Skip to main content

Temporal Representation in Spike Detection of Sparse Personal Identity Streams

  • Conference paper
Intelligence and Security Informatics (WISI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3917))

Included in the following conference series:

Abstract

Identity crime has increased enormously over the recent years. Spike detection is important because it highlights sudden and sharp rises in intensity relative to the current identity attribute value (which can be indicative of abuse). This paper proposes the new spike analysis framework for monitoring sparse personal identity streams. For each identity example, it detects spikes in single attribute values and integrates multiple spikes from different attributes to produce a numeric suspicion score. Although only temporal representation is examined here, experimental results on synthetic and real credit applications reveal some conditions on which the framework will perform well.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arasu, A., Babcock, B., Babu, S., Datar, M., Ito, K., Nishizawa, I., Rosenstein, J., Widom, J.: STREAM: The Stanford Stream Data Manager Demonstration description - short overview of system status and plans. In: Proceedings of SIGMOD 2003 (2003)

    Google Scholar 

  2. Balakrishnan, H., Balazinska, M., Carney, D., Çetintemel, U., Cherniack, M., Convey, C., Galvez, E., Salz, J., Stonebraker, M., Tatbul, N., Tibbetts, R., Zdonik, S.: Retrospective on Aurora. VLDB Journal 13(4), 370–383 (2004)

    Article  Google Scholar 

  3. Caruana, R., Niculescu-Mizil, A.: Data Mining in Metric Space: An Empirical Analysis of Supervised Learning Performance Criteria. In: Proceedings of SIGKD 2004, pp. 69–78 (2004)

    Google Scholar 

  4. Christen, P.: Probabilistic Data Generation for Deduplication and Data Linkage. In: Gallagher, M., Hogan, J.P., Maire, F. (eds.) IDEAL 2005. LNCS, vol. 3578, pp. 109–116. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Cook, M.: Fraud and ID Theft – The Lowdown on Fraud Rings. In: Collections and Credit Risk 10 (2005)

    Google Scholar 

  6. Fawcett, T., Provost, F.: Activity Monitoring: Noticing Interesting Changes in Behaviour. In: Proceedings of SIGKD 1999, pp. 53–62 (1999)

    Google Scholar 

  7. Goldenberg, A., Shmueli, G., Caruana, R.: Using Grocery Sales Data for the Detection of Bio-Terrorist Attacks. In: Statistical Medicine (submitted, 2002)

    Google Scholar 

  8. Keogh, E., Chu, S., Hart, D., Pazzani, M.: Segmenting Time Series: A Survey and Novel Approach. In: Last, M., Kandel, A., Horst, B. (eds.) Data Mining in Time Series Databases, World Scientific, Singapore (2004)

    Google Scholar 

  9. Kleinberg, J.: Bursty and Hierarchical Structure in Streams. In: Proceedings of SIGKD 2002, pp. 91–101 (2002)

    Google Scholar 

  10. Kleinberg, J.: Temporal Dynamics of On-Line Information Streams. In: Garofalakis, M., Gehrke, J., Rastogi, R. (eds.) Data Stream Management: Processing High-Speed Data Streams, Springer, Heidelberg (2005)

    Google Scholar 

  11. Montgomery, D.: Introduction to Statistical Quality Control, 4th edn. John Wiley and Sons Inc., Chichester

    Google Scholar 

  12. Percival, D., Walden, A.: Wavelet Methods for Time Series Analysis (WMTSA). Cambridge University Press, Cambridge (2000)

    Book  MATH  Google Scholar 

  13. Phua, C., Lee, V., Gayler, R., Smith, K.: A Comprehensive Survey of Data Mining-based Fraud Detection Research. Artificial Intelligence Review (submitted)

    Google Scholar 

  14. Phua, C., Gayler, R., Lee, V., Smith, K.: On the Approximate Communal Fraud Scoring of Credit Applications. In: Proceedings of Credit Scoring and Credit Control (2005)

    Google Scholar 

  15. Roberts, S.: Control-Charts-Tests based on Geometric Moving Averages. In Technometrics, 1, 239-250

    Google Scholar 

  16. Wong, W.: Data Mining for Early Disease Outbreak Detection. PhD Thesis, Carnegie Mellon University (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Phua, C., Lee, V., Gayler, R., Smith, K. (2006). Temporal Representation in Spike Detection of Sparse Personal Identity Streams. In: Chen, H., Wang, FY., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds) Intelligence and Security Informatics. WISI 2006. Lecture Notes in Computer Science, vol 3917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734628_14

Download citation

  • DOI: https://doi.org/10.1007/11734628_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33361-6

  • Online ISBN: 978-3-540-33362-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics