Detecting Fraudulent Patterns: Real-Time Identification using Machine Learning
Keywords:
Machine Learning, fraud detection, Healthcare, KNN, LR, NBAbstract
The difficulty of identifying fraudulent activity in real-time has grown in importance in the age of digital transactions and networked technologies. The comprehensive strategy presented in this work uses the strength of machine learning techniques to address this pressing problem.Our study focuses on creating and implementing a reliable, real-time fraud detection system that can change with changing fraud patterns while maintaining a high degree of accuracy. To analyse huge amounts of transactional data in real-time, we suggest a system that combines multiple machine learning approaches, such as K Nearest Neighbour, Logistic regression, Naive Bayes model.Our system's capacity for constant learning and adaptation is at its core. Anomaly detection methods are used to find out-of-the-ordinary trends in transaction data, and historical data is used to train prediction models that can predict fraudulent behaviour. In order to identify anomalies at the individual level, the system also uses user behaviour analysis, which improves accuracy and lowers false positives.The proposed machine learning method is highly accurate and quick at detecting fraudulent activity, making it appropriate for use healthcare domain. Our system offers a strong defence against the constantly changing terrain of fraudulent activities by upgrading its knowledge base and reacting to new fraud trends, protecting both businesses and customers.
Downloads
References
Y. Sahin., and E. Duman, “Detecting Credit Card Fraud by Decision Trees and Support Vector Machines,” in Proceedings of the International of MultiConference of Enginners and Computer Scientists, 2011, pp. 442-447.
D. Tripathi, B. Nigam, and D. Edla, “A Novel Web Fraud Detection Technique using Association Rule Mining,” Procedia Computer Science, vol. 115, 2017, pp. 274-281.
V. Choudhary, and E. Divya, “Credit Card Fraud Detection using Frequent Pattern Mining using FP- Tree And Apriori Growth,” International Jounral of Advance Technology and Innovation Research, vol. 09, no. 13, 2017, pp. 2370-2373.
M. Bansal, and Suman,“Credit Card Fraud Detection Using Self Organised Map,” International Journal of Information & Computation Technology, vol. 4, No. 13, 2014, pp. 1343- 1348.
] H. Naik, “Credit Card Fraud Detection for Online Banking Transactions,” International Journal for Research in Applied Science and Engineering Technology, vol. 6, no. 4, 2018, pp. 4573-4577.
N. Malini, and M. Pushpa, “Investigation of Credit Card Fraud Recognition Techniques based on KNN and HMM,” in Proceedings of the International Conference on Communication, Computing and Information Technology, 2018, pp. 9-13. [67] M. Franzese, and A. Iuliano, “Hidden Markov Models,” Encyclopedia of Bioinformatics and Computational Biology, vol. 1, 2019, pp. 753-762.
M. Pietrzykowski, and W. Sałabun, “Applications of Hidden Markov Model: state-of-the-art,” International of Journal Computer Technology & Applications, vol. 5, no. 4, 2014, pp. 1384-1391
B. Baesens, S. Höppner, and T. Verdonck, “Data engineering for fraud detection,” Decision Support Systems, 2021, article 113492, [70] X. Zhang, Y. Han, W. Xu, and Q. Wang, “HOBA: A novel feature engineering methodology for credit card fraud detection with a deep learning architecture,” Information Sciences, vol. 557, no. 10, 2021, pp. 302-316
S. Ajani and M. Wanjari, "An Efficient Approach for Clustering Uncertain Data Mining Based on Hash Indexing and Voronoi Clustering," 2013 5th International Conference and Computational Intelligence and Communication Networks, 2013, pp. 486-490, doi: 10.1109/CICN.2013.106.
Khetani, V. ., Gandhi, Y. ., Bhattacharya, S. ., Ajani, S. N. ., & Limkar, S. . (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253–262.
Potnurwar, A. V. ., Bongirwar, V. K. ., Ajani, S. ., Shelke, N. ., Dhone, M. ., & Parati, N. . (2023). Deep Learning-Based Rule-Based Feature Selection for Intrusion Detection in Industrial Internet of Things Networks. International Journal of Intelligent Systems and Applications in Engineering, 11(10s), 23–35.
