Credit Card Fraud Detection in Payment Using Machine Learning Classifiers
Keywords:Fraud Detection, Machine Learning, Payment, Predict, Classifiers, Credit Card
The fraud detection in payment is a classification problem that aims to identify fraudulent transactions based individually on the information it contains and on the basis that a fraudster's behaviour patterns differ significantly from that of the actual customer. In this context, the authors propose to implement machine learning classifiers (Naïve Bayes, C4.5 decision trees, and Bagging Ensemble Learner) to predict the outcome of regular transactions and fraudulent transactions. The performance of these classifiers is judged by the following ways: precision, recall rate, and precision-recall curve (PRC) area rate. The dataset includes more than 297K transactions via credit cards in September 2013 and November 2017 that have been collected from Kaggle platform, of which 3293 are frauds. The performance PRC ratio of machine learning classifiers is between 99.9% and 100%, which confirms that these classifiers are very good at identifying binary classes 0 in the dataset. The results of the tests have proved that the best classifier is C4.5 decision trees. This classifier has the best accuracy of 94.12% in prediction of fraudulent transactions.
Gupta S. and Johari R., “A New Framework for Credit Card Transactions involving Mutual Authentication between Cardholder and Merchant,” In Proceedings of International Conference on Communication Systems and Network Technologies (CSNT), pp: 22-26, Katra, India, 13-15 July 2011. https://doi.org/10.1109/CSNT.2011.12.
Budhram T., “A New Framework for Credit Card Transactions Involving Mutual Authentication between Cardholder and Merchant, South African Crime Quarterly,” vol.40, pp:31-37, June 2012. https://doi.org/10.17159/2413-3108/2012/v0i40a843
Ermatita and Sutedja I., “Detection of Frauds for Debit Card Transactions at Automated Teller Machine in Indonesia Using Neural Network,” IOP Conference Series Conference- Journal of Physics: Conference Series, Palembang, Indonesia, pp:1-10, 26–27 November 2018. https://doi.org/10.1088/1742-6596/1196/1/012076
DeVries P. D., “The problem of fraud in the banking industry: Are biometrics the answer?,” International Journal of Services and Standards , vol.7, no.3, pp:310-327, January 2011. https://doi.org/10.1504/IJSS.2011.045055
Ogundele O., Zavarsky P., Ruhl R., and Lindskog D., “Fraud Reduction on EMV Payment Cards by the Implementation of Stringent Security Features,” International Journal of Intelligent Computing Research, vol.3, no.3, pp:328-348, September 2012. https://doi.org/10.20533/ijicr.2042.4655.2012.0031
Robertson D., “Top Card Issuers in Asia-Pacific,” The Nilson Report, pp:1-12, October 2016. PDF link: https://nilsonreport.com/upload/content_promo/The_Nilson_Report_10-17-2016.pdf
Awoyemi J. O., Adetunmbi A. O., and Oluwadare S. A., “Credit card fraud detection using machine learning techniques: A comparative analysis,” In Proceedings of International Conference on Computing Networking and Informatics (ICCNI), pp:1-6, Lagos, Nigeria, 29-31 October 2017. https://doi.org/10.1109/ICCNI.2017.8123782
Yee O. S., Sagadevan S., and Malim N. H. A. H., “Credit Card Fraud Detection Using Machine Learning as Data Mining Technique,” Journal of Telecommunication, Electronic and Computer Engineering, Vol. 10 No.4, pp:23-27, August 2018.
Safa M. U., and Ganga R. M., “Credit Card Fraud Detection Using Machine Learning,” International Journal of Research in Engineering, Science and Management, vol. 2, no.11, pp: 372-374, November 2019
Trivedi N. K., Simaiya S., Lilhore U. K., and Sharma S. K., An Efficient Credit Card Fraud Detection Model Based on Machine Learning Methods, International Journal of Advanced Science and Technology, vol.29, no.5, pp: 3414 - 3424, April 2020.
Husejinović A., “Credit Card Fraud Detection Using Naive Bayesian And C4.5 Decision Tree Classifiers,” Periodicals of Engineering and Natural Sciences, vol.8, no.1, pp:1-5, January 2020.
Najadat H., Altiti O., Aqouleh A. A., and Younes M., Credit Card Fraud Detection Based on Machine and Deep Learning, In Proceedings of International Conference on Information and Communication Systems (ICICS)-IEEE, pp:1-6, Irbid, Jordan, 7-9 April 2020. https://doi.org/10.1109/ICICS49469.2020.239524
Chen S., Webb G. I., Liu L., and Ma X., “A Novel Selective Naïve Bayes Algorithm,” Knowledge-Based Systems -Elsevier, Vol.192, March 2020. https://doi.org/10.1016/j.knosys.2019.105361
Salmi N. and Rustam Z., “Naïve Bayes Classifier Models for Predicting the Colon Cancer,” IOP Conference Series Conference- Materials Science and Engineering, Malang, Indonesia, pp-1-9, 20-21 March 2019. https://doi.org/10.1088/1757-899X/546/5/052068.
Sammit, “#MLMuse—Naivety in Naive Bayes’ Classifiers,” Clairvoyant Soft. Available online: https://blog.clairvoyantsoft.com/mlmuse-naivety-in-naive-bayes-classifiers-9c7f6ba952bf
Hsian B., Merbouha A., Ezzikouri H., And Erritali M., “A comparative study of decision tree ID3 and C4.5,” International Journal of Advanced Computer Science and Applications Special Issue on Advances in Vehicular Ad Hoc Networking and Applications, pp:13-19, July 2014. http://dx.doi.org/10.14569/SpecialIssue.2014.040203
Oujdi S., Belbachir H., and Boufares F., “C4.5 Decision Tree Algorithm for Spatial Data, Alternatives and Performances,” Journal of Computing and Information Technology, vol.27, no.3, pp:23-29, May 2020. https://doi.org/10.20532/cit.2019.1004651
Gaikwad D. P., and Thool R. C., “Intrusion Detection System Using Bagging Ensemble Method of Machine Learning,” In Proceedings of International Conference on Computing Communication Control and Automation-IEEE, pp:1-6, Pune, India, 26-27 February 2015. http://doi.org/10.1109/ICCUBEA.2015.61
Tuysuzoglu G. and Birant D., “Enhanced Bagging (eBagging): A Novel Approach for Ensemble Learning,” The International Arab Journal of Information Technology, Vol. 17, No. 4, pp:515-528, July 2020, https://doi.org/10.34028/iajit/17/4/10
Singhal G., “Ensemble Methods in Machine Learning: Bagging Versus Boosting,” Pluralsight, June 2020. Available online: https://www.pluralsight.com/guides/ensemble-methods:-bagging-versus-boosting
How to Cite
Copyright (c) 2020 Maad M. Mijwil, Israa Ezzat Salem
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.