Xu et al., 2006 - Google Patents
Tree based behavior monitoring for adaptive fraud detectionXu et al., 2006
View PDF- Document ID
- 11897929989923304716
- Author
- Xu J
- Sung A
- Liu Q
- Publication year
- Publication venue
- 18th International Conference on Pattern Recognition (ICPR'06)
External Links
Snippet
The general basis for anomaly detection and fraud detection is pattern recognition. An effective online fraud detection system should be able to discover both known and new attacks as early as possible. The detection process should be self-adjustable to allow the …
- 238000001514 detection method 0 title abstract description 31
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/12—Computer systems based on biological models using genetic models
- G06N3/126—Genetic algorithms, i.e. information processing using digital simulations of the genetic system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2216/00—Indexing scheme relating to additional aspects of information retrieval not explicitly covered by G06F17/30 and subgroups
- G06F2216/03—Data mining
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhou et al. | Deep learning approach for cyberattack detection | |
Saxena et al. | Intrusion detection in KDD99 dataset using SVM-PSO and feature reduction with information gain | |
US20040128267A1 (en) | Method and system for data classification in the presence of a temporal non-stationarity | |
CN109754258B (en) | Online transaction fraud detection method based on individual behavior modeling | |
CN110348528A (en) | Method is determined based on the user credit of multidimensional data mining | |
Wang et al. | On sparse feature attacks in adversarial learning | |
CN105262715B (en) | A kind of abnormal user detection method based on fuzzy time series association mode | |
Jayakumar et al. | Intrusion detection using artificial neural networks with best set of features. | |
Hossain et al. | A differentiate analysis for credit card fraud detection | |
Xu et al. | Tree based behavior monitoring for adaptive fraud detection | |
Hlaing | Feature selection and fuzzy decision tree for network intrusion detection | |
Sung et al. | Behaviour mining for fraud detection | |
Kavitha et al. | Emerging intuitionistic fuzzy classifiers for intrusion detection system | |
Prasenna et al. | Network programming and mining classifier for intrusion detection using probability classification | |
Ravipati et al. | A survey on different machine learning algorithms and weak classifiers based on KDD and NSL-KDD datasets | |
Venkatesan et al. | A comprehensive study in data mining frameworks for intrusion detection | |
CN110347669A (en) | Risk prevention method based on streaming big data analysis | |
Mathiyalagan et al. | An efficient intrusion detection system using improved bias based convolutional neural network classifier | |
Brifcani et al. | Intrusion detection and attack classifier based on three techniques: a comparative study | |
Thuraisingham et al. | Dependable real-time data mining | |
Sagar et al. | Online transaction fraud detection techniques: A review of data mining approaches | |
Abadeh et al. | Computer intrusion detection using an iterative fuzzy rule learning approach | |
Baig et al. | An AODE-based intrusion detection system for computer networks | |
Sadioura et al. | Selection of sub-optimal feature set of network data to implement Machine Learning models to develop an efficient NIDS | |
Farid et al. | Attribute weighting with adaptive NBTree for reducing false positives in intrusion detection |