Cloud-Based AI solutions for credit card fraud detection with feedforward neural networks in banking sector
DOI:
https://doi.org/10.70454/IJMRE.2021.10101Keywords:
Feedforward Neural Networks, Banking Sector, Fraud Detection Systems, Transaction Data, Cloud-Based AIAbstract
The increasing complexity of fraud strategies, combined with the rapid increase in transaction volumes, makes credit card fraud detection an important area of consideration in the banking sector. Due to the complexities of fraudulent behavior in the context of large transaction sizes, traditional techniques for fraud detection based on rules have become incapable of meeting the challenge. Cloud-based AI solutions based on Feedforward Neural Networks (FNNs) provide the best option when looking for an advanced adaptive approach. This solution benefits from cloud storage to provide highly efficient management of large volumes of transactional data with maximum scalability and flexibility. FNNs aid in differentiating and recognizing complex fraud patterns, while cloud technology ensures that such a system is proficient in adjusting to transaction volume fluctuations. The integration of these technologies resulted in the model achieving a 99.89% accuracy, 98.67% precision, and 95.76% recall. The F1-score of 96.78% shows a balanced performance in precision versus recall. This convergence of AI and cloud technologies promotes accurate fraud transaction detection with reduced false-positive responses and the possibility of continuous adaptation to new fraud schemes. All said, Cloud-Based AI with FNNs is a system that is most potent to secure financial transactions and customers' interests in the banking sector.
References
[1] Barker, K. J., D'amato, J., & Sheridon, P. (2008). Credit card fraud: awareness and prevention. Journal of financial crime, 15(4), 398-410.
[2] Mohanarangan, V.D (2020). Improving Security Control in Cloud Computing for Healthcare Environments.Journal of Science and Technology, 5(6).
[3] Celestin, M., & Vanitha, N. (2019). Ethics in auditing: Addressing conflicts of interest in a complex business landscape. International Journal of Advanced Trends in Engineering and Technology, 4(2), 52-59.
[4] Ganesan, T. (2020). Machine learning-driven AI for financial fraud detection in IoT environments. International Journal of HRM and Organizational Behavior, 8(4).
[5] Georgieva, S., Markova, M., & Pavlov, V. (2019, October). Using neural network for credit card fraud detection. In AIP Conference Proceedings (Vol. 2159, No. 1). AIP Publishing.
[6] Deevi, D. P. (2020). Improving patient data security and privacy in mobile health care: A structure employing WBANs, multi-biometric key creation, and dynamic metadata rebuilding. International Journal of Engineering Research & Science & Technology, 16(4).
[7] Langseth, P., Stapenhurst, R., & Pope, J. (1997). The role of a national integrity system in fighting corruption. Commonwealth Law Bulletin, 23(1-2), 499-528.
[8] Mohanarangan, V.D. (2020). Assessing Long-Term Serum Sample Viability for Cardiovascular Risk Prediction in Rheumatoid Arthritis. International Journal of Information Technology & Computer Engineering, 8(2), 2347–3657.
[9] Siyal, A. A., Junejo, A. Z., Zawish, M., Ahmed, K., Khalil, A., &Soursou, G. (2019). Applications of blockchain technology in medicine and healthcare: Challenges and future perspectives. Cryptography, 3(1), 3.
[10] Koteswararao, D. (2020). Robust Software Testing for Distributed Systems Using Cloud Infrastructure, Automated Fault Injection, and XML Scenarios. International Journal of Information Technology & Computer Engineering, 8(2), ISSN 2347–3657.
[11] Vatsa, V., Sural, S., & Majumdar, A. K. (2007). A rule-based and game-theoretic approach to online credit card fraud detection. International Journal of Information Security and Privacy (IJISP), 1(3), 26-46.
[12] Rajeswaran, A. (2020). Big Data Analytics and Demand-Information Sharing in ECommerce Supply Chains: Mitigating Manufacturer Encroachment and Channel Conflict. International Journal of Applied Science Engineering and Management, 14(2), ISSN2454-9940
[13] Behdad, M., Barone, L., Bennamoun, M., & French, T. (2012). Nature-inspired techniques in the context of fraud detection. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(6), 1273-1290.
