IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 590-596

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Multilayered Identity Crime Detection System CHILSI HASAN K.C Abstract--- Identity Fraud is the most common, prevalent and costly fraud in millions of bank or other transactions. Business rules, scorecards and known fraud matching methods are used in the existing system to detect frauds. However, all these methods have certain limitations. Furthermore, the face of fraud has changed dramatically during the last few decades as technologies have changed and developed. In this system of new multilayered detection system complemented with two additional layers: communal detection (CD) and spike detection (SD). CD finds real social relationships to reduce the suspicion score. It is the whitelist - oriented approach on a fixed set of attributes. SD finds spikes in duplicates to increase the suspicion score, and is probe-resistant for attributes. It is the attribute - oriented approach on a variable-size set of attributes. CD and SD can detect more types of attacks, remove the redundant attributes, reduces the number of failures in the crime detection system. We proposed Multilayered Identity Crime Detection System (MICDS) is attribute ranking and selection without class-labels. MICDS includes two steps: In first step, MICDS requires weighing all attributes for spiky-ness to rank .The second step involves filtering some attributes with extreme weights to choose the best ones for computing each suspicion score. We have to identify whether any anomaly in the transaction based on the spending profile of the accountholder. Keywords--- security, data mining based fraud detection, data stream mining, anomaly detection, whitelist.

1. Introduction Identity Crime is defined as broadly as possible. At one extreme, synthetic identity fraud refers to the use of plausible but fictitious identities. These are effortless to create but more difficult to apply successfully. At the other extreme, real identity theft refers to illegal use of innocent people’s complete identity details. These can be harder to obtain (although large volumes of some identity data are widely available) but easier to successfully apply. In reality, identity crime can be committed with a mix of both synthetic and real identity details. Identity crime has become prominent because there is so much real identity data available on the Web, and confidential data accessible through unsecured mailboxes. It has also become easy for perpetrators to hide their true identities. This can happen in a myriad of insurance, credit, and telecommunications fraud, as well as other more serious crimes. In addition to this, identity crime is prevalent and costly in developed countries that do not have nationally registered identity numbers. Data breaches which involve lost or stolen consumers’ identity information can lead to other frauds such as tax returns, home equity, and payment card fraud. Consumers can incur thousands of dollars in out-of-pocket expenses. As in identity crime, credit application fraud has reached a critical mass of fraudsters who are highly experienced, organized, and sophisticated [7]. Their visible patterns can be different to each other and constantly change. They are persistent, due to the high financial rewards, and the risk and effort involved are minimal. Based on anecdotal observations of experienced credit application investigators, fraudsters can use software automation to manipulate particular values within an application and increase frequency of successful values. Duplicates (or matches) refer to applications which share common values. There are two types of duplicates: exact (or identical) duplicates have the all same values; near (or approximate) duplicates have some same values (or characters), some similar values with slightly altered spellings, or both. 1.1Existing System The first existing defence is made up of business rules and scorecards. In Australia, one business rule is the hundred-point physical identity check test which requires the applicant to provide sufficient point-weighted identity documents face-to-face. They must add up to at least one hundred points, where a passport is worth seventy points. Another business rule is to contact (or investigate) the applicant over the telephone or Internet. The above two business rules are highly effective, but human resource intensive. To rely less on human resources, a common business rule is to match an application’s identity number, address, or

