Next Article in Journal
Recognizing Similar Musical Instruments with YOLO Models
Next Article in Special Issue
Intelligent Method for Classifying the Level of Anthropogenic Disasters
Previous Article in Journal
An Improved Pattern Sequence-Based Energy Load Forecast Algorithm Based on Self-Organizing Maps and Artificial Neural Networks
Previous Article in Special Issue
Two-Stage PNN–SVM Ensemble for Higher Education Admission Prediction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Application of Artificial Intelligence for Fraudulent Banking Operations Recognition

1
Department of Artificial Intelligence Systems, Lviv Polytechnic National University, 79000 Lviv, Ukraine
2
Social Communication and Information Activity Department, Lviv Polytechnic National University, 79000 Lviv, Ukraine
3
Department of Information Systems, Faculty of Management, Comenius University in Bratislava, 820 05 Bratislava, Slovakia
*
Author to whom correspondence should be addressed.
Big Data Cogn. Comput. 2023, 7(2), 93; https://doi.org/10.3390/bdcc7020093
Submission received: 13 February 2023 / Revised: 27 April 2023 / Accepted: 6 May 2023 / Published: 10 May 2023
(This article belongs to the Special Issue Quality and Security of Critical Infrastructure Systems)

Abstract

:
This study considers the task of applying artificial intelligence to recognize bank fraud. In recent years, due to the COVID-19 pandemic, bank fraud has become even more common due to the massive transition of many operations to online platforms and the creation of many charitable funds that criminals can use to deceive users. The present work focuses on machine learning algorithms as a tool well suited for analyzing and recognizing online banking transactions. The study’s scientific novelty is the development of machine learning models for identifying fraudulent banking transactions and techniques for preprocessing bank data for further comparison and selection of the best results. This paper also details various methods for improving detection accuracy, i.e., handling highly imbalanced datasets, feature transformation, and feature engineering. The proposed model, which is based on an artificial neural network, effectively improves the accuracy of fraudulent transaction detection. The results of the different algorithms are visualized, and the logistic regression algorithm performs the best, with an output AUC value of approximately 0.946. The stacked generalization shows a better AUC of 0.954. The recognition of banking fraud using artificial intelligence algorithms is a topical issue in our digital society.

1. Introduction

The development of artificial intelligence for recognizing fraudulent banking operations has received significant attention in recent years. This is due to the growing number of fraudulent activities in the banking industry, which have resulted in significant financial losses for banks and their customers. AI-based systems have the potential to effectively identify and prevent fraudulent activities in real time, providing a significant advantage over traditional fraud detection methods.
Detecting fraudulent banking operations involves using AI and machine learning algorithms to analyze large amounts of data from multiple sources, including transaction records, customer information, and network logs. These algorithms can identify patterns and anomalies in the data that may indicate fraudulent activities, such as unauthorized access, unusual transaction patterns, and suspicious behavior.
A bank transaction involves any activity related to a bank account, which can be carried out online or offline between all parties involved. The process concludes when a written or electronic order is submitted to the bank, using internet banking systems, communication systems, or payment instruments [1]. Bank transactions fall into two categories: genuine and fraudulent transactions. The latter refers to those that violate financial circulation rules or were not authorized. Common types of banking fraud include wire fraud, identity theft, account takeover, money laundering, and accounting fraud.
As fraud becomes increasingly sophisticated, we must develop new methods to protect ourselves against it. Below are the five most common methods of preventing bank fraud: artificial intelligence, biometric data, consortium data, standardization of high technologies, and machine learning [2]. Following the outbreak of the COVID-19 pandemic and the war in Ukraine, fraudulent operations related to bank transactions have become even more common due to the significant shift toward online transactions as well as the creation of numerous charitable funds that criminals use to deceive users. Therefore, it is necessary to create reliable automated algorithms to recognize and prevent operations that threaten the finances and accounts of individuals, violate taxation or financing rules or laws, and so on. The presented study focused on machine learning algorithms as a tool well suited for analyzing and recognizing online banking transactions. This study aimed to develop machine learning models that recognize fraudulent banking transactions, especially during the COVID-19 pandemic and war in Ukraine when online transactions and charitable funds have become more prevalent.
Our project focused on using machine learning models to identify fraudulent banking transactions. We also applied preprocessing techniques to compare and select the most effective outcomes from bank data. To accomplish our goals, we took the following steps:
-
Developed several machine learning models using various methodologies and strategies.
-
Compared and assessed the models from the previous stage using both quantitative and visual criteria.
-
Analyzed the results obtained and drew a conclusion about the research objective.
This study focused on using machine learning models to detect fraudulent banking transactions. The research aimed to develop algorithms that can accurately recognize such transactions. The methods used included preprocessing techniques and machine learning algorithms. The significance of this work lies in the potential of the proposed method to improve the detection of fraudulent banking transactions, especially during the pandemic when many transactions have shifted online and during times of war when there are many charities and events collecting money.
The task of recognizing fraudulent bank transactions using machine learning involves identifying a particular transaction at a specific moment in time as either real or fraudulent based on previous historical data about other transactions. This process uses binary logic, where the transaction is either real or fraudulent, and classification algorithms are suitable for performing the task using machine learning methods. This paper proposes applying several classification algorithms that recognize the type of transaction based on certain features, along with preprocessing techniques.
In order to effectively identify fraudulent transactions, the machine learning algorithm must have access to a comprehensive historical database of such activities. The existing collection of legitimate transactions that have yet to be flagged is encrypted to maintain the confidentiality and privacy of the financial institution’s clientele. However, this encryption does not hinder the algorithm’s ability to perform. Financial institutions can effectively detect and prevent fraudulent transactions by training models using this carefully selected dataset.
Implementing AI technology in detecting fraudulent banking operations poses several challenges, including the utilized algorithms’ lack of transparency and interpretability. The intricacies of these algorithms can sometimes be challenging to comprehend, which can impede the identification and rectification of errors. Furthermore, using AI in fraud detection raises essential concerns regarding privacy, as personal data are subject to analysis and utilization in the decision-making process. These challenges require careful consideration to ensure AI-powered fraud detection systems’ safe and accurate implementation.
The application development based on AI for fraudulent banking operations recognition is an active area of research and development, with significant potential to improve the efficiency and accuracy of fraud detection. However, addressing the challenges and concerns associated with using AI in fraud detection is essential to ensure its effectiveness and ethical use in the banking industry.
Limitation of studies in the financial field. Studies using artificial intelligence to detect bank fraud are valuable. However, it is important to note that this study focuses on identifying fraudulent transactions in online banking only, while other types of financial fraud may require different detection methods. Additionally, the study’s reliability and generalizability may be affected by its limited sample size in the financial field. Data availability is also a crucial factor, as high-quality data re needed to train and test machine learning algorithms. The accuracy of the model can be compromised by incomplete and insufficiently diverse datasets, leading to false positives in real-world situations. Another challenge is the potential for human biases in the selection and analysis of data, which can impact the method’s validity and reliability. It is also important to avoid overfitting, where the model performs well on the training dataset but poorly on the test dataset due to its complexity and limited generalizability.

2. Related Works

Bank fraud is stealing money or assets from a bank, financial institution, or bank depositors. Generally, bank fraud includes any act intended to defraud a financial institution. This may involve obtaining assets, loans, money, securities, or property of a financial institution due to false statements or false information. The law broadly defines bank fraud, and several aspects of this crime must be considered [3]. As mentioned earlier, there are many ways to recognize fraudulent operations. This study considered, analyzed, and compared the application of machine learning algorithms that automatically find dependencies or conclusions based on a previous historical data set. Therefore, with the help of a set of historical bank transactions, it is possible to make assumptions about a specific transaction at a given moment.
Bank fraud is a phenomenon that includes any intentional actions aimed at deceiving a financial institution or an individual. Many methods recognize such operations, but this work used machine learning methods with data preprocessing techniques.
To determine the framework of the investigations in the fraudulent banking field, we analyzed the 3111 related documents in Scopus [4] (see Figure 1).
We used VOSviewer software (Centre for Science and Technology Studies, Leiden University, Leiden, The Netherlands) to create a map (Figure 2) to analyze the scientific research done in the fraudulent banking field. The map is based on the statistics of the average number of publications in Scopus each year and the analysis of 348 Scopus documents. The map has 827 items, 3 clusters, 94,199 links, and a total link strength of 263,429.
The map (Figure 2) shows that fraudulent banking practices have become a significant concern for financial institutions and regulatory bodies worldwide. These practices involve deliberate attempts by individuals or organizations to deceive banks, financial institutions, or their customers for financial gain. Fraudulent activities in banking can take various forms, such as phishing scams, identity theft, money laundering, and account takeover fraud.
Fraudulent banking practices such as phishing scams and identity theft are unfortunately common. Phishing scams involve deceiving customers through fraudulent emails, text messages, or phone calls to obtain their personal and financial information. Perpetrators often use sophisticated techniques such as creating fake websites that appear legitimate to trick customers. Identity theft occurs when someone’s personal information is stolen and used for fraudulent transactions or obtaining credit. The effects of identity theft can be long-lasting, causing significant financial and emotional damage that may take months or even years from which to recover.
Money laundering is another fraudulent banking practice involving concealing the origin and ownership of illegally obtained funds. This practice is often associated with organized crime and can have profound implications for financial institutions that are found to have facilitated the laundering of illicit funds.
Account takeover fraud is a fraudulent banking practice when a criminal gains unauthorized access to a customer’s bank account. This can be achieved by stealing the customer’s login credentials or exploiting vulnerabilities in the bank’s security systems. Once the criminal gains access to the account, they can make fraudulent transactions or steal funds.
Financial institutions and regulatory bodies have taken steps to prevent fraudulent banking practices. These include advanced fraud detection technologies, enhanced customer verification procedures, and increased regulatory oversight. As fraudulent activities are always changing, it is important for these bodies to remain alert and adaptable to continue combating fraudulent banking practices.
Fraudulent banking practices pose a serious threat to the stability and integrity of the financial system. Financial institutions and regulatory bodies must work together to develop effective strategies and measures to prevent and detect fraudulent activities. Only through a coordinated and proactive approach can the financial system be protected from the harmful effects of fraudulent banking practices.
The fraudulent banking approach and threats are shown in Table 1.
Some approaches may involve a combination of tactics. Banking clients need to stay vigilant and protect themselves from fraud, such as regularly monitoring their accounts and avoiding clicking on suspicious links or downloading unknown software.
A study [13] proposed a mechanism for detecting credit card fraud based on machine learning, which uses a genetic algorithm to select features. After selecting the best features, the following classifiers are used: random forest, artificial neural network, decision tree, logistic regression, and naïve Bayesian network. The efficacy of this approach, which relies on data from European cardholders, surpasses that of existing methods, according to this study. Furthermore, it is notable for its similarity to another method that emphasizes the significance of preprocessing algorithms. It is worth mentioning that the method exclusively employs the genetic algorithm as its preprocessing algorithm.
Some researchers [14] aimed to develop an unbiased, reliable, and easy-to-use methodology for automatically assessing card fraud risk. Thus, a new methodology was proposed that uses algorithms that quantify information about variables and their relationships. The authors also used a state-of-the-art recurrent filters set to minimize the training data bias, i.e., a filter for repeated features and a filter for the most informative features. Subsequently, the outcomes were categorized by applying machine learning techniques, including linear discriminant analysis, support vector machine, gradient boosting, and linear regression. The identified models were applied to synthetic and real databases. As a result, 76% accuracy was obtained, which is a relatively good number for such a task but not the best. Nevertheless, a considerable advantage of this method is its proposed new methodologies for data preprocessing.
A paper [15] proposes the use of a multilayer perceptron to improve the accuracy of the credit card fraud detection process. This study measured the method’s effectiveness based on accuracy, specificity, precision, sensitivity, root mean squared error, area under the curve, and F-measure. The experimental outcomes demonstrated that the suggested model, which employs an artificial neural network, showed significantly enhanced precision in identifying fraudulent transactions. The advantage of this study is the large number of different evaluation measures, which allow the readers to more broadly consider the effectiveness of the shown solution.
Another methodology [16] centers on differentiating fraudulent credit cards from fraudulent transactions. The concept of the suggested model is user segmentation, which partitions users into new and old categories; subsequently, CatBoost and a deep neural network are applied to separate categories correspondingly. This study also elaborates on multiple techniques to enhance the precision of detection, namely managing imbalanced datasets, transforming features, and engineering features. The experimental results showed that the AUC was 0.97 for CatBoost and 0.84 for the deep neural network. The advantage of the method is a nonstandard approach to the problem, which focuses on users rather than transactions and, as a result, achieves good accuracy.
An article [17] proposes a method to detect credit card fraud using a combination of an ensemble neural network classifier and a hybrid data resampling technique. The ensemble classifier uses a long short-term memory (LSTM) neural network and the AdaBoost algorithm. The study evaluated the effectiveness of this approach by comparing it with other machine learning algorithms. The results showed that the classifiers performed better when trained with repeatedly sampled data. LSTM ensemble performed better than other algorithms, achieving a sensitivity and specificity of 0.996 and 0.998, respectively. The method’s high accuracy is a notable advantage. In a study [18], several machine learning algorithms, such as logistic regression, support vector machine, neural networks, and random forest, were employed to train a machine learning model based on a given dataset. The authors conducted a comparative study of these algorithms’ accuracy and other performance metrics. The study concluded that the artificial neural network performed the best, obtaining an F1 score of 0.91. This work is also noteworthy for its relevance to the current problem.
Machine learning techniques for automated credit card fraud detection generally do not account for fraud sequences or behavioral changes that may result in false alarms. Thus, authors [19] proposed a detection system for credit card fraud that uses LSTM networks, utilizing a learning system to incorporate transaction sequences. The suggested method aims to capture historical credit card purchasing behavior to enhance fraud detection accuracy for incoming transactions. The experimental outcomes showed that the suggested model yields robust results, and its accuracy is relatively high. A significant advantage of this method is its focus on predicting fraudulent transactions and minimizing false positives, a factor rarely addressed in the existing literature on this subject.
In reference [20], a study was conducted to detect credit card fraud using machine and deep learning methods in the healthcare sector. These algorithms include naïve Bayes, sequential convolutional neural network, KNN, logistic regression, and random forest. The accuracy rates of each algorithm were as follows: naive Bayes, 96.1%; logistic regression, 94.8%; KNN, 95.89%; random forest, 97.58%; and convolutional neural network, 92.3%. However, the overall comparative analysis revealed that the KNN algorithm outperformed the other approaches, which was somewhat unexpected given the convolutional neural network and random forest in the algorithm list.
A paper [21] proposes a framework to handle metrics for strings. The framework was applied to generalize the edit distance metric. The scientists investigated the computational properties and solution algorithms for the multiparameterized edit distance, performed experiments for its evaluation, and discussed the possible applications of the multiparameterized edit distance and other generalized metrics in various scenarios.
A study [22] monitored air quality using IoT devices. The study proposed a mixed edge-based and cloud-based framework for PM2.5 value prediction and evaluated the framework’s quality using a real-world dataset. The proposed preprocessing technique showed an average upgrading of 40.18% in prediction accuracy on the mean absolute percentage error (MAPE).
The literature shows that detecting fraudulent financial transactions using artificial intelligence is an important topic. A study [23] highlights the importance of secure collaborative information systems in organizations and how AI, deep learning, and blockchain technologies are being used to secure these systems. The paper presents a model for detecting fraud and authenticating users. The logistic regression technique was used to create a regression model for participant authentication.
A paper [24] proposes a quality, experience-based web platform to improve bank client satisfaction and offer quality service. The platform allows customers to enter complaints and information to analyze an employee’s performance and behavior with customers.
A paper [25] discusses the increase in credit card fraud transactions and the need for banks and credit card businesses to classify fraudulent transactions to protect customers. The study used machine learning approaches to detect credit card fraud. The Random Oversampling technique yielded the best results with a precision and accuracy score of 0.99. The researchers proposed the implementation of data sampling methods as means of balancing data for optimization of the performance of the model in effectively classifying fraudulent activities.
In an article [26], the use of data science and machine learning was explored to detect credit card fraud. The project focused on creating an AI system that can detect fraud even in imbalanced datasets. To achieve this, the team emphasized the importance of feature engineering and dataset modification. They also acknowledged the challenge of adapting the system to real-time situations, given the high volume of credit card transactions. The article provides details on the evaluation metrics and machine learning techniques used to differentiate between each analysis.
A study [27] investigated the factors affecting the bank’s intention to adopt internet banking using the technology model. The study identified the factors that exhibited statistical significance in predicting bank clients’ probability of adopting banking systems.
Investigators [28] discussed the increase in cyberattacks on financial institutions and the need for better modeling techniques to mitigate them. Financial sector cyberattack modeling was carried out using the Bayesian attack network modeling technique, which utilizes phishing emails and exposures to obtain conditional probabilities for the modeling process. The method employs the generation of probability density curves for countless attack structures and exploits the degree of exploitability to mitigate attacks.
Another study [29] used a questionnaire to collect data from bank employees in different positions. According to the findings, the management level of knowledge implementation was moderate regarding knowledge creation and acquisition, with a score of 68%. On the other hand, it was high in the storage of knowledge (74%), application (77%), and sharing (76%).
Many authors have attempted to compare different machine learning algorithms for this purpose but have taken different approaches to the problem, demonstrating the importance of this topic and its practical application in the banking industry.

