Detect Suspicious Transactions and Identify Fraud Transactions in Banking Data Using Machine Learning

Authors

  • Geetanjali Sharma Research Scholar, JJTU, Rajasthan. Working as Assistant Professor, Computer Engineering Department, Pimpri Chinchwad College of Engineering, Nigdi,Pune, India
  • Shashi Bhushan Senior Lecturer, Department of Computer & Information Sciences (CIS), Universiti Teknologi PETRONAS , Malaysia
  • Ram Joshi Dean Academics, Department of Information Technology, RSCOE,Pune, India
  • Asmita Manna Assistant Professor,Computer Engineering Department,Pimpri Chinchwad College of Engineering,Nigdi,Pune, India
  • Madhuri Amol Suryavanshi Assistant Professor,Computer Engineering Department,Pimpri Chinchwad College of Engineering,Nigdi,Pune, India

Keywords:

Suspicious Transactions, KNN, SVM, Random Forest, Adaboost, Navies Bayes

Abstract

The identification of potentially malicious transactions is a crucial and difficult activity for the purpose of preventing cyberattacks, which may have devastating effects on a company's finances, reputation, and legal standing. This is an extremely important problem for assuring the safety of investors in investment applications. When it comes to our scenario, the goal of identifying potentially suspicious transactions is to determine the typical patterns of behavior shown by application users and to pinpoint any circumstances that deviate significantly from these norms at the appropriate moment. Changing your password, logging in from several locations, and engaging in high-volume cash flow or trading activities are all examples of events that have a high level of significance for investing applications. It is very essential to promptly identify suspicious transactions and activity and to take the appropriate steps in order to protect the users as well as the assets and reputation of the firm. The proposed method for predicting fraudulent transactions begins with the dataset, which is pre-processed in the initial phase and then passed into further steps where, test/train split was performed, dataset spliced model parameters were defined, then genetic algorithm for feature selection was initiated, which returns weights for particular features after that model is loaded and those weights are passed into it, and model training was then initiated, and once training was completed, model M was returned.

Downloads

Download data is not yet available.

References

Al-Momani and S. A. Aljawarneh, "Fraudulent Transactions Prediction Using Deep Neural Network," 2022 International Conference on Engineering & MIS (ICEMIS), 2022, pp. 1-7, doi: 10.1109/ICEMIS56295.2022.9914349.

M. Demirdag, E. Bay, G. Yuceturk, S. M. Yalçinkaya and I. U. Sayan, "Anomaly Detection in Investors' Activities and Transactions via Rule-Based and Advanced Technique," 2022 International Joint Conference on Information and Communication Engineering (JCICE), 2022, pp. 11-14, doi: 10.1109/JCICE56791.2022.00013.

R. A. L. Torres and M. Ladeira, "A proposal for online analysis and identification of fraudulent financial transactions," 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA), 2020, pp. 240-245, doi: 10.1109/ICMLA51294.2020.00047.

Catherine, Denny and M. R. Shihab, "Bank Account Classification for Gambling Transactions," 2021 3rd East Indonesia Conference on Computer and Information Technology (EIConCIT), 2021, pp. 302-308, doi: 10.1109/EIConCIT50028.2021.9431874.

T. Zhu et al., "Detecting and Warning Abnormal Transaction of Virtual Cryptocurrency Based on Privacy Protection Framework," 2022 IEEE 7th International Conference on Smart Cloud (SmartCloud), 2022, pp. 74-82, doi: 10.1109/SmartCloud55982.2022.00018.

Sarker, IH Machine Learning: Algorithms, Real-World Applications and Research Directions. SN COMPUT. SCI. 2, 160 (2021). https://doi.org/10.1007/s42979-021-00592

Cao, L., Tay, F. Financial Forecasting Using Support Vector Machines. Neural Comput & Applic 10, 184–192 (2001). https://doi.org/10.1007/s005210170010

Jin, M., Wang, H., Zhang, Q. et al. Financial Management and Decision Based on Decision Tree Algorithm. Wireless Pers Commun 102, 2869–2884 (2018). https://doi.org/10.1007/s11277-018-5312-6

Fawagreh, K., Gaber, M.M., Abdalla, M. (2022). Pruned Random Forests for Effective and Efficient Financial Data Analytics. In: Derindere Köseoğlu, S. (eds) Financial Data Analytics. Contributions to Finance and Accounting. Springer, Cham. https://doi.org/10.1007/978-3-030-83799-0_7

Ban, T., Zhang, R., Pang, S., Sarrafzadeh, A., Inoue, D. (2013). Referential kNN Regression for Financial Time Series Forecasting. In: Lee, M., Hirose, A., Hou, ZG., Kil, R.M. (eds) Neural Information Processing. ICONIP 2013. Lecture Notes in Computer Science, vol 8226. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-42054-2_75

Brumen, B., Rozman, I., Černezel, A. (2014). Observing a Naïve Bayes Classifier’s Performance on Multiple Datasets. In: Manolopoulos, Y., Trajcevski, G., Kon-Popovska, M. (eds) Advances in Databases and Information Systems. ADBIS 2014. Lecture Notes in Computer Science, vol 8716. Springer, Cham. https://doi.org/10.1007/978-3-319-10933-6_20

Yan, H., Ouyang, H. Financial Time Series Prediction Based on Deep Learning. Wireless Pers Commun 102, 683–700 (2018). https://doi.org/10.1007/s11277-017-5086-2

P. A. Samarakoon and D. A. S. Athukorala, “System abnormality detection in stock market complex trading systems using machine learning techniques,” 2017 National Information Technology Conference (NITC), 2017, pp. 125-130, doi: 10.1109/NITC.2017.8285660.

S. N. Kalid, K. -H. Ng, G. -K. Tong and K. -C. Khor, “A Multiple Classifiers System for Anomaly Detection in Credit Card Data With Unbalanced and Overlapped Classes,” in IEEE Access, vol. 8, pp. 28210-28221, 2020, doi: 10.1109/ACCESS.2020.2972009.

D. Huang, D. Mu, L. Yang and X. Cai, “CoDetect: Financial Fraud Detection With Anomaly Feature Detection,” in IEEE Access, vol. 6, pp. 19161-19174, 2018, doi: 10.1109/ACCESS.2018.2816564.

S. Han, “Semi-Supervised Learning Classification Based on Generalized Additive Logistic Regression for Corporate Credit Anomaly Detection,” in IEEE Access, vol. 8, pp. 199060-199069, 2020, doi: 10.1109/ACCESS.2020.3035128.

D. M. Brandão Lent, M. P. Novaes, L. F. Carvalho, J. Lloret, J. J. P. C. Rodrigues and M. L. Proença, “A Gated Recurrent Unit Deep Learning Model to Detect and Mitigate Distributed Denial of Service and Portscan Attacks,” in IEEE Access, vol. 10, pp. 73229-73242, 2022, doi: 10.1109/ACCESS.2022.3190008.

D Rzayeva, S Malekzadeh , Combination of Deep Neural Networks and K-Nearest Neighbors for Credit Card Fraud Detection - arXiv preprint arXiv:2205.15300, 2022 - arxiv.org

Zhang, D. , Bhandari, B. and Black, D. (2020) Credit Card Fraud Detection Using Weighted Support Vector Machine. Applied Mathematics, 11, 1275-1291. doi: 10.4236/am.2020.1112087.

Lin, T.-H.; Jiang, J.-R. Credit Card Fraud Detection with Autoencoder and Probabilistic Random Forest. Mathematics 2021, 9, 2683. https://doi.org/10.3390/math9212683

Randhawa, K.; Loo, C.K.; Seera, M.; Lim, C.P.; Nandi, A.K. Credit Card Fraud Detection Using AdaBoost and Majority Voting. IEEE Access 2018, 6, 14277–14284

Kaur, B.J., Kumar, R. (2020). A Hybrid Approach for Credit Card Fraud Detection Using Naive Bayes and Voting Classifier. In: Pandian, A., Palanisamy, R., Ntalianis, K. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019). ICCBI 2019

Downloads

Published

24.03.2024

How to Cite

Sharma, G. ., Bhushan, S. ., Joshi, R. ., Manna, A. ., & Suryavanshi, M. A. . (2024). Detect Suspicious Transactions and Identify Fraud Transactions in Banking Data Using Machine Learning. International Journal of Intelligent Systems and Applications in Engineering, 12(19s), 243–251. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5062

Issue

Section

Research Article