Professional Documents
Culture Documents
www.emeraldinsight.com/1359-0790.htm
JFC
25,3 Parameters of automated fraud
detection techniques during
online transactions
702 Vipin Khattri
Shri Ramswaroop Memorial University Institute of Technology,
Barabanki, India, and
Deepak Kumar Singh
Jaipuria Institute of Management, Lucknow, India
Abstract
Purpose – This paper aims to provide information of parameters and techniques used in the automated
fraud detection system during online transaction. With the increase in the use of online transactions, the
concerns regarding data security have also increased. To tackle the frauds, lot of research has been done and
plethora of papers are available on the related topics. The purpose of this paper is to provide the clear
pathway for researchers to move in the direction of development of automated fraud detection system to
prevent the fraud during online transaction.
Design/methodology/approach – This literature review analyses and compares the different types of
techniques for detecting fraud during online transaction. An in-depth study of the most prominent journals
has been done and the core methodology of the papers has been presented. This article also shed some light on
different types of parameters used in fraud detection techniques during online transaction.
Findings – There are vast varieties of various fraud detection techniques, and every technique has
completed task in its own way. After studying approximately 41 research papers, 14 books and four reports,
in total 30 parameters have been identified and a detailed study of the parameters has been presented. The
parameters are also listed with their details that how these parameters are used in the security system for
detecting online transaction fraud.
Research limitations/implications – This paper provides empirical insight about the parameters and
their prominence in the development of automated fraud detection security system of online transaction. This
paper encourages the researchers to development of improved fraud detection system.
Practical implications – This paper will pave the way for researchers to do a focused research on the
fraud detection methodologies. The analysis will help in zeroing down the most prevalent topic of research in
this field. The researchers will be able to understand the internal details of parameters and techniques used in
the fraud detection systems. This literature also helps the research to think in a variety of ways that how these
parameters will be used in the development of fraud detection system.
Originality/value – This paper is one of the most comprehensive reviews in its field. It tries and attempts
to fill a void created because of lack of compilation of the laid fraud detection parameters.
3.5 Location
This parameter is used to record country name and city name where purchase is to be made
and compare it with the list of country and city where suspicious transaction have been
occurred in past Oracle Financial Services Software, 2014). This parameter is used (Sánchez
et al., 2009) to verify the location where the card used was in suspicious category or not. If yes
then transaction can be considered in suspicious category. This parameter used (Bahnsen
JFC et al., 2015) to identify transaction that is to be made from which country so that the
25,3 transaction can be categories as suspicious transaction on the basis of comparing the current
transaction country from list of fraudulent transaction country. The authors (Singh and
Singh, 2015) used to find customer location by using internet protocol (IP) address, this
parameter is used to calculate the distance between two locations with respect to two
consecutive transactions. If calculated distance is required more time to cover it than the
708 observed time then current transaction is considered as fraudulent or suspicious transaction.
3.6 Overdraft
When a person wants to withdraw money from a bank account and available balance is not
sufficient to withdraw, this situation is known as overdraft, and generally, this situation
does not occur frequently. This parameter is used to verify that whether deficit in an account
caused by drawing more money which is beyond the limit. The authors (Ramakalyani and
Umadevi, 2012) used this parameter to find fraudulent transaction. A critical value is
defined for this parameter and on the basis of past and current transaction history, actual
value is calculated. If actual value is greater than critical value then current transaction is
considered as suspicious transaction.
3. 14 Customer age
This parameter is used to compare type of product purchasing with respect to the
customer’s age. This parameter is used (Sánchez et al., 2009) and reported that most cases of
fraud were found from 18 to 30 age group of people. This parameter is also used (Khan et al.,
2014a) to train the neural network to identify the transaction as suspicious transaction
according to product purchased. For example, one customer was buying a product which
was not suited the customer’s age. After enquiry, it was found that card was stolen of the
customer and used by another person.
3.22 Citizenship
This parameter is used to record the citizenship of the customer who is going to purchase 711
the product and compare it with the list of countries where suspicious transactions have
been occurred in past. The authors (Bahnsen et al., 2015) used this parameter to compare
identify of the country with the list of suspicious country. If found then current transaction
is considered as a suspicious transaction. In Oracle Financial Services Software (2014), this
parameter contains a risk value for each country and can be considered as high or low risk
during transaction.
