DocumentCode :
260979
Title :
Data stream mining based resilient identity fraudulent detection
Author :
Mareeswari, V. ; Sundareswari, S.
Author_Institution :
IT Dept., Sri Manakula Vinayagar Eng. Coll., Pondicherry, India
fYear :
2014
fDate :
27-28 Feb. 2014
Firstpage :
1
Lastpage :
6
Abstract :
To propose a new safe and secure mechanism to detect identity crimes, more precisely to identify replica in credit card. The synthetic identity fraud is the practice of reliable but false identities which is easy to make but more complicated to apply on real time. Detection system contains two layers which is communal detection and spike detection. Communal detection finds real social relationships to shrink the suspicion score, and is corrupt opposed to synthetic social relationships. It is the white list-oriented approach on a fixed set of attributes. Spike detection finds spikes in duplicates to enhance the suspicion score, and is probe-resistant for attributes. It is the attribute-oriented approach on a variable-size set of attributes. Both communal detection and spike detection become aware of more types of attacks, better account for changing legal behaviour, and remove the redundant attributes. To enhance identity crime detection systems flexible to real world scenario. The response time of the detection and fraud events need to be reduced. In credit card applications the key part is constrained to Identity Crime. Active Phase Blending algorithm is to reduce the time constraints on identifying fraudulent identity usage and response time.
Keywords :
behavioural sciences; credit transactions; data mining; fraud; active phase blending algorithm; attribute-oriented approach; communal detection; credit card; data stream mining; false identity; fraud event; fraudulent identity usage; identity crime detection system; legal behaviour; redundant attribute; resilient identity fraudulent detection; response time; safe and secure mechanism; spike detection; suspicion score; synthetic identity fraud; synthetic social relationship; time constraint; Credit cards; Data mining; Educational institutions; Game theory; Games; Insurance; Measurement; Active Phase Blending algorithm; Data Mining; Identity fraud; Response time;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Communication and Embedded Systems (ICICES), 2014 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4799-3835-3
Type :
conf
DOI :
10.1109/ICICES.2014.7033914
Filename :
7033914
Link To Document :
بازگشت