CHILSI HASAN K.C,IJRIT

590

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 590-596

phone number against external databases. This is convenient, but the public telephone and address directories, semi-public voters’ register, and credit history data can have data quality issues of accuracy, completeness, and timeliness. The second existing defence is known fraud matching. Here, known frauds are complete applications which were confirmed to have the intent to defraud and usually periodically recorded into a blacklist. Subsequently, the current applications are matched against the blacklist. This has the benefit and clarity of hindsight because patterns often repeat themselves. However, there are two main problems in using known frauds. First, they are untimely due to long time delays, in days or months, for fraud to reveal itself, and be reported and recorded. This provides a window of opportunity for fraudsters. Second, recording of frauds is highly manual. This means known frauds can be incorrect, expensive, and difficult to obtain, and have the potential of breaching privacy [4]. 1.2 Main Challenges The main challenges for detection system are Resilience, Adaptivity and Quality Data. Resilience is the ability to degrade gracefully when under most real attacks. The basic question asked by all detection systems is whether they can achieve resilience. To do so, the detection system trades off a small degree of efficiency (degrades processing speed) for a much larger degree of effectiveness (improves security by detecting most real attacks). Adaptivity accounts for morphing fraud behaviour, as the attempt to observe fraud changes its behaviour. But what is not obvious, yet equally important, is the need to also account for changing legal (or legitimate) behaviour within a changing environment. In the banking application domain, changing legal behaviour is exhibited by communal relationships (such as rising/falling numbers of siblings) and can be caused by external events (such as introduction of organizational marketing campaigns). This means legal behaviour can be hard to distinguish from fraud behaviour. The detection system needs to exercise caution with applications which reflect communal relationships. Quality Data is highly desirable for data mining and data quality can be improved through the real-time removal of data errors (or noise). The detection system has to filter duplicates which have been re-entered due to human error or for other reasons. It also needs to ignore redundant attributes which have many missing values, and other issues. 1.3 Multiple Layers of Defence The main contribution of this paper is the demonstration of resilience, with adaptivity and quality data in real-time data miningbased detection algorithms. The first layer Communal Detection (CD): the white list-oriented approach on fixed set of attributes. To complement and strengthen CD, the second layer Spike Detection (SD): the attribute-oriented on a variable-size set of attributes. CD and SD can detect more types of attacks, remove the redundant attributes, reduces the number of failures in the crime. The SD algorithm, which specifies how much the current prediction, is influenced by past observations. These new layers will improve detection of fraudulent applications because the detection system can detect more types of attacks, better account for changing legal behaviour, and remove the redundant attributes. The CD and SD algorithms, which monitor the significant increase or decrease in amount of something important, are similar in concept to credit transactional fraud detection in banking section. These new layers are not human resource intensive. They represent patterns in a score where the higher the score for an application, the higher the suspicion of fraud (or anomaly). In this way, only the highest scores require human intervention. These two new layers, communal and spike detection do not use external databases, but only the credit application database per sec. And crucially, these two layers are unsupervised algorithms which are not completely dependent on known frauds but use them only for evaluation. Section 2 gives an overview of related work in bank application fraud detection and other domains. Section 3 presents the justifications and anatomy of the CD algorithm, followed by the SD algorithm. Section 3 considers experimental design. Section 4 concludes the paper.

2. Background Many individual data mining algorithms have been designed, implemented, and evaluated in fraud detection. Yet until now, to the best of the researchers’ knowledge, resilience of data mining algorithms in a complete detection system has not been explicitly addressed. Much work in credit application fraud detection remains proprietary and exact performance figures unpublished. For example, has ID Score-Risk which gives a combined view of each credit application’s characteristics and their similarity to other industry provided or Web identity’s characteristics. In another example [13], has Detect which provides four categories of policy rules to signal fraud, one of which is checking a new credit application against historical application data for consistency. Case-Based Reasoning (CBR) is the only known prior publication in the screening of credit applications. CBR analyses the hardest cases which have been misclassified by existing methods and techniques. Retrieval uses threshold nearest neighbour matching. Diagnosis utilizes multiple selection criteria (probabilistic curve, best match, negative selection, density selection, and default) and resolution strategies (sequential resolution default, best guess, and combined confidence) to analyze the retrieved cases. CBR has twenty percent higher true positive and true negative rates than common algorithms on credit applications. Peer

