• DocumentCode
    1767482
  • Title

    Surrogate techniques for testing fraud detection algorithms in credit card operations

  • Author

    Salazar, Addisson ; Safont, Gonzalo ; Vergara, Luis

  • Author_Institution
    Inst. of Telecommun. & Multimedia Applic., Univ. Politec. de Valencia, València, Spain
  • fYear
    2014
  • fDate
    13-16 Oct. 2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Banks collect large amount of historical records corresponding to millions of credit cards operations, but, unfortunately, only a small portion, if any, is open access. This is because, e.g., the records include confidential customer data and banks are afraid of public quantitative evidence of existing fraud operations. This paper tackles this problem with the application of surrogate techniques to generate new synthetic credit card data. The quality of the surrogate multivariate data is guaranteed by constraining them to have the same covariance, marginal distributions, and joint distributions as the original multivariate data. The performance of fraud detection algorithms (in terms of receiver operating characteristic (ROC) curves) using a varying proportion of real and surrogate data is tested. We demonstrate the feasibility of surrogates in a real scenario considering very low false alarm and high disproportion between legitimate and fraud operations.
  • Keywords
    banking; credit transactions; electronic commerce; fraud; sensitivity analysis; statistical distributions; ROC curves; banks; confidential customer data; covariance; credit card operations; false alarm; fraud detection algorithm testing; fraud operations; historical record collection; joint distributions; legitimate operations; marginal distributions; multivariate data; public quantitative evidence; real data; receiver operating characteristic curves; surrogate multivariate data quality; surrogate techniques; synthetic credit card data generation; Companies; Correlation; Credit cards; Histograms; Joints; Signal processing algorithms; Training; data mining; fraud detection; non-linear signal processing; pattern recognition; surrogate techniques;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security Technology (ICCST), 2014 International Carnahan Conference on
  • Conference_Location
    Rome
  • Print_ISBN
    978-1-4799-3530-7
  • Type

    conf

  • DOI
    10.1109/CCST.2014.6986987
  • Filename
    6986987