Fraud Detection by the Use of Correlation Based Tree Formation Approach

Authors

  • Shivani S Computer Engg, Swami Sarvanand College of Engg and Technology, PTU, Dina Nagar, India
  • Harjinder Kaur Computer Engg, Swami Sarvanand College of Engg and Technology, PTU, Dina Nagar, India

DOI:

https://doi.org/10.26438/ijcse/v9i3.712

Keywords:

Financial fraud, similarity based decision tree, classification accuracy, precision, execution time

Abstract

Credit card fraud detection becomes critical due to increase in online transactions. Customers bought products online more often than not. The payment is either through debit or financials. The malicious users may attack the online information and hack credit and debit cards. Detection and prevention mechanisms thus are need of the hour. Researchers work towards achieving immunity against these attacks but perfection yet not achieved. This paper proposes similarity based decision tree approach for financial fraud detection strategy by working on state driven dataset. The objective is to detect the attack at early stage to avoid extravagant situations. The result is presented in the form of classification accuracy, precision and execution time. The result in terms of classification accuracy and execution time is improved by the factor of 10%.

References

[1] N. Upasani and H. Om, “Evolving fuzzy min-max neural network for outlier detection,” Procedia Comput. Sci., vol. 45, no. C, pp. 753–761, 2015, doi: 10.1016/j.procs.2015.03.148.

[2] D. Wang, B. Chen, and J. Chen, “Credit card fraud detection strategies with consumer incentives,” Omega (United Kingdom), vol. 88, pp. 179–195, Oct. 2019, doi: 10.1016/j.omega.2018.07.001.

[3] R. Saia and S. Carta, “Evaluating financial transactions in the frequency domain for a proactive fraud detection approach,” in ICETE 2017 - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, vol. 4, pp. 335–342, 2017, doi: 10.5220/0006425803350342.

[4] A. Pumsirirat and L. Yan, “Credit card fraud detection using deep learning based on auto-encoder and restricted Boltzmann machine,” Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 1, pp. 18–25, 2018, doi: 10.14569/IJACSA.2018.090103.

[5] R. Saia, “A discrete wavelet transform approach to fraud detection,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10394 LNCS, pp. 464–474, 2017, doi: 10.1007/978-3-319-64701-2_34.

[6] W. Liu, Z. Wang, X. Liu, N. Zeng, Y. Liu, and F. E. Alsaadi, “A survey of deep neural network architectures and their applications,” Neurocomputing, vol. 234, pp. 11–26, Apr. 2017, doi: 10.1016/j.neucom.2016.12.038.

[7] I. Sohony, R. Pratap, and U. Nambiar, “Ensemble learning for financial fraud detection,” in ACM International Conference Proceeding Series, pp. 289–294, 2018, doi: 10.1145/3152494.3156815.

[8] S. Bhattacharyya, S. Jha, K. Tharakunnel, and J. C. Westland, “Data mining for financial fraud: A comparative study,” Decis. Support Syst., vol. 50, no. 3, pp. 602–613, Feb. 2011, doi: 10.1016/j.dss.2010.08.008.

[9] E. W. T. Ngai, Y. Hu, Y. H. Wong, Y. Chen, and X. Sun, “The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature,” Decis. Support Syst., vol. 50, no. 3, pp. 559–569, 2011, doi: 10.1016/j.dss.2010.08.006.

[10] F. Carcillo, A. Dal Pozzolo, Y. A. Le Borgne, O. Caelen, Y. Mazzer, and G. Bontempi, “SCARFF: A scalable framework for streaming financial fraud detection with spark,” Inf. Fusion, vol. 41, pp. 182–194, May 2018, doi: 10.1016/j.inffus.2017.09.005.

[11] C. Wang and D. Han, “Credit card fraud forecasting model based on clustering analysis and integrated support vector machine,” Cluster Comput., vol. 22, pp. 13861–13866, Nov. 2019, doi: 10.1007/s10586-018-2118-y.

[12] M. Zamini and G. Montazer, “Credit Card Fraud Detection using autoencoder based clustering,” in 9th International Symposium on Telecommunication: With Emphasis on Information and Communication Technology, IST 2018, pp. 486–491, 2019, doi: 10.1109/ISTEL.2018.8661129.

[13] E. Duman and M. H. Ozcelik, “Detecting financial fraud by genetic algorithm and scatter search,” Expert Syst. Appl., vol. 38, no. 10, pp. 13057–13063, Sep. 2011, doi: 10.1016/j.eswa.2011.04.110.

[14] N. Malini and M. Pushpa, “Analysis on financial fraud identification techniques based on KNN and outlier detection,” in Proceedings of the 3rd IEEE International Conference on Advances in Electrical and Electronics, Information, Communication and Bio-Informatics, AEEICB 2017, pp. 255–258, 2017, doi: 10.1109/AEEICB.2017.7972424.

[15] I. Benchaji, S. Douzi, and B. Elouahidi, “Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for Credit Card Fraud Detection,” in 2018 2nd Cyber Security in Networking Conference, CSNet 2018, 2019, doi: 10.1109/CSNET.2018.8602972.

Downloads

Published

2021-03-31
CITATION
DOI: 10.26438/ijcse/v9i3.712
Published: 2021-03-31

How to Cite

[1]
S. Shivani and H. Kaur, “Fraud Detection by the Use of Correlation Based Tree Formation Approach”, Int. J. Comp. Sci. Eng., vol. 9, no. 3, pp. 7–12, Mar. 2021.

Issue

Section

Research Article