Skip to main content

A Synthetic Fraud Data Generation Methodology

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2513))

Included in the following conference series:

Abstract

In many cases synthetic data is more suitable than authentic data for the testing and training of fraud detection systems. At the same time synthetic data suffers from some drawbacks originating from the fact that it is indeed synthetic and may not have the realism of authentic data. In order to counter this disadvantage, we have developed a method for generating synthetic data that is derived from authentic data. We identify the important characteristics of authentic data and the frauds we want to detect and generate synthetic data with these properties.

The author is also with Telia Research AB, SE-123 86 Farsta, Sweden

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. DARPA Intrusion Detection Evaluation. http://www.ll.mit.edu/IST/ideval/ The main web page for the DARPA evaluation experiments. July 2001.

  2. JAM project homepage. http://www.cs.columbia.edu/sal/JAM/PROJECT/ July 2001.

  3. Peter Burge, John Shawe-Taylor, Yves Moreau, Bart Preneel, Christof Stoermann, and Chris Cooke. Fraud Detection and Management in Mobile Telecommunications Networks. In Proceedings of the European Conference on Security and Detection ECOS 97, pages 91–96, London, April 28–30 1997

    Google Scholar 

  4. Philip K. Chan, Wei Fan, Andreas L. Prodromidis, and Salvatore J. Stolfo. Distributed Data Mining in Credit Card Fraud Detection. IEEE Intelligent Systems, 14(6), Nov/Dec 1999.

    Google Scholar 

  5. Mandy Chung, Nicholas J. Puketza, Ronald A. Olsson, Biswanath Mukherjee. Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions. In Proceedings of the 1995 National Information Systems Security Conference, pages 173–183. Baltimore, Maryland, October 10–13 1995.

    Google Scholar 

  6. H. Debar, M. Dacier, A. Wespi, and S. Lampart. An Experimentation Workbench for Intrusion Detection Systems. Technical Report RZ2998, IBM Research Division, Zurich Research Laboratory, Zurich, Switzerland, March 1998.

    Google Scholar 

  7. Joshua Haines, Lee Rossey, Rich Lippmann, and Robert Cunnigham. Extending the 1999 Evaluation. In Proceedings of DISCEX 2001, Anaheim, CA, June 11–12 2001.

    Google Scholar 

  8. Joshua W. Haines, Richard P. Lippmann, David J. Fried, Eushiuan Tran, Steve Boswell, and Marc A. Zissman. 1999 DARPA Intrusion Detection System Evaluation: Design and Procedures. Technical Report 1062, MIT Lincoln Laboratory, February 2001.

    Google Scholar 

  9. Kristopher Kendall. A database of computer attacks for the evaluation of intrusion detection systems. Master’s thesis, MIT, 1999.

    Google Scholar 

  10. H∘akan Kvarnström, Emilie Lundin, and Erland Jonsson. Combining fraud and intrusion detection-meeting new requirements. In Proceedings of the fifth Nordic Workshop on Secure IT systems (NordSec2000), Reykjavik, Iceland, October 12–13 2000.

    Google Scholar 

  11. Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, and Kumar Das. The 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 34(4):579–595, October 2000. Elsevier Science B.V.

    Google Scholar 

  12. Roy A. Maxion, and Kymie M.C. Tan. Benchmarking Anomaly-Based Detection Systems. In International Conference on Dependable Systems and Networks, pages 623–630, New York, New York, June 2000. IEEE Computer Society Press.

    Google Scholar 

  13. John McHugh. The 1998 Lincoln Laboratory IDS Evaluation: A Critique. In Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, pages 145–161, Toulouse, France, October 2–4 2000. Lecture Notes in Computer Science #1907, Springer-Verlag, Berlin.

    Chapter  Google Scholar 

  14. Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee, and Ronald A. Olsson. A Methodology for Testing Intrusion Detection Systems. Software Engineering, 22(10):719–729, 1996.

    Article  Google Scholar 

  15. Salvatore Stolfo, Wei Fan, Andreas Prodromidis, Wenke Lee, Shelly Tselepis, and Philip K. Chan. Agent-based Fraud and Intrusion Detection in Financial Systems. Technical report, 1998. Available at: http://www.cs.columbia.edu/wfan/research.html.

  16. John W. Tukey. Exploratory Data Analysis. Addison Wesley College, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lundin, E., Kvarnström, H., Jonsson, E. (2002). A Synthetic Fraud Data Generation Methodology. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_23

Download citation

  • DOI: https://doi.org/10.1007/3-540-36159-6_23

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00164-5

  • Online ISBN: 978-3-540-36159-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics