Machine Learning-Based Real-Time Fraud Detection in Financial Transactions

Authors

  • Manzoor Anwar Mohammed Oracle Applications Developer, Brake Parts Inc., 4400 Prime Pkwy, McHenry, IL–60050, USA
  • Kanaka Rakesh Varma Kothapalli Consultant, Yotta Systems Inc., 281 Franklin Ave Suite 200, Nutley, NJ 07110, USA
  • Rahimoddin Mohammed Lead .Net Developer, Cognitiv, 8100 Old Georgetown RD, Bethesda, MD 20814, USA
  • Prasanna Pasam Developer IV Specialized, Supreme Tech Solutions, Vienna, Virginia, USA 
  • Dipakkumar Kanubhai Sachani Business Analyst, Arth Energy Corporation, Pittsburgh, Pennsylvania, USA
  • Nicholas Richardson Software Engineer, JPMorgan Chase, 10 S Dearborn St, Chicago, IL 60603, USA

Keywords:

Machine Learning, Real-Time Fraud Detection, Financial Transactions, Artificial Intelligence, Fraud Prevention, Risk Management, Transaction Monitoring

Abstract

To enhance the security and integrity of digital commerce, this study explores the application of real-time fraud detection in financial transactions through machine learning. The primary goals encompass investigating the efficacy of machine learning algorithms, pinpointing obstacles related to implementation, and proposing avenues for further research and improvement. The methodology entails a thorough analysis of the body of knowledge, including research studies and publications, emphasizing the concepts, procedures, and uses of machine learning algorithms in fraud detection. Key findings show that machine learning algorithms are effective at identifying fraudulent activity, but there are still issues with data collection, model interpretability, security risks, and regulatory compliance. The policy implications underscore the significance of stakeholder collaboration, accountability, and transparency in tackling new issues and building confidence in fraud detection systems. This study shows how machine learning-based methods may transform financial transaction fraud detection, opening the door to improved security and resilience in the digital economic ecosystem.

Downloads

Download data is not yet available.

References

Bhadane, A., & Mane, S. B. (2017-Feb). State of research on phishing and recent trends of attacks. I-Manager's Journal on Computer Science, 5(4), 14-35. https://doi.org/10.26634/jcom.5.4.14608

D, A. K., & Venugopalan, S. R. (2017/09). INTRUSION DETECTION SYSTEMS: A REVIEW. International Journal of Advanced Research in Computer Science, 8(8), 356-370. https://doi.org/10.26483/ijarcs.v8i8.4703

Das, S., Dey, A., Pal, A., & Roy, N. (2015). Applications of artificial intelligence in machine learning: Review and prospect. International Journal of Computer Applications, 115(9) https://doi.org/10.5120/20182-2402

Kim, A. C., Kim, S., Park, W. H., & Lee, D. H. (2014/01/). Fraud and financial crime detection model using malware forensics. Multimedia Tools and Applications, 68(2), 479-496. https://doi.org/10.1007/s11042-013-1410-3

Rui Pedro, F. M., Dinis Santos, H., M., & Santos, C. (2013). Organizational transactions with real time monitoring and auditing. The Learning Organization, 20(6), 390-405. https://doi.org/10.1108/TLO-09-2013-0048

Seeja, K. R., & Zareapoor, M. (2014). FraudMiner: A novel credit card fraud detection model based on frequent itemset mining. The Scientific World Journal, 2014. https://doi.org/10.1155/2014/252797

Yang, Q., Hu, X., Cheng, Z., Kang, M. (2014). Machine Learning Based Prediction and Prevention of Malicious Inventory Occupied Orders. International Journal of Mobile Computing and Multimedia Communications, 6(4), 56-72. https://doi.org/10.4018/IJMCMC.2014100104

Zareapoor, M., R, S. K., & Alam, M. A. (2012). Analysis on credit card fraud detection techniques: Based on certain design criteria. International Journal of Computer Applications, 52(3) https://doi.org/10.5120/8184-1538

Published

2017-12-31

How to Cite

Mohammed, M. A., Kothapalli, K. R. V., Mohammed, R., Pasam, P., Sachani, D. K., & Richardson, N. (2017). Machine Learning-Based Real-Time Fraud Detection in Financial Transactions. Asian Accounting and Auditing Advancement, 8(1), 67–76. Retrieved from https://4ajournal.com/article/view/93

Most read articles by the same author(s)