skip to main content
10.1145/3647444.3647933acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimmiConference Proceedingsconference-collections
research-article

AIpowered Automation of Fraud Detection in Financial Services

Published: 13 May 2024 Publication History

Abstract

Due to the rise in credit card fraud, robust and efficient fraud detection systems are needed. This study introduces an AI-based banking fraud detection method. This paper introduces a new method that combines Support Vector Machines (SVM) with Random Forest algorithms to improve reliability. Credit card fraud detection is vital to protecting financial institutions and consumers. The study uses data preprocessing, feature engineering, and model selection to find the best fraud detection solution. Through wide experimentation and evaluation using real-world credit card transaction data, proposed hybrid model of SVM and Random Forest model achieved 99.42% accuracy. This performance shows the power of AI-driven automation and is a major improvement over current fraud detection method. Proposed method is highly precise and adaptable to new fraud patterns, making it ideal for the ever-changing financial services industry. Its real-time functionality makes it ideal for the dynamic industry. The hybrid model combines SVM and Random Forest benefits. This combination uses SVM classification accuracy and Random Forest's ensemble learning to enhance the model's overfitting resistance. AI-based solutions for financial services fraud detection have advanced significantly with this study. These solutions aim to increase security, reduce financial losses, and make the financial landscape safer for everyone. This enhances security and operational efficiency in digital finance's dynamic world.