3. Materials and Methods

To meet the goals outlined in this study, we employed classification algorithms. These algorithms use features to determine the class of a given object. Machine learning relies on labeled training data to categorize new observations. To make accurate predictions for future observations, these algorithms must first analyze a dataset of examples with features and corresponding classes. They are considered supervised learning techniques because they map input variables (x) to discrete output functions (y) that represent categories rather than numerical values.
The output of classification algorithms is not continuous but discrete. The classification algorithm learns from labeled input data, where input data have a corresponding output. The goal of classification algorithms is to limit the category of a given dataset, and they are widely used to predict the output for categorical data [30].
From the information provided in the previous paragraph, it is clear that training any classification model requires a data set that shows the relationship between certain feature sets of an object and its class or category. This is why, to fit our classification model to the given task, we chose to use the dataset named Credit Card Fraud Detection obtained from the Kaggle platform [31]. The platform provides the ROC graph curve and AUC metric for each algorithm and technique. A similar set of metrics is provided for other implementations as well. It is also easy to run the program using the Kaggle platform (which was used to create this software solution), which, by default, supports running Jupyter notebooks.
To start, the “Run all” was pressed button to continue the sequential execution of all commands. An alternative solution is using any software that supports Jupyter notebooks. The concrete program implementation as saved as a notebook on the Kaggle platform and started by loading a dataset using the Pandas library.
The research workflow was organized as given in Figure 3. Figure 3 represents the stages of a high-level algorithm for a machine learning program solution, which includes dataset selection and loading, feature standardization, random undersampling, model fitting, model testing, and outputting the best model”.
  • Selecting the dataset using Kaggle datasets.
  • Loading the dataset into the program (using a library such as pandas or NumPy to load the dataset into the program).
  • Splitting the dataset into training and testing sets (using a library such as scikit-learn).
  • Standardizing the features in the training and testing sets using a standard scaler.
  • Imbalanced learning to randomly undersample the majority class in the training set to balance the class distribution.
  • Selecting a set of candidate models to evaluate.
  • For each model, fitting the model to the training data using hyperparameter tuning (using a library such as scikit-learn), which involves using cross-validation to find the best hyperparameters for each model.
  • Using a library such as scikit-learn to evaluate each model on the testing data using an appropriate evaluation metric.
  • Recording each model’s evaluation metric and hyperparameters for comparison.
  • Selecting the model with the best evaluation metric on the testing data.
  • Outputting the best model and its hyperparameters and evaluation metric for further use in production or research.
This algorithm provides a framework for building a machine learning program solution that includes dataset loading, feature standardization, random undersampling, model fitting, model testing, and outputting the best model. The presented method uses several mathematical elements:
  • Machine learning algorithms,
  • Evaluation metrics,
  • Data preprocessing technique.