CHILSI HASAN K.C,IJRIT

591

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 590-596

Group Analysis [3] is monitors inter-account behaviour over time. It compares the cumulative mean [8] weekly amount between a target account and other similar accounts (peer group) at subsequent time points. The suspicion score is a t-statistic which determines the standardized distance from the centroid of the peer group. On credit card accounts, the time window to calculate a peer group is thirteen weeks, and the future time window is four weeks. Break Point Analysis monitors intra-account behaviour over time. It detects rapid spending or sharp increases within a single account. Accounts are ranked by the t-test. The fixed-length moving transaction window contains twenty-four transactions: the first twenty for training and the next four for evaluation on credit card accounts. Bayesian networks [9] uncover simulated anthrax attacks from real emergency department data. [11] Surveys algorithms for finding suspicious activity in time for disease outbreaks and [5] uses time series analysis to track early symptoms of synthetic anthrax outbreaks from daily sales (throat, cough, and nasal) and some grocery items (facial tissues, orange juice, and soup). Control-chart-based statistics, exponential weighted moving averages, and generalized linear models were tested on the bio-terrorism detection data and rate. 2.1 Objective The main objective of this paper is to achieve resilience by adding two new, real-time, data mining-based layers to complement the two existing non-data mining layers. These new layers will improve detection of fraudulent applications because the detection system can detect more types of attacks, better account for changing legal behaviour, and remove the redundant attributes. These new layers are not human resource intensive. They represent patterns in a score where the higher the score for an application, the higher the suspicion of fraud (or anomaly). In this way, only the highest scores require human intervention. The first layer Communal Detection (CD): the white list-oriented approach on fixed set of attributes. To complement and strengthen CD, the second layer Spike Detection (SD): the attribute-oriented on a variable-size set of attributes. CD and SD can detect more types of attacks, remove the redundant attributes, reduces the number of failures in the crime. The SD algorithm, which specifies how much the current prediction, is influenced by past observations.SD complements CD. The redundant attributes are either too sparse where no patterns can be detected, or too dense where no denser values can be found. The redundant attributes are continually filtered; only selected attributes in the form of not-too-sparse and not-too- dense attributes are used for the SD suspicion score. In this way, the exposure of the detection system to probing of attributes is reduced because only one or two attributes are adaptively selected. To account for the changing legal behaviour caused by external events, SD strengthens CD by providing attribute weights which reflect the degree of importance in attributes. The attributes are adaptive for CD in the sense that its attribute weights are continually determined. The objective of proposed system is a real-time search for patterns in a multi-layered and principled fashion, to safeguard credit applications at the first stage of the credit life cycle. When a user first get registered on server the provided details undergo some identity checks. If the user passes these checking he/she regarded as a genuine customer. Here the system blocks the fraud in earlier stages so the chances for crimes reduced. Each customer’s social relationships are analyzed; the details provided are cross matched with other customers to find out any identity matching. Nowadays social networking sites are very active this is used to find out social relations. The proposed system is highly efficient as compared to existing one. 2.2 Main Objective Features are Easily detected the identity crime. Open the account easily. Minimum time needed for the various processing. Greater efficiency. User friendliness and interactive.

3. METHODS This section is divided into two subsections to systematically explain the CD algorithm (first subsection) and the SD algorithm (last subsection). Each subsection commences with a clearer discussion about its purposes. Communal Detection (CD) Algorithm Communal Detection (CD) algorithm works in real-time by giving scores when they are exact or similar matches between categorical data; and in terms of its nine inputs, three outputs, and six steps. The first layer Communal Detection (CD): the white list-oriented approach on fixed set of attributes. CD algorithm matches the current application against a moving window of previous applications. It accounts for attribute weights which reflect the degree of importance in attributes. The CD algorithm matches all links against the whitelist to find communal relationships and reduce their link score. At the end of the current microdiscrete data stream, the CD algorithm determines the State-of- Alert (SoA) and updates one random parameter’s value such that

CHILSI HASAN K.C,IJRIT

592

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 590-596

it trades off effectiveness with efficiency, or vice versa. At the end of the current Mini-discrete data stream, it constructs the new whitelist.

