Intelligent Algorithms for the Detection of Suspicious Transactions in Payment Data Management Systems Based on LSTM Neural Networks
Abstract
1. Introduction
2. Literature Review on the Identification of Suspicious Transactions Based on Artificial Intelligence Models
3. Methodology
3.1. Characteristics of Unclear Suspicious Transactions
- ➢
 - Unusually large transactions. Transactions that are significantly larger than the customer’s usual spending pattern.
 - ➢
 - Multiple small transactions. A series of small transactions made over a short period of time, transactions that may use hidden parameters to avoid detection limits.
 - ➢
 - Geographic anomalies. Transactions originating from locations where the customer has never conducted business before.
 - ➢
 - High-risk countries. Transactions involving countries known for fraud or money laundering activities.
 - ➢
 - Unusual timing. Transactions made at unusual times for the customer.
 - ➢
 - Sudden changes in transactions. A sudden increase in transaction frequency or volume without a clear explanation.
 - ➢
 - Transactions with unusual characteristics, such as transfers between multiple accounts without any apparent reason.
 
- ➢
 - Data volume and velocity. The sheer volume of transactions processed daily and the speed at which they occur can slow down traditional monitoring systems.
 - ➢
 - False positives. Legitimate transactions can be falsely flagged as suspicious, leading to customer dissatisfaction and unnecessary investigation costs.
 - ➢
 - False negatives. Undetected fraudulent transactions can result in significant financial losses.
 - ➢
 - Evolving fraud tactics. Fraudsters are constantly developing new ways to circumvent detection systems, making the constant update and adaptation of monitoring algorithms a requirement.
 - ➢
 - Data quality. Incomplete, inaccurate, or inconsistent data can hinder the effectiveness of detection systems.
 - ➢
 - Regulatory compliance. Ensuring that detection systems comply with various legal and regulatory requirements can be complex and resource-intensive.
 - ➢
 - Balancing security and customer experience: striking the right balance between reliable fraud detection and a seamless customer experience is critical to maintaining customer trust.
 
3.2. Preparing Initial Data for Intelligent Detection of Unclear Suspicious Transactions
- ➢
 - transaction_id: An identifier for each transaction.
 - ➢
 - user_id: An identifier for each user. This can help track user-specific characteristics.
 - ➢
 - merchant_id: An identifier for each system employee. This can help track the unique characteristics of an employee.
 - ➢
 - transaction_amount: The amount of money involved in the transaction.
 - ➢
 - timestamps. The date and time the transaction occurred. This can be used to analyze the time-based signatures of transactions.
 - ➢
 - payment_method: The method used for the transaction (e.g., credit card, debit card, wire transfer, PayPal). Different methods may have different levels of risk.
 - ➢
 - Location: The geographic location where the transaction occurred. Unusual locations may be suspicious to the user.
 - ➢
 - ip_address: The IP address from which the transaction was made. This can be used to detect anomalies in network activity.
 - ➢
 - is_suspicious: A binary label indicating whether the transaction is suspicious (1) or not (0). This is the target variable for the machine learning model.
 
- Data Cleaning:
 
- 2.
 - Error Correction and Outlier Handling.
 
- 3.
 - Feature Engineering:
 
3.3. Characteristics of Unclear Suspicious Transactions
- ➢
 - Logistic Regression. A simple and effective algorithm that uses linear regression to detect fraud.
 - ➢
 - K-Nearest Neighbors (KNNs). The KNN algorithm classifies transactions based on the dataset to which they are close.
 - ➢
 - Basis Vectorization. A classification algorithm that works on linear and nonlinear data and helps to distinguish suspicious and normal transactions.
 - ➢
 - Decision Trees. This algorithm analyzes transactions and classifies them in a tree structure based on whether they are likely to be suspicious or normal.
 - ➢
 - Random Forest. Used in classification and regression tasks using multiple decision trees as an ensemble. It is effective for fraud detection.
 - ➢
 - Gradient Boosting. A powerful classification method that is also used to detect payment fraud.
 - ➢
 - XGBoost. An updated version of Gradient Boosting, it is a highly efficient algorithm for fraud detection.
 - ➢
 - Recurrent Neural Networks. Used to detect payment sequences, helping to track how fraud manifests itself over time.
 - ➢
 - Naive Bayes. A simple algorithm based on random assumptions, used to detect suspicious transactions.
 - ➢
 - k-Means Clustering. This algorithm is used as a clustering method to detect suspicious transactions, separating them from groups that may appear as anomalies. These algorithms help to strengthen fraud detection in transaction monitoring systems and provide more accurate results. Several algorithms are analyzed in the study.
 