[14] Alagarsundaram, P. (2020). Analyzing the covariance matrix approach for DDoS HTTP attack detection in cloud environments. International Journal of Information Technology & Computer Engineering, 8(1).
[15] Save, P., Tiwarekar, P., Jain, K. N., &Mahyavanshi, N. (2017). A novel idea for credit card fraud detection using decision tree. International Journal of Computer Applications, 161(13).
[16] Poovendran, A. (2020). Implementing AES Encryption Algorithm to Enhance Data Security in Cloud Computing. International Journal of Information technology & computer engineering, 8(2), I
[17] Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M. J., Levi, M., ... & Savage, S. (2013). Measuring the cost of cybercrime. The economics of information security and privacy, 265-300.
[18] Sreekar, P. (2020). Cost-effective Cloud-Based Big Data Mining with K-means Clustering: An Analysis of Gaussian Data. International Journal of Engineering & Science Research,
10(1), 229-249.
[19] Ondiege, B., Clarke, M., & Mapp, G. (2017). Exploring a new security framework for remote patient monitoring devices. Computers, 6(1), 11.
[20] Karthikeyan, P. (2020). Real-Time Data Warehousing: Performance Insights of Semi-Stream Joins Using Mongodb. International Journal of Management Research & Review, 10(4), 38-49
[21] Sharma, M., & Jha, S. (2017). Digital data stealing from ATM using data skimmers: Challenge to the forensic examiner. Journal of Forensic Sciences & Criminal Investigation, 1(4).
[22] Mohan, R.S. (2020). Data-Driven Insights for Employee Retention: A Predictive Analytics Perspective. International Journal of Management Research & Review, 10(2), 44-59.
[23] Zulkurnain, A. U., Hamidy, A. K. B. K., Husain, A. B., &Chizari, H. (2015). Social engineering attack mitigation. Int. J. Math. Comput. Sci, 1(4), 188-198.
[24] Sitaraman, S. R. (2020). Optimizing Healthcare Data Streams Using Real-Time Big Data Analytics and AI Techniques. International Journal of Engineering Research and Science & Technology, 16(3), 9-22.
[25] Nagar, G. (2018). Leveraging Artificial Intelligence to Automate and Enhance Security Operations: Balancing Efficiency and Human Oversight. Valley International Journal Digital Library, 78-94.
[26] Panga, N. K. R. (2020). Leveraging heuristic sampling and ensemble learning for enhanced insurance big data classification. International Journal of Financial Management (IJFM), 9(1).
[27] Aisyah, N., Hidayat, R., Zulaikha, S., Rizki, A., Yusof, Z. B., Pertiwi, D., & Ismail, F. (2019). Artificial Intelligence in Cryptographic Protocols: Securing E-Commerce Transactions and Ensuring Data Integrity.
[28] Gudivaka, R. L. (2020). Robotic Process Automation meets Cloud Computing: A Framework for Automated Scheduling in Social Robots. International Journal of Business and General Management (IJBGM), 8(4), 49-62.
[29] Behdad, M., Barone, L., Bennamoun, M., & French, T. (2012). Nature-inspired techniques in the context of fraud detection. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 42(6), 1273-1290.
[30] Gudivaka, R. K. (2020). Robotic Process Automation Optimization in Cloud Computing Via Two-Tier MAC and LYAPUNOV Techniques. International Journal of Business and General Management (IJBGM), 9(5), 75-92.
[31] Mozzaquatro, B. A., Agostinho, C., Goncalves, D., Martins, J., & Jardim-Goncalves, R. (2018). An ontology-based cybersecurity framework for the internet of things. Sensors, 18(9), 3053.
[32] Deevi, D. P. (2020). Artificial neural network enhanced real-time simulation of electric traction systems incorporating electro-thermal inverter models and FEA. International Journal of Engineering and Science Research, 10(3), 36-48.
[33] Sharma, R., Pavlovic, V. I., & Huang, T. S. (2002). Toward multimodal human-computer interface. Proceedings of the IEEE, 86(5), 853-869.
[34] Allur, N. S. (2020). Enhanced performance management in mobile networks: A big data framework incorporating DBSCAN speed anomaly detection and CCR efficiency assessment. Journal of Current Science, 8(4).
