Abstract

Banking crime is one of the widespread phenomena in 2016 are closely associated with the used of computer-based technology and internet networks that constantly evolving. One of them is the burglary of customer accounts through the internet banking facility. To overcome this, we need a method of how to detect a conspiracy of bank burglary case of customer accounts. The way to scalable is by get a mining decision to get a decision tree and from the decision tree to get a decision attribute value to determine the level of anomalies. Then of all the attributes decision point is calculated rate of fraud. The rate of fraud is classified through level of security of attack by the attacker then entropy gain is used to calculate the relative effort between the level of attacks in the decision tree. The results show that the method could classify three levels of attacks and the corresponding entropy gains. The paper uses decision trees algorithm, alpha++ and dotted chart analysis to analyze an attack that can be scalable. The results of the analysis show that the accuracy achieved by 0.87%.

Original languageEnglish
Title of host publicationProceedings - 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics, EECSI 2017
EditorsHatib Rahmawan, Mochammad Facta, Munawar A. Riyadi, Deris Stiawan
PublisherInstitute of Advanced Engineering and Science
ISBN (Electronic)9781538605486
DOIs
Publication statusPublished - 22 Dec 2017
Event4th International Conference on Electrical Engineering, Computer Science and Informatics, EECSI 2017 - Yogyakarta, Indonesia
Duration: 19 Sept 201721 Sept 2017

Publication series

NameInternational Conference on Electrical Engineering, Computer Science and Informatics (EECSI)
Volume2017-December
ISSN (Print)2407-439X

Conference

Conference4th International Conference on Electrical Engineering, Computer Science and Informatics, EECSI 2017
Country/TerritoryIndonesia
CityYogyakarta
Period19/09/1721/09/17

Keywords

  • Bank
  • Business process
  • Dotted chart analysis
  • Event logs
  • Fraud
  • Process mining
  • Scalable
  • Security

Fingerprint

Dive into the research topics of 'Scalable attack analysis of business process based on decision mining classification'. Together they form a unique fingerprint.

Cite this