3.1. Machine Learning Algorithms

The machine learning algorithms chosen to be used here were (1) random forest, (2) k-nearest neighbors, (3) logistic regression, (4) stochastic gradient descent classifier, (5) decision tree, (6) naïve Bayes, and (7) support vector machine.
Decision tree. In machine learning, a decision tree is a tree structure that shares similarities with a flowchart. Each internal node of the tree represents an attribute check, while each branch corresponds to the outcome of the check. Finally, every end node, or final node, contains a class label. The initial set is divided into subsets to train the decision tree based on checking the attribute’s value. The described process is recursive partitioning, repeated recursively for each derived subset. The recursion split ends in case of partitioning are no longer beneficial for predictions. Classification based on decision tree methods does not require knowledge of the domain or parameter tuning, making it an excellent choice for exploring knowledge.
Furthermore, decision trees handle large amounts of data and typically provide high accuracy. Decision tree induction is a standard inductive approach for learning classification data. To classify instances, decision trees [32] sort them through the tree, starting at the root and ending at a leaf node that classifies the instance.
Random Forest. Specialists have used random forest methods for classification and regression tasks. This machine-learning-based algorithm is based on a flexible and user-friendly algorithm consisting of decision trees. The strength of the forest increases with the number of trees. The algorithm creates decision trees using randomly selected data samples, obtains predictions from each tree, and selects the best solution by voting.
Additionally, it indicates feature importance. The algorithm works in the following steps: (1) selecting random samples, (2) building a decision tree, (3) voting, and (4) selecting the prediction result as the final prediction [33].
Logistic regression is a commonly used statistical model for classification and predictive analytics, estimating the probability of an event based on a given set of independent variables [34]. Logistic regression transforms the odds using a logit transformation, the logarithm of the odds, or the natural logarithm of the odds.
Support vector machine (SVM) is a supervised learning algorithm for classification tasks and regression assignments [35]. SVM creates a decision boundary, or hyperplane, that divides n-dimensional space into classes. The hyperplane is created by selecting extreme points, or support vectors, that help define the boundary.
K-nearest neighbors (KNN) is a supervised learning nonparametric classifier. This classifier utilizes proximity to classify or predict the grouping of an individual data point. KNN is commonly used as a classification algorithm and assigns a class label based on the majority vote of nearby data points. For classification tasks with multiple classes, the class label is assigned with more than 25% of the vote rather than a strict majority of over 50% [36].
The stochastic gradient descent (SGD) classifier is an approach that is straightforward and remarkably efficient in adapting linear classifiers and regressors to convex loss functions, including logistic regression and support vector machine. However, SGD has recently received substantial attention in the realm of large-scale learning. This is due to the success of SGD in tackling vast and sparse machine-learning challenges commonly encountered in natural language processing and text classification. Due to the sparsity of the data, the classifiers developed using SGD have rapidly expanded to deal with problems with over 105 training examples and over 105 features [37].
The naïve Bayes classifier is a probabilistic machine learning model for classification tasks. The classifier’s foundation is based on Bayes’ theorem. The naïve Bayes classifier assumes that all predictors or features are independent, meaning that the presence of one feature does not affect the other [38]. The Bayes formula is represented as the following equation:
P ( A | B ) = P ( B | A ) P ( A ) P ( B ) ,
where P(A) is the event A probability, P(B) is the event B probability, and P(B|A) is the probability of event B occurring when event A occurs.
In probability theory, the probability of an event A occurring is denoted by P(A), while the probability of event B occurring is denoted by P(B). Furthermore, the conditional probability of event B happening certainly that event A has happened is represented as P(B|A).

3.2. Stacked Generalization of Machine Learning Models

Stacked generalization is a widely used method that integrates multiple low-level models to improve the overall predictive accuracy of a high-level model. This technique is based on estimating the biases of the high-level model concerning a given learning dataset. The estimation process involves generalizing the biases in a second space, using the original models’ predictions as inputs and the correct answers as outputs. Stacked generalization [39] is considered an enhanced version of cross-validation, aggregating individual models into a higher-level model. Recently, a new method for grouping machine learning models based on random forest as a meta-algorithm has been developed, and its mathematical formulation is presented below.
Randomly generate the following from the original dataset K cross-sectional data sets:
a 1 1 , , a B 1 , a 1 2 , , a B 2 , , a 1 K , , a B K ,
where K is the number of subsets, B is the size of the subset, and a b l is the observation of the lth sample.
The task is to train K-independent weak classifiers
f 1 ( . ) , , f k ( . )
Furthermore, combine the learning results using metamodel m:
res = m ( f 1 ( . ) × f 2 ( . ) × × f k ( . ) )
where f i ( . ) × f j ( . ) is the result of the pairwise multiplication of weak classifiers.
The transformed features are combined with the training dataset in the metamodel to improve model generalizability and prevent the correlation of weak classifiers’ results. However, the stacking model has a significant drawback: the meta-attributes for the training and testing sets differ. The meta-attribute in the training set is not the response of a specific classifier; it comprises responses from various classifiers with different types of dependence. On the other hand, the meta-attribute in the testing set is the answer to a completely different classifier configured for complete learning. The meta-attribute may have few unique values in classical stacking, but many do not overlap between the training and testing sets.

