Applying Machine Learning to the Detection of Credit Card Fraud
Keywords:
Credit Card, Logistic Regression, Decision Trees, Random forests, Support Vector Machines, Artificial Neural Network, Gradient BoostingAbstract
Credit card fraud is a global problem that costs both consumers and merchants a lot of money. To limit monetary losses and preserve credibility with clients, real-time detection of fraudulent transactions is essential. Due to their capacity to analyze vast amounts of transactional data and discover patterns suggestive of fraudulent behavior, machine learning methods have emerged as strong tools for credit card fraud detection. The goal of this research is to examine and evaluate the present status of machine learning algorithms for credit card fraud detection and their limitations. To do this, a thorough literature review on the use of machine learning to detect credit card fraud is conducted. The study's explanation of the research's findings is clear and drawbacks of existing methods, stressing both their contributions and potential for further development. Techniques for collecting data, dealing with missing numbers, outliers, and resolving class imbalance are also the subject of investigation. Methods for feature selection and engineering are investigated with the goal of improving machine learning model efficiency. Some of the machine learning techniques used in this research include: logistic regression, decision trees, random forests, support vector machines, artificial neural networks, gradient boosting methods, and ensemble approaches. The ROC curve, AUC, and confusion matrix are all measures of diagnostic accuracy. Metrics are explored in depth as assessment tools for determining how well these algorithms’ function. We offer empirical analyses and experimental findings that assess the efficacy of several machine learning algorithms on a sample dataset. Insights into the relative merits of various algorithms and its usefulness in identifying credit card fraud are provided in the discussion that follows the analysis of the data. In its final sections, the article addresses the challenges of credit card fraud detection and makes recommendations for future research. It stresses the need of addressing idea drift and changing fraud trends, including interpretability and explanation into fraud detection systems, and investigating new methods like deep learning and anomaly detection. In conclusion, our research contributes to the literature by providing a comprehensive evaluation of machine learning approaches to the detection of credit card fraud. Researchers, practitioners, and financial institutions may all acquire useful information from it to help them better identify and prevent fraud.
Downloads
References
Y. Abakarim, M. Lahby, and A. Attioui, ‘‘An efficient real time model for credit card fraud detection based on deep learning,’’ in Proc. 12th Int. Conf. Intell. Systems: Theories Appl., Oct. 2018, pp. 1–7, doi: 10.1145/3289402.3289530.
H. Abdi and L. J. Williams, ‘‘Principal component analysis,’’ Wiley Interdiscipl. Rev., Comput. Statist., vol. 2, no. 4, pp. 433–459, Jul. 2010, doi: 10.1002/wics.101.
V. Arora, R. S. Leekha, K. Lee, and A. Kataria, ‘‘Facilitating user authorization from imbalanced data logs of credit cards using artificial intelligence,’’ Mobile Inf. Syst., vol. 2020, pp. 1–13, Oct. 2020, doi: 10.1155/2020/8885269.
O. Balogun, S. Basri, S. J. Abdulkadir, and A. S. Hashim, ‘‘Performance analysis of feature selection methods in software defect prediction: A search method approach,’’ Appl. Sci., vol. 9, no. 13, p. 2764, Jul. 2019, doi: 10.3390/app9132764.
Bandaranayake, ‘‘Fraud and corruption control at education system level: A case study of the Victorian department of education and early childhood development in Australia,’’ J. Cases Educ. Leadership, vol. 17, no. 4, pp. 34–53, Dec. 2014, doi: 10.1177/1555458914549669.
J. Błaszczyński, A. T. de Almeida Filho, A. Matuszyk, M. Szelg¸, and R. Słowiński, ‘‘Auto loan fraud detection using dominance-based rough set approach versus machine learning methods,’’ Expert Syst. Appl., vol. 163, Jan. 2021, Art. no. 113740, doi: 10.1016/j.eswa.2020.113740.
Branco, P. Abreu, A. S. Gomes, M. S. C. Almeida, J. T. Ascensão, and P. Bizarro, ‘‘Interleaved sequence RNNs for fraud detection,’’ in Proc. 26th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2020, pp. 3101–3109, doi: 10.1145/3394486.3403361.
F. Cartella, O. Anunciacao, Y. Funabiki, D. Yamaguchi, T.Akishita, and O. Elshocht, ‘‘Adversarial attacks for tabular data: Application to fraud detection and imbalanced data,’’ 2021, arXiv:2101.08030.