[35] Skipper, H. D. (2000). Financial services integration worldwide: Promises and pitfalls. North American Actuarial Journal, 4(3), 71-108.
[36] Deevi, D. P. (2020). Real-time malware detection via adaptive gradient support vector regression combined with LSTM and hidden Markov models. Journal of Science and Technology, 5(4).
[37] Whitrow, C., Hand, D. J., Juszczak, P., Weston, D., & Adams, N. M. (2009). Transaction aggregation as a strategy for credit card fraud detection. Data mining and knowledge discovery, 18, 30-55.
[38] Dondapati, K. (2020). Integrating neural networks and heuristic methods in test case prioritization: A machine learning perspective. International Journal of Engineering & Science Research, 10(3), 49–56.
[39] Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., & Glance, N. (2007, August). Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 420-429).
[40] Dondapati, K. (2020). Leveraging backpropagation neural networks and generative adversarial networks to enhance channel state information synthesis in millimeter-wave networks. International Journal of Modern Electronics and Communication Engineering, 8(3), 81-90
[41] Brodie, M. L. (1993). The promise of distributed computing and the challenges of legacy information systems. In Interoperable database systems (DS-5) (pp. 1-31). North-Holland.
[42] Gattupalli, K. (2020). Optimizing 3D printing materials for medical applications using AI, computational tools, and directed energy deposition. International Journal of Modern Electronics and Communication Engineering, 8(3).
[43] Brown, D. K. (2018). How to Marginalize Criminal Trials Without Pretrial Discovery. Virginia Public Law and Legal Theory Research Paper, (2018-24), 55.
[44] Allur, N. S. (2020). Big data-driven agricultural supply chain management: Trustworthy scheduling optimization with DSS and MILP techniques. Current Science & Humanities, 8(4), 1–16.
[45] Guo, X., Yin, Y., Dong, C., Yang, G., & Zhou, G. (2008, October). On the class imbalance problem. In 2008 Fourth international conference on natural computation (Vol. 4, pp. 192-201). IEEE.
[46] Narla, S., Valivarthi, D. T., & Peddi, S. (2020). Cloud computing with artificial intelligence techniques: GWO-DBN hybrid algorithms for enhanced disease prediction in healthcare systems. Current Science & Humanities, 8(1), 14–30.
[47] Gudala, L., Shaik, M., Venkataramanan, S., & Sadhu, A. K. R. (2019). Leveraging artificial intelligence for enhanced threat detection, response, and anomaly identification in resource-constrained iot networks. Distributed Learning and Broad Applications in Scientific Research, 5, 23-54.
[48] Kethu, S. S. (2020). AI and IoT-driven CRM with cloud computing: Intelligent frameworks and empirical models for banking industry applications. International Journal of Modern Electronics and Communication Engineering (IJMECE), 8(1), 54.
[49] Jena, J. (2015). Next-Gen Firewalls Enhancing: Protection against Modern Cyber Threats. International Journal of Multidisciplinary and Scientific Emerging Research, 4(3), 2015-2019.
[50] Vasamsetty, C. (2020). Clinical decision support systems and advanced data mining techniques for cardiovascular care: Unveiling patterns and trends. International Journal of Modern Electronics and Communication Engineering, 8(2).
[51] Enemosah, A. (2019). Implementing DevOps Pipelines to Accelerate Software Deployment in Oil and Gas Operational Technology Environments. International Journal of Computer Applications Technology and Research, 8(12), 501-515.
[52] Kadiyala, B. (2020). Multi-swarm adaptive differential evolution and Gaussian walk group search optimization for secured IoT data sharing using supersingular elliptic curve isogeny cryptography,International Journal of Modern Electronics and Communication Engineering,8(3).
[53] Taylor, S. J., Anagnostou, A., Kiss, T., Terstyanszky, G., Kacsuk, P., Fantini, N., ... & Costes, J. (2018). Enabling cloud-based computational fluid dynamics with a platform-as-a-service solution. IEEE transactions on industrial informatics, 15(1), 85-94.
