Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3647444.3647867acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimmiConference Proceedingsconference-collections
research-article

A Novel credit card fraud detection feature selection system using machine learning

Published: 13 May 2024 Publication History

Abstract

Abstract: A comprehensive overview and implementation of a credit card fraud detection system using machine learning for feature selection system. In an era where digital transactions have become the norm, the need for robust fraud detection mechanisms has never been greater. This research explores various machine learning techniques and data preprocessing methods to develop an effective and efficient system for identifying fraudulent credit card transactions. The research begins by discussing the significance of credit card fraud and its detrimental impact on financial institutions and consumers. It then delves into the fundamental concepts of machine learning and data preprocessing, providing insights into the methodologies used to tackle this complex problem. The heart of the research lies in the design and implementation of the credit card fraud detection system. The research details the selection and fine-tuning of machine learning algorithms, the creation of a reliable dataset, and the evaluation of model performance using appropriate metrics. Additionally, research discusses strategies for handling imbalanced data, a common challenge in fraud detection. Furthermore, this research addresses the ethical and privacy considerations associated with handling sensitive financial data. It emphasizes the importance of compliance with legal regulations and ethical standards while implementing such systems. This research demonstrates a practical and effective approach to credit card fraud detection using Python and machine learning.

References

[1]
Thennakoon, A., Bhagyani, C., Premadasa, S., Mihiranga, S., & Kuruwitaarachchi, N. (2019, January). Real-time credit card fraud detection using machine learning. In 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (pp. 488-493). IEEE.
[2]
Srivastava, P. K., Kumar, S., Tiwari, A., Goyal, D., & Mamodiya, U. (2023, June). Internet of thing uses in materialistic ameliorate farming through AI. In AIP Conference Proceedings (Vol. 2782, No. 1). AIP Publishing.
[3]
Lingjun, H., Levine, R. A., Fan, J., Beemer, J., & Stronach, J. (2018). Random forest as a predictive analytics alternative to regression in institutional research. Practical Assessment, Research, and Evaluation, 23(1), 1.
[4]
Dora Pravina, C. T., Buradkar, M. U., Jamal, M. K., Tiwari, A., Mamodiya, U., & Goyal, D. (2022, December). A Sustainable and Secure Cloud resource provisioning system in Industrial Internet of Things (IIoT) based on Image Encryption. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp. 1-5).
[5]
Ahmad, H., Kasasbeh, B., Aldabaybah, B., & Rawashdeh, E. (2023). Class balancing framework for credit card fraud detection based on clustering and similarity-based selection (SBS). International Journal of Information Technology, 15(1), 325-333.
[6]
Seera, M., Lim, C. P., Kumar, A., Dhamotharan, L., & Tan, K. H. (2021). An intelligent payment card fraud detection system. Annals of operations research, 1-23.
[7]
Tiwari, Ashish, and Ritu Garg. "A Optimized Taxonomy on Spot Sale Services Using Mathematical Methodology." International Journal of Security and Privacy in Pervasive Computing (IJSPPC) 14, no. 1 (2022): 1-21.
[8]
Bin Sulaiman, R., Schetinin, V., & Sant, P. (2022). Review of machine learning approach on credit card fraud detection. Human-Centric Intelligent Systems, 2(1-2), 55-68.
[9]
Kumar Sharma, A., Tiwari, A., Bohra, B., & Khan, S. (2018). A Vision towards Optimization of Ontological Datacenters Computing World. International Journal of Information Systems & Management Science, 1(2).
