277
Views
3
CrossRef citations to date
0
Altmetric
Computers & Computing

Empirical Analysis of Machine Learning Algorithms on Detection of Fraudulent Electronic Fund Transfer Transactions

ORCID Icon &

References

  • G. Yan, “Risk types and risk amplification of online finance,” Inf. Technol. J., Vol. 12, no. 3, pp. 494–497, 2013.
  • INTERPOL warns of financial fraud linked to COVID-19, March 2020.
  • K. Rivera, C. Rohn, J. Donker, and C. Butter. Fighting fraud: A never-ending battle. Survey WLT127074948, PwC, 2020.
  • U. Flegel, J. Vayssiere, and G. Bitz, “A state of the art survey of fraud detection technology,” in Insider threats in cyber security, Boston, MA: Springer, 2010, pp. 73–84.
  • A. Oza, “Fraud detection using machine learning,” TRANSFER, Vol. 528812, no. 4097, pp. 532909, 2018.
  • J. Jha, “Intrusion detection system using support vector machine,” International Journal of Applied Information Systems, Page, Vol. 6, pp. 25–30, 2013.
  • B. Ingre, and A. Yadav, “Performance analysis of NSL-KDD dataset using ANN,” in 2015 International Conference on Signal Processing and Communication Engineering Systems, Guntur, India, January 2015, pp. 92–96. IEEE.
  • A. Javaid, Q. Niyaz, W. Sun, and M. Alam, “A deep learning approach for network intrusion detection system,” in Proceedings of the 9th EAI International Conference on Bio-Inspired Information and Communications Technologies (Formerly Bionetics), New York City, United States, 2016. ACM.
  • N. T. Van, T. N. Thinh, and L. T. Sach, “An anomaly-based network intrusion detection system using Deep learning,” in In 2017 International Conference on System Science and Engineering (ICSSE), Ho Chi Minh City, Vietnam, July 2017, pp. 210–214. IEEE.
  • N. Shone, T. N. Ngoc, V. D. Phai, and Q. Shi, “A deep learning approach to network intrusion detection,” IEEE Transactions on Emerging Topics in Computational Intelligence, Vol. 2, no. 1, pp. 41–50, February 2018.
  • S. Sorournejad, Z. Zojaji, R. E. Atani, and A. H. Monadjemi. A survey of credit card fraud detection techniques: Data and technique oriented perspective. CoRR, abs/1611.06439, 2016.
  • L. Delamaire, H. Abdou, and J. Pointon, “Credit card fraud and detection techniques: a review,” Banks and Bank Systems, Vol. 4, no. 2, pp. 13, 2009.
  • P. J. Bentley, J. Kim, G. Jung, and J.-U. Choi, “Fuzzy darwinian detection of credit card fraud,” in Proceedings of the 14th Annual Fall Symposium of the Korean Information Processing Society, 2000.
  • E. Aleskerov, B. Freisleben, and B. Rao. Cardwatch: A neural network based database mining system for credit card fraud detection. pages 220–226, 04 1997.
  • K. J. Ezawa, and S. W. Norton, “Constructing Bayesian networks to predict uncollectible telecommunications accounts,” IEEE Expert: Intelligent Systems and Their Applications, Vol. 11, no. 5, pp. 45–51, October 1996.
  • V. Dheepa, and D. R. Dhanapal, “Analysis of credit card fraud detection methods,” International Journal of Recent Trends in Engineering, Vol. 2, no. 3, pp. 4, 2009.
  • S. Panigrahi, A. Kundu, S. Sural, and A. K. Majumdar, “Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning,” Inf. Fusion, Vol. 10, no. 4, pp. 354–363, October 2009.
  • B. Thomas, “A novel fuzzy clustering method for outlier detection in data mining,” International Journal of Recent Trends in Engineering, Vol. 1, no. 2, pp. 161–165, 2009.
  • H. Kang. Fraud detection in mobile money transactions using machine learning. 2019.
  • F. Carcillo, A. D. Pozzolo, Y.-A. Le Borgne, O. Caelen, Y. Mazzer, and G. Bontempi, “Scarff: A scalable framework for streaming credit card fraud detection with spark,” Inf. Fusion, Vol. 41, pp. 182–194, 2018.