References

[1]
A. Cherif, A. Badhib, H. Ammar, S. Alshehri, M. Kalkatawi, and A. Imine, “Credit card fraud detection in the era of disruptive technologies: A systematic review,” J. King Saud Univ. - Comput. Inf. Sci., vol. 35, no. 1, pp. 145–174, 2023.
[2]
A. O. Adewumi and A. A. Akinyelu, “A survey of machine-learning and nature-inspired based credit card fraud detection techniques,” Int. J. Syst. Assur. Eng. Manag., vol. 8, no. s2, pp. 937–953, 2017.
[3]
W. Hilal, S. A. Gadsden, and J. Yawney, “Financial Fraud: A Review of Anomaly Detection Techniques and Recent Advances,” Expert Syst. Appl., vol. 193, p. 116429, 2022.
[4]
Y. Jain, N. Tiwari, S. Dubey, and S. Jain, “A comparative analysis of various credit card fraud detection techniques,” Int. J. Recent Technol. Eng., vol. 7, no. 5, pp. 402–407, 2019.
[5]
A. Izotova and A. Valiullin, “Comparison of Poisson process and machine learning algorithms approach for credit card fraud detection,” Procedia Comput. Sci., vol. 186, pp. 721–726, 2021.
[6]
V. Khetani, Y. Gandhi, S. Bhattacharya, S. N. Ajani, and S. Limkar, “Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains,” Int. J. Intell. Syst. Appl. Eng., vol. 11, pp. 253–262, 2023.
[7]
A. Alharbi, “A Novel text2IMG Mechanism of Credit Card Fraud Detection: A Deep Learning Approach,” Electron., vol. 11, no. 5, pp. 1–18, 2022.
[8]
S. Bagga, A. Goyal, N. Gupta, and A. Goyal, “Credit Card Fraud Detection using Pipeling and Ensemble Learning,” Procedia Comput. Sci., vol. 173, no. 2019, pp. 104–112, 2020.
[9]
S. Georgieva, M. Markova, and V. Pavlov, “Using neural network for credit card fraud detection,” AIP Conf. Proc., vol. 2159, no. January, 2019.
[10]
N. K. Trivedi, S. Simaiya, U. K. Lilhore, and S. K. Sharma, “An efficient credit card fraud detection model based on machine learning methods,” Int. J. Adv. Sci. Technol., vol. 29, no. 5, pp. 3414–3424, 2020.
[11]
X. Zhu, “Intelligent financial fraud detection practices in post-pandemic era,” Innovation, vol. 2, no. 4, p. 100176, 2021.
[12]
[G. Zioviris, K. Kolomvatsos, and G. Stamoulis, “Credit card fraud detection using a deep learning multistage model,” J. Supercomput., vol. 78, no. 12, pp. 14571–14596, 2022.
[13]
X. Mao, M. Liu, and Y. Wang, “Using GNN to detect financial fraud based on the related party transactions network,” Procedia Comput. Sci., vol. 214, no. C, pp. 351–358, 2022.
[14]
E. Ileberi, Y. Sun, and Z. Wang, “A machine learning based credit card fraud detection using the GA algorithm for feature selection,” J. Big Data, vol. 9, no. 1, 2022.
[15]
[U. Fiore, A. De Santis, F. Perla, P. Zanetti, and F. Palmieri, “Using generative adversarial networks for improving classification effectiveness in credit card fraud detection,” Inf. Sci. (Ny)., vol. 479, pp. 448–455, 2019.
[16]
T. K. Dang, T. C. Tran, L. M. Tuan, and M. V. Tiep, “Machine learning based on resampling approaches and deep reinforcement learning for credit card fraud detection systems,” Appl. Sci., vol. 11, no. 21, 2021.
[17]
[E. F. Malik, K. W. Khaw, B. Belaton, W. P. Wong, and X. Chew, “Credit Card Fraud Detection Using a New Hybrid Machine Learning Architecture,” Mathematics, vol. 10, no. 9, 2022.
[18]
[K. Shenoy, “Credit Card Transactions Fraud Detection Dataset,” Kaggle. 2020, [Online]. Available: https://www.kaggle.com/datasets/kartik2112/fraud-detection.
[19]
Singh, U. P., Saxena, V., Kumar, A., Bhari, P., & Saxena, D. (2022, December). Unraveling the Prediction of Fine Particulate Matter over Jaipur, India using Long Short-Term Memory Neural Network. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp. 1-5).
[20]
Kumar, A., Bhari, P. L., Singh, U. P., & Saxena, V. (2022, December). Comparative Study of different Machine Learning Algorithms to Analyze Sentiments with a Case Study of Two Person's Microblogs on Twitter. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp.1-6).
[21]
Saxena, V., Saxena, D., & Singh, U. P. (2022, December). Security Enhancement using Image verification method to Secure Docker Containers. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp. 1-5).
[22]
Chauhan, M., Malhotra, R., Pathak, M., & Singh, U. P. (2012). Different aspects of cloud security. International Journal of Engineering Research and Applications, 2, 864-869.
[23]
Mittal, A. K., Singh, U. P., Tiwari, A., Dwivedi, S., Joshi, M. K., & Tripathi, K. C. (2015). Short-term predictions by statistical methods in regions of varying dynamical error growth in a chaotic system. Meteorology and Atmospheric Physics, 127, 457-465.
[24]
Singh, U. P., Mittal, A. K., Dwivedi, S., & Tiwari, A. (2015). Predictability study of forced Lorenz model: an artificial neural network approach. History, 40(181), 27-33.
[25]
Singh, U. P., Mittal, A. K., Dwivedi, S., & Tiwari, A. (2020). Evaluating the predictability of central Indian rainfall on short and long timescales using theory of nonlinear dynamics. Journal of water and Climate Change, 11(4), 1134-1149.
[26]
Singh, U., Pathak, M., Malhotra, R., & Chauhan, M. (2012). Secure communication protocol for ATM using TLS handshake. Journal of Engineering Research and Applications (IJERA), 2(2), 838-948.
[27]
Singh, U. P., & Mittal, A. K. (2021). Testing reliability of the spatial Hurst exponent method for detecting a change point. Journal of Water and Climate Change, 12(8), 3661-3674.
[28]
Tiwari, A., Mittal, A. K., Dwivedi, S., & Singh, U. P. (2015). Nonlinear time series analysis of rainfall over central Indian region using CMIP5 based climate model. Climate Change, 1(4), 411-417.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine Intelligence
November 2023
1215 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. RF
  2. SVM

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIMMI 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 82
    Total Downloads
  • Downloads (Last 12 months)82
  • Downloads (Last 6 weeks)7
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media