Title: Identification of Suspicious, Unknown Event Patterns in an Event Cloud
1Identification of Suspicious, Unknown Event
Patterns in an Event Cloud
DEBS 2007 June 20-22, 2007 Toronto
Alexander Widder, CITT Rainer von Ammon,
CITT Philippe Schaeffer, TÜV Rheinland Christian
Wolff, University of Regensburg
2Table of Contents
- Used fraud management methods and event patterns
- Unknown event patterns
- Possible detection methods
- Discriminant analysis approach
- Next steps
3Used Fraud Management Methods
CyberSource. Third Annual UK Online Fraud Report.
http//www.cybersource.co.uk/resources/fraud_repo
rt_2007, downloaded 2007-02-07.
4Simple event patterns already exist for fraud
detection from vendors like AptSoft
Examples for used patterns
AptSoft Corporation. CEP Solution.
http//www.aptsoft.com, downloaded 2006-12-22.
5Characteristics of Unknown Event Patterns
- Hypothesis The fraud patterns change permantly!
Which kinds of patterns are possible in the
future? - Problem How to define these fraud patterns and
the relationships between the occuring events?
6Principal Scenario
On suspicious pattern ALERT
CEP Engine
Possible Detection Methods??
Monitor
Event cloud of a bank
7Deterministic Approaches
Processes with stringent causal chains.
Reference Earman, J. A Primer on Determinism,
Springer-Verlag, Dordrecht, 1986.
8Probabilistic Approaches
Processes that are not stringent causal.
Reference Alon, N., Joel, H., and Spencer, J.
The Probabilistic Method, Wiley InterScience,
New York, 2000.
9Cluster Analysis
Data analysis to recognize groups of objects
which belong together, out of a basic quantity of
objects.
Reference Romesburg, C. Cluster Analysis for
Researchers, Lulu Press, Morrisville,
2004.
10Discriminant Analysis
Analysis of the difference between certain
groups of objects.
Reference Mardia, K.V., Kent, J. T., and Bibby,
J. M. Multivariate Analysis, Academic Press,
San Diego, San Francisco, New York, Boston,
London, Sidney, Tokyo, 1979.
11Fuzzy Set Theory
Method that differs not only between 0 and 1,
such as a computer system, but also defines the
gradual assessment of membership.
Reference Gottwald S. A Treatise on Many-Valued
Logics, Research Studies Press LTD, Baldock,
Hertfordshire, 2001.
12Bayesian Belief Networks
Represent conclusions on the base of unsure
knowledge.
Reference Jensen F. Bayesian Networks and
Decision Graphs, New York, 2001.
13Dempster Shafer Method
Combines information from different sources to a
total conclusion.
Reference Shafer G. A Mathematical Theory of
Evidence, Princeton University Press, 1976.
14Hidden Markov Model
Stochastic model that is described by two random
processes.
Reference Rabiner L. A Tutorial on Hidden
Markov Models and Selected Applications in Speech
Recognition, 1989.
15Discriminant Analysis Approach Process
- Determining attributes of events of interest for
the specific use case. - Computing a discriminant function on the base of
predefined historic fraud events by using a
linear system of equations. - Computing the critical discriminant value of the
discriminant function. - Computing the discriminant value of a new
occurring event by inserting its attributes in
the discriminant function. - Allocating the event to a specific group of
events by comparing the discriminant value of the
event with the critical discriminant value of the
function.
16Discriminant Analysis Approach Goals
- Creating more discriminant functions and critical
discriminant values to compare a new occurring
event with in order to obtain more accurate
groups of events and to classify events more
exactly. - At the end, a possible group should be so much
detailed that it represents an unknown event
pattern itself.
17Principal Architecture with included Discriminant
Analysis
18Tibcos CEP Reference Architecture enhanced with
Discriminant Analysis
Discriminant Analysis
Bass, T. Fraud Detection and Event Processing for
Predictive Business. http//www.tibco.com/
resources/mk/fraud_detection_i
n_cep_wp.pdf, downloaded 2007-01-31.
19Discriminant Analysis Approach Open Questions
- Which types of events are created, e.g. by a
credit card transaction and which of them are
important to detect fraud? - Which attributes of the event types are relevant
to differenciate the groups of events for
specific use cases just as credit card fraud
detection? - In which way can the relevant string attributes
be mapped to metric values?
20Next Steps
- Finishing the realisation of a prototype for the
discriminant analysis approach based on a CEP
engine. - Examining the further mentioned algorithms,
probably at first neuronal networks. - Comparing the performance of the different
algorithms. - Combining the different solutions to a more
performant solution.
21Thank you for your Attention!