Table of Contents Author Guidelines Submit a Manuscript
Complexity
Volume 2018, Article ID 5764370, 9 pages
https://doi.org/10.1155/2018/5764370
Research Article

Credit Card Fraud Detection through Parenclitic Network Analysis

1Department of Computer Science, Faculty of Science and Technology, Universidade Nova de Lisboa, Lisboa, Portugal
2Center for Biomedical Technology, Universidad Politécnica de Madrid, 28223 Pozuelo de Alarcón, Madrid, Spain
3Data, Networks and Cybersecurity Research Institute, Univ. Rey Juan Carlos, 28028 Madrid, Spain
4Department of Applied Mathematics, Universidad Rey Juan Carlos, 28933 Móstoles, Madrid, Spain
5Center for Computational Simulation, 28223 Pozuelo de Alarcón, Madrid, Spain
6Cyber Security & Digital Trust, BBVA Group, 28050 Madrid, Spain

Correspondence should be addressed to Miguel Romance; se.cjru@ecnamor.leugim

Received 15 December 2017; Accepted 17 April 2018; Published 22 May 2018

Academic Editor: Arturo Buscarino

Copyright © 2018 Massimiliano Zanin et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. E. W. T. Ngai, Y. Hu, Y. H. Wong, Y. Chen, and X. Sun, “The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature,” Decision Support Systems, vol. 50, no. 3, pp. 559–569, 2011. View at Publisher · View at Google Scholar · View at Scopus
  2. J. West and M. Bhattacharya, “Intelligent financial fraud detection: a comprehensive review,” Computers & Security, vol. 57, pp. 47–66, 2016. View at Publisher · View at Google Scholar
  3. T. P. Bhatla, V. Prabhu, and A. Dua, “Understanding credit card frauds,” Cards Business Review, vol. 1, 2003. View at Google Scholar
  4. J. Rollins and C. Wilson, Terrorist capabilities for cyberattack: Overview and policy issues, 2006.
  5. J. Friedman, T. Hastie, and R. Tibshirani, The Elements of Statistical Learning, vol. 1, Springer, Berlin, Germany, 2001.
  6. J. Han, J. Pei, and M. Kamber, Data mining: concepts and techniques, Elsevier, 2011.
  7. I. H. Witten, E. Frank, M. A. Hall, and C. J. Pal, Data Mining: Practical Machine Learning Tools and Techniques, Morgan Kaufmann, 2016.
  8. S. H. Strogatz, “Exploring complex networks,” Nature, vol. 410, no. 6825, pp. 268–276, 2001. View at Publisher · View at Google Scholar · View at Scopus
  9. R. Albert and A. Barabási, “Statistical mechanics of complex networks,” Reviews of Modern Physics, vol. 74, no. 1, pp. 47–97, 2002. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D. W. Hwang, “Complex networks: Structure and dynamics,” Physics Reports, vol. 424, no. 4-5, pp. 175–308, 2006. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Zanin, D. Papo, P. A. Sousa et al., “Combining complex networks and data mining: why and how,” Physics Reports, vol. 635, pp. 1–44, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  12. S. Ghosh and D. L. Reilly, “A tutorial on hidden markov models and selected applications in speech recognition,” in Proceedings of the 27th Hawaii International Conference on System Sciences: Information Systems: Decision Support and Knowledge-Based Systems, vol. 3, pp. 621–630, 1994.
  13. E. Aleskerov, B. Freisleben, and B. Rao, “Cardwatch: A neural network based database mining system for credit card fraud detection,” in Proceedings of the 1997 IEEE/IAFE Conference on Computational Intelligence for Financial Engineering, CIFEr, pp. 220–226, IEEE, March 1997. View at Scopus
  14. R. Brause, T. Langsdorf, and M. Hepp, “Neural data mining for credit card fraud detection,” in Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence, pp. 103–106, IEEE, 1999.
  15. S. Maes, K. Tuyls, B. Vanschoenwinkel, and B. Manderick, “Credit card fraud detection using Bayesian and neural networks,” in Proceedings of the 1st International Naiso Congress on Neuro Fuzzy Technologies, pp. 261–270, 2002.
