Commercial Surveys

Commercial Surveys

Anomaly Detection in Inspection: A Hybrid Data Mining and MCDM Approach

Document Type : Original Article

Authors
1 MSc. Student of Socio-economic systems engineering, Faculty of Industrial and Systems engineering, Tarbiat Modares University.
2 Associate professor of industrial and systems engineering at Tarbiat Modares University
Abstract
trust growth in government and justice. Therefore, Simba inspection software data analysis, in order to detect and prevent inspectors' anomaly patterns, can insure the public trust and effectiveness of inspections. Based on a research gap identified in the research area, 1518 performance data were analyzed to detect anomalies. K-means clustering and classifications by decision tree, logistic regression, naïve bayes and support vector machine were employed to detect fraud, of which decision tree and logistic regression were better than others. Then the results synthesized with 243000 inspection report data analysis. In order to enhance practical side of research, data mining and decision science techniques were employed to find the fraudsters. As a result, collective anomaly detected and nine inspectors were identified as fraudsters. Lastly, IT-based solutions like software redesign and managerial tips were mentioned.
Keywords

Subjects


 
Available at: https://doi.org/https://doi.org/10.22051/jera.2015 .646.
 
Akpinar, M., Adak, M. F., & Guvenc, G. (2021). SVM-based anomaly detection in remote working: Intelligent software SmartRadar. Applied Soft Computing, 109, 107457. https://doi.org/https://doi.org/10.1016/j.asoc.2021.107457
Alla, S., & Kalyan Adari, S. (2019). Beginning Anomaly Detection Using Python-Based Deep Learning. Apre. https://doi.org/https://doi.org/10.1007/978-1-4842-5177-5
Amezaga Hechavarria, A., & Shafiq, M. O. (2022). A modified attention mechanism powered by Bayesian Network for user activity analysis and prediction. Data & Knowledge Engineering, 140, 102034. https://doi.org/https://doi.org/10.1016/j.datak.2022.102034
Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly Detection: A Survey. ACM Comput. Surv., 41. https://doi.org/10.1145/1541880.1541882
Domashova, J., Kripak, E., & Pisarchik, E. (2022). Application of machine learning methods to identify suspicious actions of employees related to violation of the procedures of a credit institution. Procedia Computer Science, 213, 110-118. https://doi.org/https://doi.org/10.1016/j.procs.2022.11.045
Ghazanfari, M., Alizadeh, S., & Teimourpour, B. (2005). *Data mining and knowledge discovery*. Iran University of Science and Technology. [In Persian] 
Ginevičius, R. (2011). A New Determining Method for the Criteria Weights in multicriteria Evaluation. International Journal of Information Technology & Decision Making (IJITDM), 10, 1067-1095. https://doi.org/10.1142/S0219622011004713
Goodarzi, A., & Janatbabaei, S. (2016). Evaluation of decision tree, naive Bayes, and logistic regression algorithms in detecting auto insurance fraud. Insurance Research, 2*(1), 61-80. https://www.noormags.ir/view/fa/articlepage/1428946 [In Persian] 
Han, R., Kim, K., Choi, B., & Jeong, Y. (2023). A Study on Detection of Malicious Behavior Based on Host Process Data Using Machine Learning. In Applied Sciences (Vol. 13, Issue 7). https://doi.org/10.3390/app13074097
Harifi, R., Naimi-Sadigh, A., & Mozafari, M. (2022). Customer Segmentation of the Ports and Maritime Organization using Self Organization Map and K-Means algorithm. Commercial Reviews, 20*(114), 135-154. https://doi.org/10.22034/bs.2022.254024 [In Persian] 
Ianni, M., & Masciari, E. (2023). SCOUT: Security by computing OUTliers on activity logs. Computers & Security, 132, 103355. https://doi.org/https://doi.org/10.1016/j.cose.2023.103355
Jain, M., Kaur, G., & Saxena, V. (2022). A K-Means clustering and SVM based hybrid concept drift detection technique for network anomaly detection. Expert Systems with Applications, 193, 116510. https://doi.org/https://doi.org/10.1016/j.eswa.2022.116510
Khan, S., Parkinson, S., & Murphy, C. (2023). Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach. Expert Systems with Applications, 233, 120991. https://doi.org/https://doi.org/10.1016/j.eswa.2023.120991
Landauer, M., Onder, S., Skopik, F., & Wurzenberger, M. (2023). Deep learning for anomaly detection in log data: A survey. Machine Learning with Applications, 12, 100470. https://doi.org/https://doi.org/10.1016/j.mlwa.2023.100470
Lee, Y., Kim, J., & Kang, P. (2023). LAnoBERT: System log anomaly detection based on BERT masked language model. Applied Soft Computing, 146, 110689. https://doi.org/https://doi.org/10.1016/j.asoc.2023.110689
Mansourfar, Gh., Ghayour, F., & Lotfi, B. (2015). The Ability of Support Vector Machine (SVM) in Financial Distress Prediction. *Empirical Research in Accounting, 5*(17), 177-195. https://doi.org/10.22051/jera.2015.646 [In Persian] 
Moghimi, F. (2023). Activity of 3 million trade units in the country. https://www.yjc.ir/00a6IX [In Persian] 
Pahlavani, J., Sheikhmohammadi, M., & Teimourpour, B. (2024). Anomaly detection in inspections on public complaints: a data mining approach. 19th International Conference on Industrial Engineering. [In Persian] 
Racherache, B., Shirani, P., Soeanu, A., & Debbabi, M. (2023). CPID: Insider threat detection using profiling and cyber-persona identification. Computers & Security, 132, 103350. https://doi.org/https://doi.org/10.1016/j.cose.2023.103350
Ramírez, J. M., Díez, F., Rojo, P., Mancuso, V., & Fernández-Anta, A. (2023). Explainable machine learning for performance anomaly detection and classification in mobile networks. Computer Communications, 200, 113-131. https://doi.org/https://doi.org/10.1016/j.comcom.2023.01.003
Ranjan, R., & Kumar, S. S. (2022). User behaviour analysis using data analytics and machine learning to predict malicious user versus legitimate user. High-Confidence Computing, 2(1), 100034. https://doi.org/https://doi.org/10.1016/j.hcc.2021.100034
Samiei Ashkezari, M., Soleimani, Gh., & Shams, K. (2018). Assessing the Effectiveness of Foreign Market Entry Strategies (Case Study: Ceramic and Tile Cluster of Yazd). *Commercial Reviews, 16*(88-89), 63-78. https://barresybazargani.itsr.ir/article_34479.html [In Persian] 
Soh, C., Yu, S., Narayanan, A., Duraisamy, S., & Chen, L. (2019). Employee profiling via aspect-based sentiment and network for insider threats detection. Expert Systems with Applications, 135, 351-361. https://doi.org/https://doi.org/10.1016/j.eswa.2019.05.043
Teimourpour, B., Yadegari, V., & Fatehi Pikani, M. (2020). Data mining with Python; Along with social network analysis. Olomrayaneh. [In Persian] 
Zeufack, V., Kim, D., Seo, D., & Lee, A. (2021). An unsupervised anomaly detection framework for detecting anomalies in real time through network system’s log files analysis. High-Confidence Computing, 1(2), 100030. https://doi.org/https://doi.org/10.1016/j.hcc.2021.100030
 
 
Volume 22, Issue 129 - Serial Number 129
January and February 2025
Pages 29-48

  • Receive Date 29 June 2024
  • Revise Date 13 October 2024
  • Accept Date 15 October 2024