Back
 JIS  Vol.10 No.3 , July 2019
An Intelligent Model for Online Recruitment Fraud Detection
Abstract: This study research attempts to prohibit privacy and loss of money for individuals and organization by creating a reliable model which can detect the fraud exposure in the online recruitment environments. This research presents a major contribution represented in a reliable detection model using ensemble approach based on Random forest classifier to detect Online Recruitment Fraud (ORF). The detection of Online Recruitment Fraud is characterized by other types of electronic fraud detection by its modern and the scarcity of studies on this concept. The researcher proposed the detection model to achieve the objectives of this study. For feature selection, support vector machine method is used and for classification and detection, ensemble classifier using Random Forest is employed. A freely available dataset called Employment Scam Aegean Dataset (EMSCAD) is used to apply the model. Pre-processing step had been applied before the selection and classification adoptions. The results showed an obtained accuracy of 97.41%. Further, the findings presented the main features and important factors in detection purpose include having a company profile feature, having a company logo feature and an industry feature.
Cite this paper: Alghamdi, B. and Alharby, F. (2019) An Intelligent Model for Online Recruitment Fraud Detection. Journal of Information Security, 10, 155-176. doi: 10.4236/jis.2019.103009.
References

[1]   Scanlon, J.R. and Gerber, M.S. (2014) Automatic Detection of Cyber-Recruitment by Violent Extremists. Security Informatics, 3, 5.
https://doi.org/10.1186/s13388-014-0005-5

[2]   Vidros, S., Kolias, C., Kambourakis, G. and Akoglu, L. (2017) Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset. Future Internet, 9, 6.
https://doi.org/10.3390/fi9010006

[3]   Novakovic, J.D., Veljovic, A., Ilic, S.S., Papic, Z. and Tomovic, M. (2017) Evaluation of Classification Models in Machine Learning. Theory and Applications of Mathematics & Computer Science, 7, 39-46.

[4]   Morgan, S. and Menlo Park, C. (2017) Cybercrime Report from the Editors at Cybersecurity Ventures. Herjavec Group, Toronto.

[5]   Gov, K. (2018) Vision of 2030.
http://vision2030.gov.sa/en

[6]   ACRON (2018) Australian Cybercrime Online Reporting Network (ACORN).
http://www.acorn.gov.au/learn-about-cybercrime

[7]   Armstrong, A. (2006) Handbook of Human Resource Management Practice. 10th Edition, Kogan Page Limited, London.

[8]   Hada, B. and Gairola, S. (2015) Opportunities and Challenges of E-Recruitment. Journal of Management Engineering and Information Technology, 2, 1-4.

[9]   Kaur, P. (2015) E-Recruitment: A Conceptual Study. International Journal of Applied Research, 1, 78-82.

[10]   Prasad, L. and Kapoor, P. (2016) Topic: E-Recruitment Strategies. International Journal of Business Quantitative Economic and Applied Management Research, 2, 80-95.

[11]   Panov, P., Soldatova, L. and Dzeroski, S. (2013) OntoDM-KDD: Ontology for Representing the Knowledge Discovery Process. 16th International Conference on Discovery Science, Singapore, 6-9 October 2013, 126-140.
https://doi.org/10.1007/978-3-642-40897-7_9

[12]   Cios, K.J., Pedrycz, W., Swiniarski, R.W. and Kurgan, L.A. (2007) Data Mining: A Knowledge Discovery Approach. Springer, New York.

[13]   Hussain, S. (2017) Survey on Current Trends and Techniques of Data Mining Research. London Journal of Research in Computer Science and Technology, 17, 7-15.

[14]   Sinoara, R., Antunes, J. and Rezende, S. (2017) Text Mining and Semantics: A Systematic Mapping Study. Journal of the Brazilian Computer Society, 23, 9.
https://doi.org/10.1186/s13173-017-0058-7

[15]   Diwathe, D. and Dongare, S. (2017) Classification Model Using Optimization Technique: A Review. International Journal of Computer Science and Network, 6, 42-48.

[16]   Singh, G. and Singh, A. (2017) A Review Paper: Using Data Mining Clustering Technique to Predict Criminal Behavior. International Journal of Computer Science and Mobile Computing, 6, 160-167.

[17]   Witten, I. and Frank, E. (2005) Data Mining Practical Machine Tools and Techniques. Morgan Kaufmann Elsevier, San Francisco.

[18]   Kukasvadiya, M. and Divecha, N. (2017) Analysis of Data Using Data Mining Tool Orange. International Journal of Engineering Development and Research, 5, 836-1840.

[19]   Rehman, N. (2017) Data Mining Techniques Methods Algorithms and Tools. International Journal of Computer Science and Mobile Computing, 6, 227-231.