[54] Valivarthi, D. T. (2020). Blockchain-powered AI-based secure HRM data management: Machine learning-driven predictive control and sparse matrix decomposition techniques. International Journal of Modern Electronics and Communication Engineering.8(4)
[55] Shah, V., & Shukla, S. (2017). Data distribution into distributed systems, integration, and advancing machine learning. Revista Espanola de DocumentacionCientifica, 11(1), 83-99.
[56] Jadon, R. (2020). Improving AI-driven software solutions with memory-augmented neural networks, hierarchical multi-agent learning, and concept bottleneck models. International Journal of Information Technology and Computer Engineering, 8(2).
[57] L’heureux, A., Grolinger, K., Elyamany, H. F., &Capretz, M. A. (2017). Machine learning with big data: Challenges and approaches. Ieee Access, 5, 7776-7797.
[58] Boyapati, S. (2020). Assessing digital finance as a cloud path for income equality: Evidence from urban and rural economies. International Journal of Modern Electronics and Communication Engineering (IJMECE), 8(3).
[59] Leo, M., Sharma, S., &Maddulety, K. (2019). Machine learning in banking risk management: A literature review. Risks, 7(1), 29.
[60] Gaius Yallamelli, A. R. (2020). A cloud-based financial data modeling system using GBDT, ALBERT, and Firefly algorithm optimization for high-dimensional generative topographic mapping. International Journal of Modern Electronics and Communication Engineering8(4).
[61] Carvalho, D. V., Pereira, E. M., & Cardoso, J. S. (2019). Machine learning interpretability: A survey on methods and metrics. Electronics, 8(8), 832.
[62] Yalla, R. K. M. K., Yallamelli, A. R. G., &Mamidala, V. (2020). Comprehensive approach for mobile data security in cloud computing using RSA algorithm. Journal of Current Science & Humanities, 8(3).
[63] Sun Yin, H. H., Langenheldt, K., Harlev, M., Mukkamala, R. R., &Vatrapu, R. (2019). Regulating cryptocurrencies: a supervised machine learning approach to de-anonymizing the bitcoin blockchain. Journal of Management Information Systems, 36(1), 37-73.
[64] Samudrala, V. K. (2020). AI-powered anomaly detection for cross-cloud secure data sharing in multi-cloud healthcare networks. Journal of Current Science & Humanities, 8(2), 11–22.
[65] Zhang, B., Qi, S., Monkam, P., Li, C., Yang, F., Yao, Y. D., & Qian, W. (2019). Ensemble learners of multiple deep CNNs for pulmonary nodules classification using CT images. IEEE Access, 7, 110358-110371.
[66] Ayyadurai, R. (2020). Smart surveillance methodology: Utilizing machine learning and AI with blockchain for bitcoin transactions. World Journal of Advanced Engineering Technology and Sciences, 1(1), 110–120.
[67] Lane, T., & Brodley, C. E. (2003). An empirical study of two approaches to sequence learning for anomaly detection. Machine learning, 51, 73-107.
[68] Chauhan, G. S., & Jadon, R. (2020). AI and ML-powered CAPTCHA and advanced graphical passwords: Integrating the DROP methodology, AES encryption, and neural network-based authentication for enhanced security. World Journal of Advanced Engineering Technology and Sciences, 1(1), 121–132.
[69] Zhang, D., Han, X., & Deng, C. (2018). Review on the research and practice of deep learning and reinforcement learning in smart grids. CSEE Journal of Power and Energy Systems, 4(3), 362-370.
[70] Narla, S. (2020). Transforming smart environments with multi-tier cloud sensing, big data, and 5G technology. International Journal of Computer Science Engineering Techniques, 5(1), 1-10.
[71] Omopariola, B. J., &Aboaba, V. (2019). Comparative analysis of financial models: Assessing efficiency, risk, and sustainability. Int J Comput Appl Technol Res, 8(5), 217-231.
[72] Alavilli, S. K. (2020). Predicting heart failure with explainable deep learning using advanced temporal convolutional networks. International Journal of Computer Science Engineering Techniques, 5(2).
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Charles Ubagaram, Karthick.M (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
This is an Open Access article distributed under the term's of the Creative Common Attribution 4.0 International License permitting all use, distribution, and reproduction in any medium, provided the work is properly cited.