9 Inputs are: Vi (current application) W number of vj (moving window) Rx,link−type (link-types in current whitelist) Tsimilarity (string similarity threshold) Tattribute (attribute threshold) η (exact duplicate filter) α (exponential smoothing factor) Tinput (input size threshold) SoA (State-of-Alert)

3 Outputs are: S (vi) (suspicion score) Same or new parameter value New whitelist

CD Algorithm Find attributes that exceed string similarity threshold; create multi-attribute links against link-types in current white-list when their duplicates’ similarity is more than attribute threshold. Using Step1’s multi-attribute links calculate single link type. Using previous applications linked to Step1, calculate average prior scores. Calculate suspicion score based on the result of Step 2 and Step 3. Through State of Art find out new or same parameter value. Determine new white-list. Spike Detection (SD) Algorithm Spike Detection (SD) algorithm works in real-time with the CD algorithm, and in terms of its six inputs, two outputs, and five steps. To complement and strengthen CD, the second layer Spike Detection (SD): the attribute-oriented on a variable-size set of attributes. CD and SD can detect more types of attacks, remove the redundant attributes, reduces the number of failures in the crime. SD complements CD. The redundant attributes are either too sparse where no patterns can be detected, or too dense where no denser values can be found.SD algorithm matches the current application’s value against a moving window of previous applications’ values. It calculates the current value’s score by integrating all steps to find spikes. Then, it calculates the current application’s score. Also, at the end of the current Mini-discrete data stream, the SD algorithm selects the attributes for the SD suspicion score, and updates the attribute weights for CD. 6 Inputs are: Vi (current application) W number of vj (moving window) t (current step) Tsimilarity (string similarity threshold) θ (time difference filter) α (exponential smoothing factor)

2 Outputs are: S(vi) (suspicion score)

CHILSI HASAN K.C,IJRIT

593

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 590-596

Wk (attribute weight)

SD Algorithm Match current value with previous values. Based on Step 1’s matches, compute current value’s score.. Calculate current application score. Find suitable SD attributes. Determine the attribute weights for CD (i.e, SD algorithm updates the attribute weights for CD).

Each customer’s social relationships are analyzed; the details provided are cross matched with other customers to find out any identity matching. Nowadays social networking sites are very active this is used to find out social relations. The proposed system is highly efficient as compared to existing one.

Fig 1.1 Architecture for Fraud Detection

4. EXPERIMENTAL RESULTS The system is very simple in design and to implement. The system requires very low system resources and the system will work in almost all configurations. To account for the changing legal behaviour caused by external events, SD (Spike Detection) strengthens CD (Communal Detection) by providing attribute weights which reflect the degree of importance in attributes. The CD-SD-resilient-best experiment shows that the CD-SD combination method works best and produces the highest performance curve. The System is expected to provide the following features.

CHILSI HASAN K.C,IJRIT

594

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 590-596

Easily detected the identity crime. Open the account easily Minimum time needed for the various processing. Greater efficiency. User friendliness and interactive. CD and SD’s Experimental Results There are about 25 raw attributes such as personal names, addresses, telephone numbers, driver licence numbers (or SSN), DOB, and other identity attributes (but no link attribute). Only nineteen of the most important identity attributes (I to XIX) are selected. All numerical attributes are treated as string attributes. Some of these identifying attributes, including names, were encrypted to preserve privacy. For our multilayer identity crime detection data, its encrypted attributes are limited to exact matching because the particular encryption method was made known to us. The impact of fewer known frauds means algorithms will produce poorer results and lead to incorrect evaluation. To reduce this negative impact and improve scalability, the data has been rebalanced by retaining all known frauds but randomly under-sampling unknown applications by ninety percent. The data quality was enhanced through the cleaning of two obvious data errors. First, slightly more than ten percent of all applications were filtered. This was because some important unstructured attributes were encrypted into just one value. Also, several “dummy” applications, comprising less than two percent of all applications, were filtered. They were actually test values. After the above data pre-processing activities, the actual experimental data provided significantly improved results. This was observed using the parameter settings in CD and SD. These results have been omitted to focus on the results from CD and SD parameter settings and attributes. In addition, the CD, SD, and classification algorithms use eight few data out of 25 data (each data is also known as a Mini-discrete stream) where known frauds are not significantly understated. For creating whitelist, selecting attributes, or setting attribute weights in the next user data, the training set is the previous user details. For evaluation, the test set is the current user data. Both training and test datasets are separate from each other. For example, in CD, the initial whitelist is constructed from training data, applied to test data; and so on, until the final whitelist is constructed from last training data, and applied to final test data.

