Skip to main content

Advertisement

Log in

On XCSR for electronic fraud detection

  • Special Issue
  • Published:
Evolutionary Intelligence Aims and scope Submit manuscript

Abstract

Fraud is a serious problem that costs the worldwide economy billions of dollars annually. However, fraud detection is difficult as perpetrators actively attempt to mask their actions, among typically overwhelming large volumes of, legitimate activity. In this paper, we investigate the fraud detection problem and examine how learning classifier systems can be applied to it. We describe the common properties of fraud, introducing an abstract problem which can be tuned to exhibit those characteristics. We report experiments on this abstract problem with a popular real-time learning classifier system algorithm; results from our experiments demonstrating that this approach can overcome the difficulties inherent to the fraud detection problem. Finally we apply the algorithm to a real-world problem and show that it can achieve good performance in this domain.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Australian Bureau of Statistics (2008) Personal fraud, 2007. Tech. Rep. 4528.0, Australian Bureau of Statistics

  2. Bacardit J, Bernadó-Mansilla E, Butz MV (2008) Learning classifier systems: looking back and glimpsing ahead. In: 10th international workshop on learning classifier systems, Springer, Berlin, pp 1–21

  3. Bull L (2004) Applications of learning classifier systems. Springer, Berlin

    MATH  Google Scholar 

  4. Bull L (2004) Learning classifier systems: a brief introduction. Applications of Learning Classifier Systems pp 3–14

  5. Butz MV, Wilson SW (2000) An algorithmic description of XCS. Tech. Rep. 2000017, Illinois Genetic Algorithms Laboratory

  6. Dam HH (2008) A scalable evolutionary learning classifier system for knowledge discovery in stream data mining. PhD thesis, University of New South Wales—Australian Defence Force Academy

  7. Dudley J, Barone L, While L (2008) Multi-objective spam filtering using an evolutionary algorithm. In: Congress on evolutionary computation, pp 123–130

  8. Duman E, Ozcelik MH (2011) Detecting credit card fraud by genetic algorithm and scatter search. Expert Syst Appl 38(10):13,057–13,063

    Article  Google Scholar 

  9. Fawcett T, Haimowitz I, Provost F, Stolfo S (1998) Ai approaches to fraud detection and risk management. AI Magaz 19(2):107–108

    Google Scholar 

  10. Feng Y, Zhong J, Xiong Zy, Ye Cx, Wu Kg (2007) Network anomaly detection based on DSOM and ACO clustering. In: Advances in neural networks-ISNN 2007, lecture notes in computer science, vol 4492, Springer, Berlin pp 947–955

  11. Kou Y, Lu CT, Sirwongwattana S, Huang YP (2004) Survey of fraud detection techniques. In: Networking, sensing and control, 2004 IEEE international conference on, vol 2, pp 749–754

  12. Nettleton DF, Orriols-Puig A, Fornells A (2010) A study of the effect of different types of noise on the precision of supervised learning techniques. Artif Intell Rev 33(4):275–306

    Article  Google Scholar 

  13. Nguyen TH, Foitong S, Srinil P, Pinngern O (2008) Towards adapting xcs for imbalance problems. In: PRICAI ’08, Springer, Berlin, pp 1028–1033

  14. Oda T, White T (2005) Immunity from spam: an analysis of an artificial immune system. In: 4th International conference on artificial immune systems, Springer, Berlin, pp 276–289

  15. Orriols-Puig A, Bernadó-Mansilla E (2008) Evolutionary rule-based systems for imbalanced data sets. Soft Comput 13(3):213–225

    Article  Google Scholar 

  16. Orriols-Puig A, Bernadó-Mansilla E, Goldberg DE, Sastry K, Lanzi PL (2009) Facetwise analysis of XCS for problems with class imbalances. IEEE Trans Evol Comput, submitted 3(5):1093–1119

    Article  Google Scholar 

  17. Phua C, Lee V, Smith-Miles K, Gayler R (2005) A comprehensive survey of data mining-based fraud detection research. Tech. rep., Monash University

  18. Sculley D, Wachman GM (2007) Relaxed online SVMs for spam filtering. In: 30th annual international ACM SIGIR conference on research and development in information retrieval, ACM Publishers, pp 415–422

  19. Seewald AK (2007) An evaluation of naïve Bayes variants in content-based learning for spam filtering. Int Data Anal11(5):497–524

    Google Scholar 

  20. Shafi K, Abbass HA (2007) Biologically-inspired complex adaptive systems approaches to network intrusion detection. Inform Secur Tech Rep 12(4):209–217

    Article  Google Scholar 

  21. Shafi K, Kovacs T, Abbass HA, Zhu W (2009) Intrusion detection with evolutionary learning classifier systems. Nat Comput 8(1):3–27

    Article  MathSciNet  MATH  Google Scholar 

  22. Sigaud O, Wilson SW (2007) Learning classifier systems: a survey. Soft Comput A Fusion Found Methodol Appl 11(11):1065–1078

    MATH  Google Scholar 

  23. Stolfo S, et al (1999) KDD cup 1999 dataset. UCI KDD repository. http://kdd.ics.uci.edu

  24. Stone C, Bull L (2003) For real! XCS with continuous-valued inputs. Evol Comput 11(3):299–336

    Article  Google Scholar 

  25. Tamee K, Rojanavasu P, Udomthanapong S, Pinngern O (2008) Using self-organizing maps with learning classifier system for intrusion detection. In: PRICAI ’08, Springer, Berlin, pp 1071–1076

  26. Toosi AN, Kahani M (2007) A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput Commun 30(10):2201–2212

    Article  Google Scholar 

  27. Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11,994–12,000

    Google Scholar 

  28. Urbanowicz RJ, Moore JH (2009) Learning classifier systems: a complete introduction, review, and roadmap. J Artif Evol App 2009:1–1125

    Article  Google Scholar 

  29. Vanderlooy S, Sprinkhuizen-Kuyper I, Smirnov E (2006) Reliable classifiers in ROC space. In: 15th BENELEARN machine learning conference, pp 27–36

  30. Vatsa V, Sural S, Majumdar A (2005) A game-theoretic approach to credit card fraud detection. Lect Notes Comput Sci 3803:263–276

    Article  Google Scholar 

  31. Weiss GM (2004) Mining with rarity: a unifying framework. ACM SIGKDD Explor Newslett 6(1):7–19

    Article  Google Scholar 

  32. Wilson SW (1995) Classifier fitness based on accuracy. Evol Comput 3(2):149–175

    Article  Google Scholar 

  33. Wilson SW (2000) Get real! XCS with continuous-valued inputs. In: Learning classifier systems, from foundations to applications, Springer, Berlin pp 209–222

  34. Yue D, Wu X, Wang Y, Li Y, Chu CH (2007) A review of data mining-based financial fraud detection research. In: Wireless communications, networking and mobile computing, pp 5519–5522

Download references

Acknowledgments

The first author would like to acknowledge the financial support provided by the Robert and Maude Gledden Scholarship.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Behdad.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Behdad, M., Barone, L., French, T. et al. On XCSR for electronic fraud detection. Evol. Intel. 5, 139–150 (2012). https://doi.org/10.1007/s12065-012-0076-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12065-012-0076-5

Keywords

Navigation