Open Access   Article Go Back

Fraud Detection by the Use of Correlation Based Tree Formation Approach

Shivani 1 , Harjinder Kaur2

Section:Research Paper, Product Type: Journal Paper
Volume-9 , Issue-3 , Page no. 7-12, Mar-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i3.712

Online published on Mar 31, 2021

Copyright © Shivani, Harjinder Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shivani, Harjinder Kaur, “Fraud Detection by the Use of Correlation Based Tree Formation Approach,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.3, pp.7-12, 2021.

MLA Style Citation: Shivani, Harjinder Kaur "Fraud Detection by the Use of Correlation Based Tree Formation Approach." International Journal of Computer Sciences and Engineering 9.3 (2021): 7-12.

APA Style Citation: Shivani, Harjinder Kaur, (2021). Fraud Detection by the Use of Correlation Based Tree Formation Approach. International Journal of Computer Sciences and Engineering, 9(3), 7-12.

BibTex Style Citation:
@article{Kaur_2021,
author = {Shivani, Harjinder Kaur},
title = {Fraud Detection by the Use of Correlation Based Tree Formation Approach},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2021},
volume = {9},
Issue = {3},
month = {3},
year = {2021},
issn = {2347-2693},
pages = {7-12},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5309},
doi = {https://doi.org/10.26438/ijcse/v9i3.712}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i3.712}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5309
TI - Fraud Detection by the Use of Correlation Based Tree Formation Approach
T2 - International Journal of Computer Sciences and Engineering
AU - Shivani, Harjinder Kaur
PY - 2021
DA - 2021/03/31
PB - IJCSE, Indore, INDIA
SP - 7-12
IS - 3
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
333 399 downloads 154 downloads
  
  
           

Abstract

Credit card fraud detection becomes critical due to increase in online transactions. Customers bought products online more often than not. The payment is either through debit or financials. The malicious users may attack the online information and hack credit and debit cards. Detection and prevention mechanisms thus are need of the hour. Researchers work towards achieving immunity against these attacks but perfection yet not achieved. This paper proposes similarity based decision tree approach for financial fraud detection strategy by working on state driven dataset. The objective is to detect the attack at early stage to avoid extravagant situations. The result is presented in the form of classification accuracy, precision and execution time. The result in terms of classification accuracy and execution time is improved by the factor of 10%.

Key-Words / Index Term

Financial fraud, similarity based decision tree, classification accuracy, precision, execution time

References

[1] N. Upasani and H. Om, “Evolving fuzzy min-max neural network for outlier detection,” Procedia Comput. Sci., vol. 45, no. C, pp. 753–761, 2015, doi: 10.1016/j.procs.2015.03.148.
[2] D. Wang, B. Chen, and J. Chen, “Credit card fraud detection strategies with consumer incentives,” Omega (United Kingdom), vol. 88, pp. 179–195, Oct. 2019, doi: 10.1016/j.omega.2018.07.001.
[3] R. Saia and S. Carta, “Evaluating financial transactions in the frequency domain for a proactive fraud detection approach,” in ICETE 2017 - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications, vol. 4, pp. 335–342, 2017, doi: 10.5220/0006425803350342.
[4] A. Pumsirirat and L. Yan, “Credit card fraud detection using deep learning based on auto-encoder and restricted Boltzmann machine,” Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 1, pp. 18–25, 2018, doi: 10.14569/IJACSA.2018.090103.
[5] R. Saia, “A discrete wavelet transform approach to fraud detection,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10394 LNCS, pp. 464–474, 2017, doi: 10.1007/978-3-319-64701-2_34.
[6] W. Liu, Z. Wang, X. Liu, N. Zeng, Y. Liu, and F. E. Alsaadi, “A survey of deep neural network architectures and their applications,” Neurocomputing, vol. 234, pp. 11–26, Apr. 2017, doi: 10.1016/j.neucom.2016.12.038.
[7] I. Sohony, R. Pratap, and U. Nambiar, “Ensemble learning for financial fraud detection,” in ACM International Conference Proceeding Series, pp. 289–294, 2018, doi: 10.1145/3152494.3156815.
[8] S. Bhattacharyya, S. Jha, K. Tharakunnel, and J. C. Westland, “Data mining for financial fraud: A comparative study,” Decis. Support Syst., vol. 50, no. 3, pp. 602–613, Feb. 2011, doi: 10.1016/j.dss.2010.08.008.
[9] E. W. T. Ngai, Y. Hu, Y. H. Wong, Y. Chen, and X. Sun, “The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature,” Decis. Support Syst., vol. 50, no. 3, pp. 559–569, 2011, doi: 10.1016/j.dss.2010.08.006.
[10] F. Carcillo, A. Dal Pozzolo, Y. A. Le Borgne, O. Caelen, Y. Mazzer, and G. Bontempi, “SCARFF: A scalable framework for streaming financial fraud detection with spark,” Inf. Fusion, vol. 41, pp. 182–194, May 2018, doi: 10.1016/j.inffus.2017.09.005.
[11] C. Wang and D. Han, “Credit card fraud forecasting model based on clustering analysis and integrated support vector machine,” Cluster Comput., vol. 22, pp. 13861–13866, Nov. 2019, doi: 10.1007/s10586-018-2118-y.
[12] M. Zamini and G. Montazer, “Credit Card Fraud Detection using autoencoder based clustering,” in 9th International Symposium on Telecommunication: With Emphasis on Information and Communication Technology, IST 2018, pp. 486–491, 2019, doi: 10.1109/ISTEL.2018.8661129.
[13] E. Duman and M. H. Ozcelik, “Detecting financial fraud by genetic algorithm and scatter search,” Expert Syst. Appl., vol. 38, no. 10, pp. 13057–13063, Sep. 2011, doi: 10.1016/j.eswa.2011.04.110.
[14] N. Malini and M. Pushpa, “Analysis on financial fraud identification techniques based on KNN and outlier detection,” in Proceedings of the 3rd IEEE International Conference on Advances in Electrical and Electronics, Information, Communication and Bio-Informatics, AEEICB 2017, pp. 255–258, 2017, doi: 10.1109/AEEICB.2017.7972424.
[15] I. Benchaji, S. Douzi, and B. Elouahidi, “Using Genetic Algorithm to Improve Classification of Imbalanced Datasets for Credit Card Fraud Detection,” in 2018 2nd Cyber Security in Networking Conference, CSNet 2018, 2019, doi: 10.1109/CSNET.2018.8602972.