Download a multi - agent fraud detection system for data communication

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Neuroinformatics wikipedia , lookup

Data analysis wikipedia , lookup

Corecursion wikipedia , lookup

Theoretical computer science wikipedia , lookup

Transcript
A MULTI - AGENT FRAUD DETECTION SYSTEM FOR DATA
COMMUNICATION NETWORKS
BY
OKOZOR NKEIRUKA PETROLINA
DEPARTMENT OF ELECTRONIC AND COMPUTER ENGINEERING
NNAMDI AZIKIWE UNIVERSITY, AKWA
AUGUST 2015
BACKGROUND OF THE STUDY
Data communication fraud occurs whenever a perpetrator uses
deception to receive services free of charge or at a reduced rate,
thereby violating existing legislation governing the economic activities of
government and its administration. It is a worldwide problem with
substantial annual revenue losses for many companies. Globally, data
communications fraud is estimated at about 100billion US dollars. In the
United State of America, data communication fraud is generally
considered to deprive network operators of approximately 5 percent of
their revenue. However, it is difficult to provide precise estimates since
some fraud may never be detected, and the operators are reluctant to
reveal figures on fraud losses. The situation can significantly be worse
for mobile operators in Africa for, as a result of fraud, they become
liable for large hard currency payments to foreign network operators.
Thus, data communication fraud is a significant problem which needs to
be addressed, detected and prevented in the strongest possible manner.
AIM AND OBJECTIVES
The aim of this thesis is to theoretical and empirical investigation of
computer intrusion fraud by the identification of channels through which
they are largely perpetrated and design of a Multi- Agent fraud detection
system for property management network.
The broad objective of this study is to design and implement a MultiAgent fraud Detection System for Data Communication Networks. The
specific Objectives include:
1. Developing and implementing a novel software for automatic data
collection and online intrusion detection that interfaces with a
property management network in an intranet setting using industry
standard protocols (ie specifically Transmission Control Protocol/
Internet protocol (TCP/IP) since the intranet uses internet technology
to operate).
2. Developing fraud detection agents using JavaScript objects to run
secretly in the background of the property (real estate) Management
Network. These shall comprise multiple intelligent agents which will
roam the network, adaptively generate models from the transaction
database and discover transactions (fraudulent activities) entering on
real-time basis which deviate significantly from the norm. The
intelligent agents collaborate to share information on suspicious
events and determine when to be more vigilant or more relaxed in a
manner that is difficult to achieve by an individual agent or monolithic
system.
3. Implementing the real Estate Management business application in
PHP language. By this, large volumes of transactions from an
organization’s transaction network can be received in real-time, and
the intelligent agents are able to derive new rules or models if they
receive new inputs. Each transaction is further captured in a
transaction table similar to log files.
4. Developing machine learning agents that use a meta-learning
technique to produce a score that labels a particular transaction as
being legal or fraudulent. The score is compared to a threshold value
that define measures such as number of successful or failed
transactions, the duration of transactions, restriction of available
services, and analysis of each other transaction-related data.
5. Developing a user interface that flags suspect transactions within
seconds, without the knowledge of the perpetrator for further
investigations and subsequent decision- making. This enables
operators to respond to fraud by detection, service denial and
prosecutions against fraudulent users.
RESEARCH METHODOLOGY
Opinions of stakeholders and data communication operators in Enugu
metropolis, capital of Enugu State of Nigeria will be gathered. The
selection of the study area was influenced by the sufficient availability of
network resources, and vibrant individuals knowledgeable on the
concept, universality and potential danger of network related frauds.
The primary sources of data includes the use of questionnaires,
observations, discussions and interviews while secondary data will be
gathered from secondary sources such as books, journals and internet
sources among others. The types of primary data to be collected
include characteristics of stakeholders and operators in Enugu, network
fraud dynamics, fraud detection techniques in place, changing patterns
of fraudsters, in the study area, among others. Example of secondary
data to be collected include age distribution, educational qualification
and assessment of levels of respondents, among others
The individuals in the metropolis will be grouped into two main strata
(network operators and stakeholders) which exhibit definite
characteristics such as age and educational levels. The simple random
sampling method will then be use to select individual from stratum.
EXPECTED OUTCOMES
Successful completion of this research work will achieve the following
implemented sub- system:
1. Mobile and stationary data gathering agents that collect system logs
and audit data and render them into common format.
2. Low level agents that monitor and classify ongoing activities, classify
events, and pass on this information to higher level agents and to
each other.
3. High level agents would provide a high- level intrusion detector,
able to analyze intrusions over the whole system, execute counter
measures, and support the system administration in their pursuit of
attackers.
4. Multiple intelligent agents that use machine learning to acquire
predictive rules for intrusion detection from system logs and audit
data identify and react to coordinated intrusions on multiple
subsystems.
REFERENCES
Agust in Orfile, Javier Carb’ o and Arturo Ribagorda (2005). Intrusion Detection
Effectiveness Improvement by a multi- agent System, Technomathematics
Research Foundation. International Journal of computer science &
applications, Vol. 2, No. 1,pp.1-6.
Bakpo,F.S.(2007) Application of artificial Neural Networks in Detection of Financial
Crimes in Nigeria, Ph.D thesis, Department of Computer Science and
Engineering, Enugu State University of Science and Technology.
Balasubramaniyan, J.S, Garcia- Fernandez, J.O. isaco, Spafford,E. and Zamboni,D.
(December 1998). An Architecture for Intrusion Detection using
Autonomous Agents, 14th IEEE computer security Application Conference
ACSAC
’98,
pages
13-24,
(online:
http://www.cs.umbc.edu/cadip/docs/NetworkIntrusion/tr9805.ps).
Behrouz, A. Forouzan (2004). Data Communications and Networking, Tata McGrawHill Edition, Tata McGraw- Hill Publishing Company Limited, 7 West Patel
Nagar, New Delhi 110 008.
Blavette,V.(May 2001) Application of intelligent techniques to telecommunication
fraud detection. In European Institute for Research and Strategic Studies
in Telecommunications, Public Project 2000, page1
.online:
http://www.eurscom.de/public/projects/p1000-seriesP1007 default.
Buchanan, William (2000). Distributed Systems and Networks, MCGraw- Hill
International (UK) Limited, Shoppe hangers Road, Maindenhead,
Berkshire, SL.6.2QL, England.
Carvet, C.J. Hill,J. Surdu, and Pooch ,U,(2000).A Methodology for using intelligent
Agents to provide Automated Intrusion Response. Proceedings of IEEE
Systems, Man, and Cybernetics Information Assurance and Security
Workshop, IEEE Computer society Press, New York, U.S.
Ezawa, K.J. and Norton, S.W ( 1996) Constructing Bayesian networks to predict
uncollectible telecommunications accounts, Journal of IEEE Expert, 11(5):
45-51.