A NEW GROUP KEY MANAGEMENT STRUCTURE FOR FRAUDULENT INTERNET BANKING PAYMENTS DETECTION

Osama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan

2007

Abstract

Fraudulent payments detection in the banking system is an extremely important form of risk management as the industry loses close to one billion dollars annually. New techniques in detecting fraud are evolving and can be applied to many business fields. However; there is still no efficient detection mechanism able to identify fraudulent activity by employees. This paper presents a new Group Key Management (GKM) structure to facilitate internal fraudulent banking payments detection by dynamically combining an Individual Key (IK) and a Group Key (GK). The main objective of the proposed mechanism is to identify internal fraudulent users and trace their records amongst other group members.

References

  1. Angiulli, F.; Basta, S.; Pizzuti, C.; Feb. 2006: "Distancebased detection and prediction of outliers " Knowledge and Data Engineering, IEEE Transactions on Digital Object Identifier 10.1109/TKDE.2006.29 Volume 18, Issue 2, Feb. 2006 Page(s):145 - 160
  2. Donal O'Mahony, Michael Peirce, and Hitesh Tewari. Electronic Payment Systems for E-Commerce. Artech House, 2001. Second edition.
  3. Ghosh, S.; Reilly, D.L, "Credit card fraud detection with a neural-network", 1994, IEEE System Sciences,. Vol.III: Information Systems: Decision Support and Knowledge-Based Systems, Proceedings of the Twenty-Seventh Hawaii International Conference on , Volume: 3, pp.621-630, 4-7 Jan. 1994
  4. Harney H., Andrea Colegrove and Patrick McDaniel. "Principles of Policy in Secure Groups" . Proceedings of Network and Distributed Systems Security 2001. Internet Society, February 2001. San Diego, CA
  5. Harney H. and Muckenhirn C., 1997 “Group Key Management Protocol (GKMP) Architecture” RFC 2094,
  6. Jan C, Jean-Marc Piveteau, and Markus Stadler. An Efficient Fair Payment System. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, pages 88{94, March 1996.
  7. Jon M. Peha, Ildar M. Khamitov, "PayCash: 2003, a secure efficient Internet payment system", Proceedings of the 5th international conference on Electronic commerce, Pittsburgh, Pennsylvania, pp.125-130,
  8. Joris C, Valentin Dem, Danny De Cock, Bart Preneel, and Joos Vandewalle. 2002, On the Security of Today's Online Electronic Banking Systems. Computers & Security, 21(3):253{265,
  9. Medvinsky, G. & Neuman, B. C. (1993). Netcash: A design for practical electronic currency on the internet. Proceedings Of First ACM Conference On Computer and Communication Security, ACM.
  10. Patiwat P, "Money in electronic commerce: digital cash, electronic fund transfer, and Ecash", 1996 Communications of the ACM, Volume 39, Issue 6, pp.45-50,
  11. Ren, D.; Rahal, I.; Perrizo, W.; 2004 "A vertical outlier detection algorithm with clusters as by-product" Tools with Artificial Intelligence, 2004. ICTAI 2004. 16th IEEE International Conference on Digital Object Identifier 10.1109/ICTAI.2004.22, 15-17 Nov. 2004 Page(s):22 - 29
  12. Rodeh O.,et al.,"Optimized Group Rekey for Group Communication Systems" Network and Distributed System Security 2000, San Diego, CA , February 2000
  13. Sherman A.T., McGrew D.A., “Key Establishment in large dynamic Group Using One-Way function Trees” IEEE on software engineering vol. 29, no. 5, 2003, pp. 444-458
  14. Thomas Hardjono, Mark Baugher, Hugh Harney, "Group Key Management for IP Multicast: Model & Architecture," wetice, p. 223, Tenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2001.
  15. Wong C., Gouda M., Lam S., 2000 “Secure Group Communications Using Key Graphs” IEEE networking vol. 8, no. 1, pp. 16-30
  16. Xiu Li; Bing Li; Lin Lei; Jianyong Tuo; Shouju Ren; Wenhuang Liu; 2004 Artificial immune system for fraud detection Systems, Man and Cybernetics, 2004 IEEE, Volume 2, Page(s):1407 - 1411 vol.2,Digital Object Identifier 10.1109/ICSMC.2004.1399827
  17. Zhuang Y, Simon Fong, 2004 On Designing a Flexible EPayment System with Fraud Detection Capability, 2004 IEEE
Download


Paper Citation


in Harvard Style

Dandash O., Wang Y., Dung Le P. and Srinivasan B. (2007). A NEW GROUP KEY MANAGEMENT STRUCTURE FOR FRAUDULENT INTERNET BANKING PAYMENTS DETECTION . In Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 4: ICEIS, ISBN 978-972-8865-91-7, pages 57-62. DOI: 10.5220/0002356800570062


in Bibtex Style

@conference{iceis07,
author={Osama Dandash and Yiling Wang and Phu Dung Le and Bala Srinivasan},
title={A NEW GROUP KEY MANAGEMENT STRUCTURE FOR FRAUDULENT INTERNET BANKING PAYMENTS DETECTION},
booktitle={Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 4: ICEIS,},
year={2007},
pages={57-62},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002356800570062},
isbn={978-972-8865-91-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Ninth International Conference on Enterprise Information Systems - Volume 4: ICEIS,
TI - A NEW GROUP KEY MANAGEMENT STRUCTURE FOR FRAUDULENT INTERNET BANKING PAYMENTS DETECTION
SN - 978-972-8865-91-7
AU - Dandash O.
AU - Wang Y.
AU - Dung Le P.
AU - Srinivasan B.
PY - 2007
SP - 57
EP - 62
DO - 10.5220/0002356800570062