Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Transaction aggregation as a strategy for credit card fraud detection
Whitrow C., Hand D., Juszczak P., Weston D., Adams N. Data Mining and Knowledge Discovery18 (1):30-55,2009.Type:Article
Date Reviewed: Nov 5 2009

Whitrow et al. investigate the important problem of detecting fraudulent credit card transactions. A traditional approach to detecting a fraudulent transaction is based on a transaction-level classification. Another method is to consider behavioral patterns at the account level--some credit companies were relatively successful using this.

This paper proposes a methodology that is in line with transaction-based aggregation. The essence of the approach is to raise the alarm of a fraudulent transaction as soon as possible, by using accumulated information on a series of transactions for the account within a time window. The authors take this a step further by introducing a framework of transactional aggregations, so multiple classifiers can be adopted within, for example, support vector machines, k-nearest neighbors, random forests (which seem to perform better on the aggregated data), or logistic regression. There are limitations to the framework associated with aggregation window selection, but it does have some advantages over a transactional-level classification.

The power of aggregations within the time windows combined with a hidden Markov model could be especially promising; it appears to be a natural combination for the approach--aggregates drive state transitions, arriving ultimately at a healthy or fraudulent state (predominantly at the account, rather than the transaction, level). However, Whitrow et al. have not yet considered this option.

Reviewer:  Serge Berger Review #: CR137460 (1006-0640)
Bookmark and Share
  Reviewer Selected
 
 
Security (K.4.4 ... )
 
 
Classifier Design And Evaluation (I.5.2 ... )
 
 
Data Mining (H.2.8 ... )
 
 
Performance Evaluation (Efficiency And Effectiveness) (H.3.4 ... )
 
 
Database Applications (H.2.8 )
 
 
Systems And Software (H.3.4 )
 
Would you recommend this review?
yes
no
Other reviews under "Security": Date
Security fundamentals for e-commerce
Hassler V., Artech House, Inc., Norwood, MA, 2000.  409, Type: Book (9781580531085)
May 20 2002
Building firm trust online
Schoder D., Yin P. Communications of the ACM 43(12): 73-79, 2000. Type: Article
Oct 1 2001
Electronic commerce relationships: trust by design
Keen P., Ballance G., Chan S., Schrump S., Prentice Hall PTR, Upper Saddle River, NJ, 2000.  249, Type: Book (9780130170378)
Feb 1 2000
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy