Abstract
In many cases synthetic data is more suitable than authentic data for the testing and training of fraud detection systems. At the same time synthetic data suffers from some drawbacks originating from the fact that it is indeed synthetic and may not have the realism of authentic data. In order to counter this disadvantage, we have developed a method for generating synthetic data that is derived from authentic data. We identify the important characteristics of authentic data and the frauds we want to detect and generate synthetic data with these properties.
The author is also with Telia Research AB, SE-123 86 Farsta, Sweden
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
DARPA Intrusion Detection Evaluation. http://www.ll.mit.edu/IST/ideval/ The main web page for the DARPA evaluation experiments. July 2001.
JAM project homepage. http://www.cs.columbia.edu/sal/JAM/PROJECT/ July 2001.
Peter Burge, John Shawe-Taylor, Yves Moreau, Bart Preneel, Christof Stoermann, and Chris Cooke. Fraud Detection and Management in Mobile Telecommunications Networks. In Proceedings of the European Conference on Security and Detection ECOS 97, pages 91–96, London, April 28–30 1997
Philip K. Chan, Wei Fan, Andreas L. Prodromidis, and Salvatore J. Stolfo. Distributed Data Mining in Credit Card Fraud Detection. IEEE Intelligent Systems, 14(6), Nov/Dec 1999.
Mandy Chung, Nicholas J. Puketza, Ronald A. Olsson, Biswanath Mukherjee. Simulating Concurrent Intrusions for Testing Intrusion Detection Systems: Parallelizing Intrusions. In Proceedings of the 1995 National Information Systems Security Conference, pages 173–183. Baltimore, Maryland, October 10–13 1995.
H. Debar, M. Dacier, A. Wespi, and S. Lampart. An Experimentation Workbench for Intrusion Detection Systems. Technical Report RZ2998, IBM Research Division, Zurich Research Laboratory, Zurich, Switzerland, March 1998.
Joshua Haines, Lee Rossey, Rich Lippmann, and Robert Cunnigham. Extending the 1999 Evaluation. In Proceedings of DISCEX 2001, Anaheim, CA, June 11–12 2001.
Joshua W. Haines, Richard P. Lippmann, David J. Fried, Eushiuan Tran, Steve Boswell, and Marc A. Zissman. 1999 DARPA Intrusion Detection System Evaluation: Design and Procedures. Technical Report 1062, MIT Lincoln Laboratory, February 2001.
Kristopher Kendall. A database of computer attacks for the evaluation of intrusion detection systems. Master’s thesis, MIT, 1999.
H∘akan Kvarnström, Emilie Lundin, and Erland Jonsson. Combining fraud and intrusion detection-meeting new requirements. In Proceedings of the fifth Nordic Workshop on Secure IT systems (NordSec2000), Reykjavik, Iceland, October 12–13 2000.
Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, and Kumar Das. The 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 34(4):579–595, October 2000. Elsevier Science B.V.
Roy A. Maxion, and Kymie M.C. Tan. Benchmarking Anomaly-Based Detection Systems. In International Conference on Dependable Systems and Networks, pages 623–630, New York, New York, June 2000. IEEE Computer Society Press.
John McHugh. The 1998 Lincoln Laboratory IDS Evaluation: A Critique. In Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, pages 145–161, Toulouse, France, October 2–4 2000. Lecture Notes in Computer Science #1907, Springer-Verlag, Berlin.
Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee, and Ronald A. Olsson. A Methodology for Testing Intrusion Detection Systems. Software Engineering, 22(10):719–729, 1996.
Salvatore Stolfo, Wei Fan, Andreas Prodromidis, Wenke Lee, Shelly Tselepis, and Philip K. Chan. Agent-based Fraud and Intrusion Detection in Financial Systems. Technical report, 1998. Available at: http://www.cs.columbia.edu/wfan/research.html.
John W. Tukey. Exploratory Data Analysis. Addison Wesley College, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lundin, E., Kvarnström, H., Jonsson, E. (2002). A Synthetic Fraud Data Generation Methodology. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_23
Download citation
DOI: https://doi.org/10.1007/3-540-36159-6_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00164-5
Online ISBN: 978-3-540-36159-6
eBook Packages: Springer Book Archive