Abstract
Intrusion prevention mechanisms are largely insufficient for protection of databases against Information Warfare attacks by authorized users and has drawn interest towards intrusion detection. We visualize the conflicting motives between an attacker and a detection system as a multi-stage game between two players, each trying to maximize his payoff. We consider the specific application of credit card fraud detection and propose a fraud detection system based on a game-theoretic approach. Not only is this approach novel in the domain of Information Warfare, but also it improvises over existing rule-based systems by predicting the next move of the fraudster and learning at each step.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Chiueh, T., Pilania, D.: Design, Implementation and Evaluation of a Repairable Database Management System. In: Proceedings of ACSAC 2004, pp. 179–188 (2004)
Chung, C.Y., Gertz, M., Levitt, K.: DEMIDS: A Misuse Detection System for Database Systems. In: Third International IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems, pp. 159–178 (1999)
Lee, V.C.S., Stankovic, J.A., Son, H.S.: Intrusion Detection in Real-Time Database Systems via Time Signatures. In: Proc. Sixth IEEE Real Time Technology and Applications Symposium (RTAS 2000), pp. 124–133 (2000)
Hu, Y., Panda, B.: Identification of Malicious Transactions in Database Systems. In: Seventh Int. Database Engineering and Applications Symposium (IDEAS), China, pp. 329–335 (2003)
Hamilton, S.N., Miller, W.L., Ott, A., Saydjari, O.S.: The Role of Game Theory in Information Warfare. In: Fourth Information Survivability Workshop (2002)
Hamilton, S.N., Miller, W.L., Ott, A., Saydjari, O.S.: Challenges in Applying Game Theory to the Domain of Information Warfare. In: Fourth Information Survivability Workshop (2002)
Liu, P., Li, L.: A Game-Theoretic Approach for Attack Prediction, Technical Report, PSU-S2-2002-01, Penn State University (2002)
Complete Website and e-commerce solutions (April 20, 2005), http://www.haveninternet.com/welcome.htm
Merchant account credit card processing (April 20, 2005), http://www.aaa-merchant-account.com/
Clearly Business âǍŞ Card Fraud (April 20, 2005), http://www.clearlybusiness.com/cb/articles/
Online fraud is 12 times higher than offline fraud (April 20, 2005), http://sellitontheweb.com/ezine/news0434.shtml
Li, Y., Zhang, X.: A Security-Enhanced One-Time Payment Scheme for Credit Card. In: 14th International Workshop on RIDEâǍŹ 2004, pp. 40–47 (2004)
Peters, M.E.: Emerging eCommerce Credit and Debit Card Protocols. In: Proc. 3rd International Symposium on Electronic Commerce, pp. 39–46 (2002)
Low, S.H., Maxemchuk, N.F., Paul, S.: Anonymous credit cards and their collusion analysis. IEEE/ACM Transactions on Networking, 809–816 (1996)
Ghosh, S., Reilly, D.L.: Credit card fraud detection with a neural network. In: Proc. 27th Annual Hawaii International Conference on System Sciences, pp. 621–630 (1994)
Aleskerov, E., Freisleben, B., Rao, B.: CARDWATCH: A Neural Network Based Database Mining System for Credit Card Fraud Detection. In: Proc. Computational Intelligence for Financial Engineering (CIFEr), pp. 220–226 (1997)
Chan, P.K., Fan, W., Prodromidis, A.L., Stolfo, S.J.: Distributed Data Mining in Credit Card Fraud Detection. IEEE Intelligent Systems, 67–74 (1999)
Syeda, M., Zhang, Y.Q., Pan, Y.: Parallel Granular Neural Networks for Fast Credit Card Fraud Detection. In: Proc. FUZZ-IEEE 2002 Int. Conference, pp. 572–577 (2002)
Game Theory (April 26, 2005), http://plato.stanford.edu/entries/game-theory/
Kydd, A.: Formal Theory for Political Science âǍŞ Lecture Notes (2002)
Ferguson, T.S., Melolidakis, C.: On the Inspection Game. Naval Research Logistics 45, 327–334 (1998)
Kodialam, M., Lakshman, T.V.: Detecting network intrusions via sampling: A Game-theoretic Approach. In: Proc. IEEE INFOCOM 2003, pp. 1880–1889 (2003)
Maschler, M.: A price leadership method for solving the inspectorâǍŹs non-constant sum game. Naval Research Logistics Quarterly 13, 11–33 (1966)
âǍIJTit for TatâǍİ (April 28, 2005), http://www.abc.net.au/science/slab/tittat/story.htm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vatsa, V., Sural, S., Majumdar, A.K. (2005). A Game-Theoretic Approach to Credit Card Fraud Detection. In: Jajodia, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2005. Lecture Notes in Computer Science, vol 3803. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11593980_20
Download citation
DOI: https://doi.org/10.1007/11593980_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30706-8
Online ISBN: 978-3-540-32422-5
eBook Packages: Computer ScienceComputer Science (R0)