  16. M. Syeda, Y.-Q. Zhang, and Y. Pan, “Parallel granular neural networks for fast credit card fraud detection,” in Proceedings of the IEEE International Conference on Fuzzy Systems (FUZZ-IEEE '02), vol. 1, pp. 572–577, 2002.
  17. R. Patidar and L. Sharma, “Credit card fraud detection using neural network,” International Journal of Soft Computing and Engineering (IJSCE), vol. 1, 2011. View at Google Scholar
  18. E. M. Carneiro, L. A. V. Dias, A. M. D. Cunha, and L. F. S. Mialaret, “Cluster analysis and artificial neural networks: a case study in credit card fraud detection,” in Proceedings of the 12th International Conference on Information Technology: New Generations, ITNG 2015, pp. 122–126, IEEE, April 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. C. Serrano-Cinca, “Self organizing neural networks for financial diagnosis,” Decision Support Systems, vol. 17, no. 3, pp. 227–238, 1996. View at Publisher · View at Google Scholar · View at Scopus
  20. V. Zaslavsky and A. Strizhak, “Credit card fraud detection using self organizing maps,” The International Journal of Information & Security, vol. 18, pp. 48–63, 2006. View at Google Scholar
  21. P. J. Bentley, J. Kim, G.-H. Jung, and J.-U. Choi, “Fuzzy darwinian detection of credit card fraud,” in Proceedings of the 14th Annual Fall Symposium of the Korean Information Processing Society, vol. 14, pp. 1–4, 2000.
  22. E. Duman and M. H. Ozcelik, “Detecting credit card fraud by genetic algorithm and scatter search,” Expert Systems with Applications, vol. 38, no. 10, pp. 13057–13063, 2011. View at Publisher · View at Google Scholar · View at Scopus
  23. K. RamaKalyani and D. UmaDevi, “Fraud detection of credit card payment system by genetic algorithm,” International Journal of Scientific & Engineering Research, vol. 3, no. 7, pp. 1–6, 2012. View at Google Scholar
  24. R. Chen, T. Chen, Y. Chien, and Y. Yang, Advances in Neural Networks–ISNN 2005 821, 2005.
  25. R.-C. Chen, T.-S. Chen, and C.-C. Lin, “A new binary support vector system for increasing detection rate of credit card fraud,” International Journal of Pattern Recognition and Artificial Intelligence, vol. 20, no. 2, pp. 227–239, 2006. View at Google Scholar
  26. Y. G. Sahin and E. Duman, “Detecting credit card fraud by decision trees and support vector machines,” in Proceedings of the International Multi-Conference of Engineering and Computer Statistics, vol. 1, 2011.
  27. Q. Lu and C. Ju, “Research on credit card fraud detection model based on class weighted support vector machine,” Journal of Convergence Information Technology, vol. 6, no. 1, pp. 62–68, 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. L. D. F. Costa, F. A. Rodrigues, G. Travieso, and P. R. V. Boas, “Characterization of complex networks: a survey of measurements,” Advances in Physics, vol. 56, no. 1, pp. 167–242, 2007. View at Publisher · View at Google Scholar · View at Scopus
  29. B. Wang, H. Tang, C. Guo, and Z. Xiu, “Entropy optimization of scale-free networks’ robustness to random failures,” Physica A: Statistical Mechanics and its Applications, vol. 363, no. 2, pp. 591–596, 2006. View at Google Scholar
  30. V. Latora and M. Marchiori, “Efficient behavior of small-world networks,” Physical Review Letters, vol. 87, Article ID 198701, 2001. View at Publisher · View at Google Scholar · View at Scopus
  31. M. Zanin, P. A. Sousa, and E. Menasalvas, “Information content: Assessing meso-scale structures in complex networks,” Europhysics Letters, vol. 106, article 30001, 2014. View at Google Scholar
  32. S. Bhattacharyya, S. Jha, K. Tharakunnel, and J. C. Westland, “Data mining for credit card fraud: a comparative study,” Decision Support Systems, vol. 50, no. 3, pp. 602–613, 2011. View at Publisher · View at Google Scholar · View at Scopus
