Preview

Fraud Detection System

Powerful Essays
Open Document
Open Document
13075 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Fraud Detection System
Computer and Information Science; Vol. 7, No. 2; 2014
ISSN 1913-8989
E-ISSN 1913-8997
Published by Canadian Center of Science and Education

A Fraud Detection System Based on Anomaly Intrusion Detection
Systems for E-Commerce Applications
Daniel Massa1 & Raul Valverde2
1

Information Technology and Services, Betsson, Malta

2

John Molson School of Business, Concordia University, Montreal, Canada

Correspondence: Raul Valverde, John Molson School of Business, Concordia University, Montreal, QC., H3G
1M8, Canada. Tel: 1-514-848-2424 ext. 2968. E-mail: rvalverde@jmsb.concordia.ca
Received: March 25, 2014 doi:10.5539/cis.v7n2p117 Accepted: April 14, 2014

Online Published: April 28, 2014

URL: http://dx.doi.org/10.5539/cis.v7n2p117

Abstract
The concept of exchanging goods and services over the Internet has seen an exponential growth in popularity over the years. The Internet has been a major breakthrough of online transactions, leaping over the hurdles of currencies and geographic locations. However, the anonymous nature of the Internet does not promote an idealistic environment for transactions to occur. The increase in online transactions has been added with an equal increase in the number of attacks against security of online systems.
Auction sites and e-commerce web applications have seen an increase in fraudulent transactions. Some of these fraudulent transactions that are executed in e-commerce applications happen due to successful computer intrusions on these web sites. Although a lot of awareness has been raised about these facts, there has not yet been an effective solution to adequately address the problem of application-based attacks in e-commerce.
This paper proposes a fraud detection system that uses different anomaly detection techniques to predict computer intrusion attacks in e-commerce web applications. The system analyses queries that are generated when requesting server-side code on an e-commerce site, and create models for different features when



References: Almadhoob, A., & Valverde, R. (2014). A cybercrime prevention in the kingdom of Bahrain via IT security audit plans Barfar, A., & Mohammadi, S. (2007). Honeypots: intrusion deception. ISSA Journal, 28-31. Berendt, B., Mobasher, B., & Spiliopoulou, M. (2002) Web Usage Mining for E-Business Applications., ECML/PKDD-2002 15, 2011, Bhattacharyya, S., Jha, S., Tharakunnel, K., & Westland, J. C. (2011). Data mining for credit card fraud: A comparative study Bhowmik, R. (2011). Detecting Auto Insurance Fraud by Data Mining Techniques. Journal of Emerging Trends in Computing and Information Sciences, 2(4), 156-162. Bolton, R. J., & Hand, D. J. (2002). Statistical fraud detection: A review. Statistical Science, 235-249. Brause, R., Langsdorf, T., & Hepp, M. (1999). Neural Data Mining for Credit Card Fraud Detection. Chang, S. S., & Chiang, M. S. (2005). An e-intelligence approach to e-commerce intrusion detection. Granular Computing, 2005 IEEE International Conference on (p Corona, I., & Giacinto, G. (2010). Detection of Server-side Web Attacks. In T. Diethe, N. Cristianini, & J. Dawes, R. (2011) OWASP WebScarab Project. Retrieved December https://www.owasp.org/index.php/Category:OWASP_WebScarab_Project 16, 2011, Coding and Computing, 2000. Proceedings. International Conference on (p. 302). Gaarudapuram, S. R. (2008) Data processing for anomaly detection in web-based applications, Dissertation (MA), Oregon State University HooBieNet. (2002). Brutus - The Remote Password Cracker. Retrieved December 18, 2011, from http://www.hoobie.net/brutus/ Ingham, K. (2006) HTTP-delivered attacks against web servers. Retrieved December 14, 2011, from http://www.i-pi.com/HTTP-attacks-JoCN-2006/ Jaquith, A. (2002). The Security of Applications: Not All Are Created Equal, @Stake, Inc. Retrieved July 27, 2011, from http://www.securitymanagement.com/archive/library/atstake_tech0502.pdf Katzgrau, K. (2008). KLogger. Retrieved September 15, 2011, from http://codefury.net/projects/klogger/ Kruegel, C., Vigna, G., & Robertson, W Meyer, R. (2008). Detecting Attacks on Web Applications from Log Files. Information Security Reading Room. 25, 2011, Mookhey, K. K. (2010). Common Security Vulnerabilities in e-commerce Systems. Symantec. Retrieved July 26, from http://www.symantec.com/connect/articles/common-security-vulnerabilities-e-commerce-systems MySQL. (2012). MySQL The world 's most popular open source database. Homepage of MySQL. Retrieved January 26, from http://www.mysql.com/ OsCommerce. (2012). Welcome to osCommerce! Homepage of osCommerce. Retrieved January 26, 2012, from http://www.oscommerce.com/ OWASP. (2008). OWASP Testing Guide (3rd ed.). OWASP Foundation. Penya, Y. K., Ruiz-Agúndez, I., & Bringas, P. G. (2011). Integral Misuse and Anomaly Detection and Prevention System PHP. (2012). PHP: Hypertext Preprocessor. Homepage of PHP. Retrieved January 26, 2012, from http://www.php.net/ Phua, C., Lee, V. C. S., Smith-Miles, K., & Gayler, R. W. (2010). A Comprehensive Survey of Data Mining-based Fraud Detection Research RSnake. (2011b). XSS (Cross Site Scripting) Cheat Sheet. Retrieved December 19, 2011, from http://ha.ckers.org/xss.html Stephens, J., & Valverde, R. (2013). Security of E-Procurement Transactions in Supply Chain Reengineering. Tan, H. S. (2002). E-fraud: current trends and international developments. Journal of Financial Crime, 9(4), 347-354 Tarjan, R. (1972). Depth-first search and linear graph algorithms. SIAM journal on computing, 1(2), 146-160. Networking, Sensing and Control, 2004 IEEE International Conference on (p. 749).