[20]   Jyoth, P., Siva Ranjani, R., Mishra, T. and Mishra, S.R. (2017) A Study of Classification Techniques of Data Mining Techniques in Health Related Research. International Journal of Innovative Research in Computer and Communication Engineering, 5, 13779-137876.

[21]   Vidros, S., Kolias, C. and Kambourakis, G. (2016) Feature: Online Recruitment Services: Another Playground for Fraudsters. Computer Fraud & Security, 2016, 8-13.
https://doi.org/10.1016/S1361-3723(16)30025-2

[22]   Yasin, A. and Abuhasan, A. (2016) An Intelligent Classification Model for Phishing Email Detection. International Journal of Network Security & Its Applications, 8, 55-72.
https://doi.org/10.5121/ijnsa.2016.8405

[23]   Al-garadi, M.A., Varathan, K.D. and Ravana, S.D. (2016) Cybercrime Detection in Online Communications: The Experimental Case of Cyberbullying Detection in the Twitter Network. Computers in Human Behavior, 63, 433-443.
https://doi.org/10.1016/j.chb.2016.05.051

[24]   Sharaff, A., Nagwani, N.K. and Swami, K. (2015) Impact of Feature Selection Technique on Email Classification. International Journal of Knowledge Engineering, 1, 59-63.
https://doi.org/10.7763/IJKE.2015.V1.10

[25]   Sornsuwit, P. and Jaiyen, S. (2015) Intrusion Detection Model Based on Ensemble Learning for U2r and R2l Attacks. In: 7th International Conference Information Technology and Electrical Engineering, IEEE, Chiang Mai, 354-359.
https://doi.org/10.1109/ICITEED.2015.7408971

[26]   Gaikwad, D.P. and Thool, R.C. (2015) Intrusion Detection System Using Bagging Ensemble Method of Machine Learning. Computing Communication Control and Automation, Pune, 26-27 February 2015, 291-295.
https://doi.org/10.1109/ICCUBEA.2015.61

[27]   Zuhaira, H., Selmat, A. and Salleh, M. (2015) The Effect of Feature Selection on Phish Website Detection: An Empirical Study on Robust Feature Subset Selection for Effective Classification. International Journal of Advanced Computer Science & Applications, 1, 221-232.
https://doi.org/10.14569/IJACSA.2015.061031

[28]   Nizamani, S., Memon, N., Glasdam, M. and Nguyen, D.D. (2014) Detection of Fraudulent Emails by Employing Advanced Feature Abundance. Egyptian Informatics Journal, 15, 169-174.
https://doi.org/10.1016/j.eij.2014.07.002

[29]   Shrivas, A.K. and Dewangan, A.K. (2014) An Ensemble Model for Classification of Attacks with Feature Selection Based on KDD99 and NSL-KDD Data Set. International Journal of Computer Applications, 99, 8-13.
https://doi.org/10.5120/17447-5392

[30]   Balakrishnan, S., Venkatalakshmi, K. and Kannan, A. (2014) Intrusion Detection System Using Feature Selection and Classification Technique. Journal of Computer Science and Application, 3, 145-151.
https://doi.org/10.14355/ijcsa.2014.0304.02

[31]   Riyad, A.M. and Ahmed, M.I. (2013) An Ensemble Classification Approach for Intrusion Detection. International Journal of Computer Applications, 80, 37-42.
https://doi.org/10.5120/13836-1402

[32]   Ozarkar, P. and Patwardhan, M. (2013) Efficient Spam Classification by Appropriate Feature Selection. Global Journal of Computer Science and Technology, 13, 49-57.

[33]   Rathi, M. and Pareek, V. (2013) Spam Mail Detection through Data Mining—A Comparative Performance Analysis. International Journal of Modern Education and Computer Science, 5, 31-39.
https://doi.org/10.5815/ijmecs.2013.12.05

[34]   Haddi, E., Liu, X. and Shi, Y. (2013) The Role of Text Pre-Processing in Sentiment Analysis. Procedia Computer Science, 17, 26-32.
https://doi.org/10.1016/j.procs.2013.05.005

[35]   Tomar, D. and Agarwal, S. (2015) Twin Support Vector Machine: A Review from 2007 to 2014. Egyptian Informatics Journal, 16, 55-69.
https://doi.org/10.1016/j.eij.2014.12.003

[36]   Novakovic, J.D., Veljovic, A., Ilic, S.S., Papic, Z. and Tomovic, M. (2017) Evaluation of Classification Models in Machine Learning. Theory and Applications of Mathematics & Computer Science, 7, 39-46.

[37]   Dharamkar, B. and Singh, R.R. (2014) Cyber-Attack Classification Using Improved Ensemble Technique Based on Support Vector Machine and Neural Network. International Journal of Computer Applications, 103, 7.

 
 
Top