Design of an artificial immune system as a novel anomaly detector for combating financial fraud in the retail sector

作者: Jungwon Kim , A. Ong , R.E. Overill

DOI: 10.1109/CEC.2003.1299604

关键词: Computer securityArtificial immune systemAnomaly detectionClonal selectionProcess (computing)Immune systemScalabilityAntigenData miningTransaction dataComputer scienceTransaction processing

摘要: … about potential or actual frauds. This requires the retail sector to employ an anomaly detection approach to fraud detection. To detect anomalies in retail transactions, the fraud detection …

参考文章(16)
David M. Chess, John F. Morar, William C. Arnold, Steve R. White, Morton Swimmer, Edward J. Pring, Anatomy of a Commercial-Grade Immune System ,(1999)
Steven A. Hofmeyr, Stephanie Forrest, Immunology as Information Processing ,(2001)
Ramakrishnan Srikant, Rakesh Agrawal, Fast algorithms for mining association rules very large data bases. pp. 580- 592 ,(1998)
Lauren M. Sompayrac, How the immune system works ,(1999)
Peter J. Bentley, Jungwon Kim, An evaluation of negative selection in an artificial immune system for network intrusion detection genetic and evolutionary computation conference. pp. 1330- 1337 ,(2001)
Modupe Ayara, Jon Timmis, Rogério de Lemos, Leandro N. de Castro, Ross Duncan, Negative Selection: How to Generate Detectors Unversity of Kent. ,(2002)
Farhad Hussain, Huan Liu, Einoshin Suzuki, Hongjun Lu, Exception Rule Mining with a Relative Interestingness Measure pacific asia conference on knowledge discovery and data mining. ,vol. 1805, pp. 86- 97 ,(2000) , 10.1007/3-540-45571-X_11
Leandro N. De Castro, Jonathan Timmis, Artificial Immune Systems: A New Computational Intelligence Approach ,(2002)
Wenke Lee, Salvatore J. Stolfo, A framework for constructing features and models for intrusion detection systems ACM Transactions on Information and System Security. ,vol. 3, pp. 227- 261 ,(2000) , 10.1145/382912.382914
F. Esponda, S. Forrest, P. Helman, A formal framework for positive and negative detection schemes systems man and cybernetics. ,vol. 34, pp. 357- 373 ,(2004) , 10.1109/TSMCB.2003.817026