- -
 - Architectures such as DNN, LSTM, and CNN can independently identify complex and hidden features from large amounts of raw data. This saves researchers from the difficulties of the feature engineering stage.
 - -
 - Neural networks are suitable for representing very complex, nonlinear relationships and can “learn” even more difficult dependencies than traditional models.
 - -
 - The ability to combine different large-scale types of data (text, numbers, geo-data, time series) and train in the same format. This provides a comprehensive analysis of suspicious transactions.
 - -
 - Since fraud has changing patterns, neural networks can learn these new patterns over time, adapt, and provide more reliable forecasts.
 
3.4. Identification of Suspicious Transactions Based on a Neural Network Model of Artificial Intelligence
- The weights are initialized with initial values of , , , and bias , .
 - For each training line,
- The input sequence X is passed through the RNN.
 - At each time step, hidden states and outputs are computed.
 - The loss is computed using binary cross-entropy.
 - The loss is propagated back and the weights are updated using gradient descent.
 
 
- -
 - using the above equations, the values of , , , , and are calculated;
 - -
 - the final output value is printed.
 
- Calculate the loss gradient with respect to :
 - To obtain gradients with respect to parameters and , this gradient is fed back through the output layer.
 - For each , the gradients of , , , and and their corresponding , , , and biases are calculated.
 
