You are on page 1of 2

AI Magazine Volume 19 Number 2 (1998) (© AAAI)

Workshop Report

ing of accuracy for timely decisions,


AI Approaches to Fraud and social issues (privacy, discrimina-
tion, “redlining”). The following para-
Detection and graphs amplify a few of these issues.
First, the probability of a bad event

Risk Management is extremely small in certain contexts,


ranging from three to four percent of
consumer credit delinquencies to frac-
tions of one percent of fraudulent
transactions.
Tom Fawcett, Ira Haimowitz, Foster Provost, Second, unequal, often business-
driven weights are given to false posi-
and Salvatore Stolfo tive and false negative predictions. A
false negative means that fraud, bad
credit, or intrusion passes unnoticed,
with potential loss of revenue or secu-
rity. However, a false positive means a
■ The 1997 AAAI Workshop on AI researchers and practitioners doing false accusation of fraud or risk that
Approaches to Fraud Detection and Risk work in these three related areas. might send away a valuable customer;
Management brought together over 50 Risk management, fraud detection, lose money in challenging what is oth-
researchers and practitioners to discuss and intrusion detection all involve erwise a legitimate transaction; or, in
problems of fraud detection, computer
monitoring the behavior of popula- extreme cases, be the flash point for
intrusion detection, and risk scoring.
tions of users (or their accounts) to litigation.
This article presents highlights, includ-
ing discussions of problematic issues estimate, plan for, avoid, or detect risk. Third, the patterns of the bad inci-
that are common to these application In his paper, Til Schuermann (Oliver, dents change over time. For example,
domains, and proposed solutions that Wyman, and Company) categorizes as fraud-detection systems become
apply a variety of AI techniques. risk into market risk, credit risk, and more accurate, the perpetrators invent
operating risk (or fraud). Similarly, Bar- new means of committing unde-

T
he Workshop on AI Approaches ry Glasgow (Metropolitan Life Insur- tectable fraud.
to Fraud Detection and Risk ance Co.) discusses inherent risk versus The working notes contain 16
Management, held in conjunc- fraud. This workshop focused primari- papers, 10 of which were selected for
tion with the Fourteenth National ly on what might loosely be termed presentation at the workshop. These
Conference on Artificial Intelligence “improper behavior,” which includes 10 papers were grouped into 3 cate-
(AAAI-97), was held in Providence, fraud, intrusion, delinquency, and gories. Four papers address issues in
Rhode Island, on 27 July 1997. There account defaulting. However, Glasgow applying classification techniques to
were over 50 attendees, with a bal- does discuss the estimation of “inher- fraud and risk problems, including the
anced mix of university and industry ent risk,” which is the bread and butter use of clustering techniques to gener-
researchers. The organizing committee of insurance firms. ate class labels (Haimowitz and Henry
consisted of Tom Fawcett and Foster Problems of predicting, preventing, Schwarz of GE), the use of techniques
Provost of Bell Atlantic Science and and detecting improper behavior share from decision analysis and ROC analy-
Technology, Ira Haimowitz of General characteristics that complicate the sis to deal with uncertain and chang-
Electric Corporate Research and Devel- application of existing AI and ma- ing costs and class distributions
opment, and Salvatore Stolfo of chine-learning technologies. In partic- (Provost and Fawcett), and the use of
Columbia University. ular, these problems often have or metalearning techniques to address the
The purpose of the workshop was to require more than one of the following necessity of information hiding among
gather researchers and practitioners that complicate the technical problem collaborating but competing institu-
working in the areas of risk manage- of automatically learning predictive tions (Stolfo, David Fan, Wenke Lee,
ment, fraud detection, and computer models: large volumes of (historical) and Andreas Prodomidis, all of
intrusion detection. We sought partic- data, highly skewed distributions (“im- Columbia University, and Phillip Chan
ipants to discuss and explore common proper behavior” occurs far less fre- of Florida Institute of Technology).
issues in the application of AI tech- quently than “proper behavior”), Three papers presented approaches
nologies to these problems, share their changing distributions (behaviors to modeling legitimate behavior for
experiences in deploying AI approach- change over time), widely varying error the detection of anomalous activity to
es and techniques, and develop a costs (in certain contexts, false positive detect fraud or intrusions. These
deeper understanding of both the errors are far more costly than false papers addressed the problem that
complexity of the problems and the negatives), costs that change over time, examples of improper behavior might
effectiveness of various solutions. To adaptation of undesirable behavior to be scarce and that any database of
our knowledge, this workshop was the detection techniques, changing pat- improper behavior is unlikely to be
first forum bringing together terns of legitimate behavior, the trad- complete. Thus, patterns of proper

