Chrystel Gaber, B. Hemery, Mohammed Achemlal, M. Pasquet, P. Urien
{"title":"用于移动传输服务中欺诈检测的合成日志生成器","authors":"Chrystel Gaber, B. Hemery, Mohammed Achemlal, M. Pasquet, P. Urien","doi":"10.1109/CTS.2013.6567225","DOIUrl":null,"url":null,"abstract":"Mobile payments become more and more popular and thus are very attractive targets for fraudsters. As the latter always find new ways to commit crimes and avoid detection, research in the field of fraud is always evolving. However, transactional data and feedback from existing services are lacking. This article addresses this issue by proposing a synthetic data generator. Our idea is to model the behavior of various actors to generate testing data that researchers can use to evaluate approaches for identifying fraudulent transactions. This paper presents our approach and prototype. The logs generator was evaluated by comparing the generated synthetic logs with real ones.","PeriodicalId":256633,"journal":{"name":"2013 International Conference on Collaboration Technologies and Systems (CTS)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":"{\"title\":\"Synthetic logs generator for fraud detection in mobile transfer services\",\"authors\":\"Chrystel Gaber, B. Hemery, Mohammed Achemlal, M. Pasquet, P. Urien\",\"doi\":\"10.1109/CTS.2013.6567225\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile payments become more and more popular and thus are very attractive targets for fraudsters. As the latter always find new ways to commit crimes and avoid detection, research in the field of fraud is always evolving. However, transactional data and feedback from existing services are lacking. This article addresses this issue by proposing a synthetic data generator. Our idea is to model the behavior of various actors to generate testing data that researchers can use to evaluate approaches for identifying fraudulent transactions. This paper presents our approach and prototype. The logs generator was evaluated by comparing the generated synthetic logs with real ones.\",\"PeriodicalId\":256633,\"journal\":{\"name\":\"2013 International Conference on Collaboration Technologies and Systems (CTS)\",\"volume\":\"181 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"24\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Collaboration Technologies and Systems (CTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CTS.2013.6567225\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Collaboration Technologies and Systems (CTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CTS.2013.6567225","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Synthetic logs generator for fraud detection in mobile transfer services
Mobile payments become more and more popular and thus are very attractive targets for fraudsters. As the latter always find new ways to commit crimes and avoid detection, research in the field of fraud is always evolving. However, transactional data and feedback from existing services are lacking. This article addresses this issue by proposing a synthetic data generator. Our idea is to model the behavior of various actors to generate testing data that researchers can use to evaluate approaches for identifying fraudulent transactions. This paper presents our approach and prototype. The logs generator was evaluated by comparing the generated synthetic logs with real ones.