A Signature Based Method for Fraud Detection on E-Commerce Scenarios

被引:1
|
作者
Belo, Orlando [1 ]
Mota, Gabriel [1 ]
Fernandes, Joana [2 ]
机构
[1] Univ Minho, Guimaraes, Portugal
[2] Farfetch, Braga, Portugal
关键词
D O I
10.1007/978-3-319-25226-1_45
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic transactions have revolutionized the way that consumers shop, making the small and local retailers, which were being affected by the worldwide crisis, accessible to the entire world. As e-commercemarket expands, the number of commercial transactions supported by credit cards-Card or Customer Not Present also increases. This growing relationship, quite natural and expected, has clear advantages, facilitating e-commerce transactions and attracting new possibilities for trading. However, at the same time a big and serious problem emerges: the occurrence of fraudulent situations in payments. In this work, we used a signature based method to establish the characteristics of user behavior and detect potential fraud cases. A signature is defined by a set of attributes that receive a diverse range of variables-e.g., the average number of orders, time spent per order, number of payment attempts, number of days since last visit, and many others-related to the behavior of a user, referring to an e-commerce application scenario. Based on the analysis of user behavior deviation, detected by comparing the user's recent activity with the user behavior data, which is expressed through the user signature, it is possible to detect potential fraud situations (deviant behavior) in useful time, giving a more robust and accurate decision support system to the fraud analysts on their daily job.
引用
收藏
页码:531 / 543
页数:13
相关论文
共 50 条
  • [1] Fraud Detection in E-Commerce
    Alqethami, Sara
    Almutanni, Badriah
    AlGhamdi, Manal
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (06): : 200 - 206
  • [2] A Multiperspective Fraud Detection Method for Multiparticipant E-Commerce Transactions
    Yu, Wangyang
    Wang, Yadi
    Liu, Lu
    An, Yisheng
    Yuan, Bo
    Panneerselvam, John
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (02) : 1564 - 1576
  • [3] Behavioral graph fraud detection in E-commerce
    Yin, Hang
    Zhang, Zitao
    Wang, Zhurong
    Ozyurt, Yilmazcan
    Liang, Weiming
    Dong, Wenyu
    Zhao, Yang
    Shan, Yinan
    2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW, 2022, : 769 - 776
  • [4] Credit Card Fraud Detection in E-commerce
    Porwal, Utkarsh
    Mukund, Smruthi
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 280 - 287
  • [5] Improved Fraud Detection in e-Commerce Transactions
    Shaji, Jisha
    Panchal, Dakshata
    2017 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS, COMPUTING AND IT APPLICATIONS (CSCITA), 2017, : 121 - 126
  • [6] A subgraph-based knowledge reasoning method for collective fraud detection in E-commerce
    Song, Junshuai
    Qu, Xiaoru
    Hu, Zehong
    Li, Zhao
    Gao, Jun
    Zhang, Ji
    NEUROCOMPUTING, 2021, 461 : 587 - 597
  • [7] Group-based Fraud Detection Network on e-Commerce Platforms
    Yu, Jianke
    Wang, Hanchen
    Wang, Xiaoyang
    Li, Zhao
    Qin, Lu
    Zhang, Wenjie
    Liao, Jian
    Zhang, Ying
    PROCEEDINGS OF THE 29TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2023, 2023, : 5463 - 5475
  • [8] A method of fraud & intrusion detection for e-payment systems in mobile e-commerce
    Venkataram, Pallapa
    Babu, B. Sathish
    Naveen, M. K.
    Samyama, Gungal G. H.
    2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 395 - +
  • [9] Fraud Detection using Machine Learning in e-Commerce
    Saputra, Adi
    Suharjito
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (09) : 332 - 339
  • [10] E-commerce and e-commerce fraud in Saudi Arabia: A case study
    Alfuraih, Saleh I.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 176 - 180