Preview

Fraud Detection System

Powerful Essays
Open Document
Open Document
13075 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Fraud Detection System
Computer and Information Science; Vol. 7, No. 2; 2014
ISSN 1913-8989
E-ISSN 1913-8997
Published by Canadian Center of Science and Education

A Fraud Detection System Based on Anomaly Intrusion Detection
Systems for E-Commerce Applications
Daniel Massa1 & Raul Valverde2
1

Information Technology and Services, Betsson, Malta

2

John Molson School of Business, Concordia University, Montreal, Canada

Correspondence: Raul Valverde, John Molson School of Business, Concordia University, Montreal, QC., H3G
1M8, Canada. Tel: 1-514-848-2424 ext. 2968. E-mail: rvalverde@jmsb.concordia.ca
Received: March 25, 2014 doi:10.5539/cis.v7n2p117 Accepted: April 14, 2014

Online Published: April 28, 2014

URL: http://dx.doi.org/10.5539/cis.v7n2p117

Abstract
The concept of exchanging goods and services over the Internet has seen an exponential growth in popularity over the years. The Internet has been a major breakthrough of online transactions, leaping over the hurdles of currencies and geographic locations. However, the anonymous nature of the Internet does not promote an idealistic environment for transactions to occur. The increase in online transactions has been added with an equal increase in the number of attacks against security of online systems.
Auction sites and e-commerce web applications have seen an increase in fraudulent transactions. Some of these fraudulent transactions that are executed in e-commerce applications happen due to successful computer intrusions on these web sites. Although a lot of awareness has been raised about these facts, there has not yet been an effective solution to adequately address the problem of application-based attacks in e-commerce.
This paper proposes a fraud detection system that uses different anomaly detection techniques to predict computer intrusion attacks in e-commerce web applications. The system analyses queries that are generated when requesting server-side code on an e-commerce site, and create models for different features when



References: Almadhoob, A., & Valverde, R. (2014). A cybercrime prevention in the kingdom of Bahrain via IT security audit plans Barfar, A., & Mohammadi, S. (2007). Honeypots: intrusion deception. ISSA Journal, 28-31. Berendt, B., Mobasher, B., & Spiliopoulou, M. (2002) Web Usage Mining for E-Business Applications., ECML/PKDD-2002 15, 2011, Bhattacharyya, S., Jha, S., Tharakunnel, K., & Westland, J. C. (2011). Data mining for credit card fraud: A comparative study Bhowmik, R. (2011). Detecting Auto Insurance Fraud by Data Mining Techniques. Journal of Emerging Trends in Computing and Information Sciences, 2(4), 156-162. Bolton, R. J., & Hand, D. J. (2002). Statistical fraud detection: A review. Statistical Science, 235-249. Brause, R., Langsdorf, T., & Hepp, M. (1999). Neural Data Mining for Credit Card Fraud Detection. Chang, S. S., & Chiang, M. S. (2005). An e-intelligence approach to e-commerce intrusion detection. Granular Computing, 2005 IEEE International Conference on (p Corona, I., & Giacinto, G. (2010). Detection of Server-side Web Attacks. In T. Diethe, N. Cristianini, & J. Dawes, R. (2011) OWASP WebScarab Project. Retrieved December https://www.owasp.org/index.php/Category:OWASP_WebScarab_Project 16, 2011, Coding and Computing, 2000. Proceedings. International Conference on (p. 302). Gaarudapuram, S. R. (2008) Data processing for anomaly detection in web-based applications, Dissertation (MA), Oregon State University HooBieNet. (2002). Brutus - The Remote Password Cracker. Retrieved December 18, 2011, from http://www.hoobie.net/brutus/ Ingham, K. (2006) HTTP-delivered attacks against web servers. Retrieved December 14, 2011, from http://www.i-pi.com/HTTP-attacks-JoCN-2006/ Jaquith, A. (2002). The Security of Applications: Not All Are Created Equal, @Stake, Inc. Retrieved July 27, 2011, from http://www.securitymanagement.com/archive/library/atstake_tech0502.pdf Katzgrau, K. (2008). KLogger. Retrieved September 15, 2011, from http://codefury.net/projects/klogger/ Kruegel, C., Vigna, G., & Robertson, W Meyer, R. (2008). Detecting Attacks on Web Applications from Log Files. Information Security Reading Room. 25, 2011, Mookhey, K. K. (2010). Common Security Vulnerabilities in e-commerce Systems. Symantec. Retrieved July 26, from http://www.symantec.com/connect/articles/common-security-vulnerabilities-e-commerce-systems MySQL. (2012). MySQL The world 's most popular open source database. Homepage of MySQL. Retrieved January 26, from http://www.mysql.com/ OsCommerce. (2012). Welcome to osCommerce! Homepage of osCommerce. Retrieved January 26, 2012, from http://www.oscommerce.com/ OWASP. (2008). OWASP Testing Guide (3rd ed.). OWASP Foundation. Penya, Y. K., Ruiz-Agúndez, I., & Bringas, P. G. (2011). Integral Misuse and Anomaly Detection and Prevention System PHP. (2012). PHP: Hypertext Preprocessor. Homepage of PHP. Retrieved January 26, 2012, from http://www.php.net/ Phua, C., Lee, V. C. S., Smith-Miles, K., & Gayler, R. W. (2010). A Comprehensive Survey of Data Mining-based Fraud Detection Research RSnake. (2011b). XSS (Cross Site Scripting) Cheat Sheet. Retrieved December 19, 2011, from http://ha.ckers.org/xss.html Stephens, J., & Valverde, R. (2013). Security of E-Procurement Transactions in Supply Chain Reengineering. Tan, H. S. (2002). E-fraud: current trends and international developments. Journal of Financial Crime, 9(4), 347-354 Tarjan, R. (1972). Depth-first search and linear graph algorithms. SIAM journal on computing, 1(2), 146-160. Networking, Sensing and Control, 2004 IEEE International Conference on (p. 749).

You May Also Find These Documents Helpful

  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Internet and network security are a primary concern for many businesses. In today 's world, the number of hacks and leaks of data is continuing to rise, which is what makes security the primary concern. What may or may not be apparent is that many breaches of data tend to be caused by internal users ' errors that may not even have been meant to be malicious. Liaskos and Sandy quote a study by Roman which revealed…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Silverstone, H. R. (2005). Fraud 101: Techniques and Strategies for Detection. NY: John Willey & Sons, Inc.…

    • 1405 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Web-based attacks are on the front lines of Internet security. The trending threats are as followed in rank:…

    • 347 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Wells, J. T. (2011). Principles of fraud examination (3rd ed.). Retrieved from The University of…

    • 1086 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Madoff's Case

    • 1131 Words
    • 5 Pages

    Reinstein. , & Dery, J. (1999). Aicpa standard aids in detecting risk factors for fraud. Healthcare financial management, 58(10), 58-60. doi: 45346362…

    • 1131 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Kickstarter Current Event

    • 662 Words
    • 3 Pages

    With the internet came a whole new type of economy. Sites popped up with whole new ways to make purchases. Almost anything from around the world can be purchased online. For a while, the most popular transactional methods were to buy direct from a store’s website, from a large retailer like…

    • 662 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Web-based attacks – the increasing pervasiveness of Web browser applications along with increasingly common, easily exploited Web browser application security vulnerabilities has resulted in the widespread growth of Web-based threats. Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks to gain access to those computers. Instead, they can focus on attacking and compromising websites to mount additional, client-side attacks.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Our world has changed drastically in recent years; we are living in the age of globalization and fast economic growth. Internet trading (e-commerce) has become an important part of our busy lifestyle and major part of every business sector in the world. As our lives have change the internet has changed…

    • 8462 Words
    • 34 Pages
    Good Essays
  • Powerful Essays

    Investigative Programs, Cyber Investigations: Operation "Web Snare". (2005). Federal Bureau of Investigation Website. Retrieved November 12, 2005 from, www.fbi.gov/cyberinvest/websmare.htm…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Impact of Technology

    • 1009 Words
    • 5 Pages

    Global world trade and business has also become easier, faster and more reliable since the invention of computers. It allows people to purchase anything over the internet from any business or organisation in the world. This fast and convenient system is increasing the financial gain, growth and competitiveness of every industry. Banks and financial institutions have now started online banking systems, and ATM technology has now made it…

    • 1009 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The use of technology and e-commerce has become widespread especially for organizations that conduct business over the internet. Many organizations have adapted to selling their products to consumers and distributors through the internet. This helps businesses grow by reaching international customers or customers in different territories. Online sites such as PayPal have created a faster and safer way to pay bills online virtually at any location and at any time. This feature has allowed consumers and organizations to pay their bills in a more efficient way. More consumers have adopted e-commerce to pay for personal bills such as car payments and utility bills. The benefits of this technology perk are the efficiency and convenience of having the ability to transact anywhere, anytime, and in any way, it saves consumers time and fees. The immediate…

    • 1041 Words
    • 5 Pages
    Good Essays
  • Better Essays

    In day to day life credit cards are used for purchasing goods and services by the help of virtual card for online transaction or physical card for offline transaction. In physical transaction, Credit cards will insert into payment machine at merchant shop to purchase goods. Tracing fraudulent transactions in this mode may not be possible because the attacker already steal the credit card. The credit card company may go in financial loss if loss of credit card is not realized by credit card holder. In online payment mode, attackers need only little information for doing fraudulent transaction (secure code, card number, expiration date etc.). In this purchase method, mainly transactions will be done through the Internet or telephone. Small transactions are generally undergo less verification, and are less likely to be checked by either the card issuer or the merchant. Card issuers must take more precaution against fraud detection and financial losses. Credit card fraud cases are increasing every year. In 2008, number of fraudulent through credit card had increased by 30 percent because of various ambiguities in issuing and managing credit cards. Credit card fraudulent is approximately 1.2% of the total transaction amount, although it is not small amount as compare to total transaction amount which is in trillions of dollars in 2007[ 2-4] . Hidden Markov Model will be helpful to find out the fraudulent transaction by using spending profiles of user. It works on the user spending profiles which can be divided into major three types such as 1) Lower profile; 2) Middle profile; and 3) Higher profile. For every credit card, the spending profile is different, so it can figure out an inconsistency of user profile and try to find fraudulent transaction. It keeps record of spending profile of the card holder by both way, either offline or online. Thus analysis of purchased commodities of cardholder will be a useful tool in fraud detection system…

    • 12677 Words
    • 51 Pages
    Better Essays