Performance of Machine Learning Techniques in the Prevention of Financial Frauds
DOI:
https://doi.org/10.26438/ijcse/v9i1.2729Keywords:
Financial fraud, clustering, regression, machine learningAbstract
Financial fraud presents more and more threat that has serious consequences in the financial sector. As a result, financial institutions are forced to continually improve their fraud detection systems. In recent years, several studies have used machine learning and data mining techniques to provide solutions to this problem. In this paper, we propose a state of art on various fraud techniques, as well as detection and prevention techniques proposed in the literature such as classification, clustering, And regression. The aim of this study is to identify the techniques and methods that give the best results that have been perfected so far. Financial fraud presents more and more threat that has serious consequences in the financial sector. As a result, financial institutions are forced to continually improve their fraud detection systems. In recent years, several studies have used machine learning and data mining techniques to provide solutions to this problem. In this paper, we propose a state of art on various fraud techniques, as well as detection and prevention techniques proposed in the literature such as classification, clustering, and regression. The aim of this study is to identify the techniques and methods that give the best results that have been perfected so far.
References
[1] Bolton, R. & Hand, D.. Statistical Fraud Detection: A Review (With Discussion). Statistical Science 17(3): 235–255.
[2] G.K. Palshikar, The Hidden Truth – Frauds and Their Control: A Critical Application for Business Intelligence, Intelligent Enterprise, vol. 5, no. 9, 28, pp. 46–51, May 2002.
[3] Mark. "Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations". Hoboken, NJ: John Wiley & Sons Inc. ISBN 978-0-47089046-2.
[4] Pang-Ning Tan, Micheal Steinbach, Vipin Kumar, “Introduction to Data Mining”, Pearson Education, ISBN: 81-317-1472-1, 2006.
[5] Heyer, L.J., Kruglyak, S. and Yooseph, S., “Exploring Expression Data: Identification and Analysis of Coexpressed Genes”, Genome Research 9: pp:1106-1115, 1999.
[6] Ayse Yasemin SEYDIM “Intelligent Agents: A Data Mining Perspective” Southern Methodist University, Dallas, 1999
[7] T.Dean, J.Allen, Y.Aloimonos, “Artificial Intelligence: heory and Practice”, The Benjamin/Cummings Publishing Co. Inc., 1995.
[8] Eleni Mangina, “Intelligent Agent-Based Monitoring Platform for Applications in Engineerings”, International Journal of Computer Science & applications Vol.2, No.1, pp. 38-48, 2005.
[9] L. Yang, R. Karim, V. Ganapathy, and R. Smith, “Improving NFA-based signature matching using ordered binary decision diagrams,” in Proc.13th Int. Symp. Recent Adv. Intrusion Detect., pp. 58–78, Sep. 2010.
[10] A. Z. Broder, “Identifying and filtering near-duplicate documents,” in Proc. 11th Annu. Symp. Combinat. Pattern Matching, pp. 1–10, 2000.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
