ABSTRACT
This paper is on adaptive real-time searching of credit application data streams for identity crime with many search parameters. Specifically, we concentrated on handling our domain-specific adversarial activity problem with the adaptive Communal Analysis Suspicion Scoring (CASS) algorithm. CASS's main novel theoretical contribution is in the formulation of State-of- Alert (SoA) which sets the condition of reduced, same, or heightened watchfulness; and Parameter-of-Change (PoC) which improves detection ability with pre-defined parameter values for each SoA. With pre-configured SoA policy and PoC strategy, CASS determines when, what, and how much to adapt its search parameters to ongoing adversarial activity. The above approach is validated with three sets of experiments, where each experiment is conducted on several million real credit applications and measured with three appropriate performance metrics. Significant improvements are achieved over previous work, with the discovery of some practical insights of adaptivity into our domain.
- M. Bilenko and R. Mooney. "Adaptive Duplicate Detection using Learnable String Similarity Measures", Proc. of SIGKDD03, 2003, pp39--48. Google ScholarDigital Library
- R. Caruana and A. Niculescu-Mizil, "Data Mining in Metric Space: An Empirical Analysis of Supervised Learning Performance Criteria", Proc. of SIGKDD04, 2004, pp69--78. Google ScholarDigital Library
- L. Chen and G. Agrawal, "Supporting Self-Adaptation in Streaming Data Mining Applications", Proc. of IPDPS05, 2006, pp1--10. Google ScholarDigital Library
- P. Christen and K. Goiser, "Quality and Complexity Measures for Data Linkage and Deduplication", In F. Guillet and H. Hamilton (eds.), Quality Measures in Data Mining, Studies in Computational Intelligence, Springer, 2006.Google Scholar
- C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, Q. Zhang P. Wagle, and H. Hinton, "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks", Proc. of the 7th USENIX, 1998, pp63--78. Google ScholarDigital Library
- N. Dalvi, P. Domingos, Mausam, S. Sanghai, and D. Verma, "Adversarial Classification", Proc. of SIGKDD04, 2004, pp99--108. Google ScholarDigital Library
- J. Kleinberg, "Temporal Dynamics of On-Line Information Streams", In M. Garofalakis, J. Gehrke, and R. Rastogi (eds.), Data Stream Management: Processing High-Speed Data Streams, Springer, 2005.Google Scholar
- D. Lowd and C. Meek, "Adversarial Learning", Proc. of SIGKDD05, 2005, pp641--647. Google ScholarDigital Library
- C. Phua, R. Gayler, K. Smith-Miles, and V. Lee, "Communal Detection of Implicit Personal Identity Streams", Proc. of ICDM06 Workshop on Mining Evolving and Streaming Data, 2006. Google ScholarDigital Library
- C. Phua, V. Lee, R. Gayler, and K. Smith-Miles, "Temporal Representation in Spike Detection of Sparse Personal Identity Streams", Proc. of PAKDD06 Workshop on Intelligence and Security Informatics, 2006. Google ScholarDigital Library
- K. Ramamohanarao and J. Bailey, "Discovery of Emerging Patterns and Their Use in Classification" Proc. of Australian Conference on Artificial Intelligence, 2003, pp1--12.Google Scholar
- W. Winkler, "The State of Record Linkage and Current Research Problems", Statistics of Income Division, Internal Revenue Service Publication R99/04, 1999.Google Scholar
- K. Yoshida, F. Adachi, T. Washio, H. Motoda, T. Homma, A. Nakashima, H. Fujikawa, and K. Yamazaki, "Density-Based Spam Detector", Proc. of SIGKDD04, 2004, pp486--493. Google ScholarDigital Library
Index Terms
- Adaptive communal detection in search of adversarial identity crime
Recommendations
Resilient Identity Crime Detection
Identity crime is well known, prevalent, and costly; and credit application fraud is a specific case of identity crime. The existing nondata mining detection system of business rules and scorecards, and known fraud matching have limitations. To address ...
Black-box adversarial attacks on XSS attack detection model
AbstractCross-site scripting (XSS) has been extensively studied, although mitigating such attacks in web applications remains challenging. While there is an increasing number of XSS attack detection approaches designed based on machine ...
Adversarial Anomaly Detection Using Centroid-Based Clustering
2018 IEEE International Conference on Information Reuse and Integration (IRI)As cyber attacks are growing with an unprecedented rate in the recent years, organizations are seeking an efficient and scalable solution towards a holistic protection system. As the adversaries are becoming more skilled and organized, traditional rule ...
Comments