Thursday, May 8, 2008

Final Year Project

Today almost all anomaly detection systems (anti-virus solutions, intruder detection systems) are programmed to recognize known signatures of anomalies. But people have managed to discover new approaches (signatures) to execute the same attack and also to execute new attacks, which cannot be detected using previously mentioned anomaly detection systems. This situation leads the research community to discover anomaly detection systems which are capable of handling the undiscovered paths mentioned above. My Contribution would be towards finding novel solution to this problem.

Human immune system is the best known natural anomaly detection system which consists of several techniques to protect the body from foreign invaders such as virus, bacteria, fungi etc... The system has several features like distributed, autonomous, adaptive and also has the capability of identifying new threats and act upon it, which motivated the research community to apply its model to arising problems in computing world. The basic approach of immune system would be to detect all abnormalities by examining the normal behavior.

I have selected the stock exchange fraud detection as the problem domain because it is highly dynamic and randomized environment in which people have managed to execute various techniques to earn money using inappropriate ways. Few of such known frauds are,


  • Insider trading

  • Pump and dump

  • Making the close

  • Front running

  • The main attribute of all these frauds are that when someone carry out such a fraud, price and volume data stream reflect an abnormal behavior and the executing person shows an abnormal behavior with respect to its peer group. My objective would be to introduce a novel concept to detect the anomalies which reflect through abnormal behaviors of price/volume data and involving parties.

    The proposed solution is enriched with techniques used by immune system model such as danger signal, negative selection, clonal selection and immune network theory which ultimately avoid the drawbacks of currently available anomaly detection systems. It doesn’t have a separate learning phrase and capable of identifying the abnormalities by examining features of the given data stream rather that globally assigns boundary values for anomaly detection. Here is a brief description about main steps of proposed solution.

    Danger signal
    Proposed solution is act upon a danger signal which will be generated by examining the price/volume data stream. System will identify the sudden increases and decreases as danger which will ultimately cause to reduce the false positive and false negative alarm rate.

    Creating scenarios
    If there is no any suspected party, the probability that case of being a fraud is very low, so in this step system try to identify “is their any suspected parties” and their relationship by examining the behavior of individuals against its peer group.

    Memory

    System will maintain a memory which consists of identified fraud scenarios in order to mount quick response on up coming fraud scenarios. Maintaining memory is done by measuring the activating frequency of stored scenarios.

    Tuesday, January 15, 2008

    Stock market surveillance systems

    Stock exchange plays a dominant role in any country’s economy where companies sell their stocks to raise their capital.It sometimes use as indicator to predict the fluctuations of whole country’s economy. Because of this people pay more attention to invest their money on stock market. Normally people invest their money on stock market irrespective of their economy level, age, educational level etc...

    So there is a possibility of investors get in to trouble and lost all their money due to unawareness about the fluctuations of market. People normally tend to react on sudden movements on stock market expecting huge profit. But these movements sometimes created by stock manipulators to cheat people and earn money. There are several well known cases on stock manipulation which some times resulted in change of ownership of companies. Manipulation of stock market are done by the people who have lot of stocks(money) and more power. Eg – Businessman, stock brokers.

    Some techniques that are used by stock manipulators are not illegal but execute with the intention of cheat others. Some countries have laws against illegal stock transactions and it is mandatory (recommended) to have stock surveillance systems in such countries. Functionality of stock market surveillance system is to detect such manipulation in real time and report them. Stock surveillance systems are monitor the market for detect well known stock manipulation cases.

    Following are some of well known stock manipulation techniques.
  • Insider trading

  • Front running

  • Painting the tape

  • Wash sales

  • Pump and dump

  • Poop and scoop

  • Making the close(portfolio pumping)
  • Monday, January 14, 2008

    The most intersting subject in my UNI life

    I really enjoyed by arguing on subject matters with my batch mates.Recently I had such a discussion, which I guessed most interesting discussion I had in my UNI life.That is about Evolutionary Computing(EC) and its applications.

    EC is inspired by Darwinian principle of "survival of the fittest" which we observed in daily life.Under that we have learn about
  • Genetic Algorithms(GA)

  • Genetic Programming(GP)

  • Evolutionary stratergies(ES)

  • Evolutionary Programming(EP)

  • Learning Classifier Systems(LCS)


  • First four techniques are used to optimization, constraint satisfaction problems while the most interesting part that is LCS use for automatic rule generation.It can be use as alternative for Expert Systems(ES).

    Under LCS we have solved the problems like
  • Robot navigation to have maximum reward

  • Reduce numbers in to one number

  • Predicting character sequence which are organized in circular way


  • What makes these techniques more interesting is that all these techniques has concept and no rigid ways to implement them.It is our responsibility to understand them and apply them accordingly.

    I invite all computer science undergraduates to discuss on these technique and like to say that if you have a chance to learn Evolutionary Computing Don't miss it.