  • R. A. Kemmerer, and G. Vigna, “Intrusion detection: a brief history and overview,” Computer. (Long. Beach. Calif), Vol. 35, no. 4, pp. supl27–supl30, 2002.
  • P. Uppuluri, and R. Sekar, “Experiences with specification-based intrusion detection,” in In International Workshop on Recent Advances in Intrusion Detection, Springer, 2001, pp. 172–189.
  • S. Bay, K. Kumaraswamy, M. G. Anderle, R. Kumar, and D. M. Steier, “Large scale detection of irregularities in accounting data,” in Sixth International Conference on Data Mining (ICDM’06), 2006, pp. 75–86. IEEE.
  • P. Gogoi, M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, “Packet and flow based network intrusion dataset,” in Contemporary computing, Manish Parashar, Dinesh Kaushik, Omer F. Rana, Ravi Samtaney, Yuanyuan Yang, and Albert Zomaya, Eds. volume 306. Berlin, Germany: Springer, 2012, pp. 322–334.
  • inigoperona. Creates a KDDCup99 format database from traffic sniffed with tcpdump: inigoperona/tcpdump2gurekddcup99. https://github.com/inigoperona/tcpdump2gureKDDCup99, March 2018. Accessed: 7 September 2018.
  • M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data Set,” in In Proceedings of the 2009 IEEE Symposium, June 2009.
  • S. Revathi, and D. A. Malathi, “A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection,” International Journal of Engineering Research, Vol. 2, no. 12, pp. 7, 2013.
  • A. H. Lashkari, G. Draper-Gil, M. S. I. Mamun, and A. A. Ghorbani, “Characterization of tor traffic using time based features,” in ICISSP, 2017, pp. 253–262.
  • G. Draper-Gil, A. H. Lashkari, M. S. I. Mamun, and A. A. Ghorbani, “Characterization of encrypted and vpn traffic using time-related,” in Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP), 2016, pp. 407–414.
  • A. Thakkar, and R. Lohiya, “A review of the advancement in intrusion detection datasets,” Procedia. Comput. Sci., Vol. 167, pp. 636–645, 2020.
  • T. Shibahara, T. Yagi, M. Akiyama, D. Chiba, and T. Yada, “Efficient dynamic malware analysis based on network behavior using deep learning,” in 2016 IEEE Global Communications Conference (GLOBECOM), 2016, pp. 1–7. IEEE.
  • G. Karatas, O. Demir, and O. K. Sahingoz, “Deep learning in intrusion detection systems,” in 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT), 2018, pp. 113–116. IEEE.
  • A. Abraham, “Artificial neural networks,” in Handbook of Measuring System Design, P. H. Sydenham, and R. Thorn, Ed. 2005. Doi:10.1002/0471497398.mm421
  • S. Malhotra. After ago. Introduction to SoftMax Regression (with codes in Python). http://www.datascribble.com/blog/machine-learning/introduction-softmax-regression-codes-python/, September 2017. Accessed: 7 September 2018.
  • L. Breiman, “Random forests,” Mach. Learn., Vol. 45, no. 1, pp. 5–32, 2001.
  • H. H. Elmousalami, and M. Elaskary, “Drilling stuck pipe classification and mitigation in the gulf of suez oil fields using artificial intelligence,” Journal of Petroleum Exploration and Production Technology, Vol. 10, no. 5, pp. 1–14, 2020.
  • E. Lundin, H. Kvarnström, and E. Jonsson, “A synthetic fraud data generation methodology,” in Information and Communications Security, Robert Deng, Feng Bao, Jianying Zhou, and Sihan Qing, Eds. Berlin, Germany: Springer, 2002, pp. 265–277.
  • Predicting Fraud in Financial Payment Services | Kaggle. . https://www.kaggle.com/arjunjoshua/predicting-fraud-in-financial-payment-services/data. Accessed: 6 September 2018.
  • G. Brown. Ensemble learning, pages 312–320. Boston, MA: Springer US, 2010.
  • P. Grover. Gradient Boosting from scratch. https://medium.com/mlreview/gradient-boosting-from-scratch-1e317ae4587d, December 2017. Accessed: 7 September 2018.
  • T. Chen, and C. Guestrin. Xgboost: A scalable tree boosting system.CoRR, abs/1603.02754, 2016.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.