An Integrated Intrusion Detection System for Credit Card Fraud Detection

  • M. Sasirekha
  • I. Sumaiya Thaseen
  • J. Saira Banu
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)


Computer security is one of the key areas where lot of research is being done. Many intrusion detection techniques are proposed to ensure the network security, protect network resources and network infrastructures. Intrusion detection systems (IDS) attempt to detect attacks by gathering network data and analyze the information from various areas to identify the possible intrusions. This paper proposes an IDS combining three approaches such as anomaly, misuse and decision making model to produce better detection accuracy and a decreased false positive rate. The integrated IDS can be built to detect the attacks in credit card system using Hidden Markov approach in the anomaly detection module. The credit card holder’s behaviours are taken as attributes and the anomalous transactions are found by the spending profile of the user. The transactions that are considered to be anomalous or abnormal are then sent to the misuse detection system. Here, the transactions are compared with predefined attack types and then sent to the decision making model to classify it as known/unknown type of attack. Finally, the decision-making module is used to integrate the detected results and report the types of attacks in credit card system. As abnormal transactions are analyzed carefully in each of the module, the fraud rate is reduced and system is immune to attacks.


Intrusion detection Anomaly detection Misuse detection Hidden Markov Model 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Wang, S.-S., Yan, K.-Q., Wang, S.-C., Liu, C.-W.: An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks (2011), doi:10.1016/j.eswa.2011.05.076Google Scholar
  2. 2.
    Srivastava, A., Kundu, A., Sural, S., Majumdar, A.K.: Credit Card Fraud Detection Using Hidden Markov Model. IEEE Transactions on Dependable and Secure Computing 5(1) (January-March 2008), doi:10.1109/TDSC.2007.70228Google Scholar
  3. 3.
    Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. 41(3) (July 2009), doi:10.1145/1541880.1541882Google Scholar
  4. 4.
    Rabiner, L.R.: A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proc. IEEE 77(2), 257–286 (1989)CrossRefGoogle Scholar
  5. 5.
    Filippov, V., Mukhanov, L., Shchukin, B.: Credit Card Fraud Detection System. Institute of Control Sciences Moscow, RussiaGoogle Scholar
  6. 6.
    Sherly, K.K., Nedunchezhian, R.: Boat Adaptive Credit Card Fraud detection system. IEEE Transactions (2010)Google Scholar
  7. 7.
    Krug̈el, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: SAC 2002: Proceedings of the 2002 ACM Symposium on APPLIED Computing. ACM, New York (2002)Google Scholar
  8. 8.
    Mahoney, M.V.: Network traffic anomaly detection based on packet bytes. In: SAC 2003: Proceedings of the 2003 ACM Symposium on Applied Computing, pp. 346–350. ACM, New York (2003)CrossRefGoogle Scholar
  9. 9.
    Wang, K., Stolfo, S.J.: Anomalous Payload-Based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203–222. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Ghosh, S., Reilly, D.L.: Credit Card Fraud Detection with a Neural-Network. In: Proc. 27th Hawaii Int’l Conf. System Sciences: Information Systems: Decision Support and Knowledge-Based Systems, vol. 3, pp. 621–630 (1994)Google Scholar
  11. 11.
    Stolfo, S.J., Fan, D.W., Lee, W., Prodromidis, A.L., Chan, P.K.: Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results. In: Proc. AAAI Workshop AI Methods in Fraud and Risk Management, pp. 83–90 (1997)Google Scholar
  12. 12.
    Stolfo, S.J., Fan, D.W., Lee, W., Prodromidis, A., Chan, P.K.: Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project. In: Proc. DARPA Information Survivability Conf. and Exposition, vol. 2, pp. 130–144 (2000)Google Scholar
  13. 13.
    Ourston, D., Matzner, S., Stump, W., Hopkins, B.: Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks. In: Proc. 36th Ann. Hawaii Int’l Conf. System Sciences, vol. 9, pp. 334–344 (2003)Google Scholar
  14. 14.
    Hoang, X.D., Hu, J., Bertok, P.: A Multi-layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls. In: Proc. 11th IEEE Int’l Conf. Networks, pp. 531–536 (2003)Google Scholar
  15. 15.
    Sherly, K.K., Nedunchezhian, R.: BOAT adaptive credit card fraud detection system. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), December 28-29, pp. 1–7 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • M. Sasirekha
    • 1
  • I. Sumaiya Thaseen
    • 1
  • J. Saira Banu
    • 1
  1. 1.VIT UniversityVelloreIndia

Personalised recommendations