5. CONCLUSION The main focus of this paper is Multilayered Resilient Identity Crime Detection System (MICDS); in other words, the real-time search for patterns in a multi-layered and principled fashion, to safeguard credit applications at the first stage of the credit life cycle. This paper describes an important domain that has many problems relevant to other data mining research. It has documented the development and evaluation in the data mining layers of defence for a real-time credit application fraud detection system. In doing so, this research produced three concepts (or “force multipliers”) which dramatically increase the detection system’s effectiveness (at the expense of some efficiency). These concepts are resilience (multi-layer defence), adaptivity (accounts for changing fraud and legal behaviour), and quality data (real-time removal of data errors). These concepts are fundamental to the design, implementation, and evaluation of all fraud detection, adversarial-related detection, and identity crime-related detection systems. The implementation of CD and SD algorithms is practical because these algorithms are designed for actual use to complement the existing detection system.

6. References [1] Bifet A and Kirkby R, “Massive Online Analysis”, Technical Manual, University of Waikato, 2009. [2] Clifton, Kate Smith Miles, “Vincent Leel, Resilient Identity Crime Detection”, Vol. 24 No.3, 2012. [3] Bolton, R. and Hand. D, “Unsupervised Profiling Methods for Fraud Detection”, Proc. of CSCC01, 2001. [4] Brockett P , Derrig R ,Golden L ,Levine A and Alpert M, “Fraud Classification using Principal Component Analysis of RIDITs”, The Journal of Risk and Insurance, 2002. [5] Goldenberg A, Shmueli G and Caruana R,”Using Grocery Sales Data for the Detection of Bio-Terrorist Attacks”, Statistical Medicine, 2002. [6] G Anil Kumar, D Venkatesh, Kante Rames H B, “Credit Crime Detection By Using Multilayer System”, pp. 10-11, 2013. [7] Gordon G, Rebovich D, Choo K and Gordon J ,”Identity Fraud Trends and Patterns: Building a Data-Based Foundation for Proactive Enforcement”, Center for Identity Management and Information Protection, Utica College,2007. [8] Hutwagner L, Thompson W, Seeman G, Treadwell T,”The Bioterrorism Preparedness and Response Early Aberration Reporting System (EARS)”, Journal of Urban Health 80: pp. 89-96, 2006.

CHILSI HASAN K.C,IJRIT

595

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 590-596

[9] Wong W, Moore A, Cooper G and Wagner M ,”Bayesian Network Anomaly Pattern Detection for Detecting Disease Outbreaks”, Proc. of ICML03. ISBN: 1-57735-189-4, 2003. [10] Witten I and Frank E, “Data Mining: Practical Machine Learning Tools and Techniques with Java”, Morgan Kauffman Publishers, San Francisco. ISBN-10: 1558605525, 2000. [11] Wong W,”Data Mining for Early Disease Outbreak Detection”, PhD thesis, Carnegie Mellon University, 2004. [12] Cortes C, Pregibon D and Volinsky C, “Computational methods for dynamic graphs”, Journal of Computational and Graphical Statistics 12, 2003.. [13] Experian, Experian Detect: Application Fraud Prevention System.Whitepaper,2008. http://www.experian.com/products/pdf/experian detect.pdf. [14] Fawcett T,”An Introduction to ROC Analysis”, Pattern Recognition Letters 27: pp. 861-874. DOI: 10.1016/j.patrec.2005.10.010., 2006.

CHILSI HASAN K.C received her B.Tech in Computer Science & Engg from Calicut University, Kerala and currently pursuing M.Tech in Computer Science & Engg Calicut University, Kerala. Her research interest are Data security, Network security, Image processing. (E-mail id:[email protected])

CHILSI HASAN K.C,IJRIT

596

Multilayered Identity Crime Detection System

Keywords--- security, data mining based fraud detection, data stream mining, anomaly .... are similar in concept to credit transactional fraud detection in banking ... justifications and anatomy of the CD algorithm, followed by the SD algorithm.

80KB Sizes 0 Downloads 280 Views

Recommend Documents

Resilient Identity Crime Detection
All experiments were performed on a dedicated 2 Xeon. Quad Core (8 2.0GHz CPUs) and 12 Gb RAM server, running on Windows Server 2008 platform.

