Improving the quality of payment fraud detection by using a combined approach of transaction analysis
DOI:
https://doi.org/10.30837/2522-9818.2024.4.031Keywords:
machine learning; fraud transactions; classification; clustering; feature importance.Abstract
Subject matter: The study focuses on the methods for detection fraud transactions. Goal: Improve the accuracy of machine learning models for fraud transactions with combined methods for transaction analysis. Tasks: Investigate methods of detection fraud transactions and suggest methods that improve accuracy. Methods: artificial intelligence methods, machine learning. Results: Methods for detecting fraudulent transactions are investigated. Methods based on data classification technology are considered: XGBoost, SVC, Logistic Regression, Logistic Regression, AdaBoostClassifier, K-Nearest Neighbors, Isolation Forest and their software models are built. The dataset used is "creditcard.csv", which contains transactions made by European cardholders over two days and contains 492 fraud cases out of 284,807 transactions. The best result is obtained with the model based on gradient boosting, which allows to process unbalanced data. It is obtained that the f1-score, due to the use of the weight parameter of the minority class, is 86% for the minority class. To improve the accuracy of fraud detection, the labeled data was clustered into subclasses using the -means method. The number of clusters equal to twelve was determined by the elbow method. This made it possible to improve the accuracy of multiclassification. F1-score ranges from 96 to 100% for different subclasses. The feature importance within each subclass is evaluated by the gradient boosting algorithm. The results of the experiment showed a different influence of features on subclass belonging, which allows for a more detailed analysis of the data to identify hidden structures in the data. Conclusions: The scientific novelty of the results obtained is the combined use of data classification and clustering methods to detect fraudulent transactions, which reduced the number of type II errors. Assessing the informative value of features within different types (subclasses) of fraudulent transactions allows us to evaluate which features have the greatest impact on the object’s belonging to a particular subclass.
References
References
Ivanna, Hordiichuk (2023), ''V Ukraini zafiksovano anomalnu aktyvnist shakhraiv''. available at: https://glavcom.ua/country/criminal/v-ukrajini-zafiksovano-anomalnu-aktivnist-shakhrajiv-959941.html
''U merezhi aktyvizuvalysia shakhrai, yaki proponuiut ukraintsiam «dopomohu» vid mizhnarodnykh orhanizatsii''. available at: https://www.ukrinform.ua/rubric-society/3702800-u-merezi-aktivizuvalisa-sahrai-aki-proponuut-ukraincam-dopomogu-vid-miznarodnih-organizacij.html
Viktoriia, Telechuk ''U Facebook diie fishynhova skhema shakhraistva: yak vberehtysia''. available at: https://rayon.in.ua/news/575310-u-facebook-die-fishingova-skhema-shakhraystva-yak-vberegtisya
Voinarska, I. A. (2021), ''Shakhraistvo u nerukhomosti, Ekonomika. Finansy''. Pravo. № 4. Р. 31–32. available at: http://nbuv.gov.ua/UJRN/ecfipr_2021_4_8
''Kartkovi shakhrai hrabuiut ukraintsiv sylnishe: yaki skhemy vynakhodiat i yak zakhystytysia'' (2024). available at: https://minfin.com.ua/ua/credits/articles/kartochnye-moshenniki-grabyat-ukraincev-silnee-kakie-shemy-izobretayut-i-kak-zaschititsya/
Kaprian, Yu. (2023), ''Vykorystannia mashynnoho navchannia dlia borotby z bankivskym shakhraistvom'', Biznes Inform. № 7. Р. 140–145. available at: https://www.businessinform.net/_inc/kachka_pdf.php?year=2023&volume=7_0&pages=140_145&qu=%D1%88%D0%B0%D1%85%D1%80%D0%B0%D0%B
Sinha, A. and Mokha, S. (2017), ''Classification and fraud detection in finance industry '', International Journal of Computer Applications, Vol. 176, no. 3, P. 45–52. DOI: https://doi.org/10.5120/ijca2017915570
Gavrylenko , S., Poltoratskyi , V., & Nechyporenko , A. (2024), ''Intrusion detection model based on improved transformer'', Advanced Information Systems, 8(1), P. 94–99. DOI: https://doi.org/10.20998/2522-9052.2024.1.12
Gavrylenko, S., Chelak, V., Hornostal O. (2021), ''Ensemble approach based on bagging and boosting for Identification the Computer System State'', Proceedings of the 31th International Scientific Symposium Metrology and Metrology Assurance (ММА).Sozopol, Bulgaria, P. 1–7. available at: https://ieeexplore.ieee.org/document/9610949
Lepoivre, M. (2016), ''Credit Card Fraud Detection with Unsupervised Algorithms'', Journal of Advances in Information Technology, Vol. 7, no. 1. P. 34–38. DOI: https://doi.org/10.12720/jait.7.1.34-38
Leonard, K. (1993), ''Detecting credit card fraud using expert systems'', Computers & Industrial Engineering. 1993. Vol. 25, no. 1-4. P. 103–106. DOI: https://doi.org/10.1016/0360-8352(93)90231-l
Abhishek, A. (2021), ''Predictive Analytics with Machine Learning for Fraud Detection'', International Journal for Research in Applied Science and Engineering Technology, Vol. 9, no. 11. P. 1518–1520. DOI: https://doi.org/10.22214/ijraset.2021.39046
Vanarote, V. (2021), ''Transaction Fraud Detection (Anomaly detection) using Machine Learning'', International Journal of Advanced Research in Science, Communication and Technology, P. 361–363. DOI: https://doi.org/10.48175/ijarsct-1402
Nadisha, A., Rakendu R, Surekha M. (2015), ''A Hybrid Approach to Detect Credit Card Fraud'', International Journal of Scientific and Research Publications, Vol. 5, Issue 11, P. 304–314. available at: https://www.ijsrp.org/research-paper-1115.php?rp=P474793
Gavrylenko, S., Zozulia, V., and Khatsko, N. (2023), ''Methods for Improving the Quality of Classification on Imbalanced Data'', Proceedings of the IEEE 4th KhPI Week on Advanced Technology (KhPIWeek), Kharkiv, Ukraine, P. 1–5. DOI: https://doi.org/10.20998/2522-9052.2024.1.12
Hajek, P, Abedin M., Sivarajah, U. (2022), ''Fraud Detection in Mobile Payment Systems using an XGBoost-based Framework'', Inf Syst Front, P. 1–19. DOI: https://doi.org/10.1007/s10796-022-10346-6
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Our journal abides by the Creative Commons copyright rights and permissions for open access journals.
Authors who publish with this journal agree to the following terms:
Authors hold the copyright without restrictions and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-commercial and non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their published work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.












