Two-Stage Credit Card Fraud Detection Using Sequence Alignment

  • Amlan Kundu
  • Shamik Sural
  • A. K. Majumdar
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4332)


A phenomenal growth in the number of credit card transactions, especially for on-line purchases, has also led to a substantial rise in fraudulent activities. Implementation of efficient fraud detection systems has thus become imperative for all credit card companies in order to minimize their losses. In real life, fraudulent transactions could be interspersed with genuine transactions and simple pattern matching techniques are not often sufficient to detect the fraudulent transactions efficiently. In this paper, we propose a hybrid approach in which anomaly detection and misuse detection models are combined. Sequence alignment is used to determine similarity of an incoming sequence of transactions to both a genuine card holder’s sequence as well as to sequences generated by a validated fraud model. The scores from these two stages are combined to determine if a transaction is genuine or not. We use stochastic models for studying the performance of the system.


Credit Card Basic Local Alignment Search Tool Fraud Detection Card Holder Credit Limit 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Global Consumer Attitude Towards Online Shopping (April 28, 2006),
  2. 2.
    Statistics for General and Online Card Fraud (April 22, 2006),
  3. 3.
    Business news on Preventing card fraud BBC NEWS (March 8, 2005),
  4. 4.
    Ghosh, S., Reilly, D.L.: Credit Card Fraud Detection with a Neural-Network. In: Proceedings of the Annual International Conference on System Science, pp. 621–630 (1994)Google Scholar
  5. 5.
    Stolfo, S.J., Fan, D.W., Lee, W., Prodromidis, A.L.: Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results. In: Proceedings of the Workshop on AI Methods in Fraud and Risk Management (1997)Google Scholar
  6. 6.
    Aleskerov, E., Freisleben, B., Rao, B.: CARDWATCH: A Neural Network Based Database Mining System for Credit Card Fraud Detection. In: Proceedings of the IEEE/IAFE, pp. 220–226 (1997)Google Scholar
  7. 7.
    Fan, W., Prodromidis, A.L., Stolfo, S.J.: Distributed Data Mining in Credit Card Fraud Detection. In: Proceedings of IEEE Intelligent Systems, pp. 67–74 (1999)Google Scholar
  8. 8.
    Brause, R., Langsdorf, T., Hepp, M.: Neural Data Mining for Credit Card Fraud Detection. In: International Conference on Tools with Articial Intelligence, pp. 103–106 (1999)Google Scholar
  9. 9.
    Chiu, C., Tsai, C.: A Web Services-Based Collaborative Scheme for Credit Card Fraud Detection. In: Proceedings of the IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 177–181 (2004)Google Scholar
  10. 10.
    Phua, C., Lee, V., Smith, K., Gayler, R.: A Comprehensive Survey of Data Mining-based Fraud Detection Research. In: Proceedings of the Articial Intelligence (2005)Google Scholar
  11. 11.
    Vatsa, V., Sural, S., Majumdar, A.K.: A Game- Theoretic Approach to Credit Card Fraud Detection. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2005. LNCS, vol. 3803, pp. 263–276. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  12. 12.
    Takeda, K.: The application of bioinformatics to network intrusion detection, Security Technology. In: 39th Annual International Conference (CCST) IEEE, pp. 130–132 (2005)Google Scholar
  13. 13.
    Coul, S., Branch, J., Szymanski, B., Breimer, E.: Intrusion Detection: A Bioinformatics Approach. In: Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC) IEEE, pp. 24–33 (2003)Google Scholar
  14. 14.
    Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology, 443–453 (1970)Google Scholar
  15. 15.
    Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. Journal of Molecular Biology, 195–197 (1981)Google Scholar
  16. 16.
    Altschul, S.F., Gish, W., Miller, W., Myers, W., Lipman, J.: Basic Local Alignment Search Tool. Journal of Molecular Biology, 403–410 (1990)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Amlan Kundu
    • 1
  • Shamik Sural
    • 1
  • A. K. Majumdar
    • 2
  1. 1.School of Information Technology 
  2. 2.Department of Computer Science & EngineeringIndian Institute of TechnologyKharagpurIndia

Personalised recommendations