Improving Financial Fraud Detection System with Advanced Machine Learning for Predictive Analysis and Prevention

Authors

  • Sagar Bharat Shah Department of Operations, Business Analytics, and Information Systems (OBAIS), University of Cincinnati, Cincinnati, OH, USA Author

DOI:

https://doi.org/10.32628/CSEIT24861147

Keywords:

Financial fraud detection, Fraud Prevention, Transaction Security, Credit card fraud, Machine learning

Abstract

Credit card fraud is a major problem for financial institutions. Credit card fraud costs over one million people every year across several different nations. Research studies involving the study of actual credit card data are few and few between because of privacy issues. In order to prevent financial losses and make sure that transactions are safe, CCFD is an essential application in financial systems. This paper focuses on the analysis of financial fraud detection system that uses ML algorithms with special emphasis on the CCFD dataset. The system methods for increasing the model’s accuracy consist of data preprocessing, feature engineering, and class balancing with Borderline-SMOTE. LSTM model improves the performance of the competitors’ algorithms with 99.9% accuracy, precision80.3%, a recall92.1% and F1 - score85.8%. Regarding the trade-off among accuracy and recall rate, LSTM is superior to other models from the fraud detection portfolio, including DT, RF, and SVM. Continuous real-time data, CNNs and other forms of DL may be further explored in future research to extend the detection of fraud. More improvements could also center on model interpretation and bringing up the models’ suitability for practical utility in big conventional financial structures.

Downloads

Download data is not yet available.

References

B. Boddu, “Best Practices for In-Memory Database Administration in Real-Time Environments,” https://www.ijirmps.org/research-paper.php?id=231463, vol. 8, no. 6, p. 8, 2020.

E. Ileberi, Y. Sun, and Z. Wang, “Performance evaluation of machine learning methods for credit card fraud detection using SMOTE and AdaBoost,” IEEE Access, vol. 9, pp. 165286–165294, 2021.

Vashudhar Sai Thokala, “Scalable Cloud Deployment and Automation for E-Commerce Platforms Using AWS, Heroku, and Ruby on Rails,” Int. J. Adv. Res. Sci. Commun. Technol., pp. 349–362, Oct. 2023, doi: 10.48175/IJARSCT-13555A.

N. Abid, “Enhanced IoT Network Security with Machine Learning Techniques for Anomaly Detection and Classification,” Int. J. Curr. Eng. Technol., vol. 13, no. 6, pp. 536–544, 2023, doi: https://doi.org/10.14741/ijcet/v.13.6.5.

H. Sinha, “An examination of machine learning-based credit card fraud detection systems,” Int. J. Sci. Res. Arch., vol. 12, no. 01, pp. 2282–2294, 2024, doi: https://doi.org/10.30574/ijsra.2024.12.2.1456.

A. Ali et al., “Financial Fraud Detection Based on Machine Learning: A Systematic Literature Review,” Applied Sciences (Switzerland). 2022. doi: 10.3390/app12199637.

A. RB and S. K. KR, “Credit card fraud detection using artificial neural network,” Glob. Transitions Proc., 2021, doi: 10.1016/j.gltp.2021.01.006.

D. S. G. Jubin Thomas, Hemanth Volikatla, Veera Venkata Raghunath Indugu, Kushwanth Gondi, “Machine Learning Approaches for Fraud Detection in E-commerce Supply Chains,” Innov. Comput. Sci. J., vol. 8, no. 1, 2022.

P. Khare and S. Srivastava, “AI-Powered Fraud Prevention: A Comprehensive Analysis of Machine Learning Applications in Online Transactions,” J. Emerg. Technol. Innov. Res., vol. 10, pp. f518–f525, 2023.

S. Arora and P. Khare, “Optimizing Software Pricing : AI-driven Strategies for Independent Software Vendors,” Int. Res. J. Eng. Technol., vol. 11, no. 5, pp. 743–753, 2024.

Muthuvel Raj Suyambu and Pawan Kumar Vishwakarma, “Improving Efficiency of Electric Vehicles: An Energy Management Approach Utilizing Fuzzy Logic,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 3, no. 2, pp. 737–748, Feb. 2023, doi: 10.48175/IJARSCT-9749V.

S. S. Pranav Khare, “The Impact of AI on Product Management : A Systematic Review and Future Trends,” Int. J. Res. Anal. Rev. (IJRAR, vol. 9, no. 4, 2022.

P. Khare and S. Srivastava, “Enhancing Security with Voice: A Comprehensive Review of AI-Based Biometric Authentication Systems.” 2023.