3.3. Metrics for Model Assessment

We employed the receiver operating characteristic (ROC) curve and the area under the curve (AUC) to evaluate the efficiency of the models suggested in this article. The ROC curve is a graphical representation of a classification model’s accuracy for all classification thresholds. This curve is plotted using the true positive rate ( T P R ) and false positive rate ( F P R ). T P R is the recall measure defined as the ratio of true positives to the sum of true positives and false negatives.
T P R = T P T P + F N ,
where T P is true positive model labels; F N is false negative model labels.
In model evaluation, T P refers to the number of positive instances correctly identified by the model, while F N represents the number of positive instances incorrectly classified as negative by the model.
The F P R is a measure employed in assessing model performance, which quantifies the proportion of negative instances incorrectly classified as positive by the model concerning the total number of negative instances that include both the truly negative samples and the ones misclassified as positive. The F P R is defined as follows:
F P R = F P F P + T N ,
where T P is true positive model labels; F N is false negative model labels.
In the context of model evaluation, T P , which represents the true positive model labels, is the count of positive instances correctly identified by the model. F N , which stands for false negative model labels, indicates numerous positive instances incorrectly classified as negative by the model.
The ROC curve plots the relationship between the T P R and the F P R at varying classification thresholds. By reducing the classification threshold, more items are classified as positive, increasing numerous true and false positives. A standard ROC curve is commonly used in evaluating model performance [39].
The area under the curve (AUC) is a widely used metric in evaluating binary classification models. It offers a comprehensive measure of performance for all possible classification thresholds. The AUC is interpreted as the model’s probability of assigning a higher score to a random positive instance than a random negative instance. A perfect model has an AUC of 1.0, and the model with random predictions has an AUC of 0.0. The AUC is advantageous as it is scale-independent and invariant to the classification threshold, enabling the comparison of different models across different datasets. However, the scale invariance and threshold invariance of the AUC may not always be desirable in certain use cases. For instance, the AUC may not be applicable in situations where well-calibrated probabilistic input data are needed. Similarly, when significant differences exist in the costs of false positives and false negatives, the AUC may not be the most appropriate metric. For example, minimizing false positives in spam detection may be more important than minimizing false negatives [40], which the AUC does not consider.

3.4. Data Preprocessing Techniques

In this study, the preprocessing stage involved standardizing certain features not encrypted in the dataset, specifically, the time and amount variables of submitted transactions. In addition, undersampling was employed as the dataset was not imbalanced. Standardization [41] is a technique for scaling variables where values are centered around the mean and have a standard deviation of one. Thus, the attribute’s mean value is transformed to zero, and the distribution is normalized with a standard deviation of one. The standardization equation is expressed as follows:
X = X μ σ ,
where μ is the mathematical expectation, and σ is the standard deviation.
In order to achieve the tasks set in this study, classification algorithms needed to be employed. A technique called random undersampling was utilized, which involves the random selection and removal of examples from the majority class in the training dataset. This results in a decrease in the number of many examples in the common class in the transformed training dataset. This procedure is repeated until the desired class distribution is obtained, such as an equal number of examples for each class [42].
Classification is a supervised learning method used to determine the class or label of a given observation based on a dataset of previous observations. The dataset used in this paper was obtained from the open platform Kaggle and contained data on transactions of European cardholders labeled as fraudulent or real. Most of the features of this dataset are encrypted using the principal component method to ensure user privacy, with the only open features being the time of the transaction and the amount involved.
Preprocessing was applied to the dataset in the form of standardization of features that were not encrypted as well as the balancing of classes by random sampling.
The program’s output is a graph of the ROC curve for each selected algorithm and the AUC metric, which allows quantitative, not just visual, evaluation of the algorithm’s effectiveness. The demonstrated flowchart was used for the programmatic realization of the goal.
Table 2 represents the results of the analysis of the pros and cons of each algorithm. The effectiveness of algorithms varies depending on the specific problem and dataset being used. The performance of each algorithm improved with the proper tuning of the hyperparameters and feature engineering.
Among the selected machine learning algorithms that were used for training and prediction were (1) random forest, (2) k-nearest neighbors, (3) logistic regression, (4) linear discriminant analysis, (5) decision tree, (6) naïve Bayes, and (7) support vector machine.

4. Results

4.1. Dataset Selection

Three datasets were taken into account:
In addition, more than 4050 notebooks were developed based on the mentioned dataset. This allowed us to compare our results with those of existing methods.

4.2. Experiment Design

The technical implementation of the task outlined in this paper was conducted using the high-level programming language Python [43]. The simplicity, consistency, flexibility, powerful AI and ML libraries and frameworks, platform independence, and the large community of Python are widely recognized as the ideal solution for machine learning and AI-driven projects. The development environment utilized for this project was notebooks [44] from the Kaggle platform, where the dataset was obtained. Notebooks are composed of a sequence of cells that can be formatted in either Markdown for text or a programming language of the user’s choice for code [44].
In the technical implementation of this task, the following libraries were utilized:
  • Scikit Learn is an open-source machine learning library that supports both supervised and unsupervised learning. Scikit Learn also provides various tools to adapt models, preprocess data, select models, and assess models, among many other services [45].
  • Pandas is an open-source library primarily intended to conveniently and efficiently handle labeled or relational data. It offers several data structures and functionalities that enable numerical data and time series processing. This library was developed on the foundation of the NumPy library and is known for its fast performance and high productivity for users [46].
  • Matplotlib is an open-source library that enables data visualization and plotting for Python, and it supports its numerical extension NumPy. This library provides a feasible alternative to MATLAB and is compatible with different operating systems. Creators use the matplotlib API to embed graphs in GUI applications [47]. Because the program is implemented and stored in Kaggle, an online platform, the code of the software solution can be concurrently run in the browser of the application’s end user. This is why the need for personal computing power is not critical for running programs available to any modern computer with a sufficiently good Internet connection.
This dataset is readily available on the same platform, facilitating rapid processing. Once the data are loaded into memory as a frame data structure, they are sequentially processed using the earlier preprocessing techniques: standardization and random undersampling. Standardizing the features in the training and testing sets is performed by a standard scaler, and random undersampling is used to balance the class distribution. The selected models use a set of hyperparameters.
The dataset was split into training, validation, and testing sets (70%, 15%, and 15%, respectively) to measure the generalization performance. Decision tree, logistic regression, SVC, k-nearest neighbors stochastic gradient descent, naïve Bayes, and random forest algorithms were used for classification task solving. Next, grid search for hyperparameters’ tuning was used. After the initialization of the models and data processing, their successive training and evaluation using the AUC metric began and the ROC curve was visualized for each of the algorithms. After the models performed the given task, the program displayed the algorithm with the best result based on the AUC metric.
Figure 4 shows the ROC curves for these algorithms and their metrics:
  • The decision tree algorithm produced an AUC metric of 0.938.
  • The logistic regression algorithm obtained an AUC value of 0.946.
  • The SVC algorithm showed an AUC of 0.936.
  • The k-nearest neighbors algorithm showed an AUC value of 0.927.
  • The algorithm based on stochastic gradient descent had an AUC value of 0.917.
  • The naïve Bayes algorithm showed an AUC value of 0.908.
  • The random forest algorithm had an AUC value of 0.911.
Figure 5 shows the overall output of the program, which shows the best algorithm according to the AUC metric, namely, logistic regression, which obtained an AUC value of approximately 0.946.
However, stacked generalization produced better results than logistic regression. The summary table of the results is presented in Figure 6. The AUC and F1 score were used for model evaluation. The results of stacked generalization was compared with state-of-the-art results, URL: https://www.kaggle.com/datasets/mlg-ulb/creditcardfraud/code (accessed on 15 November 2022) [31] and https://www.kaggle.com/code/janiobachmann/credit-fraud-dealing-with-imbalanced-datasets (accessed on 15 November 2022) [48]. The highest F1 was calculated for the ensemble model at 0.96.
The easiest solution to run the program is to use the Kaggle platform (which was used to create this software solution), which, by default, supports running Jupyter on laptops. To start it, click the “Run all” button, which continues to execute all commands one by one. An alternative solution is to use any software that supports launching Jupyter laptops. This study used the root programming language Python to create a software solution because of its unique adaptation to artificial intelligence tasks and auxiliary libraries for this language: Pandas, Sklearn, and Matplotlib.
The program was created and published on the Kaggle platform, so it does not depend on the end user’s computing power and only requires a stable Internet connection and a web browser. From the test runs of the presented algorithms, we concluded that they all more or less equally cope with recognizing bank fraud. This is also evident from the ROC curve plots, which do not show much visual difference. Nevertheless, based on the numerical metric AUC, we can see that the logistic regression algorithm performed best from weak classifiers, with an output AUC value of approximately 0.946.

