Performance of Machine Learning Techniques in the Prevention of Financial Frauds

Authors

  • Saleha Farheen Dept. Computer Science Engineering, Bhopal, India
  • Monika Raghuwanshi Dept. Computer Science Engineering, Bhopal, India

DOI:

https://doi.org/10.26438/ijcse/v9i1.2729

Keywords:

Financial fraud, clustering, regression, machine learning

Abstract

Financial fraud presents more and more threat that has serious consequences in the financial sector. As a result, financial institutions are forced to continually improve their fraud detection systems. In recent years, several studies have used machine learning and data mining techniques to provide solutions to this problem. In this paper, we propose a state of art on various fraud techniques, as well as detection and prevention techniques proposed in the literature such as classification, clustering, And regression. The aim of this study is to identify the techniques and methods that give the best results that have been perfected so far. Financial fraud presents more and more threat that has serious consequences in the financial sector. As a result, financial institutions are forced to continually improve their fraud detection systems. In recent years, several studies have used machine learning and data mining techniques to provide solutions to this problem. In this paper, we propose a state of art on various fraud techniques, as well as detection and prevention techniques proposed in the literature such as classification, clustering, and regression. The aim of this study is to identify the techniques and methods that give the best results that have been perfected so far.

References

[1] Bolton, R. & Hand, D.. Statistical Fraud Detection: A Review (With Discussion). Statistical Science 17(3): 235–255.

[2] G.K. Palshikar, The Hidden Truth – Frauds and Their Control: A Critical Application for Business Intelligence, Intelligent Enterprise, vol. 5, no. 9, 28, pp. 46–51, May 2002.

[3] Mark. "Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations". Hoboken, NJ: John Wiley & Sons Inc. ISBN 978-0-47089046-2.

[4] Pang-Ning Tan, Micheal Steinbach, Vipin Kumar, “Introduction to Data Mining”, Pearson Education, ISBN: 81-317-1472-1, 2006.

[5] Heyer, L.J., Kruglyak, S. and Yooseph, S., “Exploring Expression Data: Identification and Analysis of Coexpressed Genes”, Genome Research 9: pp:1106-1115, 1999.

[6] Ayse Yasemin SEYDIM “Intelligent Agents: A Data Mining Perspective” Southern Methodist University, Dallas, 1999

[7] T.Dean, J.Allen, Y.Aloimonos, “Artificial Intelligence: heory and Practice”, The Benjamin/Cummings Publishing Co. Inc., 1995.

[8] Eleni Mangina, “Intelligent Agent-Based Monitoring Platform for Applications in Engineerings”, International Journal of Computer Science & applications Vol.2, No.1, pp. 38-48, 2005.

[9] L. Yang, R. Karim, V. Ganapathy, and R. Smith, “Improving NFA-based signature matching using ordered binary decision diagrams,” in Proc.13th Int. Symp. Recent Adv. Intrusion Detect., pp. 58–78, Sep. 2010.

[10] A. Z. Broder, “Identifying and filtering near-duplicate documents,” in Proc. 11th Annu. Symp. Combinat. Pattern Matching, pp. 1–10, 2000.

Downloads

Published

2021-01-31
CITATION
DOI: 10.26438/ijcse/v9i1.2729
Published: 2021-01-31

How to Cite

[1]
S. Farheen and M. Raghuwanshi, “Performance of Machine Learning Techniques in the Prevention of Financial Frauds”, Int. J. Comp. Sci. Eng., vol. 9, no. 1, pp. 27–29, Jan. 2021.

Issue

Section

Research Article