Data Mining in Resilient Identity Crime Detection ...
2.2.2 Key Ideas . .... 7.2.3 Web-based Identity Crime Detection . . . . . . . . . . . . . . 78 .... application fraud: business rules and scorecards, and known fraud matching. The ... University's (SNU) data mining laboratory to exchange security ide

Leak detection system
Sep 12, 1988 - a series of precisely-aligned and formed spiral grooves that cooperate with several parallel helical grooves formed in the stator. The use of the ...

Phishing Detection System
various features such as HTML Email, IP-based URL, no of domains used,age ... E. Classifying Phishing Emails Using Confidence-Weighted Linear Classifiers.

Biometric Identity Management System - UNHCR
In February 2015, DPSM and the. Division of Information Systems and. Telecommunications (DIST) completed development of UNHCR's new biometric identity ...

Intruder detection and warning system
(22) Filed: Feb. 4, 2010. (57). ABSTRACT. Related U's' Patent Documents. An intruder detection and warning system has a plurality of. Reissue 0ft infrared ...

Intruder detection and warning system
Feb 4, 2010 - 6,943,685 B2* 9/2005 Seo ............................. .. 340/541 ... (21) Appl- NO-1 12/700'241. (74) Attorney, Agent, or Firm 4 Bacon & Thomas, PLLC.

Host based Attack Detection using System Calls
Apr 3, 2012 - This calls for better host based intrusion detection[1]. ... Intrusion detection is the process of monitoring the events occurring in a ... System Call in Linux ... Rootkits[2] are a set of software tools used by an attacker to gain.

Deadlock Detection & Deadlock Prevention of Distributed System
deadlock detection and prevention approaches for distributed database. ... aspects of distributed systems, they are harder to detect, avoid, and prevent.

Communal Detection of Implicit Personal Identity Streams
... and each day, a few hundred thousand applications and more than ten thousand ..... ideas from whitelist-based spam filtering, social network analysis [5; 10] ...

pdf-0944\system-management-planning-enterprise-identity-and ...
... apps below to open or edit this item. pdf-0944\system-management-planning-enterprise-identi ... nd-edition-systems-engineering-by-jeffrey-o-grady.pdf.

Design of Multilayered Stack Antenna for Wireless Communication
In Today's technology of wireless communication requires small, portable and low ... communication services for various commercial and military applications.

An Extensive Intrusion Detection System Incorporating ...
tools, methods and resources to help identify, assess and report ... Also, according to www.wikipedia.com, an intrusion detection .... A large electro-magnet is mounted on the door .... intelligent, distributed java agents and data mining to learn ..

Multi sensor detection, stall to stop and lock disabling system
6 Jun 2008 - See application ?le for complete search history. (56). References Cited ... US RE43,990 E. Page 2. US. PATENT DOCUMENTS. 6,923,509 B1. 8/2005 Barnett. 6,980,092 B2 12/2005 Turnbull et al. 6,988,026 B2* 1/2006 Breed et al. ..... original

Design and Implement Online SQL Injection Detection System Based ...
There was a problem previewing this document. ... Design and Implement Online SQL Injection Detection System Based on Query Signature.pdf. Design and ...

Enhanced Group Signature Based Intruder Detection System ... - IJRIT
Keywords- Digital signature, digital signature algorithm (DSA), Enhanced Group Signature Based Intruder Detection System (EGIDS), Mobile. Ad hoc NETwork ...

A Piggyback System for Joint Entity Mention Detection ...
We release to the public the GERDAQ evaluation data- set for A2W. GERDAQ .... competition dataset, which consists of 800,000 queries. First we polished the ...

Multi sensor detection, stall to stop and lock disabling system
Jun 6, 2008 - transmits detection information to a monitoring computer terminal and transmits a .... 10, 2008, Golden Was issued a Patent (7,385,497) the “Multi sensor detection ..... device such as a laptop computer or a cell phone for trans.

Design of Multilayered Stack Antenna for Wireless Communication
IJRIT International Journal of Research in Information Technology, Volume 2, Issue ... In Today's technology of wireless communication requires small, portable ...