Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
A MULTI - AGENT FRAUD DETECTION SYSTEM FOR DATA COMMUNICATION NETWORKS BY OKOZOR NKEIRUKA PETROLINA DEPARTMENT OF ELECTRONIC AND COMPUTER ENGINEERING NNAMDI AZIKIWE UNIVERSITY, AKWA AUGUST 2015 BACKGROUND OF THE STUDY Data communication fraud occurs whenever a perpetrator uses deception to receive services free of charge or at a reduced rate, thereby violating existing legislation governing the economic activities of government and its administration. It is a worldwide problem with substantial annual revenue losses for many companies. Globally, data communications fraud is estimated at about 100billion US dollars. In the United State of America, data communication fraud is generally considered to deprive network operators of approximately 5 percent of their revenue. However, it is difficult to provide precise estimates since some fraud may never be detected, and the operators are reluctant to reveal figures on fraud losses. The situation can significantly be worse for mobile operators in Africa for, as a result of fraud, they become liable for large hard currency payments to foreign network operators. Thus, data communication fraud is a significant problem which needs to be addressed, detected and prevented in the strongest possible manner. AIM AND OBJECTIVES The aim of this thesis is to theoretical and empirical investigation of computer intrusion fraud by the identification of channels through which they are largely perpetrated and design of a Multi- Agent fraud detection system for property management network. The broad objective of this study is to design and implement a MultiAgent fraud Detection System for Data Communication Networks. The specific Objectives include: 1. Developing and implementing a novel software for automatic data collection and online intrusion detection that interfaces with a property management network in an intranet setting using industry standard protocols (ie specifically Transmission Control Protocol/ Internet protocol (TCP/IP) since the intranet uses internet technology to operate). 2. Developing fraud detection agents using JavaScript objects to run secretly in the background of the property (real estate) Management Network. These shall comprise multiple intelligent agents which will roam the network, adaptively generate models from the transaction database and discover transactions (fraudulent activities) entering on real-time basis which deviate significantly from the norm. The intelligent agents collaborate to share information on suspicious events and determine when to be more vigilant or more relaxed in a manner that is difficult to achieve by an individual agent or monolithic system. 3. Implementing the real Estate Management business application in PHP language. By this, large volumes of transactions from an organization’s transaction network can be received in real-time, and the intelligent agents are able to derive new rules or models if they receive new inputs. Each transaction is further captured in a transaction table similar to log files. 4. Developing machine learning agents that use a meta-learning technique to produce a score that labels a particular transaction as being legal or fraudulent. The score is compared to a threshold value that define measures such as number of successful or failed transactions, the duration of transactions, restriction of available services, and analysis of each other transaction-related data. 5. Developing a user interface that flags suspect transactions within seconds, without the knowledge of the perpetrator for further investigations and subsequent decision- making. This enables operators to respond to fraud by detection, service denial and prosecutions against fraudulent users. RESEARCH METHODOLOGY Opinions of stakeholders and data communication operators in Enugu metropolis, capital of Enugu State of Nigeria will be gathered. The selection of the study area was influenced by the sufficient availability of network resources, and vibrant individuals knowledgeable on the concept, universality and potential danger of network related frauds. The primary sources of data includes the use of questionnaires, observations, discussions and interviews while secondary data will be gathered from secondary sources such as books, journals and internet sources among others. The types of primary data to be collected include characteristics of stakeholders and operators in Enugu, network fraud dynamics, fraud detection techniques in place, changing patterns of fraudsters, in the study area, among others. Example of secondary data to be collected include age distribution, educational qualification and assessment of levels of respondents, among others The individuals in the metropolis will be grouped into two main strata (network operators and stakeholders) which exhibit definite characteristics such as age and educational levels. The simple random sampling method will then be use to select individual from stratum. EXPECTED OUTCOMES Successful completion of this research work will achieve the following implemented sub- system: 1. Mobile and stationary data gathering agents that collect system logs and audit data and render them into common format. 2. Low level agents that monitor and classify ongoing activities, classify events, and pass on this information to higher level agents and to each other. 3. High level agents would provide a high- level intrusion detector, able to analyze intrusions over the whole system, execute counter measures, and support the system administration in their pursuit of attackers. 4. Multiple intelligent agents that use machine learning to acquire predictive rules for intrusion detection from system logs and audit data identify and react to coordinated intrusions on multiple subsystems. REFERENCES Agust in Orfile, Javier Carb’ o and Arturo Ribagorda (2005). Intrusion Detection Effectiveness Improvement by a multi- agent System, Technomathematics Research Foundation. International Journal of computer science & applications, Vol. 2, No. 1,pp.1-6. Bakpo,F.S.(2007) Application of artificial Neural Networks in Detection of Financial Crimes in Nigeria, Ph.D thesis, Department of Computer Science and Engineering, Enugu State University of Science and Technology. Balasubramaniyan, J.S, Garcia- Fernandez, J.O. isaco, Spafford,E. and Zamboni,D. (December 1998). An Architecture for Intrusion Detection using Autonomous Agents, 14th IEEE computer security Application Conference ACSAC ’98, pages 13-24, (online: http://www.cs.umbc.edu/cadip/docs/NetworkIntrusion/tr9805.ps). Behrouz, A. Forouzan (2004). Data Communications and Networking, Tata McGrawHill Edition, Tata McGraw- Hill Publishing Company Limited, 7 West Patel Nagar, New Delhi 110 008. Blavette,V.(May 2001) Application of intelligent techniques to telecommunication fraud detection. In European Institute for Research and Strategic Studies in Telecommunications, Public Project 2000, page1 .online: http://www.eurscom.de/public/projects/p1000-seriesP1007 default. Buchanan, William (2000). Distributed Systems and Networks, MCGraw- Hill International (UK) Limited, Shoppe hangers Road, Maindenhead, Berkshire, SL.6.2QL, England. Carvet, C.J. Hill,J. Surdu, and Pooch ,U,(2000).A Methodology for using intelligent Agents to provide Automated Intrusion Response. Proceedings of IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, IEEE Computer society Press, New York, U.S. Ezawa, K.J. and Norton, S.W ( 1996) Constructing Bayesian networks to predict uncollectible telecommunications accounts, Journal of IEEE Expert, 11(5): 45-51.