S. Arora and P. Khare, “The Role of Machine Learning in Personalizing User Experiences in SaaS Products,” J. Emerg. Technol. Innov. Res., vol. 11, pp. c809–c821, 2024.

J. Geng and B. Zhang, “Credit Card Fraud Detection Using Adversarial Learning,” in 2023 International Conference on Image Processing, Computer Vision and Machine Learning (ICICML), 2023, pp. 891–894. doi: 10.1109/ICICML60161.2023.10424872.

J. Wang and C. Yang, “Financial Fraud Detection Based on Ensemble Machine Learning,” in 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2022, pp. 1–6. doi: 10.1109/DASC/PiCom/CBDCom/Cy55231.2022.9928001.

N. Nguyen et al., “A Proposed Model for Card Fraud Detection Based on CatBoost and Deep Neural Network,” IEEE Access, vol. 10, pp. 96852–96861, 2022, doi: 10.1109/ACCESS.2022.3205416.

F. K. Alarfaj, I. Malik, H. U. Khan, N. Almusallam, M. Ramzan, and M. Ahmed, “Credit Card Fraud Detection Using State-of-the-Art Machine Learning and Deep Learning Algorithms,” IEEE Access, 2022, doi: 10.1109/ACCESS.2022.3166891.

A. A. Taha and S. J. Malebary, “An Intelligent Approach to Credit Card Fraud Detection Using an Optimized Light Gradient Boosting Machine,” IEEE Access, vol. 8, pp. 25579–25587, 2020, doi: 10.1109/ACCESS.2020.2971354.

Y. Zhang, J. Tong, Z. Wang, and F. Gao, “Customer Transaction Fraud Detection Using Xgboost Model,” in Proceedings - 2020 International Conference on Computer Engineering and Application, ICCEA 2020, 2020. doi: 10.1109/ICCEA50009.2020.00122.

H. Najadat, O. Altiti, A. A. Aqouleh, and M. Younes, “Credit Card Fraud Detection Based on Machine and Deep Learning,” in 2020 11th International Conference on Information and Communication Systems, ICICS 2020, 2020. doi: 10.1109/ICICS49469.2020.239524.

R. Tandon, “Face mask detection model based on deep CNN techniques using AWS,” Int. J. Eng. Res. Appl., vol. 13, no. 5, pp. 12–19, 2023.

A. P. A. Singh, “STRATEGIC APPROACHES TO MATERIALS DATA COLLECTION AND INVENTORY MANAGEMENT,” Int. J. Bus. Quant. Econ. Appl. Manag. Res., vol. 7, no. 5, 2022.

V. V. Kumar, F. W. Liou, S. N. Balakrishnan, and V. Kumar, “Economical impact of RFID implementation in remanufacturing: a Chaos-based Interactive Artificial Bee Colony approach,” J. Intell. Manuf., vol. 26, no. 4, pp. 815–830, Aug. 2015, doi: 10.1007/s10845-013-0836-9.

V. S. Jubin Thomas, Kirti Vinod Vedi, Sandeep Gupta, “A Survey of E-Commerce Integration in Supply Chain Management for Retail and Consumer Goods in Emerging Markets,” J. Emerg. Technol. Innov. Res., vol. 10, no. 12, pp. h730–h736, 2023.

V. V Kumar, “An interactive product development model in remanufacturing environment : a chaos-based artificial bee colony approach,” MASTER Sci. Manuf. Eng., 2014.

K. Patel, “Optimizing QA Practices in Agile Development: Challenges and Innovative Solutions,” Int. J. Res. Anal. Rev., vol. 10, no. 4, pp. 324–330, 2023.

M. Alamri and M. Ykhlef, “Survey of Credit Card Anomaly and Fraud Detection Using Sampling Techniques,” Electronics, vol. 11, no. 23, 2022, doi: 10.3390/electronics11234003.

N. G. Singh, Abhinav Parashar A, “Streamlining Purchase Requisitions and Orders : A Guide to Effective Goods Receipt Management,” J. Emerg. Technol. Innov. Res., vol. 8, no. 5, 2021.

B. Boddu, “The Quantum Edge: How Quantum Computing Will Transform Databases,” Int. J. Innov. Res. Eng. Multidiscip. Phys. Sci., vol. 9, no. 3, 2021, doi: https://doi.org/10.5281/zenodo.14059357.

A. P. A. Singh, “Best Practices for Creating and Maintaining Material Master Data in Industrial Systems,” Int. J. Res. Anal. Rev., vol. 10, no. 1, pp. 112–119, 2023.

I. Benchaji, S. Douzi, B. El Ouahidi, and J. Jaafari, “Enhanced credit card fraud detection based on attention mechanism and LSTM deep model,” J. Big Data, vol. 8, pp. 1–21, 2021.