5. Conclusions

This paper emphasized the importance of utilizing artificial intelligence to identify fraudulent banking transactions. We proposed various classification algorithms that can determine the type of transaction based on specific features. The proposed model, which is based on an artificial neural network, significantly increases the accuracy of detecting fraudulent transactions. Additionally, the paper provided multiple methods for enhancing detection accuracy, such as managing imbalanced datasets, feature transformation, and feature engineering.
This paper presented the recognition of banking fraud using artificial intelligence algorithms. As a result of training and testing, each selected algorithm showed outstanding (AUC values were not lower than 0.9 in any of the cases) and equal results. This could also be seen from the graphs of the ROC curves, which do not show a significant visual difference. From the test runs of the presented algorithms, it was concluded that all of them more or less equally cope with recognizing fraudulent bank transactions. Nevertheless, based on the numerical AUC metric, the logistic regression algorithm performs best, obtaining an AUC value of approximately 0.946.
The stacked generalization with deformed results of the weak classifier was proposed in the paper with an AUC of 0.008, being better than the best weak classifier. On the other side, stacking reduces bias and variance, but it is exceptionally efficient at preventing overfitting and variance. The improvement provided by the linear stacking model over the best individual model was relatively small. There was often no improvement, especially in cases where the individual base model was already sophisticated, e.g., gradient-boosted trees. The particular model’s output deformation was used in the stacked generalization.
This study is important because we applied artificial intelligence to identify fraudulent banking transactions. This is particularly relevant during the pandemic, as more transactions are performed online, and during times of war, when there are many charities and events collecting money.

Author Contributions

Conceptualization, B.M., O.T., N.S., S.F. and Y.S.; methodology, B.M., O.T., N.S., S.F. and Y.S.; software, B.M., O.T., N.S., S.F. and Y.S.; validation, B.M., O.T., N.S., S.F. and Y.S.; formal analysis, B.M., O.T., N.S., S.F. and Y.S.; investigation, B.M., O.T., N.S., S.F. and Y.S.; resources, B.M., O.T., N.S., S.F. and Y.S.; data curation, B.M., O.T., N.S., S.F. and Y.S.; writing—original draft preparation, B.M., O.T., N.S., S.F. and Y.S.; writing—review and editing, B.M., O.T., N.S., S.F. and Y.S.; visualization, B.M., O.T., N.S., S.F. and Y.S.; project administration, N.S. and S.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data used to support the findings of this study are included within the article. The Credit Card Fraud Detection dataset is available at: https://www.kaggle.com/datasets/mlg-ulb/creditcardfraud (accessed on 15 November 2022); Credit Fraud || Dealing with Imbalanced Datasets is available at: https://www.kaggle.com/code/janiobachmann/credit-fraud-dealing-with-imbalanced-datasets (accessed on 15 November 2022).

