An Integrated Intrusion Detection System for Credit Card Fraud Detection
Computer security is one of the key areas where lot of research is being done. Many intrusion detection techniques are proposed to ensure the network security, protect network resources and network infrastructures. Intrusion detection systems (IDS) attempt to detect attacks by gathering network data and analyze the information from various areas to identify the possible intrusions. This paper proposes an IDS combining three approaches such as anomaly, misuse and decision making model to produce better detection accuracy and a decreased false positive rate. The integrated IDS can be built to detect the attacks in credit card system using Hidden Markov approach in the anomaly detection module. The credit card holder’s behaviours are taken as attributes and the anomalous transactions are found by the spending profile of the user. The transactions that are considered to be anomalous or abnormal are then sent to the misuse detection system. Here, the transactions are compared with predefined attack types and then sent to the decision making model to classify it as known/unknown type of attack. Finally, the decision-making module is used to integrate the detected results and report the types of attacks in credit card system. As abnormal transactions are analyzed carefully in each of the module, the fraud rate is reduced and system is immune to attacks.
KeywordsIntrusion detection Anomaly detection Misuse detection Hidden Markov Model
Unable to display preview. Download preview PDF.
- 1.Wang, S.-S., Yan, K.-Q., Wang, S.-C., Liu, C.-W.: An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks (2011), doi:10.1016/j.eswa.2011.05.076Google Scholar
- 2.Srivastava, A., Kundu, A., Sural, S., Majumdar, A.K.: Credit Card Fraud Detection Using Hidden Markov Model. IEEE Transactions on Dependable and Secure Computing 5(1) (January-March 2008), doi:10.1109/TDSC.2007.70228Google Scholar
- 3.Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. 41(3) (July 2009), doi:10.1145/1541880.1541882Google Scholar
- 5.Filippov, V., Mukhanov, L., Shchukin, B.: Credit Card Fraud Detection System. Institute of Control Sciences Moscow, RussiaGoogle Scholar
- 6.Sherly, K.K., Nedunchezhian, R.: Boat Adaptive Credit Card Fraud detection system. IEEE Transactions (2010)Google Scholar
- 7.Krug̈el, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: SAC 2002: Proceedings of the 2002 ACM Symposium on APPLIED Computing. ACM, New York (2002)Google Scholar
- 10.Ghosh, S., Reilly, D.L.: Credit Card Fraud Detection with a Neural-Network. In: Proc. 27th Hawaii Int’l Conf. System Sciences: Information Systems: Decision Support and Knowledge-Based Systems, vol. 3, pp. 621–630 (1994)Google Scholar
- 11.Stolfo, S.J., Fan, D.W., Lee, W., Prodromidis, A.L., Chan, P.K.: Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results. In: Proc. AAAI Workshop AI Methods in Fraud and Risk Management, pp. 83–90 (1997)Google Scholar
- 12.Stolfo, S.J., Fan, D.W., Lee, W., Prodromidis, A., Chan, P.K.: Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project. In: Proc. DARPA Information Survivability Conf. and Exposition, vol. 2, pp. 130–144 (2000)Google Scholar
- 13.Ourston, D., Matzner, S., Stump, W., Hopkins, B.: Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks. In: Proc. 36th Ann. Hawaii Int’l Conf. System Sciences, vol. 9, pp. 334–344 (2003)Google Scholar
- 14.Hoang, X.D., Hu, J., Bertok, P.: A Multi-layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls. In: Proc. 11th IEEE Int’l Conf. Networks, pp. 531–536 (2003)Google Scholar
- 15.Sherly, K.K., Nedunchezhian, R.: BOAT adaptive credit card fraud detection system. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), December 28-29, pp. 1–7 (2010)Google Scholar