P. Khare and S. Srivastava, “SIGNATURE-BASED BIOMETRIC AUTHENTICATION: A DEEP DIVE INTO DEEP LEARNING APPROACHES,” Int. Res. J. Mod. Eng. Technol. Sci., vol. 4, no. 8, Aug. 2022, doi: 10.56726/IRJMETS29522.

V. V. Kumar, A. Sahoo, and F. W. Liou, “Cyber-enabled product lifecycle management: A multi-agent framework,” in Procedia Manufacturing, 2019. doi: 10.1016/j.promfg.2020.01.247.

V. V Kumar, M. Tripathi, S. K. Tyagi, S. K. Shukla, and M. K. Tiwari, “An integrated real time optimization approach (IRTO) for physical programming based redundancy allocation problem,” 3rd Int. Conf. Reliab. Saf. Eng., pp. 692–704, 2007.

M. S. Rajeev Arora, “Applications of Cloud Based ERP Application and how to address Security and Data Privacy Issues in Cloud application,” Himal. Univ., 2022.

Sahil Arora and Apoorva Tewari, “Fortifying Critical Infrastructures: Secure Data Management with Edge Computing,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 3, no. 2, pp. 946–955, Aug. 2023, doi: 10.48175/IJARSCT-12743E.

J. Thomas and V. Vedi, “Enhancing Supply Chain Resilience Through Cloud-Based SCM and Advanced Machine Learning: A Case Study of Logistics,” J. Emerg. Technol. Innov. Res., vol. 8, no. 9, 2021.

M. T. Arora, Rajeev and Kumar, Shantanu and Jain, Nitin and Nafis, “Revolutionizing Healthcare with Cloud Computing: Superior Patient Care and Enhanced Service Efficiency,” SSRN, 2022, doi: http://dx.doi.org/10.2139/ssrn.4957197.

I. Benchaji, S. Douzi, and B. El Ouahidi, “Credit card fraud detection model based on LSTM recurrent neural networks,” J. Adv. Inf. Technol., 2021, doi: 10.12720/jait.12.2.113-118.

R. Bishukarma, “Scalable Zero-Trust Architectures for Enhancing Security in Multi-Cloud SaaS Platforms,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 3, no. 3, pp. 1308–1319, 2023, doi: 10.48175/IJARSCT-14000S.

E. Ileberi, Y. Sun, and Z. Wang, “A machine learning based credit card fraud detection using the GA algorithm for feature selection,” J. Big Data, 2022, doi: 10.1186/s40537-022-00573-8.

S. S. Pranav Khare, “AI-Driven Palm Print Authentication: A comprehensive Analysis of Deep Learning Approaches for Efficient Biometrics,” Int. J. Sci. Res. Arch., vol. 6, no. 1, pp. 318–327, 2022.

Vasudhar Sai Thokala, “Efficient Data Modeling and Storage Solutions with SQL and NoSQL Databases in Web Applications,” Int. J. Adv. Res. Sci. Commun. Technol., pp. 470–482, Apr. 2022, doi: 10.48175/IJARSCT-3861B.

Ramesh Bishukarma, “Privacy-preserving based encryption techniques for securing data in cloud computing environments,” Int. J. Sci. Res. Arch., vol. 9, no. 2, pp. 1014–1025, Aug. 2023, doi: 10.30574/ijsra.2023.9.2.0441.

S. A. and A. Tewari, “AI-Driven Resilience: Enhancing Critical Infrastructure with Edge Computing,” Int. J. Curr. Eng. Technol., vol. 12, no. 02, pp. 151–157, 2022, doi: https://doi.org/10.14741/ijcet/v.12.2.9.

Abhishek Goyal, “Integrating IoT and Agile Methodologies for Smarter Engineering Solutions,” Int. J. Sci. Res. Arch., vol. 8, no. 2, pp. 754–766, Apr. 2023, doi: 10.30574/ijsra.2023.8.2.0284.

S. Rajora et al., “A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time Variance,” 2018, pp. 1958–1963. doi: 10.1109/SSCI.2018.8628930.

P. Sharma, S. Banerjee, D. Tiwari, and J. C. Patni, “Machine learning model for credit card fraud detection-a comparative analysis.,” Int. Arab J. Inf. Technol., vol. 18, no. 6, pp. 789–796, 2021.

S. Simaiya, D. Kumar Lilhore, and S. Sharma, “An Efficient Credit Card Fraud Detection Model Based on Machine Learning Methods,” MATTER Int. J. Sci. Technol., 2020.

Downloads

Published

25-11-2024

Issue

Section

Research Articles