3.27 Gender
This parameter is used to record the category of human (male or female) and find the pattern
of fraudulent transaction committed by male or female. The authors (Sánchez et al., 2009)
reported, high fraudulent transactions were made by female client. This parameter is also
used (Khan et al., 2014a) to train the neural network to identify the transaction as suspicious
transaction.
detecting online
transaction fraud
Parameters used in
Summary of
fraud detection
713
techniques
Automated
Table II.
JFC
25,3
714
Table II.
Year of publications
Sr No. Parameters 2015 2014 2013 2012 Others
Figure 1.
Frequency of
parameters used in
online transaction
fraud detection
techniques
JFC
25,3
716
Figure 2.
Frequency of
parameters used in
online transaction
fraud detection
techniques
(Cybersource, 2015)
achieve the target for developing the improved fraud detection system for online
transaction.
4. Conclusion
As time grows, online business in all areas is also growing, and there is no restriction or
reducing gap between customer and financial business for online transaction. In the same
manner, online fraud transaction is also increasing which should be prevented or reduced.
Therefore, an improved more sophisticated system for detecting and preventing the online
fraud transaction require which is based on various parameters used in detection
techniques. Fraud detection not only depends on the static fact but it also considers the
behavioral pattern of the customer of past transaction which is helpful to find suspicious
transaction.
5. Future scope
Credit card fraud has exponentially increased in the recent years. Apart from the excessive
use of credit card, one main reason is increase in the online use of credit cards. To reduce the
risk of merchants’ and credit card companies, managing the process in an automatic and
efficient way and building an accurate but easy to manage credit card risk monitoring
system is the key. In this paper, discussion on different parameters and different types of
fraud detection techniques has been done. In future, by using this information, candidate
will develop an improved online transaction fraud detection system. This system will Automated
consider a good trade-off between finding the fraudulent cases and time consuming for fraud detection
identification of fraudulent cases. By using these parameters, researchers may involve a
broad view of implementation and do various more sophisticated implementation of fraud
techniques
detection system towards more intelligence and automatic decision oriented.
References 717
Agarwal, C.C. and Reddy, C.K. (Eds) (2013), Data Clustering: Algorithms and Applications, Chapman
and Hall/CRC, New York, NY.
Agrawal, A., Kumar, S. and Mishra, A.K. (2015), “Implementation of novel approach for credit card
fraud detection”, 2nd International Conference on Computing for Sustainable Global
Development (INDIACom), IEEE, pp. 1-4.
Aleskerov, E., Freisleben, B. and Rao, B. (1997), “Cardwatch: a neural network-based database mining
system for credit card fraud detection”, Proceedings of the IEEE/IAFE Computational
Intelligence for Financial Engineering (CIFEr), pp. 220-226.
Assis, C.A., Pereira, A.C., Pereira, M.A. and Carrano, E.G. (2014), “A genetic programming approach for
fraud detection in electronic transactions”, IEEE Symposium on IEEE Computational Intelligence
in Cyber Security (CICS), pp. 1-8.
Authorize.Net (2012), “Fighting online fraud”, available at: www.authorize.net/content/dam/authorize/
documents/FDS_0504.pdf (accessed 15 November 2016).
Bahnsen, A.C., Aouada, D., Stojanovic, A. and Ottersten, B. (2015), “Detecting credit card fraud using
periodic features”, IEEE 14th International Conference on IEEE Machine Learning and
Applications (ICMLA), pp. 208-213.
Bai, F. and Chen, X. (2013), “Analysis on the new types and countermeasures of credit card fraud in
mainland China”, Journal of Financial Crime, Vol. 20 No. 3, pp. 267-271.
Barker, K.J., D’Amato, J. and Sheridon, P. (2008), “Credit card fraud: awareness and prevention”, Journal
of Financial Crime, Vol. 15 No. 4, pp. 398-410.