You May Also Find These Documents Helpful

  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Internet and network security are a primary concern for many businesses. In today 's world, the number of hacks and leaks of data is continuing to rise, which is what makes security the primary concern. What may or may not be apparent is that many breaches of data tend to be caused by internal users ' errors that may not even have been meant to be malicious. Liaskos and Sandy quote a study by Roman which revealed…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Lab2 Snort

    • 1322 Words
    • 4 Pages

    References: CSEC 630 Lab2 -Intrusion Detection System and Protocol Analysis Lab (n.d.). University of Maryland University College. Retrieved from: https://learn.umuc.edu/d2l/common/viewFile.d2lfile/Database/NzkyMzkw/CSEC630_lab2_LEO.pdf?ou=33745…

    • 1322 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Silverstone, H. R. (2005). Fraud 101: Techniques and Strategies for Detection. NY: John Willey & Sons, Inc.…

    • 1405 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Wells, J. T. (2011). Principles of fraud examination (3rd ed.). Retrieved from The University of…

    • 1086 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Madoff's Case

    • 1131 Words
    • 5 Pages

    Reinstein. , & Dery, J. (1999). Aicpa standard aids in detecting risk factors for fraud. Healthcare financial management, 58(10), 58-60. doi: 45346362…

    • 1131 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    • The Internet Crime Complaint Center (IC3) processed more than 336,000 complaints related to Internet crime in 2009 in the United States. • Many complaints were related to fraud, including nondelivery of ordered items, credit and debit card fraud, and advanced fee scams. Much of the credit card fraud was perpetrated when credit card numbers were stolen by criminals tricking people into revealing sensitive information or by computer programs that gather credit card data. • Non-fraud-related complaints pertained to issues such as computer intrusions, unsolicited e-mail, and child pornography.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Web-based attacks – the increasing pervasiveness of Web browser applications along with increasingly common, easily exploited Web browser application security vulnerabilities has resulted in the widespread growth of Web-based threats. Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks to gain access to those computers. Instead, they can focus on attacking and compromising websites to mount additional, client-side attacks.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Medicare Fraud

    • 2440 Words
    • 10 Pages

    Medicare Fraud Detection, Data Mining | StatSoft. (n.d.). Data Mining, Statistical Analysis, Software and Services, Credit Scoring | StatSoft. Retrieved October 11, 2010, from http://www.statsoft.com/solutions/medicare-fraud-detection/…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    Investigative Programs, Cyber Investigations: Operation "Web Snare". (2005). Federal Bureau of Investigation Website. Retrieved November 12, 2005 from, www.fbi.gov/cyberinvest/websmare.htm…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Our world has changed drastically in recent years; we are living in the age of globalization and fast economic growth. Internet trading (e-commerce) has become an important part of our busy lifestyle and major part of every business sector in the world. As our lives have change the internet has changed…

    • 8462 Words
    • 34 Pages
    Good Essays
  • Good Essays

    The use of technology and e-commerce has become widespread especially for organizations that conduct business over the internet. Many organizations have adapted to selling their products to consumers and distributors through the internet. This helps businesses grow by reaching international customers or customers in different territories. Online sites such as PayPal have created a faster and safer way to pay bills online virtually at any location and at any time. This feature has allowed consumers and organizations to pay their bills in a more efficient way. More consumers have adopted e-commerce to pay for personal bills such as car payments and utility bills. The benefits of this technology perk are the efficiency and convenience of having the ability to transact anywhere, anytime, and in any way, it saves consumers time and fees. The immediate…

    • 1041 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Impact of Technology

    • 1009 Words
    • 5 Pages

    Global world trade and business has also become easier, faster and more reliable since the invention of computers. It allows people to purchase anything over the internet from any business or organisation in the world. This fast and convenient system is increasing the financial gain, growth and competitiveness of every industry. Banks and financial institutions have now started online banking systems, and ATM technology has now made it…

    • 1009 Words
    • 5 Pages
    Good Essays