Skip to main content

Advertisement

Log in

A Model to Detect the Fraud of Electronic Payment Card Transactions Based on Stream Processing in Big Data

  • Published:
Journal of Signal Processing Systems Aims and scope Submit manuscript

Abstract

With the growing use of electronic cash cards, the number of transactions with these cards has also increased rapidly, so the importance of using fraud detection models has been paid attention to by financial organizations from various aspects. Electronic cash card fraud detection models often on a single algorithm, optimization of classifications and clusters, to find fraudulent patterns, which provide unsupervised or supervised methods. But the proposed model will use both unsupervised and supervised methods to detect fraud so that it will take advantage of the advantages of both methods. In the proposed method, by selecting the most important features of users’ behavioral patterns such as transaction time and values, their behavioral modeling is done which includes extracting different profiles of users and determining threshold values for each profile. The proposed model will work in real-time by combining two filters to detect electronic card fraud. The first filter is a fast filter that includes a number of unsupervised algorithms, but the second filter is an explicit filter that consists of a number of supervised algorithms. The proposed model creates a profile of the cardholder and measures the degree of deviation of the cardholder’s behavior pattern in new transactions through the Map/Reduce approach for parallel execution alongside the human observer. After then the transaction has been completed and the maximum difference between two consecutive orders of observations, the fraud or non-fraud label will be applied to the transaction and added to the relevant database for future use, in order to detect the deviation of the transaction. According to the simulation results of the proposed model, the accuracy criterion with All Variables, reducing the dimensions of PCA and LASSO is 0.985, 0.987, and 0.980, respectively. F1-Score criterion with All Variables, PCA, and LASSO dimension reduction will be 0.681, 0.676, and 0.669 respectively. The simulation results show that the case with the highest F1 score is the classification of the Proposed Model using all variables. By comparing the simulation results, it can be seen that the F1 score has a high discriminating power between different classification algorithms because the values obtained from it are more different. Also, the results of the calculated performance change values of each pre-processed data with dimension reduction showed that PCA and All variables have very similar performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7

Similar content being viewed by others

Data Availability

The data that were generated and analyzed during the current study are available in the UCI Machine Learning Repository. The data are licensed under the CC BY-SA 4.0 license, and can be freely downloaded and used for research purposes https://archive.ics.uci.edu/ml/datasets/default+of+credit+card+clients#.

References

  1. Chen, R., Herskovits, E. H., & for the Alzheimer’s Disease Neuroimaging Initiative. (2022). Machine learning detects distinct subtypes of minimal cognitive impairment. Journal of Signal Processing Systems, 94, 437–443. https://doi.org/10.1007/s11265-021-01667-x

    Article  Google Scholar 

  2. Banirostam, H., Banirostam, T., Pedram, M. M., & Rahmani, A. M. (2023). Providing and evaluating a comprehensive model for detecting fraudulent electronic payment card transactions with a two-level filter based on flow processing in big data. International Journal of Information Technology. https://doi.org/10.1007/s41870-023-00783-4

  3. Zheng, L., Zhang, X., & Wang, H. (2023). Big data approach for fire prevention and warning for power systems. Journal of Signal Processing Systems. https://doi.org/10.1007/s11265-023-01857-9

  4. Liu, F., He, Y., He, J., et al. (2022). Optimization of big data parallel scheduling based on dynamic clustering scheduling algorithm. Journal of Signal Processing Systems, 94, 1243–1251. https://doi.org/10.1007/s11265-022-01765-4

    Article  Google Scholar 

  5. Devi Meenakshi, B., Janani, B., Gayathri, S., & Indira, N. (2019). Credit card fraud detection using random Forest. International Research Journal of Engineering and Technology (IRJET), 6(3), 6662–6666 https://www.irjet.net/archives/V6/i3/IRJET-V6I3710.pdf

    Google Scholar 

  6. Banirostam, H., Hedayati, A. R., & Khadem Zadeh, A. K. (2014). Using virtualization technique to increase security and reduce energy consumption in cloud computing. International Journal of Research in Computer Science, 4(2), 25–30. https://doi.org/10.7815/ijorcs.42.2014.082