Behera, T.K. and Panigrahi, S. (2015), “Credit card fraud detection: a hybrid approach using fuzzy
clustering and neural network”, Second International Conference on IEEE Advances in
Computing and Communication Engineering (ICACCE), pp. 494-499.
Bekirev, A.S., Klimov, V.V., Kuzin, M.V. and Shchukin, B.A. (2015), “Payment card fraud detection
using neural network committee and clustering”, Optical Memory and Neural Networks, Vol. 24
No. 3, pp. 193-200.
Bentley, P.J., Kim, J., Jung, G.H. and Choi, J.U. (2000), “Fuzzy Darwinian detection of credit card fraud”,
The 14th Annual Fall Symposium of the Korean Information Processing Society, 14 October.
Bhatla, T.P., Prabhu, V. and Dua, A. (2003), “Understanding credit card frauds”, Cards Business Review,
Vol. 1 No. 6.
Bhusari, V. and Patil, S. (2011), “Study of hidden Markov model in credit card fraudulent detection”,
International Journal of Computer Applications, Vol. 20 No. 5, pp. 33-36.
Bianchini, M., Maggini, M. and Scarselli, F. (Eds) (2009), Innovations in Neural Information Paradigms
and Applications, Vol. 247, Springer.
Bolton, R.J. and Hand, D.J. (2001), “Unsupervised profiling methods for fraud detection”, Credit Scoring
and Credit Control VII, pp. 235-255.
Braspenning, P.J., Thuijsman, F. and Weijters, A.J.M.M. (1995), Artificial Neural Networks: An
Introduction to ANN Theory and Practice, Springer Science and Business Media, Berlin, Vol. 931.
Brause, R.W., Langsdorf, T.S. and Hepp, H.M. (1999), “Credit card fraud detection by adaptive neural
data mining”, Proceedings of the 11th IEEE International Conference on Tools with Artificial
Intelligence, pp. 103-106.
JFC Cao, B.Y. (Ed.) (2007), Fuzzy Information and Engineering, Springer Science and Business Media,
Berlin.
25,3
Carminati, M., Caron, R., Maggi, F., Epifani, I. and Zanero, S. (2014), “BankSealer: an online banking
fraud analysis and decision support system”, IFIP International Information Security
Conference, Springer Berlin Heidelberg, pp. 380-394.
Carneiro, E.M., Dias, L.A.V., da Cunha, A.M. and Mialaret, L.F.S. (2015), “Cluster analysis and artificial
718 neural networks: a case study in credit card fraud detection”, 12th International Conference on
IEEE Information Technology-New Generations (ITNG), pp. 122-126.
Chen, S.H. (Ed.) (2012), Genetic Algorithms and Genetic Programming in Computational Finance,
Springer Science and Business Media, New York, NY.
Chen, J., Tao, Y., Wang, H. and Chen, T. (2015), “Big data-based fraud risk management at Alibaba”,
The Journal of Finance and Data Science, Vol. 1 No. 1, pp. 1-10.
Correia, I., Fournier, F. and Skarbovsky, I. (2015), “The uncertain case of credit card fraud detection”,
Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems,
pp. 181-192.
CyberSource (2015), “Annual fraud benchmark report: a balancing act”, available at:www.cybersource.
com/content/dam/cybersource/NA_2016_Fraud_Benchmark_Report.pdf (accessed 15 January
2017).
Das, S. (2013), Computational Business Analytics, CRC Press, New York, NY.
Delamaire, L., Abdou, H.A.H. and Pointon, J. (2009), “Credit card fraud and detection techniques: a
review”, Banks and Bank Systems, Vol. 4 No. 2, pp. 57-68.
Dhok, S.S. and Bamnote, G.R. (2012), “Credit card fraud detection using hidden Markov model”,
International Journal of Advanced Research in Computer Science, Vol. 3 No. 3.
Duman, E. and Elikucuk, I. (2013), “Applying migrating birds optimization to credit card fraud
detection”, Pacific-Asia Conference on Knowledge Discovery and Data Mining, Springer Berlin
Heidelberg, pp. 416-427.
