Credit Card Fraud Detection Using Machine Learning As Data Mining Technique
Keywords:
Credit Card, Data Mining, Fraud Detection, Machine Learning,Abstract
The rapid participation in online based transactional activities raises the fraudulent cases all over the world and causes tremendous losses to the individuals and financial industry. Although there are many criminal activities occurring in financial industry, credit card fraudulent activities are among the most prevalent and worried about by online customers. Thus, countering the fraud activities through data mining and machine learning is one of the prominent approaches introduced by scholars intending to prevent the losses caused by these illegal acts. Primarily, data mining techniques were employed to study the patterns and characteristics of suspicious and non-suspicious transactions based on normalized and anomalies data. On the other hand, machine learning (ML) techniques were employed to predict the suspicious and non-suspicious transactions automatically by using classifiers. Therefore, the combination of machine learning and data mining techniques were able to identify the genuine and non-genuine transactions by learning the patterns of the data. This paper discusses the supervised based classification using Bayesian network classifiers namely K2, Tree Augmented Naïve Bayes (TAN), and Naïve Bayes, logistics and J48 classifiers. After preprocessing the dataset using normalization and Principal Component Analysis, all the classifiers achieved more than 95.0% accuracy compared to results attained before preprocessing the dataset.References
WorldPay. (2015, Nov). Global payments report preview: your definitive guide to the world of online payments. Retrieved September 28, 2016, from http://offers.worldpayglobal.com/rs/850-JOA- 856/images/GlobalPaymentsReportNov2015.pdf.
Federal Trade Commision. (2008). consumer sentinel network - data book for January - December 2008. Retrieved Oct 20, 2016. From https://www.ftc.gov/.
Bhatla, T.P., Prabhu, V., and Dua, A. (2003). understanding credit card frauds. Crads Business Review# 2003-1, Tata Consultancy Services.
The Nilson Report. (2015). Global fraud losses reach $16.31 Billion. Edition: July 2015, Issue 1068.
Y. Sahin and E. Duman, “Detecting credit card fraud by decision trees and support vector machines”, Proceedings of the International MultiConference of Engineers and Computer Scientists 2011 Vol I, IMECS 2011, March 2011.
Elkan, C. (2001). Magical thinking in data mining: lessons from COIL challenge 2000. Proc. of SIGKDD01, 426-431.
Mohammed, J. Zaki., & Wagner, Meira Jr. (2014). Data mining and analysis: fundamental concepts and algorithms. Cambridge University Press. ISBN 978-0-521-76633-3.
F. N. Ogwueleka. (2011). Data mining application in credit card fraud detection system. Journal of Engineering Science and Technology, Vol. 6, No. 3 (2011) 311 - 322.
V. Bhusari & S. Patil. (2011). Application of hidden markov model in credit card fraud detection. International Journal of Distributed and Parallel Systems (IJDPS) Vol.2, No.6.
S.J. Stolfo, D.W. Fan, W. Lee, A.L. Prodromidis, and P.K. Chan. (1998). Credit card fraud detection using meta-learning: issues and initial results, Proc. AAAI Workshop AI Methods in Fraud and Risk Management, pp. 83-90.
Sen, Sanjay Kumar., & Dash, Sujatha. (2013). Meta learning algorithms for credit card fraud detection. International Journal of Engineering Research and Development Volume 6, Issue 6, pp. 16-20.
Maes, Sam, Tuyls Karl, Vanschoenwinkel Bram & Manderick, Bernard. (2002). Credit card fraud detection using bayesian and neural networks. Proc. of 1st NAISO Congress on Neuro Fuzzy Technologies. Hawana.
A.C. Bahnsen, Aleksandar, Stojanovic., D. Aouada & Bjorn, Ottersten. (2013). Cost sensitive credit card fraud detection using bayes minimum risk. 12th International Conference on Machine Learning and Applications.
Amlan Kundu, Suvasini Panigrahi, Shamik Sural and Arun K. Majumdar. (2009). Credit card fraud detection: a fusion approach using dempster–shafer theory and bayesian learning. Special Issue on Information Fusion in Computer Security, Vol. 10, Issue No. 4, pp.354-363.
Lam, Bacchus (1994). Learning bayesian belief networks: an approach based on the MDL principle. Computational Intelligence, Vol. 10, Issue No. 3, pp.269–293.
M. Mehdi, S. Zair, A. Anou and M. Bensebti (2007). A bayesian networks in intrusion detection systems. International Journal of Computational Intelligence Research, Issue No. 1, pp.0973-1873 Vol. 3.
R.Najafi & Afsharchi, Mohsen. (2012). Network intrusion detection using tree augmented naive-bayes. The Third International Conference on Contemporary Issues in Computer and Information Sciences (CICI) 2012.
G. Cooper, E. Herskovits (1992). A bayesian method for the induction of probabilistic networks from data. Machine Learning. 9(4):309-347.
Quinlan, J. R. (1993). C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers.
Friedman, N. and Goldszmidt, M. (1996). Building classifiers using bayesian networks. Proc. 13th National Conference on Artificial Intelligence.Vol. 2, pp 1277-1284.
Friedman, N., Geiger, D. and Goldszmidt, M. (1997). Bayesian network classifiers. machine learning,Vol. 29, pp 131-163. Kluwer Academic Publishers, Boston.
Downloads
Published
How to Cite
Issue
Section
License
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.