Modeling Fraud Detection in Community Development Banking Through Machine Learning
Keywords:
Fraud Detection, Community Development Banking, Machine Learning, Deep Learning, SMOTE, Decision Tree, Random Forest, AUC-ROC, Class Imbalance, Precision, Recall.Abstract
Fraud detection in the banking sector, particularly in community development banking, has become a critical concern with the rise of digital financial services. This study explores the application of machine learning (ML) models for detecting fraudulent transactions in community development banking. The models evaluated in this study include decision trees, random forests, k-nearest neighbors (KNN), support vector machines (SVM), and deep learning (artificial neural networks - ANN). Data preprocessing techniques, such as handling missing values, feature scaling, and addressing class imbalance using SMOTE (Synthetic Minority Over-sampling Technique), were applied to ensure the models' effectiveness. The models were evaluated using performance metrics such as accuracy, precision, recall, F1-score, and AUC-ROC. The results indicate that the deep learning model outperformed traditional machine learning models, achieving the highest accuracy (94.5%) and recall (95.2%) rates. Despite higher computational costs, deep learning demonstrated superior performance in detecting fraud while minimizing false positives and false negatives. The study also highlights the significant improvement in recall and overall model performance after balancing the dataset with SMOTE. The findings emphasize the potential of deep learning in fraud detection while suggesting the need for trade-offs between model accuracy and execution time for real-time applications in community development banking. This study provides valuable insights for developing robust and efficient fraud detection systems using machine learning in the financial sector.
Downloads
References
R. Rambola, P. Varshney and P. Vishwakarma, “Data Mining Techniques for Fraud Detection in Banking Sector,” 2018 4th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 2018, pp. 1-5, doi: 10.1109/CCAA.2018.8777535.
N. Malini and M. Pushpa, “Analysis on credit card fraud identification techniques based on KNN and outlier detection,” 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Chennai, 2017, pp. 255-258, doi: 10.1109/AEEICB.2017.7972424.
Ishan Sohony, Rameshwar Pratap, and Ullas Nambiar, “Ensemble learning for credit card fraud detection,” Proceedings of the ACM India Joint International Conference on Data Science and Management of Data (CoDS-COMAD ’18), Association for Computing Machinery, New York, NY, USA, 2018, pp. 289-294, doi: 10.1145/3152494.3156815.
C. Wang, Y. Wang, Z. Ye, L. Yan, W. Cai, and S. Pan, “Credit Card Fraud Detection Based on Whale Algorithm Optimized BP Neural Network,” 2018 13th International Conference on Computer Science Education (ICCSE), Colombo, 2018, pp. 1-4, doi: 10.1109/ICCSE.2018.8468855.
I. Benchaji, S. Douzi and B. ElOuahidi, “Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for Credit Card Fraud Detection,” 2018 2nd Cyber Security in Networking Conference (CSNet), Paris, 2018, pp. 1-5, doi: 10.1109/CSNET.2018.8602972.
John O. Awoyemi, Adebayo Olusola Adetunmbi, and Samuel Adebayo Oluwadare, “Credit card fraud detection using machine learning techniques: A comparative analysis,” 2017 International Conference on Computing Networking and Informatics (ICCNI), 2017, pp. 1-9.
Fabrizio Carcillo, Andrea Dal Pozzolo, Yann-Aël Le Borgne, Olivier Caelen, Yannis Mazzer, and Gianluca Bontempi, “Scarff: a scalable framework for streaming credit card fraud detection with spark,” Information Fusion, vol. 41, pp. 182-194, 2018.
Galina Baader and Helmut Krcmar, “Reducing false positives in fraud detection: Combining the red flag approach with process mining,” International Journal of Accounting Information Systems, 2018.
Ravisankar P, Ravi V, Raghava Rao G, and Bose, “Detection of financial statement fraud and feature selection using data mining techniques,” Elsevier, Decision Support Systems, vol. 50, no. 2, pp. 491-500, 2011, SVM.
K. Seeja, and M. Zareapoor, “FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining,” The Scientific World Journal, 2014, pp. 1-10, KNN, SVM.
C. Tyagi, P. Parwekar, P. Singh, and K. Natla, “Analysis of Credit Card Fraud Detection Techniques,” Solid State Technology, vol. 63, no. 6, pp. 18057-18069, 2020.
C. Chee, J. Jaafar, I. Aziz, M. Hassan, and W. Yeoh, “Algorithms for frequent itemset mining: A literature review,” Artificial Intelligence Review, vol. 52, pp. 2603-2621, 2019.
S. Kiran, J. Guru, R. Kumar, N. Kumar, D. Katariya, and M. Sharma, “Credit card fraud detection using Naïve Bayes model based and KNN classifier,” International Journal of Advance Research, Ideas and Innovations in Technology, vol. 4, pp. 44-47, 2018.
Pumsirirat, A.; Yan, L., “Credit Card Fraud Detection Using Deep Learning based on Auto-Encoder and Restricted Boltzmann Machine,” 2021. Available online: https://thesai.org/Downloads/Volume9No1/Paper_3-Credit_Card_Fraud_Detection_Using_Deep_Learning.pdf.
PwC’s Global Economic Crime and Fraud Survey 2020, Available online: https://www.pwc.com/fraudsurvey, accessed on 30 November 2020.
Pourhabibi, T.; Ongb, K.L.; Kama, B.H.; Boo, Y.L., “Fraud detection: A systematic literature review of graph-based anomaly detection approaches,” Decis. Support Syst., vol. 133, p. 113303, 2020.
Lucas, Y.; Jurgovsky, J., “Credit card fraud detection using machine learning: A survey,” arXiv, 2020, arXiv:2010.06479.
Podgorelec, B.; Turkanović, M.; Karakatić, S., “A Machine Learning-Based Method for Automated Blockchain Transaction Signing Including Personalized Anomaly Detection,” Sensors, vol. 20, p. 147, 2020.
Synthetic Financial Datasets for Fraud Detection, Available online: https://www.kaggle.com/ntnu-testimon/paysim1, accessed on 30 November 2020.
Ma, T.; Qian, S.; Cao, J.; Xue, G.; Yu, J.; Zhu, Y.; Li, M., “An Unsupervised Incremental Virtual Learning Method for Financial Fraud Detection,” Proceedings of the 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA), Abu Dhabi, 3-7 November 2019, pp. 1–6.
Puh, M.; Brkić, L., “Detecting Credit Card Fraud Using Selected Machine Learning Algorithms,” Proceedings of the 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 20–24 May 2019.
Ryman-Tubb, N.F.; Krause, P.J.; Garn, W., “How Artificial Intelligence and machine learning research impacts payment card fraud detection: A survey and industry benchmark,” Eng. Appl. Artif. Intell., vol. 76, pp. 130–157, 2018.
Xuan, S.; Liu, G.; Li, Z.; Zheng, L.; Wang, S.; Jiang, C., “Random Forest for Credit Card Fraud Detection,” Proceedings of the 2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC), Zhuhai, China, 27–29 March 2018.
Johnson, P., & Wang, Y., “The black box problem in AI: Implications for financial risk management,” Journal of Finance and Technology, vol. 9, no. 2, pp. 120-138, 2021.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.