[10]
Asha, R. B., & KR, S. K. (2021). Credit card fraud detection using artificial neural network. Global Transitions Proceedings, 2(1), 35-41.
[11]
Rangaiah, Y. V., Sharma, A. K., Bhargavi, T., Chopra, M., Mahapatra, C., & Tiwari, A. (2022, December). A Taxonomy towards Blockchain based Multimedia content Security. In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT) (pp. 1-4). IEEE.
[12]
Bagga, S., Goyal, A., Gupta, N., & Goyal, A. (2020). Credit card fraud detection using pipeling and ensemble learning. Procedia Computer Science, 173, 104-112.
[13]
Rohinidevi, V. V., Srivastava, P. K., Dubey, N., Tiwari, S., & Tiwari, A. (2022, December). A Taxonomy towards fog computing Resource Allocation. In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT) (pp. 1-5). IEEE.
[14]
Carcillo, F., Le Borgne, Y. A., Caelen, O., Kessaci, Y., Oblé, F., & Bontempi, G. (2021). Combining unsupervised and supervised learning in credit card fraud detection. Information sciences, 557, 317-331.
[15]
Singh, N. K., Jain, A., Arya, S., Gonzales, W. E. G., Flores, J. E. A., & Tiwari, A. (2022, December). Attack Detection Taxonomy System in cloud services. In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT) (pp. 1-5). IEEE.
[16]
Khatri, S., Arora, A., & Agrawal, A. P. (2020, January). Supervised machine learning algorithms for credit card fraud detection: a comparison. In 2020 10th international conference on cloud computing, data science & engineering (confluence) (pp. 680-683). IEEE.
[17]
Chouhan, A., Tiwari, A., Diwaker, C., & Sharma, A. (2022, February). Efficient Opportunities and Boundaries towards Internet of Things (IoT) Cost Adaptive Model. In 2022 IEEE Delhi Section Conference (DELCON) (pp. 1-5). IEEE.
[18]
Chen, J. I. Z., & Lai, K. L. (2021). Deep convolution neural network model for credit-card fraud detection and alert. Journal of Artificial Intelligence and Capsule Networks, 3(2), 101-112.
[19]
Tanouz, D., Subramanian, R. R., Eswar, D., Reddy, G. P., Kumar, A. R., & Praneeth, C. V. (2021, May). Credit card fraud detection using machine learning. In 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS) (pp. 967-972). IEEE.
[20]
Kumar Sharma, A., Tiwari, A., Bohra, B., & Khan, S. (2018). A Vision towards Optimization of Ontological Datacenters Computing World. International Journal of Information Systems & Management Science, 1(2).
[21]
Chikersal, P., Doryab, A., Tumminia, M., Villalba, D. K., Dutcher, J. M., Liu, X., ... & Dey, A. K. (2021). Detecting depression and predicting its onset using longitudinal symptoms captured by passive sensing: a machine learning approach with robust feature selection. ACM Transactions on Computer-Human Interaction (TOCHI), 28(1), 1-41.
[22]
Tiwari, A., Sharma, R. M., & Garg, R. (2020). Emerging ontology formulation of optimized internet of things (IOT) services with cloud computing. In Soft Computing: Theories and Applications: Proceedings of SoCTA 2018 (pp. 31-52). Springer Singapore.
[23]
Tiwari, A., Sah, M. K., & Malhotra, A. (2015, September). Effective service Utilization in Cloud Computing exploitation victimisation rough pure mathematics as revised ROSP. In 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO)(Trends and Future Directions) (pp. 1-6). IEEE
[24]
Tiwari, A., & Sharma, R. M. (2021). OCC: a hybrid multiprocessing computing service decision making using ontology system. International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), 16(4), 96-116.
[25]
Sah, M. K., Kumar, V., & Tiwari, A. (2017). Security and concurrency control in distributed database system. International Journal of scientific research and management, 2(12), 1839-1845
[26]
Tiwari, A., Kumar, S., Baishwar, N., Vishwakarma, S. K., & Singh, P. (2022, September). Efficient Cloud Orchestration Services in Computing. In Proceedings of 3rd International Conference on Machine Learning, Advances in Computing, Renewable Energy and Communication: MARC 2021 (pp. 739-746). Singapore: Springer Nature Singapore.