S. S. Lad, I. Dept. of CSERajarambapu Institute of TechnologyRajaramnagarSangliMaharashtra, and A. C. Adamuthe, ‘‘Malware classification with improved convolutional neural network model,’’ Int. J. Comput. Netw. Inf. Secur., vol. 12, no. 6, pp. 30–43, Dec. 2021, doi: 10.5815/ijcnis.2020.06.03.
V. N. Dornadula and S. Geetha, ‘‘Credit card fraud detection using machine learning algorithms,’’ Proc. Comput. Sci., vol. 165, pp. 631–641, Jan. 2019, doi: 10.1016/j.procs.2020.01.057.
Benchaji, S. Douzi, and B. E. Ouahidi, ‘‘Credit card fraud detection model based on LSTM recurrent neural networks,’’ J. Adv. Inf. Technol., vol. 12, no. 2, pp. 113–118, 2021, doi: 10.12720/jait.12.2.113-118.
Y. Fang, Y. Zhang, and C. Huang, ‘‘Credit card fraud detection based on machine learning,’’ Comput., Mater. Continua, vol. 61, no. 1, pp. 185–195, 2019, doi: 10.32604/cmc.2019.06144.
J. Forough and S. Momtazi, ‘‘Ensemble of deep sequential models for credit card fraud detection,’’ Appl. Soft Comput., vol. 99, Feb. 2021, Art. no. 106883, doi: 10.1016/j.asoc.2020.106883.
K. He, X. Zhang, S. Ren, and J. Sun, ‘‘Deep residual learning for image recognition,’’ 2015, arXiv:1512.03385.
X. Hu, H. Chen, and R. Zhang, ‘‘Short paper: Credit card fraud detection using LightGBM with asymmetric error control,’’ in Proc. 2nd Int. Conf. Artif. Intell. for Industries (AII), Sep. 2019, pp. 91–94, doi: 10.1109/AI4I46381.2019.00030.
J. Kim, H.-J. Kim, and H. Kim, ‘‘Fraud detection for job placement using hierarchical clusters-based deep neural networks,’’ Int. J. Speech Technol., vol. 49, no. 8, pp. 2842–2861, Aug. 2019, doi: 10.1007/s10489-019-01419-2.
M.-J. Kim and T.-S. Kim, ‘‘A neural classifier with fraud density map for effective credit card fraud detection,’’ in Intelligent Data Engineering and Automated Learning, vol. 2412, H. Yin, N. Allinson, R. Freeman, J. Keane, and S. Hubbard, Eds. Berlin, Germany: Springer, 2002, pp. 378–383, doi: 10.1007/3-540-45675-9_56.
N. Kousika, G. Vishali, S. Sunandhana, and M. A. Vijay, ‘‘Machine learning based fraud analysis and detection system,’’ J. Phys., Conf., vol. 1916, no. 1, May 2021, Art. no. 012115, doi: 10.1088/1742-6596/1916/1/012115.
R. F. Lima and A. Pereira, ‘‘Feature selection approaches to fraud detection in e-payment systems,’’ in E-Commerce and Web Technologies, vol. 278, D. Bridge and H. Stuckenschmidt, Eds. Springer, 2017, pp. 111–126, doi: 10.1007/978-3-319-53676-7_9.
Y. Lucas and J. Jurgovsky, ‘‘Credit card fraud detection using machine learning: A survey,’’ 2020, arXiv:2010.
Kevin Harris, Lee Green, Juan González, Juan Garciam, Carlos Rodríguez. Automated Content Generation for Personalized Learning using Machine Learning. Kuwait Journal of Machine Learning, 2(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/180
Sherje, N. P., Agrawal, S. A., Umbarkar, A. M., Dharme, A. M., & Dhabliya, D. (2021). Experimental evaluation of mechatronics based cushioning performance in hydraulic cylinder. Materials Today: Proceedings, doi:10.1016/j.matpr.2020.12.1021 Aoudni, Y., Donald, C., Farouk, A., Sahay, K. B., Babu, D. V., Tripathi, V., & Dhabliya, D. (2022). Cloud security based attack detection using transductive learning integrated with hidden markov model. Pattern Recognition Letters, 157, 16-26. doi:10.1016/j.patrec.2022.02.012
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.