Break Detection Systems
نویسنده
چکیده
This paper discusses a subclass of fraud detection systems known as break detection systems. A number of AI techniques have proven effective in fraud detection; however break detection systems address more complex problems than have typically been reported. Problems addressed by break detection systems are characterized not only by dynamic data with complicated temporal and other relationships, but also by changing types of fraudulent behavior. Furthermore, the available data usually does not provide the appropriate representation for direct search. In particular, we note the essential role of consolidation and linkage in these systems to build abstractions that can support break detection. The authors have had experience designing and building two break detection systems in related domains of financial transactions one to discover occurrences of money laundering involving large cash transactions reported to the U.S. Treasury, the other to discover potentially violative behavior of stock broker/dealers in the Nasdaq Stock Market. We discuss problem domain characteristics, AI techniques, and lessons learned about break detection in the context of the architectures of these systems.
منابع مشابه
Exploiting Software How to Break Code
How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want ...
متن کاملCurrent Intrusion Detection Techniques in Information Technology - A Detailed Analysis
It is a known fact that computer and network systems have certain design flaws which leads to security hazards. Intruders can exploit the security flaws and break the computer systems, and is very expensive and sometimes nearly impossible to fix all the design and programming errors. This suggests that prevention-based approaches are no more reliable and hence intrusion detection is needed as a...
متن کاملUnlimited Vocabulary Grapheme to PhonemeConversion with Probabilistic Phrase Break Detection
This paper describes a grapheme-to-phoneme conversion method using phoneme con-nectivity and CCV conversion rules with probabilistic phrase break detection. The method consists of mainly four modules including phrase-break detection, morpheme normalization, morpheme to phoneme conversion and phoneme connectivity check. In the experiments with a test corpus of 210 sentences, we achieved 85% of p...
متن کاملStatistical / Rule - based Hybrid Phrase Break
In this paper, we present a new phrase break detection architecture that integrates proba-bilistic approach with rule-based error correction. The architecture consists of a probabilis-tic phrase break detector and a transformational rule-based post error corrector. The probabilistic method alone usually suuers from performance degradation due to inherent data sparseness problems. So we adopted ...
متن کاملReducing False Positives in Video Shot Detection Using Learning Techniques
Video has become an interactive medium of daily use today. However, the sheer volume of the data makes it extremely difficult to browse and find required information. Organizing the video and locating required information effectively and efficiently presents a great challenge to the video retrieval community. This demands a tool which would break down the video into smaller and manageable units...
متن کامل