2015
DOI: 10.4018/irmj.2015070101
|View full text |Cite
|
Sign up to set email alerts
|

Suspicious Behavior Detection in Debit Card Transactions using Data Mining

Abstract: The approach used in this paper is an implementation of a data mining process against real-life transactions of debit cards with the aim of detecting suspicious behavior. The framework designed for this purpose has been obtained through merging supervised and unsupervised models. First, due to unlabeled data, Twostep and Self-Organizing Map algorithms have been used in clustering the transactions. A C5.0 classification algorithm has been applied to evaluate supervised models and also to detect suspicious behav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…Much of this research focuses on detection. For example, researchers have studied malware detection (Kolter & Maloof, ; Souri & Hosseini, ), network intrusion detection (Shah, Qian, Kumar, Ali, & Alvi, ; Zhu, Premkumar, Zhang, & Chu, ), suspicious debit card transactions (Saghehei & Memariani, ), insider threat detection (Legg, Buckley, Goldsmith, & Creese, ), and phishing detection (Thabtah & Abdelhamid, ) using analytics methods. Many of these are low base rate problems, or problems in which the class of interest makes up only a small portion of the overall sample.…”
Section: Introductionmentioning
confidence: 99%
“…Much of this research focuses on detection. For example, researchers have studied malware detection (Kolter & Maloof, ; Souri & Hosseini, ), network intrusion detection (Shah, Qian, Kumar, Ali, & Alvi, ; Zhu, Premkumar, Zhang, & Chu, ), suspicious debit card transactions (Saghehei & Memariani, ), insider threat detection (Legg, Buckley, Goldsmith, & Creese, ), and phishing detection (Thabtah & Abdelhamid, ) using analytics methods. Many of these are low base rate problems, or problems in which the class of interest makes up only a small portion of the overall sample.…”
Section: Introductionmentioning
confidence: 99%