skip to main content
10.1145/1288552.1288553acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
Article

Adaptive communal detection in search of adversarial identity crime

Published:12 August 2007Publication History

ABSTRACT

This paper is on adaptive real-time searching of credit application data streams for identity crime with many search parameters. Specifically, we concentrated on handling our domain-specific adversarial activity problem with the adaptive Communal Analysis Suspicion Scoring (CASS) algorithm. CASS's main novel theoretical contribution is in the formulation of State-of- Alert (SoA) which sets the condition of reduced, same, or heightened watchfulness; and Parameter-of-Change (PoC) which improves detection ability with pre-defined parameter values for each SoA. With pre-configured SoA policy and PoC strategy, CASS determines when, what, and how much to adapt its search parameters to ongoing adversarial activity. The above approach is validated with three sets of experiments, where each experiment is conducted on several million real credit applications and measured with three appropriate performance metrics. Significant improvements are achieved over previous work, with the discovery of some practical insights of adaptivity into our domain.

References

  1. M. Bilenko and R. Mooney. "Adaptive Duplicate Detection using Learnable String Similarity Measures", Proc. of SIGKDD03, 2003, pp39--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Caruana and A. Niculescu-Mizil, "Data Mining in Metric Space: An Empirical Analysis of Supervised Learning Performance Criteria", Proc. of SIGKDD04, 2004, pp69--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Chen and G. Agrawal, "Supporting Self-Adaptation in Streaming Data Mining Applications", Proc. of IPDPS05, 2006, pp1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. P. Christen and K. Goiser, "Quality and Complexity Measures for Data Linkage and Deduplication", In F. Guillet and H. Hamilton (eds.), Quality Measures in Data Mining, Studies in Computational Intelligence, Springer, 2006.Google ScholarGoogle Scholar
  5. C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, Q. Zhang P. Wagle, and H. Hinton, "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks", Proc. of the 7th USENIX, 1998, pp63--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. N. Dalvi, P. Domingos, Mausam, S. Sanghai, and D. Verma, "Adversarial Classification", Proc. of SIGKDD04, 2004, pp99--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Kleinberg, "Temporal Dynamics of On-Line Information Streams", In M. Garofalakis, J. Gehrke, and R. Rastogi (eds.), Data Stream Management: Processing High-Speed Data Streams, Springer, 2005.Google ScholarGoogle Scholar
  8. D. Lowd and C. Meek, "Adversarial Learning", Proc. of SIGKDD05, 2005, pp641--647. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Phua, R. Gayler, K. Smith-Miles, and V. Lee, "Communal Detection of Implicit Personal Identity Streams", Proc. of ICDM06 Workshop on Mining Evolving and Streaming Data, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Phua, V. Lee, R. Gayler, and K. Smith-Miles, "Temporal Representation in Spike Detection of Sparse Personal Identity Streams", Proc. of PAKDD06 Workshop on Intelligence and Security Informatics, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. Ramamohanarao and J. Bailey, "Discovery of Emerging Patterns and Their Use in Classification" Proc. of Australian Conference on Artificial Intelligence, 2003, pp1--12.Google ScholarGoogle Scholar
  12. W. Winkler, "The State of Record Linkage and Current Research Problems", Statistics of Income Division, Internal Revenue Service Publication R99/04, 1999.Google ScholarGoogle Scholar
  13. K. Yoshida, F. Adachi, T. Washio, H. Motoda, T. Homma, A. Nakashima, H. Fujikawa, and K. Yamazaki, "Density-Based Spam Detector", Proc. of SIGKDD04, 2004, pp486--493. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Adaptive communal detection in search of adversarial identity crime

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              DDDM '07: Proceedings of the 2007 international workshop on Domain driven data mining
              August 2007
              65 pages
              ISBN:9781595938466
              DOI:10.1145/1288552
              • General Chair:
              • Philips Yu

              Copyright © 2007 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 12 August 2007

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Upcoming Conference

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader