1
|
Kanika, Singla J. A novel framework for online transaction fraud detection system based on deep neural network. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2022. [DOI: 10.3233/jifs-212616] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Abstract
Since the introduction of online payment systems, people have started doing online transactions which has also led to the rise of fraudulent transactions causing loss of money to the users and created distrust in the usage of online payment systems. Hence, fraud detection systems are the need of the hour. Among the transactions occurring on daily basis, frauds are less in number as compared to the genuine transactions, so class imbalance naturally exists in fraud detection systems. In this research work, a novel framework for online transaction fraud detection system based on Deep Neural Network (DNN) has been proposed by utilizing algorithm-level method capable to detect frauds from imbalanced data and to maintain the overall performance of the model as well. The proposed system optimizes the decision threshold by utilizing the validation data efficiently for deciding whether an incoming transaction is a Fraud or not. For demonstration of the efficiency of our proposed system, three class imbalanced publicly available datasets have been used. Proposed system has shown better performance than data-level method. The results produced by the proposed fraud detection system have also been compared with existing machine learning techniques-based fraud detection systems. The experimental results show that the deep learning-based fraud detection system is more efficient for detecting frauds from imbalanced datasets having large number of input features as compared to the machine learning models.
Collapse
Affiliation(s)
- Kanika
- School of CSE, Lovely Professional University, Punjab, India
| | - Jimmy Singla
- School of CSE, Lovely Professional University, Punjab, India
| |
Collapse
|
2
|
Ghosh Dastidar K, Jurgovsky J, Siblini W, Granitzer M. NAG: neural feature aggregation framework for credit card fraud detection. Knowl Inf Syst 2022. [DOI: 10.1007/s10115-022-01653-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
Abstract
AbstractThe state-of-the-art feature-engineering method for fraud classification of electronic payments uses manually engineered feature aggregates, i.e., descriptive statistics of the transaction history. However, this approach has limitations, primarily that of being dependent on expensive human expert knowledge. There have been attempts to replace manual aggregation through automatic feature extraction approaches. They, however, do not consider the specific structure of the manual aggregates. In this paper, we define the novel Neural Aggregate Generator (NAG), a neural network-based feature extraction module that learns feature aggregates end-to-end on the fraud classification task. In contrast to other automatic feature extraction approaches, the network architecture of the NAG closely mimics the structure of feature aggregates. Furthermore, the NAG extends learnable aggregates over traditional ones through soft feature value matching and relative weighting of the importance of different feature constraints. We provide a proof to show the modeling capabilities of the NAG. We compare the performance of the NAG to the state-of-the-art approaches on a real-world dataset with millions of transactions. More precisely, we show that features generated with the NAG lead to improved results over manual aggregates for fraud classification, thus demonstrating its viability to replace them. Moreover, we compare the NAG to other end-to-end approaches such as the LSTM or a generic CNN. Here we also observe improved results. We perform a robust evaluation of the NAG through a parameter budget study, an analysis of the impact of different sequence lengths and also the predictions across days. Unlike the LSTM or the CNN, our approach also provides further interpretability through the inspection of its parameters.
Collapse
|
3
|
Naïve Bayes Based Classifier for Credit Card Fraud Discovery. INFORM SYST 2022. [DOI: 10.1007/978-3-030-95947-0_37] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
4
|
Zhu X, Ao X, Qin Z, Chang Y, Liu Y, He Q, Li J. Intelligent financial fraud detection practices in post-pandemic era. Innovation (N Y) 2021; 2:100176. [PMID: 34806059 PMCID: PMC8581570 DOI: 10.1016/j.xinn.2021.100176] [Citation(s) in RCA: 19] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/20/2021] [Accepted: 10/18/2021] [Indexed: 11/26/2022] Open
Abstract
The great losses caused by financial fraud have attracted continuous attention from academia, industry, and regulatory agencies. More concerning, the ongoing coronavirus pandemic (COVID-19) unexpectedly shocks the global financial system and accelerates the use of digital financial services, which brings new challenges in effective financial fraud detection. This paper provides a comprehensive overview of intelligent financial fraud detection practices. We analyze the new features of fraud risk caused by the pandemic and review the development of data types used in fraud detection practices from quantitative tabular data to various unstructured data. The evolution of methods in financial fraud detection is summarized, and the emerging Graph Neural Network methods in the post-pandemic era are discussed in particular. Finally, some of the key challenges and potential directions are proposed to provide inspiring information on intelligent financial fraud detection in the future. Financial fraud in the post-pandemic era is becoming more sophisticated and insidious We reiew the development of financial fraud detection from data and method perspectives Graph neural network methods are emphasized due to their capacity for heterogeneous data analysis Future directions of financial fraud detection are discussed from task, data, and model-oriented perspectives
Collapse
Affiliation(s)
- Xiaoqian Zhu
- School of Economics and Management, University of Chinese Academy of Sciences, Beijing 100190, China.,Institutes of Science and Development, Chinese Academy of Sciences, Beijing 100190, China
| | - Xiang Ao
- Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS), Institute of Computing Technology, CAS, Beijing 100190, China.,School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing 100049, China.,Institute of Intelligent Computing Technology, Suzhou, CAS
| | - Zidi Qin
- Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS), Institute of Computing Technology, CAS, Beijing 100190, China.,School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing 100049, China
| | - Yanpeng Chang
- Institutes of Science and Development, Chinese Academy of Sciences, Beijing 100190, China.,School of Public Policy and Management, University of Chinese Academy of Sciences, Beijing 100049, China
| | - Yang Liu
- Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS), Institute of Computing Technology, CAS, Beijing 100190, China.,School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing 100049, China
| | - Qing He
- Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS), Institute of Computing Technology, CAS, Beijing 100190, China.,School of Computer Science and Technology, University of Chinese Academy of Sciences, Beijing 100049, China
| | - Jianping Li
- School of Economics and Management, University of Chinese Academy of Sciences, Beijing 100190, China
| |
Collapse
|
5
|
Abnormal Detection of Cash-Out Groups in IoT Based Payment. SENSORS 2021; 21:s21227507. [PMID: 34833582 PMCID: PMC8623590 DOI: 10.3390/s21227507] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/20/2021] [Revised: 11/02/2021] [Accepted: 11/08/2021] [Indexed: 11/16/2022]
Abstract
With the rise of online/mobile transactions, the cost of cash-out has decreased and the cost of detection has increased. In the world of online/mobile payment in IoT, merchants and credit cards can be applied and approved online and used in the form of a QR code but not a physical card or Point of Sale equipment, making it easy for these systems to be controlled by a group of fraudsters. In mainland China, where the credit card transaction fee is, on average, lower than a retail loan rate, the credit card cash-out option is attractive for people for an investment or business operation, which, after investigation, can be considered unlawful if over a certain amount is used. Because cash-out will incur fees for the merchants, while bringing money to the credit cards’ owners, it is difficult to confirm, as nobody will declare or admit it. Furthermore, it is more difficult to detect cash-out groups than individuals, because cash-out groups are more hidden, which leads to bigger transaction amounts. We propose a new method for the detection of cash-out groups. First, the seed cards are mined and the seed cards’ diffusion is then performed through the local graph clustering algorithm (Approximate PageRank, APR). Second, a merchant association network in IoT is constructed based on the suspicious cards, using the graph embedding algorithm (Node2Vec). Third, we use the clustering algorithm (DBSCAN) to cluster the nodes in the Euclidean space, which divides the merchants into groups. Finally, we design a method to classify the severity of the groups to facilitate the following risk investigation. The proposed method covers 145 merchants from 195 known risky merchants in groups that acquire cash-out from four banks, which shows that this method can identify most (74.4%) cash-out groups. In addition, the proposed method identifies a further 178 cash-out merchants in the group within the same four acquirers, resulting in a total of 30,586 merchants. The results and framework are already adopted and absorbed into the design for a cash-out group detection system in IoT by the Chinese payment processor.
Collapse
|
6
|
Otoo G, Appati JK, Yaokumah W, Soli MAT, Nwolley SJ, Ludu JY. Evaluation of Data Imbalance Algorithms on the Prediction of Credit Card Fraud. INTERNATIONAL JOURNAL OF INTELLIGENT INFORMATION TECHNOLOGIES 2021. [DOI: 10.4018/ijiit.289967] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Abstract
Credit Card fraud has been on the rise for some years now after the introduction of card payment systems. To curb this menace, computational methods have been proposed. Unfortunately, the data available for such a study is highly skewed resulting in the data imbalance problem. In this study, we investigate the performance of some selected data imbalance algorithms employed in the prediction of credit card fraud. A dataset from Kaggle containing 284,315 genuine transactions and 492 fraudulent transactions was used for the evaluation. The machine learning algorithms deployed for the study is Logistic Regression, Naïve Bayes, and the K-Nearest Neighbour algorithm with F1 score and Precision-Recall area under the curve (PR AUC) as the metric. Numerical assessment of the performance of the adopted algorithm gave a rate of 82.5% and 81%, respectively using neighbourhood cleaning rule for undersampling
Collapse
|
7
|
Albulayhi K, Smadi AA, Sheldon FT, Abercrombie RK. IoT Intrusion Detection Taxonomy, Reference Architecture, and Analyses. SENSORS 2021; 21:s21196432. [PMID: 34640752 PMCID: PMC8512890 DOI: 10.3390/s21196432] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/15/2021] [Revised: 09/14/2021] [Accepted: 09/21/2021] [Indexed: 11/16/2022]
Abstract
This paper surveys the deep learning (DL) approaches for intrusion-detection systems (IDSs) in Internet of Things (IoT) and the associated datasets toward identifying gaps, weaknesses, and a neutral reference architecture. A comparative study of IDSs is provided, with a review of anomaly-based IDSs on DL approaches, which include supervised, unsupervised, and hybrid methods. All techniques in these three categories have essentially been used in IoT environments. To date, only a few have been used in the anomaly-based IDS for IoT. For each of these anomaly-based IDSs, the implementation of the four categories of feature(s) extraction, classification, prediction, and regression were evaluated. We studied important performance metrics and benchmark detection rates, including the requisite efficiency of the various methods. Four machine learning algorithms were evaluated for classification purposes: Logistic Regression (LR), Support Vector Machine (SVM), Decision Tree (DT), and an Artificial Neural Network (ANN). Therefore, we compared each via the Receiver Operating Characteristic (ROC) curve. The study model exhibits promising outcomes for all classes of attacks. The scope of our analysis examines attacks targeting the IoT ecosystem using empirically based, simulation-generated datasets (namely the Bot-IoT and the IoTID20 datasets).
Collapse
Affiliation(s)
- Khalid Albulayhi
- Department of Computer Science, University of Idaho, Moscow, ID 83844, USA;
- Correspondence:
| | - Abdallah A. Smadi
- Department of ECE, Science, University of Idaho, Moscow, ID 83844, USA;
| | | | | |
Collapse
|
8
|
Zhang Z, Deng X. Anomaly detection using improved deep SVDD model with data structure preservation. Pattern Recognit Lett 2021. [DOI: 10.1016/j.patrec.2021.04.020] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
9
|
Credit Card Fraud Detection in Card-Not-Present Transactions: Where to Invest? APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11156766] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Online shopping, already on a steady rise, was propelled even further with the advent of the COVID-19 pandemic. Of course, credit cards are a dominant way of doing business online. The credit card fraud detection problem has become relevant more than ever as the losses due to fraud accumulate. Most research on this topic takes an isolated, focused view of the problem, typically concentrating on tuning the data mining models. We noticed a significant gap between the academic research findings and the rightfully conservative businesses, which are careful when adopting new, especially black-box, models. In this paper, we took a broader perspective and considered this problem from both the academic and the business angle: we detected challenges in the fraud detection problem such as feature engineering and unbalanced datasets and distinguished between more and less lucrative areas to invest in when upgrading fraud detection systems. Our findings are based on the real-world data of CNP (card not present) fraud transactions, which are a dominant type of fraud transactions. Data were provided by our industrial partner, an international card-processing company. We tested different data mining models and approaches to the outlined challenges and compared them to their existing production systems to trace a cost-effective fraud detection system upgrade path.