Copyright © 1998, American Association for Artificial Intelligence. All rights reserved. 0738-4602-1998 / $2.00 SUMMER 1998 107
Workshop Report

users must be learned and represented. the lack of existing knowledge and the and what information is illegal to use
Peter Burge and John Shawe-Taylor existence of intelligent adversaries is for risk-based discrimination. Gooday,
(both of Royal Halloway University) problematic for building intelligent in particular, said that sufficient
use adaptive prototypes, or statistical systems. Fortunately, several papers attributes are available for credit scor-
behavior profiles of nonfraudulent showed that machine-learning tech- ing, but new innovations must be
behaviors, combined with pattern- niques have matured to a level where applied to improve performance.
matching techniques. Partial pattern they can help to elicit knowledge from Our hope was for the workshop to
matching is also used by Terran Lane historical data sets and can allow sys- facilitate interaction between research-
and Carla Brodley (both of Purdue tems to adapt to changing environ- ers and practitioners, focus on the
University), who represent sequences ments as new data become available commonalities among fields previous-
of transactions for acceptable users. from recent experience. The tech- ly treated in isolation, and provide
Jake Ryan, Meng-Jang Lin, and Risto niques reported on include adaptive cross-fertilization among the fields. We
Miikulainen (all of University of Texas) user profiling, unsupervised learning thank the authors and attendees for
train backpropagation neural networks (for example, clustering), various clas- their efforts and enthusiasm in making
to recognize the typical commands of sification and regression models (for this possible. We are indebted to the
a computer user. An anomaly is sig- example, neural nets, rule learners, American Association for Artificial
naled if the neural network does not decision trees), link analysis, sequence Intelligence for organizational and
classify the new commands as the matching, and fuzzy logic. funding assistance; Ray Mooney, chair
actual log-on identification. Another issue is that the decision- of the AAAI-97 Workshop Committee;
Finally, three papers look beyond support scenarios needed for these and our anonymous workshop-pro-
currently implemented systems and problems are more complex than the posal reviewers for their suggestions
prototypes for a view of what future simple classification problems treated and encouragement.
systems should address, especially for in much of the AI literature. Several Tom Fawcett is a researcher in machine
the coming age of ubiquitous electron- workshop papers address this issue by learning and data mining at Bell Atlantic
ic commerce. In particular, systems combining multiple methods. For Science and Technology in White Plains,
should be able to deal with data at example, Fawcett and Provost com- New York. He received a Ph.D. from the
University of Massachusetts at Amherst. His
many different levels of aggregation bine data mining, profiling, and classi-
research interests include the effect of repre-
(transactions, sequences of transac- fier learning; Haimowitz and Schwarz
sentation on induction, time-series prob-
tions, accounts). Suhayya Abu-Hakima, combine unsupervised and supervised lems, and the application of machine learn-
Mansour Toloo, and Tony White (all of learning. Goldberg and Senator use ing to real-world problems. His e-mail
National Research Council of Canada) link analysis to identify and define address is fawcett@basit.com.
note that systems should look beyond entities (for example, collaborators in Ira Haimowitz is employed at General
these aggregations to groups of crime). Several authors look at se- Electric Corporate Research and Develop-
accounts and transactions, for exam- quences of actions, rather than indi- ment. His research and application interests
ple, to identify collusive agents; they vidual actions, to examine context and include data mining, database marketing,
should transcend traditional systems- infer fraudulent intent. risk management, and automated trend
oriented boundaries, and they might There were also common technical detection. He received his Ph.D. in comput-
be better viewed as investigative tools issues that authors had to deal with, er science from the Massachusetts Institute
of Technology in 1994.
instead of stand-alone solutions. David including lack of data on fraudulent
Jensen (University of Massachusetts) behavior, lack of labeled data, skewed Foster Provost’s research concentrates
on weakening the simplifying assumptions
discussed a government-driven pros- class distributions, large volumes of
that prevent inductive algorithms from
pective assessment of AI technologies data, and the protection of sensitive
being applied successfully. He received his
for fraud detection. Henry Goldberg information. Ph.D. in computer science from the Univer-
and Ted Senator (both of NASD Regula- A panel discussion at the day’s end sity of Pittsburgh in 1992, has worked on
tion) highlight “break detection” as a focused on consumer privacy. In this automated knowledge discovery in science,
challenging and ever-increasing prob- era of ever-abundant online informa- and is currently with Bell Atlantic Science
lem, requiring analysis of dynamic tion about individuals, corporations and Technology.
sequences of transactions. The papers and governments can use private infor- Salvatore J. Stolfo is professor of com-
contained a wide variety of application mation to help predict a person’s credit puter science at Columbia University and
domains relevant to law enforcement, worthiness or one’s fraudulent behav- codirector of the University of Southern Cal-
including cellular cloning, tumbling ior. Generally speaking, there are more ifornia/Information Sciences Institute and
and subscription fraud, insurance restrictions on the use of demographic Columbia Center for Applied Research in
Digital Government Information Systems.
fraud, credit card fraud, money laun- and personal attributes for risk man-
His most recent research has focused on dis-
dering, securities fraud, check fraud, agement than there are for targeted
tributed data-mining systems with applica-
and computer intrusion. marketing. David Janzen (Sprint), John tions to fraud and intrusion detection in
Many issues surfaced from the Gooday (Equifax), and Barry Glasgow network information systems. He has been
papers and the workshop discussions (Met Life) each elaborated on what awarded 9 patents in the areas of parallel
regarding specific difficulties for build- information is necessary or superfluous computing and database inference and has
ing models and detectors. In particular, for catching fraud and delinquency cofounded two high-tech companies.

108 AI MAGAZINE

You might also like