    Article  Google Scholar 

  7. Zhang, X., Han, Y., Xu, W., & Wang, Q. HOBA: A Novel Feature Engineering Methodology for Credit Card Fraud Detection with a Deep Learning Architecture. Information Sciences, 557, 302–316. https://doi.org/10.1016/j.ins.2019.05.023

  8. Isern, J., Jimenez-Perera, G., Medina-Valdes, L., et al. (2023). A cyber-physical system for integrated remote control and protection of smart grid critical infrastructures. Journal of Signal Processing Systems, 95, 1127–1140. https://doi.org/10.1007/s11265-023-01842-2

    Article  Google Scholar 

  9. Banirostam, H., Shamsinezhad, E., & Banirostam, T. (2013). Functional control of users by biometric behavior features in cloud computing. In 4th international conference on intelligent systems, modelling and simulation (ISMS) (pp. 94–98). https://doi.org/10.1109/ISMS.2013.102

    Chapter  Google Scholar 

  10. Jain, Y., Tiwari, N., Dubey, S., & Jain, S. (2019). A comparative analysis of various credit card fraud detection techniques. International Journal of Recent Technology and Engineering (IJRTE), 7(6S5), 402–407. https://doi.org/10.23919/MIPRO.2019.8757212

    Article  Google Scholar 

  11. Shamsinezhad, E., Shahbahrami, A., Hedayati, A., Khadem Zadeh, A., & Banirostam, H. (2013). Presentation methods for task migration in cloud computing by combination of Yu router and post-copy. International Journal of Computer Science Issues (IJCSI), 10(1), 98–102.

    Google Scholar 

  12. Carcillo, F., Borgne, Y.-L., Caelen, O., Kessaci, Y., Oble, F., & Bontempi, G. (2021). Combining unsupervised and supervised Learning in credit card fraud detection. Information Sciences, 557, 317–331. https://doi.org/10.1016/j.ins.2019.05.042

    Article  MathSciNet  Google Scholar 

  13. Appiah, K., Jin, Z., Shi, L. et al. (2023). Naturalistic Scene Modelling: Deep Learning with Insights from Biology: Journal of Signal Processing Systems, (2023). https://doi.org/10.1007/s11265-023-01894-4.

  14. Zenggang, X., Mingyang, Z., Xuemin, Z., et al. (2022). Social similarity routing algorithm based on socially aware networks in the big data environment. Journal of Signal Processing Systems, 94, 1253–1267. https://doi.org/10.1007/s11265-022-01790-3

    Article  Google Scholar 

  15. Bharathi, T., Anuradha, S., & Phil Scholar, M. (2018). Fraud detection techniques on big data cloud computing. International Journal of Computer Science Engineering and Technology (IJCSET), 4(11), 11–16. https://doi.org/10.5281/ijcset.v4i11.101

    Article  Google Scholar 

  16. Shpyrko, V., & Kova, B. (2019). Fraud detection models and payment transactions analysis using Machine Learning. Conference on Monitoring, Modeling & Management of Emergent Economy (M3E2), 65(2), 1–7. https://doi.org/10.1051/shsconf/20196502002

    Article  Google Scholar 

  17. Mniai, A., & Jebari, K. (2022). Credit card fraud detection by improved SVDD. World Congress on Engineering (WCE), 1, 1–6.

    Google Scholar 

  18. Melo-Acosta G.E, Duitama-Muñoz F, & Arias-Londoño J. D. (2017). Fraud Detection in Big Data using Supervised and Semi-Supervised Learning Techniques. IEEE-Colombian Conference on Communications and Computing(COLCOM), 1–6. https://doi.org/10.1109/ColComCon.2017.8088206

  19. Misraa, S., Thakura, S., Ghosha, M., & Kumar Saha, S. (2020). An autoencoder based model for detecting fraudulent credit card transaction. International conference on computational intelligence and data science(ICCIDS), 167(254), 254–262. https://doi.org/10.1016/j.procs.2020.03.219