Duman, E. and Elikucuk, I. (2013), “Solving credit card fraud detection problem by the new
metaheuristics migrating birds optimization”, International Work-Conference on Artificial
Neural Networks, Springer Berlin Heidelberg, pp. 62-71.
Duman, E. and Ozcelik, M.H. (2011), “Detecting credit card fraud by genetic algorithm and scatter
search”, Expert Systems with Applications, Vol. 38 No. 10, pp. 13057-13063.
Everitt, B.S., Landau, S., Leese, M. and Stahl, D. (2011), Cluster Analysis, John Wiley and Sons. Ltd,
New York, NY.
Financial Fraud Action-UK (2017), “fraud the facts 2016”, available at: www.financialfraudaction.org.
uk/wp-content/uploads/2016/07/Fraud-the-Facts-A5-final.pdf (accessed 5 February 2017).
Ganji, V.R. and Mannem, S.N.P. (2012), “Credit card fraud detection using anti-k nearest neighbor
algorithm”, International Journal on Computer Science and Engineering, Vol. 4 No. 6, p. 1035.
Gen, M. and Cheng, R. (1997), Genetic Algorithms and Engineering Design, John Wily and Sons,
New York, NY.
Goldberg, D.E. (2006), Genetic Algorithms, Pearson Education.
Graupe, D. (2013), Principles of Artificial Neural Networks, World Scientific, Vol. 7.
Halvaiee, N.S. and Akbari, M.K. (2014), “A novel model for credit card fraud detection using artificial
immune systems”, Applied Soft Computing, Vol. 24, pp. 40-49.
Hassoun, M.H. (1995), Fundamentals of Artificial Neural Networks, MIT press, MA.
Khan, A.U.S., Akhtar, N. and Qureshi, M.N. (2014a), “Real-time credit-card fraud detection using artificial
neural network tuned by simulated annealing algorithm”, Proceedings of International Conference
on Recent Trends in Information, Telecommunication and Computing, ITC, pp. 113-121.
Khan, M.Z., Pathan, J.D. and Ahmed, A.H.E. (2014b), “Credit card fraud detection system using hidden Automated
Markov model and K-clustering”, International Journal of Advanced Research in Computer and
Communication Engineering, Vol. 3 No. 2, pp. 5458-5461.
fraud detection
Li, J., Cao, L., Lim, E.P., Zhou, Z.H., Ho, T.B., Cheung, D. and Motoda, H. (2013), Trends and Applications
techniques
in Knowledge Discovery and Data Mining, Springer Berlin Heidelberg.
Oracle Financial Services Software (2014), “Know your customer risk assessment guide”, available at:
https://docs.oracle.com/cd/E41197_01/books/ECM%206.2.2/kyc_rag_2.0_4ed.pdf (accessed 1
January 2017). 719
Özçelik, M.H., Duman, E., Is ik, M. and Çevik, T. (2010), “Improving a credit card fraud detection system
using genetic algorithm”, International Conference on IEEE Networking and Information
Technology (ICNIT), pp. 436-440.
Panigrahi, S., Kundu, A., Sural, S. and Majumdar, A.K. (2009), “Credit card fraud detection: a fusion
approach using Dempster–Shafer theory and Bayesian learning”, Information Fusion, Vol. 10
No. 4, pp. 354-363.
Papadopoulos, A. and Brooks, G. (2011), “The investigation of credit card fraud in Cyprus: reviewing
police effectiveness”, Journal of Financial Crime, Vol. 18 No. 3, pp. 222-234.
Patel, R.D. and Singh, D.K. (2013), “Credit card fraud detection and prevention of fraud
using genetic algorithm”, International Journal of Soft Computing and Engineering, Vol. 2
No. 6.
Philip, N. and Sherly, K.K. (2012), “Credit card fraud detection based on behavior mining”, TIST
International Journal for Science, Technology and Research, Vol. 1, pp. 7-12.
Prakash, A. and Chandrasekar, C. (2012), “A novel hidden Markov model for credit card fraud
detection”, International Journal of Computer Applications, Vol. 59 No. 3.
