seminar7 Detriment of Cloning Fraud Service to be denied to legitimate customers Crediting process is costly to the carrier and inconvenient to the customer Fraud incurs land-line usage charges Cellular carries must pay costs to other carriers

2001/11/27IDS Lab Seminar8 Strategies for Dealing with Cloning Fraud Pre-call methods Post-call methods User profiling

2001/11/27IDS Lab Seminar9 Pre-call Methods Requiring PIN (Personal Identification Number) PIN is entered before every call RF Fingerprinting Identifying cellular phones by their transmission characteristics Authentication A reliable and secure private-key encryption method

2001/11/27IDS Lab Seminar10 Post-call Methods Collision detection Analyzing call data for temporally overlapping calls Velocity checking Analyzing the locations and times for consecutive calls Dialed digit analysis

2001/11/27IDS Lab Seminar11 User Profiling Analyzing calling behavior to detect usage anomalies suggestive of fraud Working well with low-usage

2001/11/27IDS Lab Seminar12 The Need to Be Adaptive The patterns of fraud are dynamic Bandits constantly change their strategies The environment is dynamic in other ways

2001/11/27IDS Lab Seminar13 Problems of Learning Algorithms Context The discovery of context-sensitive fraud  which call features are important? The profiling of individual accounts  how should profiles be created? Granularity Aggregating customer behavior, smoothing out the variation Watching for coarser-grained changes that have better predictive power  when should alarms be issued?

2001/11/27IDS Lab Seminar14 The Detector Constructor Framework

2001/11/27IDS Lab Seminar15 How Framework Works

2001/11/27IDS Lab Seminar16 Learning Fraud Rules Rule generation Rule are generated locally for each account Using RL program Rule selection Most of the rules created by generating step are specific only to single accounts The rule found in ( “ covers ” ) many accounts is worth using

2001/11/27IDS Lab Seminar17 Constructing Profiling Monitors (1/3) Sensitivity to different users is accomplished Profiling phase The monitor is applied to a segment of an account ’ s typical(non-fraud) usage Use phase The monitor processes a single account- day at a time

2001/11/27IDS Lab Seminar18 Constructing Profiling Monitors (2/3) Profiling monitors are created by the monitor constructor, which employs a set of templates

2001/11/27IDS Lab Seminar19 Constructing Profiling Monitors (3/3)

2001/11/27IDS Lab Seminar20 Combining Evidence from the Monitors The outputs of the monitors are used to a standard learning program Using Linear Threshold Unit (LTU) In training, the monitors ’ outputs are presented along with the desired output The evidence combination weights the monitor outputs and learns a threshold on the sum

2001/11/27IDS Lab Seminar21 The Data Records of cellular calls placed over four months by users in the New York City area Each call is described by 31 attributes Adding 7 attributes TIME-OF-DAY etc. Each call is given a class label of legitimate or fraudulent

2001/11/27IDS Lab Seminar22 Data Selection Rule learning: 879 accounts 500,000 calls Profiling, training, testing: 3600 accounts 30 days (fraud-free)  profiling Remaining days  96,000 account-days Randomly selecting 10,000 for training 5000 for testing (20% fraud; 80% non-fraud)

2001/11/27IDS Lab Seminar23 Experiments Rule learning generated 3630 rules The rule selection process, yielded 99 rules Each of the 99 rules was used to instantiate 2 monitor templates, yielding 198 monitors The final feature selection step reduced to 7 monitors

2001/11/27IDS Lab Seminar24 Experiments

2001/11/27IDS Lab Seminar25 Conclusion Fraud behavior changes frequently, and fraud detection systems should be adaptive as well To build usage monitors we must know which aspects of customers ’ behavior to profile This framework is not specific to cloning fraud