International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 8 - Issue 10, October 2019 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Detecting Fraudulent Credit Card Transactions Using Outlier Detection

[Full Text]



Surya Teja Marella, K.Karthikeya, Saiteja Myla, M.Mohan Sai , Vamseekrishna Allam



Anomaly Detection, Credit Fraud Detection, Outlier Detection, Financial Analytics



Credit card frauds transactions are becoming more frequent day by day and it is becoming more difficult for humans to analyse fraudulent transactions by analysing transaction hence it has become necessary for humans to develop an intelligent system to determine fraudulent transactions. The technique we applied to determine fraudulent transactions are anomaly detection (Outlier detection). Several intelligent algorithms can be used in this context for anomaly detection (outlier detection), In this paper we implemented Decision Tree algorithm, Random Forest and Neural Networks to determine which algorithm is best fit in terms of time taken and accuracy. We were able to formulate results of 284,407 transactions over a period of two days in September 2013. We were able to identify that three models are almost equal when it comes to accuracy but random forest is more precise.



[1] Ginny Y. Wong, and Frank H. F. Leung, “Predicting Protein-Ligand Binding Site Using Support Vector Machine with Protein Properties,” Nov.-Dec. 2013, pp. 1517-1529, vol. 10.
[2] Chao Wang, Tongge Xu , Xi Qin, “Network Traffic Classification with Improved Random Forest” Year: 2015, Volume: 1, Pages: 78-81, DOI Bookmark:10.1109/CIS.2015.27
[3] Ana Erika Camargo Cruz and Koichiro Ochimizu, “Towards logistic regression models for predicting fault-prone code across software projects”, Year: 2009, Volume: 1, Pages: 460-463,DOI Bookmark:10.1109/ESEM.2009.5316002
[4] Marella, S.T., Karthikeya, K., Kushwanth, V.S. and Bezawada, A., 2018. Enhancement of Performance and Economy of Data Centers by Virtualization. International Journal of Simulation--Systems, Science & Technology, 19(6).
[5] Bezawada, A., Marella, S.T. and Gunasekhar, T., 2018. A Systematic Analysis of Load Balancing in Cloud Computing. International Journal of Simulation--Systems, Science & Technology, 19(6).
[6] Paul, A., Mukherjee, D.P., Das, P., Gangopadhyay, A., Chintha, A.R. and Kundu, S., 2018. Improved random forest for classification. IEEE Transactions on Image Processing, 27(8), pp.4012-4024.
[7] Zhang, X., Wang, S. and Zhao, Y., 2011, June. Application of support vector machine and least squares vector machine to freight volume forecast. In 2011 International Conference on Remote Sensing, Environment and Transportation Engineering (pp. 104-107). IEEE.
[8] Li, P., Li, S., Bi, T. and Liu, Y., 2014. Telecom customer churn prediction method based on cluster stratified sampling logistic regression.
[9] Vatrapu, R., Mukkamala, R.R., Hussain, A. and Flesch, B., 2016. Social set analysis: A set theoretical approach to big data analytics. Ieee Access, 4, pp.2542-2571
[10] Rind, A., Lammarsch, T., Aigner, W., Alsallakh, B. and Miksch, S., 2013. Timebench: A data model and software library for visual analytics of time-oriented data. IEEE Transactions on Visualization and Computer Graphics, 19(12), pp.2247-2256.
[11] Jabbar, S., Malik, K.R., Ahmad, M., Aldabbas, O., Asif, M., Khalid, S., Han, K. and Ahmed, S.H., 2018. A methodology of real-time data fusion for localized big data analytics. IEEE Access, 6, pp.24510-24520.
[12] Huang, Z., Li, M., Chousidis, C., Mousavi, A. and Jiang, C., 2017. Schema Theory-Based Data Engineering in Gene Expression Programming for Big Data Analytics. IEEE Transactions on Evolutionary Computation, 22(5), pp.792-804.
[13] Lepenioti, K., Bousdekis, A., Apostolou, D. and Mentzas, G., 2020. Prescriptive analytics: Literature review and research challenges. International Journal of Information Management, 50, pp.57-70.
[14] Liang, T.P. and Liu, Y.H., 2018. Research landscape of business intelligence and big data analytics: A bibliometrics study. Expert Systems with Applications, 111, pp.2-10.
[15] Seng, J.K.P. and Ang, K.L.M., 2017. Big feature data analytics: Split and combine linear discriminant analysis (SC-LDA) for integration towards decision making analytics. IEEE Access, 5, pp.14056-14065.
[16] Herbrich, Ralf, Tom Minka, and Thore Graepel. "Trueskill™: A Bayesian skill rating system." Advances in Neural Information Processing Systems. 2006.
[17] Solo, A.M., 2017, December. An Overview of the New Interdisciplinary Fields of Political Engineering and Computational Politics for the Next Frontier in Politics. In 2017 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 1805-1806). IEEE.
[18] Qin-zhang, Y., Jing, Z. and Ying-chao, Z., 2010, January. Modeling and Simulation of International Politics Evolution in Crisis. In 2010 Second International Conference on Computer Modeling and Simulation (Vol. 1, pp. 324-328). IEEE.
[19] Marsland, S., 2014. Machine learning: an algorithmic perspective. Chapman and Hall/CRC.
[20] Polson, N.G. and Sokolov, V., 2017. Deep learning: a Bayesian perspective. Bayesian Analysis, 12(4), pp.1275-1304.
[21] Haykin, S.S., 2009. Neural networks and learning machines/Simon Haykin. New York: Prentice Hall,.
[22] LeCun, Y., Bengio, Y. and Hinton, G., 2015. Deep learning. nature, 521(7553), p.436.
[23] Bengio, Y., 2009. Learning deep architectures for AI. Foundations and trends® in Machine Learning, 2(1), pp.1-127.
[24] Mahadevan, S. and Haldar, A., 2000. Probability, reliability and statistical method in engineering design. John Wiley & Sons.
[25] Oberkampf, W.L., Trucano, T.G. and Hirsch, C., 2004. Verification, validation, and predictive capability in computational engineering and physics. Applied Mechanics Reviews, 57(5), pp.345-384.