Prakash, A. and Chandrasekar, C. (2015), “An optimized multiple semi-hidden Markov model for
credit card fraud detection”, Indian Journal of Science and Technology, Vol. 8 No. 2,
pp. 165-171.
Quah, J.T. and Sriganesh, M. (2008), “Real-time credit card fraud detection using computational
intelligence”, Expert Systems with Applications, Vol. 35 No. 4, pp. 1721-1732.
Ramakalyani, K. and Umadevi, D. (2012), “Fraud detection of credit card payment system by
genetic algorithm”, International Journal of Scientific and Engineering Research, Vol. 3
No. 7, pp. 1-6.
Renuga, T.D., Rabiyathul, A.B. and Kamaladevi, M. (2014), “Fraud detection in card not present
transactions based on behavioral pattern”, Journal of Theoretical and Applied Information
Technology, Vol. 61 No. 3.
Sadaaki, M., Hidetomo, I. and Katsuhiro, H. (2008), Algorithms for Fuzzy Clustering: Methods in
c-Means Clustering with Applications, German, Springer.
Sánchez, D., Vila, M.A., Cerda, L. and Serrano, J.M. (2009), “Association rules applied to credit card
fraud detection”, Expert Systems with Applications, Vol. 36 No. 2, pp. 3630-3640.
Singh, P. and Singh, M. (2015), “Fraud detection by monitoring customer behavior and activities”,
International Journal of Computer Applications, Vol. 111 No. 11.
Soltani, N., Akbari, M.K. and Javan, M.S. (2012), “A new user-based model for credit card fraud
detection based on artificial immune system”, 16th CSI International Symposium on IEEE
Artificial Intelligence and Signal Processing (AISP), pp. 029-033.
Van Laarhoven, P.J. and Aarts, E.H. (1987), “Simulated annealing”, Simulated Annealing: Theory and
Applications, Springer Netherlands, pp. 7-15.
Van Vlasselaer, V., Bravo, C., Caelen, O., Eliassi-Rad, T., Akoglu, L., Snoeck, M. and Baesens, B. (2015),
“APATE: a novel approach for automated credit card transaction fraud detection using
network-based extensions”, Decision Support Systems, Vol. 75, pp. 38-48.
JFC VISA (2011), “Global visa card-not present merchant guide to greater fraud control”, available at: www.
fnbtanzania.co.tz/downloads/merchant-services/Global_Visa_Card-Not-Present.pdf (accessed 10
25,3 November 2016).
Zaki, M.J., MeiraJr, W. and Meira, W. (2014), Data Mining and Analysis: Fundamental Concepts and
Algorithms, Cambridge University Press, MA.
Further reading
720
Arthur Williams, D. (2007), “Credit card fraud in Trinidad And Tobago”, Journal of Financial Crime,
Vol. 14 No. 3, pp. 340-359.
Balan, L. and Popescu, M. (2011), “‘Credit card fraud’, the annals of the ‘Stefan cel Mare’ University of
Suceava”, Fascicle of The Faculty of Economics and Public Administration, Vol. 11 No. 1, pp. 81-85.
Kohonen, T. (1998), “The self-organizing map”, Neurocomputing, Vol. 21 Nos 1/3, pp. 1-6.
Mena, J. (2003), Investigative Data Mining for Security and Criminal Detection, Butterworth-Heinemann.
Minelli, M., Chambers, M. and Dhiraj, A. (2012), Big Data, Big Analytics: Emerging Business Intelligence
and Analytic Trends for Today’s Businesses, John Wiley and Sons, NJ.
Mo, H. (Ed.) (2009), Handbook of Research on Artificial Immune Systems and Natural Computing:
Applying Complex Adaptive Technologies: Applying Complex Adaptive Technologies, IGI Global.
Zhang, C. and Zhang, S. (2002), Association Rule Mining: Models and Algorithms, Springer-Verlag,
Berlin.
Corresponding author
Vipin Khattri can be contacted at: vipinkhattri@gmail.com
For instructions on how to order reprints of this article, please visit our website:
www.emeraldgrouppublishing.com/licensing/reprints.htm
Or contact us for further details: permissions@emeraldinsight.com