Fraud and financial crime detection model using malware forensics

Ae Chan Kim, Seongkon Kim, Won Hyung Park, Dong Hoon Lee

Research output: Contribution to journalArticle

4 Citations (Scopus)

Abstract

Recently various electronic financial services are provided by development of electronic devices and communication technology. By diversified electronic financial services and channels, users of none face-to-face electronic financial transaction services continuously increase. At the same time, under financial security environment, leakage threats of inside information and security threats against financial transaction users steadily increase. Accordingly, in this paper, based on framework standards of financial transaction detection and response, digital forensics techniques that has been used to analyze system intrusion incidents traditionally is used to detect anomaly transactions that may occur in the user terminal environment during electronic financial transactions. Particularly, for the method to analyze user terminals, automated malware forensics techniques that is used as supporting tool for malware code detection and analysis is used, and for the method to detect anomaly prior behaviors and transaction patterns of users, moving average based on the statistical basis is applied. In: addition, the risk point calculation model is proposed by scoring anomaly transaction cases in the detection step by items. This model logs calculated risk point results as well as maintains incident accountability, which can be utilized as basic data for establishing security incident response and security policies.

Original languageEnglish
Pages (from-to)479-496
Number of pages18
JournalMultimedia Tools and Applications
Volume68
Issue number2
DOIs
Publication statusPublished - 2014 Jan 1

Fingerprint

Crime
Communication
Malware
Digital forensics

Keywords

  • Electronic financial transaction
  • Fraud detection
  • Malware forensics

ASJC Scopus subject areas

  • Media Technology
  • Hardware and Architecture
  • Computer Networks and Communications
  • Software

Cite this

Fraud and financial crime detection model using malware forensics. / Kim, Ae Chan; Kim, Seongkon; Park, Won Hyung; Lee, Dong Hoon.

In: Multimedia Tools and Applications, Vol. 68, No. 2, 01.01.2014, p. 479-496.

Research output: Contribution to journalArticle

Kim, Ae Chan ; Kim, Seongkon ; Park, Won Hyung ; Lee, Dong Hoon. / Fraud and financial crime detection model using malware forensics. In: Multimedia Tools and Applications. 2014 ; Vol. 68, No. 2. pp. 479-496.
@article{21506b92e2304bd88fe58a877690458a,
title = "Fraud and financial crime detection model using malware forensics",
abstract = "Recently various electronic financial services are provided by development of electronic devices and communication technology. By diversified electronic financial services and channels, users of none face-to-face electronic financial transaction services continuously increase. At the same time, under financial security environment, leakage threats of inside information and security threats against financial transaction users steadily increase. Accordingly, in this paper, based on framework standards of financial transaction detection and response, digital forensics techniques that has been used to analyze system intrusion incidents traditionally is used to detect anomaly transactions that may occur in the user terminal environment during electronic financial transactions. Particularly, for the method to analyze user terminals, automated malware forensics techniques that is used as supporting tool for malware code detection and analysis is used, and for the method to detect anomaly prior behaviors and transaction patterns of users, moving average based on the statistical basis is applied. In: addition, the risk point calculation model is proposed by scoring anomaly transaction cases in the detection step by items. This model logs calculated risk point results as well as maintains incident accountability, which can be utilized as basic data for establishing security incident response and security policies.",
keywords = "Electronic financial transaction, Fraud detection, Malware forensics",
author = "Kim, {Ae Chan} and Seongkon Kim and Park, {Won Hyung} and Lee, {Dong Hoon}",
year = "2014",
month = "1",
day = "1",
doi = "10.1007/s11042-013-1410-3",
language = "English",
volume = "68",
pages = "479--496",
journal = "Multimedia Tools and Applications",
issn = "1380-7501",
publisher = "Springer Netherlands",
number = "2",

}

TY - JOUR

T1 - Fraud and financial crime detection model using malware forensics

AU - Kim, Ae Chan

AU - Kim, Seongkon

AU - Park, Won Hyung

AU - Lee, Dong Hoon

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Recently various electronic financial services are provided by development of electronic devices and communication technology. By diversified electronic financial services and channels, users of none face-to-face electronic financial transaction services continuously increase. At the same time, under financial security environment, leakage threats of inside information and security threats against financial transaction users steadily increase. Accordingly, in this paper, based on framework standards of financial transaction detection and response, digital forensics techniques that has been used to analyze system intrusion incidents traditionally is used to detect anomaly transactions that may occur in the user terminal environment during electronic financial transactions. Particularly, for the method to analyze user terminals, automated malware forensics techniques that is used as supporting tool for malware code detection and analysis is used, and for the method to detect anomaly prior behaviors and transaction patterns of users, moving average based on the statistical basis is applied. In: addition, the risk point calculation model is proposed by scoring anomaly transaction cases in the detection step by items. This model logs calculated risk point results as well as maintains incident accountability, which can be utilized as basic data for establishing security incident response and security policies.

AB - Recently various electronic financial services are provided by development of electronic devices and communication technology. By diversified electronic financial services and channels, users of none face-to-face electronic financial transaction services continuously increase. At the same time, under financial security environment, leakage threats of inside information and security threats against financial transaction users steadily increase. Accordingly, in this paper, based on framework standards of financial transaction detection and response, digital forensics techniques that has been used to analyze system intrusion incidents traditionally is used to detect anomaly transactions that may occur in the user terminal environment during electronic financial transactions. Particularly, for the method to analyze user terminals, automated malware forensics techniques that is used as supporting tool for malware code detection and analysis is used, and for the method to detect anomaly prior behaviors and transaction patterns of users, moving average based on the statistical basis is applied. In: addition, the risk point calculation model is proposed by scoring anomaly transaction cases in the detection step by items. This model logs calculated risk point results as well as maintains incident accountability, which can be utilized as basic data for establishing security incident response and security policies.

KW - Electronic financial transaction

KW - Fraud detection

KW - Malware forensics

UR - http://www.scopus.com/inward/record.url?scp=84895063539&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84895063539&partnerID=8YFLogxK

U2 - 10.1007/s11042-013-1410-3

DO - 10.1007/s11042-013-1410-3

M3 - Article

VL - 68

SP - 479

EP - 496

JO - Multimedia Tools and Applications

JF - Multimedia Tools and Applications

SN - 1380-7501

IS - 2

ER -