    Article  Google Scholar 

  20. Gyamfi, N., & Abdulai, J. (2018). Bank fraud detection using support vector Machine. International Symposium on Telecommunications, 37–41. https://doi.org/10.1109/IEMCON.2018.8614994

  21. Bansal, A., & Garg, H. (2021). An efficient techniques for fraudulent detection in credit card dataset: A comprehensive study. IOP conference series: Materials science and engineering, 1116(1), 1–10. https://doi.org/10.1088/1757-899X/1116/1/012181

    Article  Google Scholar 

  22. Carcilli, F., Borgne, Y. A., Caelen, O., & Bontemoi, G. (2018). Streaming active Learning strategies for real-life credit card fraud detection: Assessment and visualization. International Journal of Data Science and Analytics, 5(4), 285–300. https://doi.org/10.1007/s41060-018-0116-z

    Article  Google Scholar 

  23. Ileberi, E., Sun, Y., & Wang, Z. (2022). A machine learning based credit card fraud detection using the GA algorithm for feature selection. Journal of Big Data, 9(1), 1–17. https://doi.org/10.1186/s40537-022-00573-8

    Article  Google Scholar 

  24. Sathyapriya, M., & Thiagarasu, V. (2019). A cluster based approach for credit card fraud detection system using hmm with the implementation of big data technology. International Journal of Applied Engineering Research, 14(1), 393–396. https://doi.org/10.5121/ijdps.2011.2618

    Article  Google Scholar 

  25. Suman Mishra, J., Panda, S., & Kumar Mishra, A. (2013). Novel approach for credit card fraud detection targeting the Indian market. IJCSI International Journal of Computer Science Issues, 10(1), 172–179 https://www.researchgate.net/publication/331563033

    Google Scholar 

  26. UCI Machine Learning Repository. (2023). Default of Credit Card Clients Dataset. https://archive.ics.uci.edu/ml/datasets/default+of+credit+card+clients#.

  27. Banirostam, H., Hedayati, A., Khadem Zadeh, A., & Shamsinezhad, E. (2013). A trust based approach for increasing security in cloud computing infrastructure. In UKSim 15th international conference on computer modeling and simulation (pp. 717–721). https://doi.org/10.1109/UKSim.2013.39

    Chapter  Google Scholar 

  28. Banirostam, T., Shamsinejad, E., Pedram, M. M., & Rahamni, A. M. (2021). A review of anonymity algorithms in big data. Advances in Computer Engineering and Technology, 7(2), 187–196.

    Google Scholar 

  29. Shamsinejad, E., Banirostam, T., Pedram, M. M., & Rahmani, A. M. (2023). Presenting a model of data anonymization in big data in the context of in-memory processing. Journal of Electrical and Computer Engineering Innovations (JECEI).

  30. Banirostam, T., Banirostam, H., Pedram, M. M., & Rahamni, A. M. (2021). A review of fraud detection algorithms for electronic payment card transactions. Advances in Computer Engineering and Technology, 7(2), 157–166.

    Google Scholar 

Download references

Acknowledgments

Acknowledgments: The authors thank the anonymous reviewers and the editor for their useful comments and suggestions.

Funding

This research received no external funding.

Author information

Authors and Affiliations

Authors

Contributions

H.B., T.B., and M.M.P. conceived and designed the study, collected and analyzed the data, and drafted the manuscript. A.M.R. critically revised the manuscript and gave final approval of the version to be published. All authors reviewed the manuscript.

Corresponding author

Correspondence to Touraj Banirostam.

Ethics declarations

Ethical Approval

This study did not involve human or animal subjects, and therefore did not require ethical approval.

Consent to Participate

Not applicable.

Consent to Publish

Not applicable.

Competing Interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Banirostam, H., Banirostam, T., Pedram, M.M. et al. A Model to Detect the Fraud of Electronic Payment Card Transactions Based on Stream Processing in Big Data. J Sign Process Syst 95, 1469–1484 (2023). https://doi.org/10.1007/s11265-023-01903-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11265-023-01903-6

Keywords

Navigation