Abstract
Fraud is a serious problem that costs the worldwide economy billions of dollars annually. However, fraud detection is difficult as perpetrators actively attempt to mask their actions, among typically overwhelming large volumes of, legitimate activity. In this paper, we investigate the fraud detection problem and examine how learning classifier systems can be applied to it. We describe the common properties of fraud, introducing an abstract problem which can be tuned to exhibit those characteristics. We report experiments on this abstract problem with a popular real-time learning classifier system algorithm; results from our experiments demonstrating that this approach can overcome the difficulties inherent to the fraud detection problem. Finally we apply the algorithm to a real-world problem and show that it can achieve good performance in this domain.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Australian Bureau of Statistics (2008) Personal fraud, 2007. Tech. Rep. 4528.0, Australian Bureau of Statistics
Bacardit J, Bernadó-Mansilla E, Butz MV (2008) Learning classifier systems: looking back and glimpsing ahead. In: 10th international workshop on learning classifier systems, Springer, Berlin, pp 1–21
Bull L (2004) Applications of learning classifier systems. Springer, Berlin
Bull L (2004) Learning classifier systems: a brief introduction. Applications of Learning Classifier Systems pp 3–14
Butz MV, Wilson SW (2000) An algorithmic description of XCS. Tech. Rep. 2000017, Illinois Genetic Algorithms Laboratory
Dam HH (2008) A scalable evolutionary learning classifier system for knowledge discovery in stream data mining. PhD thesis, University of New South Wales—Australian Defence Force Academy
Dudley J, Barone L, While L (2008) Multi-objective spam filtering using an evolutionary algorithm. In: Congress on evolutionary computation, pp 123–130
Duman E, Ozcelik MH (2011) Detecting credit card fraud by genetic algorithm and scatter search. Expert Syst Appl 38(10):13,057–13,063
Fawcett T, Haimowitz I, Provost F, Stolfo S (1998) Ai approaches to fraud detection and risk management. AI Magaz 19(2):107–108
Feng Y, Zhong J, Xiong Zy, Ye Cx, Wu Kg (2007) Network anomaly detection based on DSOM and ACO clustering. In: Advances in neural networks-ISNN 2007, lecture notes in computer science, vol 4492, Springer, Berlin pp 947–955
Kou Y, Lu CT, Sirwongwattana S, Huang YP (2004) Survey of fraud detection techniques. In: Networking, sensing and control, 2004 IEEE international conference on, vol 2, pp 749–754
Nettleton DF, Orriols-Puig A, Fornells A (2010) A study of the effect of different types of noise on the precision of supervised learning techniques. Artif Intell Rev 33(4):275–306
Nguyen TH, Foitong S, Srinil P, Pinngern O (2008) Towards adapting xcs for imbalance problems. In: PRICAI ’08, Springer, Berlin, pp 1028–1033
Oda T, White T (2005) Immunity from spam: an analysis of an artificial immune system. In: 4th International conference on artificial immune systems, Springer, Berlin, pp 276–289
Orriols-Puig A, Bernadó-Mansilla E (2008) Evolutionary rule-based systems for imbalanced data sets. Soft Comput 13(3):213–225
Orriols-Puig A, Bernadó-Mansilla E, Goldberg DE, Sastry K, Lanzi PL (2009) Facetwise analysis of XCS for problems with class imbalances. IEEE Trans Evol Comput, submitted 3(5):1093–1119
Phua C, Lee V, Smith-Miles K, Gayler R (2005) A comprehensive survey of data mining-based fraud detection research. Tech. rep., Monash University
Sculley D, Wachman GM (2007) Relaxed online SVMs for spam filtering. In: 30th annual international ACM SIGIR conference on research and development in information retrieval, ACM Publishers, pp 415–422
Seewald AK (2007) An evaluation of naïve Bayes variants in content-based learning for spam filtering. Int Data Anal11(5):497–524
Shafi K, Abbass HA (2007) Biologically-inspired complex adaptive systems approaches to network intrusion detection. Inform Secur Tech Rep 12(4):209–217
Shafi K, Kovacs T, Abbass HA, Zhu W (2009) Intrusion detection with evolutionary learning classifier systems. Nat Comput 8(1):3–27
Sigaud O, Wilson SW (2007) Learning classifier systems: a survey. Soft Comput A Fusion Found Methodol Appl 11(11):1065–1078
Stolfo S, et al (1999) KDD cup 1999 dataset. UCI KDD repository. http://kdd.ics.uci.edu
Stone C, Bull L (2003) For real! XCS with continuous-valued inputs. Evol Comput 11(3):299–336
Tamee K, Rojanavasu P, Udomthanapong S, Pinngern O (2008) Using self-organizing maps with learning classifier system for intrusion detection. In: PRICAI ’08, Springer, Berlin, pp 1071–1076
Toosi AN, Kahani M (2007) A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Comput Commun 30(10):2201–2212
Tsai CF, Hsu YF, Lin CY, Lin WY (2009) Intrusion detection by machine learning: a review. Expert Syst Appl 36(10):11,994–12,000
Urbanowicz RJ, Moore JH (2009) Learning classifier systems: a complete introduction, review, and roadmap. J Artif Evol App 2009:1–1125
Vanderlooy S, Sprinkhuizen-Kuyper I, Smirnov E (2006) Reliable classifiers in ROC space. In: 15th BENELEARN machine learning conference, pp 27–36
Vatsa V, Sural S, Majumdar A (2005) A game-theoretic approach to credit card fraud detection. Lect Notes Comput Sci 3803:263–276
Weiss GM (2004) Mining with rarity: a unifying framework. ACM SIGKDD Explor Newslett 6(1):7–19
Wilson SW (1995) Classifier fitness based on accuracy. Evol Comput 3(2):149–175
Wilson SW (2000) Get real! XCS with continuous-valued inputs. In: Learning classifier systems, from foundations to applications, Springer, Berlin pp 209–222
Yue D, Wu X, Wang Y, Li Y, Chu CH (2007) A review of data mining-based financial fraud detection research. In: Wireless communications, networking and mobile computing, pp 5519–5522
Acknowledgments
The first author would like to acknowledge the financial support provided by the Robert and Maude Gledden Scholarship.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Behdad, M., Barone, L., French, T. et al. On XCSR for electronic fraud detection. Evol. Intel. 5, 139–150 (2012). https://doi.org/10.1007/s12065-012-0076-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12065-012-0076-5