Acknowledgments

The authors would like to thank the Armed Forces of Ukraine for providing security to perform this work. This work was made possible only because of the resilience and courage of the Ukrainian Army.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jansen, J.; Leukfeldt, R. How people help fraudsters steal their money: An analysis of 600 online banking fraud cases. In Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust, Verona, Italy, 13 July 2015; pp. 24–31. [Google Scholar] [CrossRef]
  2. Top 5 Banking Fraud Prevention Methods, SailPoint. Available online: https://www.sailpoint.com/identity-library/top-5-banking-fraud-prevention-methods/ (accessed on 15 November 2022).
  3. Law, B. Bank Fraud—Definitions & Penalties, Berry Law. 24 October 2017. Available online: https://jsberrylaw.com/blog/bank-fraud-definition-penalties/ (accessed on 15 November 2022).
  4. Scopus. Search “Fraudulent Banking”. Available online: https://www.scopus.com/results/results.uri?sort=plf-f&src=s&st1=fraudulent+banking&sid=d19e2a93c0ea9fab26cd4a3bf34ff777&sot=b&sdt=b&sl=33&s=ALL%28fraudulent+AND+banking%29&origin=searchbasic&editSaveSearch=&sessionSearchId=d19e2a93c0ea9fab26cd4a3bf34ff777&limit=10 (accessed on 15 November 2022).
  5. Barker, R. The use of proactive communication through knowledge management to create awareness and educate clients on e-banking fraud prevention. S. Afr. J. Bus. Manag. 2020, 51, a1941. [Google Scholar] [CrossRef]
  6. Abidoye, A.P.; Kabaso, B. Hybrid machine learning: A tool to detect phishing attacks in communication networks. Int. J. Adv. Comput. Sci. Appl. 2020, 11, 559–569. [Google Scholar] [CrossRef]
  7. Shah, S.S.H.; Ahmad, A.R.; Jamil, N.; Khan, A.U.R. Memory forensics-based malware detection using computer vision and machine learning. Electronics 2022, 11, 2579. [Google Scholar] [CrossRef]
  8. Maulana, L.R.; Fajar, A.N.; Meyliana. Extending the design of smart mobile application to detect fraud theft of E-banking access using big data analytic and SOA. In Proceedings of the 2021 IEEE 5th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Purwokerto, Indonesia, 24–25 November 2021; pp. 360–364. [Google Scholar] [CrossRef]
  9. Khalaf Al Hattali, S.S.; Hussain, S.M.; Frank, A. Design and development for detection and prevention of ATM skimming frauds. Indones. J. Electr. Eng. Comput. Sci. 2019, 17, 1224–1231. [Google Scholar] [CrossRef]
  10. Tsai, C.; Su, P. The application of multi-server authentication scheme in internet banking transaction environments. Inf. Syst. e-Bus. Manag. 2021, 19, 77–105. [Google Scholar] [CrossRef]
  11. Hammi, B.; Zeadally, S.; Adja, Y.C.E.; Giudice, M.D.; Nebhen, J. Blockchain-based solution for detecting and preventing fake check scams. IEEE Trans. Eng. Manag. 2022, 69, 3710–3725. [Google Scholar] [CrossRef]
  12. Abdul Rani, M.I.; Syed Mustapha Nazri, S.N.F.; Zolkaflil, S. A systematic literature review of money mule: Its roles, recruitment and awareness. J. Financ. Crime 2023. ahead-of-print. [Google Scholar] [CrossRef]
  13. Ileberi, E.; Sun, Y.; Wang, Z. A machine learning based credit card fraud detection using the GA algorithm for feature selection. J. Big Data 2022, 9, 24. [Google Scholar] [CrossRef]
  14. Chaquet-Ulldemolins, J.; Gimeno-Blanes, F.-J.; Moral-Rubio, S.; Muñoz-Romero, S.; Rojo-álvarez, J.-L. On the Black-Box Challenge for Fraud Detection Using Machine Learning (I): Linear Models and Informative Feature Selection. Appl. Sci. Switz. 2022, 12, 3328. [Google Scholar] [CrossRef]
  15. Kasasbeh, B.; Aldabaybah, B.; Ahmad, H. Multilayer perceptron artificial neural networks-based model for credit card fraud detection, Indones. J. Electr. Eng. Comput. Sci. 2022, 26, 362–373. [Google Scholar] [CrossRef]
  16. Nguyen, N.; Duong, T.; Chau, T.; Nguyen, V.-H.; Trinh, T.; Tran, D.; Ho, T. A Proposed Model for Card Fraud Detection Based on CatBoost and Deep Neural Network. IEEE Access 2022, 10, 96852–96861. [Google Scholar] [CrossRef]
  17. Esenogho, E.; Mienye, I.D.; Swart, T.G.; Aruleba, K.; Obaido, G. A Neural Network Ensemble with Feature Engineering for Improved Credit Card Fraud Detection. IEEE Access 2022, 10, 16400–16407. [Google Scholar] [CrossRef]
  18. Sharma, P.; Banerjee, S.; Tiwari, D.; Patni, J.C. Machine learning model for credit card fraud detection-A comparative analysis. Int. Arab J. Inf. Technol. 2021, 18, 789–796. [Google Scholar] [CrossRef]
  19. Benchaji, I.; Douzi, S.; El Ouahidi, B. Credit card fraud detection model based on LSTM recurrent neural networks. J. Adv. Inf. Technol. 2021, 12, 113–118. [Google Scholar] [CrossRef]
  20. Mehbodniya, A.; Alam, I.; Pande, S.; Neware, R.; Rane, K.P.; Shabaz, M.; Madhavan, M.V. Financial Fraud Detection in Healthcare Using Machine Learning and Deep Learning Techniques. Secur. Commun. Netw. 2021, 2021, 9293877. [Google Scholar] [CrossRef]
  21. Cauteruccio, F.; Terracina, G.; Ursino, D. Generalizing identity-based string comparison metrics: Framework and techniques. Knowl.-Based Syst. 2020, 187, 104820. [Google Scholar] [CrossRef]
  22. Ojagh, S.; Cauteruccio, F.; Terracina, G.; Liang, S.H.L. Enhanced air quality prediction by edge-based spatiotemporal data pre-processing. Comput. Electr. Eng. 2021, 96, 107572. [Google Scholar] [CrossRef]
  23. Arora, M.; Bhardwaj, I. Artificial Intelligence in Collaborative Information System. Int. J. Mod. Educ. Comput. Sci. (IJMECS) 2022, 14, 44–55. [Google Scholar] [CrossRef]
  24. Junejo, M.; Laghari, A.; Jumani, A.; Karim, S.; Khuhro, M. Quality of Experience Assessment of Banking Service. Int. J. Inf. Eng. Electron. Bus. (IJIEEB) 2020, 12, 39–50. [Google Scholar] [CrossRef]
  25. Gupta, P.; Varshney, A.; Khan, M.R.; Ahmed, R.; Shuaib, M.; Alam, S. Unbalanced Credit Card Fraud Detection Data: A Machine Learning-Oriented Comparative Study of Balancing Techniques. Procedia Comput. Sci. 2023, 218, 2575–2584. [Google Scholar] [CrossRef]
  26. Navaneethakrishnan, P.; Viswanath, R. Fraud Detection on Credit Cards Using Artificial Intelligence Methods. Ilkogr. Online-Elem. Educ. Online 2020, 19, 2086–2096. [Google Scholar]
  27. Khan, M.; Mahmood, W. Technology Adoption in Pakistani Banking Industry using UTAUT. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 2022, 14, 32–42. [Google Scholar] [CrossRef]
  28. Zimba, A. A Bayesian Attack-Network Modeling Approach to Mitigating Malware-Based Banking Cyberattacks. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 2022, 14, 25–39. [Google Scholar] [CrossRef]
  29. Elhassan, R.; Yousif, A.; Suliman, T. Assessment of Knowledge Management Application in Banking Sector of Sudan: Case Study Farmer’s Commercial Bank. Int. J. Inf. Eng. Electron. Bus. (IJIEEB) 2021, 13, 1–19. [Google Scholar] [CrossRef]
  30. Wang, P.; Fan, E.; Wang, P. Comparative analysis of image classification algorithms based on traditional machine learning and deep learning. Pattern Recognit. Lett. 2021, 141, 61–67. [Google Scholar] [CrossRef]
  31. Credit Card Fraud Detection. Available online: https://www.kaggle.com/datasets/mlg-ulb/creditcardfraud (accessed on 15 November 2022).
