Abstract
Identity crime has increased enormously over the recent years. Spike detection is important because it highlights sudden and sharp rises in intensity relative to the current identity attribute value (which can be indicative of abuse). This paper proposes the new spike analysis framework for monitoring sparse personal identity streams. For each identity example, it detects spikes in single attribute values and integrates multiple spikes from different attributes to produce a numeric suspicion score. Although only temporal representation is examined here, experimental results on synthetic and real credit applications reveal some conditions on which the framework will perform well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Arasu, A., Babcock, B., Babu, S., Datar, M., Ito, K., Nishizawa, I., Rosenstein, J., Widom, J.: STREAM: The Stanford Stream Data Manager Demonstration description - short overview of system status and plans. In: Proceedings of SIGMOD 2003 (2003)
Balakrishnan, H., Balazinska, M., Carney, D., Çetintemel, U., Cherniack, M., Convey, C., Galvez, E., Salz, J., Stonebraker, M., Tatbul, N., Tibbetts, R., Zdonik, S.: Retrospective on Aurora. VLDB Journal 13(4), 370–383 (2004)
Caruana, R., Niculescu-Mizil, A.: Data Mining in Metric Space: An Empirical Analysis of Supervised Learning Performance Criteria. In: Proceedings of SIGKD 2004, pp. 69–78 (2004)
Christen, P.: Probabilistic Data Generation for Deduplication and Data Linkage. In: Gallagher, M., Hogan, J.P., Maire, F. (eds.) IDEAL 2005. LNCS, vol. 3578, pp. 109–116. Springer, Heidelberg (2005)
Cook, M.: Fraud and ID Theft – The Lowdown on Fraud Rings. In: Collections and Credit Risk 10 (2005)
Fawcett, T., Provost, F.: Activity Monitoring: Noticing Interesting Changes in Behaviour. In: Proceedings of SIGKD 1999, pp. 53–62 (1999)
Goldenberg, A., Shmueli, G., Caruana, R.: Using Grocery Sales Data for the Detection of Bio-Terrorist Attacks. In: Statistical Medicine (submitted, 2002)
Keogh, E., Chu, S., Hart, D., Pazzani, M.: Segmenting Time Series: A Survey and Novel Approach. In: Last, M., Kandel, A., Horst, B. (eds.) Data Mining in Time Series Databases, World Scientific, Singapore (2004)
Kleinberg, J.: Bursty and Hierarchical Structure in Streams. In: Proceedings of SIGKD 2002, pp. 91–101 (2002)
Kleinberg, J.: Temporal Dynamics of On-Line Information Streams. In: Garofalakis, M., Gehrke, J., Rastogi, R. (eds.) Data Stream Management: Processing High-Speed Data Streams, Springer, Heidelberg (2005)
Montgomery, D.: Introduction to Statistical Quality Control, 4th edn. John Wiley and Sons Inc., Chichester
Percival, D., Walden, A.: Wavelet Methods for Time Series Analysis (WMTSA). Cambridge University Press, Cambridge (2000)
Phua, C., Lee, V., Gayler, R., Smith, K.: A Comprehensive Survey of Data Mining-based Fraud Detection Research. Artificial Intelligence Review (submitted)
Phua, C., Gayler, R., Lee, V., Smith, K.: On the Approximate Communal Fraud Scoring of Credit Applications. In: Proceedings of Credit Scoring and Credit Control (2005)
Roberts, S.: Control-Charts-Tests based on Geometric Moving Averages. In Technometrics, 1, 239-250
Wong, W.: Data Mining for Early Disease Outbreak Detection. PhD Thesis, Carnegie Mellon University (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Phua, C., Lee, V., Gayler, R., Smith, K. (2006). Temporal Representation in Spike Detection of Sparse Personal Identity Streams. In: Chen, H., Wang, FY., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds) Intelligence and Security Informatics. WISI 2006. Lecture Notes in Computer Science, vol 3917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734628_14
Download citation
DOI: https://doi.org/10.1007/11734628_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33361-6
Online ISBN: 978-3-540-33362-3
eBook Packages: Computer ScienceComputer Science (R0)