  33. N. Sethi and A. Gera, “A revived survey of various credit card fraud detection techniques,” International Journal of Computer Science and Mobile Computing, vol. 3, no. 4, pp. 780–791, 2014. View at Google Scholar
  34. Z. Zojaji, R. E. Atani, and A. H. Monadjemi, “A survey of credit card fraud detection techniques: data and technique oriented perspective,” Cryptography and Security, 2016. View at Google Scholar
  35. J. M. Zurada, Introduction to Artificial Neural Systems, West St. Paul, 1992.
  36. M. T. Hagan, H. B. Demuth, and M. H. Beale, Neural Network Design, Pws Pub., Boston, Mass, USA, 1996.
  37. L. Davis, Ed., Handbook of Genetic Algorithms, Van Nostrand Reinhold, New York, NY, USA, 1991.
  38. M. Kumar, M. Husian, N. Upreti, and D. Gupta, “Genetic algorithm: Review and application,” International Journal of Information Technology and Knowledge Management, vol. 2, pp. 451–454, 2010. View at Google Scholar
  39. C. Cortes and V. Vapnik, “Support-vector networks,” Machine Learning, vol. 20, no. 3, pp. 273–297, 1995. View at Publisher · View at Google Scholar · View at Scopus
  40. N. Cristianini and J. Shawe-Taylor, An Introduction to Support Vector Machines And Other Kernel-Based Learning Methods, Cambridge university press, 2000.
  41. F. V. Jensen, An Introduction to Bayesian Networks, vol. 210, UCL press, London, UK, 1996.
  42. N. Friedman, D. Geiger, and M. Goldszmidt, “Bayesian network classifiers,” Machine Learning, vol. 29, no. 2-3, pp. 131–163, 1997. View at Publisher · View at Google Scholar · View at Scopus
  43. T. Kohonen, “The self-organizing map,” Neurocomputing, vol. 21, no. 1–3, pp. 1–6, 1998. View at Publisher · View at Google Scholar · View at Scopus
  44. M. F. A. Gadi, X. Wang, and A. P. do Lago, “Credit card fraud detection with artificial immune system,” in ICARIS 2008: Artificial Immune Systems, vol. 8 of Lecture Notes in Computer Science, pp. 119–131, Springer, 2008. View at Google Scholar
  45. J. A. Hanley and B. J. McNeil, “The meaning and use of the area under a receiver operating characteristic (ROC) curve,” Radiology, vol. 143, no. 1, pp. 29–36, 1982. View at Google Scholar
  46. M. Zanin and S. Boccaletti, “Complex networks analysis of obstructive nephropathy data,” Chaos: An Interdisciplinary Journal of Nonlinear Science, vol. 21, no. 3, 033103, 5 pages, 2011. View at Publisher · View at Google Scholar · View at MathSciNet
  47. M. Zanin, J. M. Alcazar, J. V. Carbajosa et al., “Parenclitic networks: Uncovering new functions in biological data,” Scientific Reports, vol. 4, article no. 5112, 2014. View at Publisher · View at Google Scholar · View at Scopus
  48. M. Zanin, P. Sousa, D. Papo et al., “Optimizing functional network representation of multivariate time series,” Scientific Reports, vol. 2, article 630, 2012. View at Publisher · View at Google Scholar
  49. M. Zanin, D. Papo, M. Romance, R. Criado, and S. Moral, “The topology of card transaction money flows,” Physica A: Statistical Mechanics and its Applications, vol. 462, pp. 134–140, 2016. View at Publisher · View at Google Scholar · View at Scopus
  50. F. Rosenblatt, “The perceptron: a probabilistic model for information storage and organization in the brain,” Psychological Review, vol. 65, no. 6, pp. 386–408, 1958. View at Publisher · View at Google Scholar · View at Scopus
  51. P. J. Werbos, Beyond Regression: New Tools for Prediction and Analysis in the Behavioral Sciences, secondoftwo school Harvard University, 1974. View at MathSciNet
  52. M. R. Berthold, N. Cebron, F. Dill et al., “KNIME - the Konstanz information miner,” ACM SIGKDD Explorations Newsletter, vol. 11, no. 1, pp. 26–31, 2009. View at Publisher · View at Google Scholar
  53. D. M. Hawkins, “The problem of overfitting,” Journal of Chemical Information and Computer Sciences, vol. 44, no. 1, pp. 1–12, 2004. View at Google Scholar