[27]
Tiwari, A., & Sharma, R. M. (2018). Rendering Form Ontology Methodology for IoT Services in Cloud Computing. International Journal of Advanced Studies of Scientific Research, 3(11)
[28]
Mail, M. A. E., Ab Razak, M. F., & Ab Rahman, M. (2022). Malware detection system using cloud sandbox, machine learning. International Journal of Software Engineering and Computer Systems, 8(2), 25-32.
[29]
Rangaiah, Y. V., Sharma, A. K., Bhargavi, T., Chopra, M., Mahapatra, C., & Tiwari, A. (2022, December). A Taxonomy towards Blockchain based Multimedia content Security. In 2022 2nd International Conference on Innovative Sustainable Computational Technologies (CISCT) (pp. 1-4). IEEE.
[30]
Tiwari, A., & Garg, R. (2022). A Optimized Taxonomy on Spot Sale Services Using Mathematical Methodology. International Journal of Security and Privacy in Pervasive Computing (IJSPPC), 14(1), 1-21.
[31]
Tiwari, A., & Garg, R. (2019). Eagle Techniques In Cloud Computational Formulation. International Journal of Innovative Technology and Exploring Engineering, 8(1), 422-429.
[32]
Pawar, S., & Singh, S. (2015). Performance comparison of VMWare and Xen hypervisor on guest OS. Int. J. Innov. Comput. Sci. Eng. Issue, 2(3), 56-60.
[33]
Nishad, L. S., Akriti, Paliwal, J., Pandey, R., Beniwal, S., & Kumar, S. (2016, March). Security, privacy issues and challenges in cloud computing: A survey. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (pp. 1-7).
[34]
Sahu, K., Srivastava, R. K., Kumar, S., Saxena, M., Gupta, B. K., & Verma, R. P. (2023). Integrated hesitant fuzzy-based decision-making framework for evaluating sustainable and renewable energy. International Journal of Data Science and Analytics, 16(3), 371-390.
[35]
Koppaiyan, R. S., Pallivalappil, A. S., Singh, P., Tabassum, H., Tewari, P., Sweeti, M., & Kumar, S. (2022, December). High-Availability Encryption-Based Cloud Resource Provisioning System. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp. 1-6).
[36]
An approach to reduce turn around time and waiting time by the selection of round robin and shortest job first algorithm
[37]
Najadat, H., Altiti, O., Aqouleh, A. A., & Younes, M. (2020, April). Credit card fraud detection based on machine and deep learning. In 2020 11th International Conference on Information and Communication Systems (ICICS) (pp. 204-208). IEEE.
[38]
Tiwari, A. & Sharma, R. M. (2021). Realm Towards Service Optimization in Fog Computing. In I. Management Association (Ed.), Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing (pp. 1530-1563).
[39]
Dudeja, D., Sabharwal, S. M., Ganganwar, Y., Singhal, M., Goyal, N., & Tiwari, A. (2023). Sales-Based Models for Resource Management and Scheduling in Artificial Intelligence Systems. Engineering Proceedings, 59(1), 43.
[40]
Saini, D. K. J. B., Patil, P., Gupta, K. D., Kumar, S., Singh, P., & Diwakar, M. (2022, April). Optimized web searching using inverted indexing technique. In 2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT) (pp. 351-356). IEEE.
[41]
Dadheech, P., Mehbodniya, A., Tiwari, S., Kumar, S., Singh, P., & Gupta, S. (2022). Zika virus prediction using AI-driven technology and hybrid optimization algorithm in healthcare. Journal of Healthcare Engineering, 2022.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine Intelligence
November 2023
1215 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Accuracy
  2. Card-Not-Present frauds
  3. Card-Present-Frauds
  4. Concept Drift
  5. Error-rate
  6. Machine Learning
  7. Sensitivity
  8. Specificity

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIMMI 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 48
    Total Downloads
  • Downloads (Last 12 months)48
  • Downloads (Last 6 weeks)6
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media