Use of the Dempster-Shafer theory for fraud detection: The mobile money transfer case study

11Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security Information and Event Management (SIEM) systems are largely used to process logs generated by both hardware and software devices to assess the security level of service infrastructures. This log-based security analysis consists in correlating massive amounts of information in order to detect attacks and intrusions. In order to make this analysis more accurate and effective we propose an approach based on the Dempster-Shafer theory, that allows for combining evidence from multiple and heterogeneous data sources and get to a degree of belief that takes into account all the available evidence. The proposed approach has been validated with the respect to a challenging demonstration case, namely the detection of frauds performed against a Mobile Money Transfer service. An extensive simulation campaign has been executed to assess the performance of the proposed approach and the experimental results are presented in this paper.

Cite

CITATION STYLE

APA

Coppolino, L., D’Antonio, S., Formicola, V., Massei, C., & Romano, L. (2015). Use of the Dempster-Shafer theory for fraud detection: The mobile money transfer case study. Studies in Computational Intelligence, 570, 465–474. https://doi.org/10.1007/978-3-319-10422-5_48

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free