Open Access Open Access  Restricted Access Subscription or Fee Access

A Comprehensive Survey on Intrusion and Fraud Detection in Data Mining

A. Shivyaa, P. J. Yuvadharshini

Abstract


Intrusions are any set of actions that threatens the integrity, availability, or confidentiality of a network resource. Intrusion detection is an essential and important technique in data mining field. Fraud can be defined as an intentional deception or misrepresentation that an individual knows to be false that results in some unauthorized benefit to himself or another person. Due to the dramatic increase of fraud which results in loss of billions of dollars worldwide each year, several modern techniques in detecting fraud are continually evolved and applied to many business fields. Fraud detection involves monitoring the behaviour of populations of users in order to estimate, detect, or avoid undesirable behaviour. Undesirable behaviour is a broad term including misbehaviour; fraud intrusion, and account defaulting. Intrusion and fraud detection complements preventive mechanisms such as firewalls and OS-security. This survey paper categorises, compares, and summarises details from published technical and review articles in intrusion and fraud detection. It defines the professional fraudster, formalises the main types and subtypes of known fraud. The goal of this paper is to provide a comprehensive survey of different techniques to detect intrusion and frauds.


Keywords


Intrusion, Fraud Detection, Data Mining

Full Text:

PDF

References


Meghana Solanki, VidyaDhamdhere,“Intrusion Detection Technique using Data mining Approach: A Survey”.

Daniel Massa & Raul Valverde,”A Fraud Detection System Based on Anomaly Intrusion Detection Systems for E-Commerce Applications”,Computer and Information Science; Vol. 7, No. 2; 2014,ISSN 1913-8989 E-ISSN 1913-8997,Published by Canadian Center of Science and Education

Anita B. Desai, Dr. RavindraDeshmukh,“Data mining techniques for Fraud Detection”,International Journal of Computer Science and Information Technologies, Vol. 4 (1) , 2013, 1 - 4

Dr. S.Vijayarani1 and Ms. Maria Sylviaa. S, ”Intrusion Detection System – AStudy”,International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1, February 2015

B.Santos Kumar, T. ChandraSekhara Phani Raju, M. Ratnakar, Sk.Dawood Baba, N.Sudhakar,”B.Santos Kumar, T. ChandraSekhara PhaniRaju, M.Ratnakar, Sk.Dawood Baba, N.Sudhakar”,International Journal of Computer Science and Information Technologies, Vol. 4 (1) , 2013, 77 - 82


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.