Fraud Detection Model for Illegal Transactions

  • Musibau Adekunle Ibrahim Department of Computer Science, Faculty of Computing and Information Technology, Osun State University, Osogbo, Nigeria
  • Patrick Ozoh Department of Computer Science, Faculty of Computing and Information Technology, Osun State University, Osogbo, Nigeria
  • Oladotun Ayotunde Ojo Department of Computer Science, Faculty of Computing and Information Technology, Osun State University, Osogbo, Nigeria
Keywords: Confusion Matrix, Financial Transaction, Credit Card, Fraud Detection, Machine Learning

Abstract

Due to advancements in network technologies, digital security is becoming a top priority worldwide.  This project aims to study how machine learning classifier such as random forest could be used to learn patterns in fraudulent and legitimate transactions in order to detect fraudulent transactions using Python programming language on Jupyter notebook as an Integrated Development Environment. Scikit-learn was used to develop algorithm, streamlit and heroku platforms for proper and efficient detection and classification of unauthorized transactions. This was incorporated into a web application that allows users to upload data that can be analyzed by the system to detect fraud. The Classification report and Confusion matrix have been used to evaluate each model’s accuracy. Random forest as a classifier model gave an accuracy of 99.95%. At the end of this study, a web-based application has been developed to upload data and detect fraudulent in online based transactions.

References

Benson S., Edwin R.A., & Annie P. (2020). Analysis on credit card fraud detection methods. International Conference on Computer, Communication and Electrical Technology (ICCCET), IEEE, 42(2), 152-156.

Berk, R. J. (2019). What You Can and Can’t Properly Do with Regression. Journal of Quantitative Criminology, Springer, 5(3). 756-767.

David, U. (2021). Bureau of consumer financial protection consumer credit card market report, International Conference on Computer, Communication and Electrical Technology (ICCCET), 12, 15-22.

Hand D. J. (2019), Fraud Detection in Telecommunications and Banking: Discussion of Becker, Techno metrics, 52(1), 34-38.

Maniraj, S. P., Aditya S., Shadab A. and Swarna S. (2019). Credit Card Fraud Detection using Machine Learning and Data Science, International Journal of Engineering Research, 8(2), 56-64.

Mareeswari,V. (2019). Prevention of Credit Card Fraud Detection based on HSVM. International Conference on Information Communication and Embedded System, 11. 33-47.

Mason, S. (2020). Looking at debit and credit card fraud. Teaching Statistics,34(3),87-9.

Melo-Acosta, G.E. (2020). Fraud Detection in Big Data Using Supervised and Semi-Supervised Learning Techniques, IEEE Colombian Conference on Communications and Computing, 2(1), 723-729.

Mohammed, E., & Behrouz F. (2019). Supervised Machine Learning Algorithms for Credit Card Fraudulent Transaction Detection: A Comparative Study, IEEE Annals of the History of Computing, 12(3), 82-93.

Shabad, M., & Kavitha, M. (2018). Credit Card Fraud Detection Using Neural Networks at Merchant Side, Journal of Computational and Theoretical Nanoscience, 15(4),3373-3375.

Shiyang X., Guan Jun L., Zhenchuan Li., Lutao Z., Shuo W., & Changjun J. (2019). Random forest for credit card fraud detection. IEEE 15th International Conference on Networking, Sensing and Control, 15, 23-38.

Srivastava, A., Kundu, A., Sural, S. & Majumdar, A. (2018). Credit Card Fraud Detection Using Hidden Markov Model. IEEE Transactions on Dependable and Secure Computing, 5(1),37-48.

Suvasini P., Amlan K., Shamik S., & Majumdarb A.K. (2019). Credit card fraud detection: A fusion approach using Dempster–Shafer theory and Bayesian learning. Information Fusion, 10 (4), 354-363.

Talabis, M. (2019). Information Security Analytics. Waltham: Syngress is an imprint of Elsevier, 5(1), 1-12.

Published
2024-03-11
How to Cite
Ibrahim, M. A., Ozoh, P., & Ojo, O. A. (2024). Fraud Detection Model for Illegal Transactions. Journal of Computing and Social Informatics, 3(1), 8-17. https://doi.org/10.33736/jcsi.6449.2024