P. Craja, A. Kim, and S. Lessmann, “Deep learning for detecting financial statement fraud,” Decision Support Systems, vol. 139, 2020, article 113421.
J. Xu, A. Sung and Q. Liu, “Behaviour Mining for Fraud Detection,” Journal of Research and Practice in Information Technology, vol. 39, no. 1, 2007, pp. 3-18
R. Porkess, and S. Mason, “Looking at Debit and Credit Card Fraud,” Teaching Statistics, vol. 34, no. 3, 2011, pp. 87-91.
S. Yusuf, and D. Ekrem, “Detecting Credit Card Fraud by ANN and Logistic Regression,” in Proceedings of the International Symposium on Innovations in Intelligent SysTems and Applications, 2011
L. Mukhanov, “Using Bayesian Belief Networks for credit card fraud detection,” In Proceedings of the Conference: Proceedings of the 26th International Conference on Artificial Intelligence and Applications, 2008, pp. 221-225.
S. Maes, K. Tuyls, B. Vanschoenwinkel, and B. Manderick, “Credit Card Fraud Detection Using Bayesian and Neural Networks,” In Proceedings of the First International NAISO Congress on NEURO FUZZY THECHNOLOGIES, 2002.
C. Milgo, “A Bayesian Classification Model for Fraud Detection over ATM Platforms,” Journal of Computer Engineering, vol. 18, no. 4, pp. 26-32, 2016.
A. Desai, and D. Deshmukh, “Data mining techniques for Fraud Detection,” International Journal of Computer Science and Information Technologies, vol. 3, pp. 1-4, 2013.
K. Seeja, and M. Zareapoor, “FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining,” The Scientific World Journal, 2014, pp. 1-10.
Kevin Zakka. (n.d.), A Complete Guide to K-NearestNeighbours with Applications in Python and R, Retrieved from https://kevinzakka.github.io/2016/07/13/k-nearestneighbor
I. Sutedja, Y. Heryadi, L. Wulandhari, and B. Abbas, “Recognizing debit card fraud transaction using CHAID and K-nearest neighbour: Indonesian Bank case,” in Proceedings of the 11th International Conference on Knowledge, Information and Creativity Support Systems, 2016, pp. 1-5.
C. Sudha, and T. Raj, “Credit Card Fraud Detection in Internet Using K-nearest Neighbor Algorithm,” International Journal of Computer Science, vol. 5, issue 11, pp. 22-30, 2017.
Zhang, X., Han, Y., Xu, W., & Wang, Q. (2019). HOBA: A novel feature engineering methodology for credit card fraud detection with a deep learning architecture. Information Sciences
Haoxiang, Wang, and S. Smys. "Overview of Configuring Adaptive Activation Functions for Deep Neural Networks-A Comparative Study." Journal of Ubiquitous Computing and Communication Technologies (UCCT) 3, no. 01 (2021): 10-22.
Choi, D., & Lee, K. (2018). An artificial intelligence approach to financial fraud detection under IoT environment: A survey and implementation. Security and Communication Networks, 2018.
Smys, S., and Jennifer S. Raj. "Analysis of Deep Learning Techniques for Early Detection of Depression on Social Media Network-A Comparative Study." Journal of trends in Computer Science and Smart technology (TCSST) 3, no. 01 (2021): 24-39.
Wang, Y., &Xu, W. (2018). Leveraging deep learning with LDA-based text analytics to detect automobile insurance fraud. Decision Support Systems, 105, 87-95.
Ranganathan, G. "A Study to Find Facts Behind Preprocessing on Deep Learning Algorithms." Journal of Innovative Image Processing (JIIP) 3, no. 01 (2021): 66-74.
Kim, E., Lee, J., Shin, H., Yang, H., Cho, S., Nam, S. K., ...& Kim, J. I. (2019). Champion-challenger analysis for credit card fraud detection: Hybrid ensemble and deep learning. Expert Systems with Applications, 128, 214-224
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.