4. Conclusions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Adekunle, I.M.; Ozoh, P. Fraud detection model for illegitimate transactions. Kabale Univ. Interdiscip. Res. J. 2023, 2, 21–37. [Google Scholar]
 - Ahmed, M.; Mahmood, A.N.; Islam, M.R. A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 2016, 55, 278–288. [Google Scholar] [CrossRef]
 - Janet, B.; Joshua Arul Kumar, R.; Ganesh, D.P.S. Credit Card Fraud Detection with Unbalanced Real and Synthetic Dataset Using Machine Learning Models. In Proceedings of the 2022 International Conference on Electronic Systems and Intelligent Computing (ICESIC), Chennai, India, 22–23 April 2022; pp. 73–78. [Google Scholar] [CrossRef]
 - Rustamovich, A.A.; Mekhriddin, N.; Fayzullo, N.; Sabharwal, M. Intelligent system of labor market regulation based on the evolutionary modeling of employment. In Proceedings of the 2022 4th International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2022, Greater Noida, India, 16–17 December 2022; pp. 2534–2539. [Google Scholar] [CrossRef]
 - Khosravi, S.; Kargari, M.; Teimourpour, B.; Eshghi, A.; Aliabdi, A. Using Supervised Machine Learning Approaches to Detect Fraud in the Banking Transaction Network. In Proceedings of the 2023 9th International Conference on Web Research (ICWR), Tehran, Iran, 3–4 May 2023; pp. 115–119. [Google Scholar] [CrossRef]
 - Rashidov, A.; Akhatov, A.; Nazarov, F. The Same Size Distribution of Data Based on Unsupervised Clustering Algorithms. In Advances in Artificial Systems for Logistics Engineering III; Lecture Notes on Data Engineering and Communications Technologies; Springer: Cham, Germany, 2023; Volume 180. [Google Scholar]
 - Al-Momani, A.; Aljawarneh, S.A. Fraudulent Transactions Prediction Using Deep Neural Network. In Proceedings of the 2022 International Conference on Engineering & MIS (ICEMIS), Istanbul, Turkey, 4–6 July 2022; pp. 1–7. [Google Scholar] [CrossRef]
 - Kute, D.V.; Pradhan, B.; Shukla, N.; Alamri, A. Deep Learning and Explainable Artificial Intelligence Techniques Applied for Detecting Money Laundering–A Critical Review. IEEE Access 2021, 9, 82300–82317. [Google Scholar] [CrossRef]
 - Duffield, E.; Schinzel, H.; Gutierrez, F. Transaction Locking and Masternode Consensus: A Mechanism for mitigating Double Spending Attacks. CryptoPapers.info 2014, 1–14. Available online: https://www.allcryptowhitepapers.com/wp-content/uploads/2022/10/Dash-Instanttx-.pdf (accessed on 20 October 2025).
 - Baesens, B.; Höppner, S.; Verdonck, T. Data engineering for fraud detection. Decis. Support Syst. 2021, 150, 113492. [Google Scholar] [CrossRef]
 - Ghosh, S.; Bilgaiyan, S.; Gourisaria, M.K.; Sharma, A. Comparative Analysis of Applications of Machine Learning in Credit Card Fraud Detection. In Proceedings of the 2023 6th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 3–4 March 2023; pp. 1–7. [Google Scholar] [CrossRef]
 - Mamatov, N.; Ibrokhimov, S.; Samijonov, A. Artificial neural networks in the creation of systems for monitoring and evaluating the quality of knowledge. In Scientific Trends and Trends in the Context of Globalization, Proceedings of the 7th ISPC, Umeå, Sweden, 19–20 April 2024. No. 44(197). Available online: https://archive.interconf.center/index.php/2709-4685/article/view/5968 (accessed on 20 October 2025). [CrossRef]
 - Makhmadiyarovich, N.F.; Sherzodjon, Y. Development of algorithms for predictive evaluation of investment projects based on machine learning. In Artificial Intelligence, Blockchain, Computing and Security; CRC Press: Boca Raton, FL, USA, 2023; Volume 2, pp. 681–685. ISBN 9781032684994. [Google Scholar]
 - Nazarov, F.M.; Shokir o’g’li, Y.S.; Sherali o’g’li, E.B. Algorithms to Increase Data Reliability in Video Transcription. In Proceedings of the 2022 IEEE 16th International Conference on Application of Information and Communication Technologies (AICT), Washington, DC, USA, 12–14 October 2022; pp. 1–6. [Google Scholar] [CrossRef]
 - Liu, X.; Zhang, P. A Scan Statistics Based Suspicious Transactions Detection Model for Anti-money Laundering (AML) in Financial Institutions. In Proceedings of the 2010 International Conference on Multimedia Communications, Hong Kong, China, 7–8 August 2010; pp. 210–213. [Google Scholar] [CrossRef]
 - Ridwan, R.; Abdullah, S.; Yusmita, F. Implementation of Cashless Policy Strategies to Minimize Fraud in the Governmentsector: Systemic Review. J. Akunt. 2022, 12, 181–201. [Google Scholar]
 - Rose, J.D.; Nelson, S.C.; Hanumat Sastry, G.; Nivasan, D.; Bansal, R. Credit Card Fraud Legal Advisor Tool Using Machine Learning. In Proceedings of the 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon), Mysuru, India, 16–17 October 2022; pp. 1–5. [Google Scholar] [CrossRef]
 - Dablain, D.; Krawczyk, B.; Chawla, N.V. DeepSMOTE: Fusing deep learning and SMOTE for imbalanced data. IEEE Trans. Neural Netw. Learn.-Syst. 2022, 34, 6390–6404. [Google Scholar] [CrossRef] [PubMed]
 - Dileep, M.R.; Navaneeth, A.V.; Abhishek, M. A novel approach for credit card fraud detection using decision tree and random forest algorithms. In Proceedings of the 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), Tirunelveli, India, 4–6 February 2021; pp. 1025–1028. [Google Scholar]
 - Nazarov, F.M.; Yarmatov, S.; Xamidov, M. Machine Learning Price Prediction on Green Building Prices. In Proceedings of the 2024 International Russian Smart Industry Conference, Sochi, Russian Federation, 25–29 March 2024. [Google Scholar]
 - Muhamediyeva, D.T.; Safarova, L.U. Intelligent technologies in the electric power industry. AIP Conf. Proc. 2024, 3154, 020041. [Google Scholar] [CrossRef]
 - Mytnyk, B.; Tkachyk, O.; Shakhovska, N.; Fedushko, S.; Syerov, Y. Application of Artificial Intelligence for Fraudulent Banking Operations Recognition. Big Data Cogn.-Comput. 2023, 7, 93. [Google Scholar] [CrossRef]
 - Rastogi, S.; Sharma, A.; Panse, C.; Bhimavarapu, V.M. Unified Payment Interface (UPI): A digital innovation and its impact on financial inclusion and economic development. Univers. J. Account. Financ. 2021, 9, 518–530. [Google Scholar] [CrossRef]
 - Makhmudov, F.; Turimov, D.; Xamidov, M.; Nazarov, F.; Cho, Y.I. Real-time fatigue detection algorithms using machine learning for yawning and eye state. Sensors 2024, 24, 7810. [Google Scholar] [CrossRef] [PubMed]
 - Pundir, K.; Kaur, N.; Kumar, A.; Kumar, N.; Das, C. Detect Legitimate and Illicit Transactions Using Machine Learning. In Proceedings of the 2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE), Gautam Buddha Nagar, India, 9–11 May 2024; pp. 418–423. [Google Scholar] [CrossRef]
 - Kshemkalyani, A.D.; Singhal, M. Distributed Computing: Principles, Algorithms, and Systems; Cambridge University Press: New York, NY, USA, 2008; Volume 756. [Google Scholar]
 - Balobid, A.M.; Binamro, J.S.; Yohannes, S.T.; Kaddoura, S. Evaluation of Supervised Machine Learning Approaches for Credit Card Fraud Detection. In Proceedings of the 2022 14th Annual Undergraduate Research Conference on Applied Computing (URC), Dubai, United Arab Emirates, 23–24 November 2022; pp. 1–6. [Google Scholar] [CrossRef]
 