Collapse
|
10
|
Seera M, Lim CP, Kumar A, Dhamotharan L, Tan KH. An intelligent payment card fraud detection system. ANNALS OF OPERATIONS RESEARCH 2021:1-23. [PMID: 34121790 PMCID: PMC8186361 DOI: 10.1007/s10479-021-04149-2] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 06/03/2021] [Indexed: 06/12/2023]
Abstract
Payment cards offer a simple and convenient method for making purchases. Owing to the increase in the usage of payment cards, especially in online purchases, fraud cases are on the rise. The rise creates financial risk and uncertainty, as in the commercial sector, it incurs billions of losses each year. However, real transaction records that can facilitate the development of effective predictive models for fraud detection are difficult to obtain, mainly because of issues related to confidentially of customer information. In this paper, we apply a total of 13 statistical and machine learning models for payment card fraud detection using both publicly available and real transaction records. The results from both original features and aggregated features are analyzed and compared. A statistical hypothesis test is conducted to evaluate whether the aggregated features identified by a genetic algorithm can offer a better discriminative power, as compared with the original features, in fraud detection. The outcomes positively ascertain the effectiveness of using aggregated features for undertaking real-world payment card fraud detection problems.
Collapse
Affiliation(s)
- Manjeevan Seera
- Econometrics and Business Statistics, School of Business, Monash University Malaysia, Selangor, Malaysia
| | - Chee Peng Lim
- Institute for Intelligent Systems Research and Innovation, Deakin University, Geelong, VIC Australia
| | - Ajay Kumar
- AIM Research Center on Artificial Intellegence in Value Creation, EMLYON Business School, Écully, France
| | | | - Kim Hua Tan
- Nottingham University Business School, Nottingham, UK
| |
Collapse
|
11
|
Unceta I, Nin J, Pujol O. Environmental Adaptation and Differential Replication in Machine Learning. ENTROPY 2020; 22:e22101122. [PMID: 33286891 PMCID: PMC7597251 DOI: 10.3390/e22101122] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/16/2020] [Revised: 09/17/2020] [Accepted: 09/29/2020] [Indexed: 11/16/2022]
Abstract
When deployed in the wild, machine learning models are usually confronted with an environment that imposes severe constraints. As this environment evolves, so do these constraints. As a result, the feasible set of solutions for the considered need is prone to change in time. We refer to this problem as that of environmental adaptation. In this paper, we formalize environmental adaptation and discuss how it differs from other problems in the literature. We propose solutions based on differential replication, a technique where the knowledge acquired by the deployed models is reused in specific ways to train more suitable future generations. We discuss different mechanisms to implement differential replications in practice, depending on the considered level of knowledge. Finally, we present seven examples where the problem of environmental adaptation can be solved through differential replication in real-life applications.
Collapse
Affiliation(s)
- Irene Unceta
- BBVA Data & Analytics, 28050 Madrid, Spain;
- Department of Mathematics and Computer Science, Universitat de Barcelona, 08007 Barcelona, Spain;
| | - Jordi Nin
- Department of Operations, Innovation and Data Sciences, Universitat Ramon Llull, ESADE, 08172 Sant Cugat del Vallès, Spain
- Correspondence: ; Tel.: +34-932-806162 (ext. 2513)
| | - Oriol Pujol
- Department of Mathematics and Computer Science, Universitat de Barcelona, 08007 Barcelona, Spain;
| |
Collapse
|
12
|
|
13
|
A review of deep learning with special emphasis on architectures, applications and recent trends. Knowl Based Syst 2020. [DOI: 10.1016/j.knosys.2020.105596] [Citation(s) in RCA: 121] [Impact Index Per Article: 30.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/19/2022]
|