2018
DOI: 10.1145/3178370
|View full text |Cite
|
Sign up to set email alerts
|

Security Evaluation of a Banking Fraud Analysis System

Abstract: The significant growth of banking frauds, fueled by the underground economy of malware, raised the need for effective detection systems. Therefore, in last the years, banks have upgraded their security to protect transactions from frauds. State-of-the-art solutions detect frauds as deviations from customers' spending habits. To the best of our knowledge, almost all existing approaches do not provide an in-depth model's granularity and security analysis against elusive attacks. In this paper, we examine Banksea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(13 citation statements)
references
References 34 publications
(58 reference statements)
0
5
0
Order By: Relevance
“…BankSealer [15], [16] works in an unsupervised setting, extracting local, global, and temporal profiles [17] for each user to capture their behaviors. The same authors also study the security of fraud detection systems against mimicry and adversarial attacks [18], [19].…”
Section: A Unsupervised Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…BankSealer [15], [16] works in an unsupervised setting, extracting local, global, and temporal profiles [17] for each user to capture their behaviors. The same authors also study the security of fraud detection systems against mimicry and adversarial attacks [18], [19].…”
Section: A Unsupervised Learningmentioning
confidence: 99%
“…Financial datasets are known to be extremely unbalanced, usually containing from 0.1% to 1% [18] of anomalous transactions. This information was also confirmed by the domain experts we interviewed.…”
Section: A Synthetic Anomalies Overviewmentioning
confidence: 99%
“…The result of an anomaly detection algorithm can be a label or a score; semi-supervised and unsupervised methods generally output a score that can be transformed into a label using a threshold [7]. Histogram and kernel-based approaches are the most common unsupervised anomaly detection methods, especially in network security and fraud detection domains [9][10][11][12][13]. In addition, the data to be processed in these domains is usually very large.…”
Section: Introductionmentioning
confidence: 99%
“…As discussed in [1], one of the most difficult issues researcher faces is because of the limited availability of malicious samples (owing to obvious privacy concerns). Therefore, abnormal detection is of the essence to resolve security issues of online banking.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, abnormal detection is of the essence to resolve security issues of online banking. However, there are remaining issues of abnormal detection as described in [1], one of which is how to calculate the distance between data samples.…”
Section: Introductionmentioning
confidence: 99%