| № | Machine Learning Algorithm | Methods for Evaluating an Algorithm (%) | |||
|---|---|---|---|---|---|
| Accuracy | Precision | Recall | F1-Score | ||
| 1 | SVM | 93.75 | 88 | 93 | 90 | 
| 2 | Logistic Regression | 89 | 88 | 89 | 88 | 
| 3 | KNN | 85.65 | 84 | 86 | 85 | 
| 4 | XGBoost | 91.65 | 88 | 95 | 91 | 
| 5 | Random Forest | 90.6 | 88 | 92 | 90 | 
| LSTM algorithm | Parameters | Evaluation Methods | |||
| Accuracy | Precision | Recall | F1-Score | ||
| Epochs = 30 | 93% | 89% | 95% | 92% | |
| Batch size = 32 | |||||
| Activation function—sigmoid | |||||
| Hybrid Method (LSTM + AKA) | Accuracy | Precision | Recall | F1-Score, | 
|---|---|---|---|---|
| 95% | 92% | 97% | 94% | |
| Parameters | Epochs = 5 when the bat size = 32  | n_bees = 10 n_iterations = 50  | Akvitatsiya-sigmoid | 
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.  | 
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mukhamadiyev, A.; Nazarov, F.; Yarmatov, S.; Cho, J. Intelligent Algorithms for the Detection of Suspicious Transactions in Payment Data Management Systems Based on LSTM Neural Networks. Sensors 2025, 25, 6683. https://doi.org/10.3390/s25216683
Mukhamadiyev A, Nazarov F, Yarmatov S, Cho J. Intelligent Algorithms for the Detection of Suspicious Transactions in Payment Data Management Systems Based on LSTM Neural Networks. Sensors. 2025; 25(21):6683. https://doi.org/10.3390/s25216683
Chicago/Turabian StyleMukhamadiyev, Abdinabi, Fayzullo Nazarov, Sherzod Yarmatov, and Jinsoo Cho. 2025. "Intelligent Algorithms for the Detection of Suspicious Transactions in Payment Data Management Systems Based on LSTM Neural Networks" Sensors 25, no. 21: 6683. https://doi.org/10.3390/s25216683
APA StyleMukhamadiyev, A., Nazarov, F., Yarmatov, S., & Cho, J. (2025). Intelligent Algorithms for the Detection of Suspicious Transactions in Payment Data Management Systems Based on LSTM Neural Networks. Sensors, 25(21), 6683. https://doi.org/10.3390/s25216683
        