  32. Charbuty, B.; Abdulazeez, A. Classification based on decision tree algorithm for machine learning. J. Appl. Sci. Technol. Trends 2021, 2, 20–28. [Google Scholar] [CrossRef]
  33. Polimis, K.; Rokem, A.; Hazelton, B. Confidence intervals for random forests in python. J. Open Source Softw. 2017, 2, 124. [Google Scholar] [CrossRef]
  34. Mood, C. Logistic regression: Why we cannot do what we think we can do, and what we can do about it. Eur. Sociol. Rev. 2010, 26, 67–82. [Google Scholar] [CrossRef]
  35. Aldino, A.A.; Saputra, A.; Nurkholis, A.; Setiawansyah, S. Application of Support Vector Machine (SVM) Algorithm in Classification of Low-Cape Communities in Lampung Timur. Build. Inform. Technol. Sci. (BITS) 2021, 3, 325–330. [Google Scholar] [CrossRef]
  36. Isnain, A.R.; Supriyanto, J.; Kharisma, M.P. Implementation of K-Nearest Neighbor (K-NN) Algorithm For Public Sentiment Analysis of Online Learning. Indones. J. Comput. Cybern. Syst. 2021, 15, 121–130. [Google Scholar] [CrossRef]
  37. Do, T.N.; Tran-Nguyen, M.T. ImageNet Challenging Classification with the Raspberry Pis: A Federated Learning Algorithm of Local Stochastic Gradient Descent Models. In Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications; FDSE 2022; Communications in Computer and Information Science; Springer: Singapore, 2022; Volume 1688. [Google Scholar] [CrossRef]
  38. Zhang, Y.; Sakhanenko, L. The naive Bayes classifier for functional data. Stat. Probab. Lett. 2019, 152, 137–146. [Google Scholar] [CrossRef]
  39. Chukhray, N.; Shakhovska, N.; Mrykhina, O.; Lisovska, L.; Izonin, I. Stacking Machine Learning Model for the Assessment of R&D Product’s Readiness and Method for Its Cost Estimation. Mathematics 2022, 10, 1466. [Google Scholar] [CrossRef]
  40. Muppalaneni, N.B.; Ma, M.; Gurumoorthy, S.; Kannan, R.; Vasanthi, V. Machine learning algorithms with ROC curve for predicting and diagnosing the heart disease. In Soft Computing and Medical Bioinformatics; Springer: Berlin/Heidelberg, Germany, 2019; pp. 63–72. [Google Scholar]
  41. Ozsahin, D.U.; Taiwo Mustapha, M.; Mubarak, A.S.; Said Ameen, Z.; Uzun, B. Impact of feature scaling on machine learning models for the diagnosis of diabetes. In Proceedings of the 2022 International Conference on Artificial Intelligence in Everything (AIE), Lefkosa, Cyprus, 2–4 August 2022; pp. 87–94. [Google Scholar] [CrossRef]
  42. Shamsudin, H.; Yusof, U.K.; Jayalakshmi, A.; Khalid, M.N.A. Combining oversampling and undersampling techniques for imbalanced classification: A comparative study using credit card fraudulent transaction dataset. In Proceedings of the 2020 IEEE 16th International Conference on Control & Automation (ICCA), Singapore, 9–11 October 2020; pp. 803–808. [Google Scholar] [CrossRef]
  43. Nagpal, A.; Gabrani, G. Python for Data Analytics, Scientific and Technical Applications. In Proceedings of the 2019 Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates, 4–6 February 2019; pp. 140–145. [Google Scholar] [CrossRef]
  44. Pimentel, J.F.; Murta, L.; Braganholo, V.; Freire, J. A Large-Scale Study About Quality and Reproducibility of Jupyter Notebooks. In Proceedings of the 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR), Montreal, QC, Canada, 25–31 May 2019; pp. 507–517. [Google Scholar] [CrossRef]
  45. Wang, A.Y.; Wang, D.; Drozdal, J.; Muller, M.; Park, S.; Weisz, J.; Liu, X.; Wu, L.; Dugan, C. Documentation matters: Human-centered AI system to assist data science code documentation in computational notebooks. ACM Trans. Comput.-Hum. Interact. 2022, 29, 17. [Google Scholar] [CrossRef]
  46. Cutler, J.; Dickenson, M.; Cutler, J.; Dickenson, M. Introduction to Machine Learning with Python. In Computational Frameworks for Political and Social Research with Python; Springer: Berlin/Heidelberg, Germany, 2020; pp. 129–142. [Google Scholar]
  47. Moruzzi, G.; Moruzzi, G. Plotting with matplotlib. In Essential Python for the Physicist; Springer: Berlin/Heidelberg, Germany, 2020; pp. 53–69. [Google Scholar]
  48. Credit Fraud || Dealing with Imbalanced Datasets. Available online: https://www.kaggle.com/code/janiobachmann/credit-fraud-dealing-with-imbalanced-datasets (accessed on 15 November 2022).
Figure 1. The statistics of scientific studies in fraudulent banking field in Scopus by year.
Figure 1. The statistics of scientific studies in fraudulent banking field in Scopus by year.
Bdcc 07 00093 g001
Figure 2. Map based on statistics of average number of publications in Scopus each year.
Figure 2. Map based on statistics of average number of publications in Scopus each year.
Bdcc 07 00093 g002
Figure 3. Scheme of the program solution to the problem.
Figure 3. Scheme of the program solution to the problem.
Bdcc 07 00093 g003
Figure 4. Plots of ROC curves of the following algorithms: (a) decision tree algorithm; (b) random forest algorithm; (c) logistic regression algorithm; (d) SVC algorithm; (e) k-nearest neighbors algorithm; (f) SGD algorithm; (g) naïve Bayes algorithm.
Figure 4. Plots of ROC curves of the following algorithms: (a) decision tree algorithm; (b) random forest algorithm; (c) logistic regression algorithm; (d) SVC algorithm; (e) k-nearest neighbors algorithm; (f) SGD algorithm; (g) naïve Bayes algorithm.
Bdcc 07 00093 g004
Figure 5. The initial state of the program.
Figure 5. The initial state of the program.
Bdcc 07 00093 g005
Figure 6. Summary of results.
Figure 6. Summary of results.
Bdcc 07 00093 g006
Table 1. Fraudulent banking approaches and threats.
Table 1. Fraudulent banking approaches and threats.
Fraudulent Banking ApproachThreat
Phishing [5,6]The attacker steals login credentials or other personal information by tricking the victim into entering them on a fake banking website or through a fake email or text message.
Malware [7]Malicious software is used to steal login credentials or other personal information and may be used to take control of the victim’s computer or manipulate banking transactions.
Social Engineering [8]Attackers use psychological manipulation to trick victims into disclosing sensitive information or performing transactions they would not normally. This may include pretexting, baiting, or quid pro quo tactics.
Skimming [9]Attackers install devices on ATMs or other card readers to steal card information. This information is then be used to create counterfeit cards or make unauthorized transactions.
Account Takeover [10]Attackers access a victim’s account by stealing login credentials or other means. Once in the account, they make unauthorized transactions, change account details, or otherwise manipulate the account for their gain.
Fake Checks [11]Attackers send fake checks to victims, asking them to deposit them and send back a portion of the funds. The check eventually bounces, leaving the victim responsible for the funds they sent to the attacker.
Money Mules [12]Attackers recruit unwitting victims to help launder money by having them receive and send funds on their behalf. The victims say they are performing legitimate work but participating in illegal activities.
Table 2. The initial state of the algorithms.
Table 2. The initial state of the algorithms.
MethodsAlgorithmProsCons
Machine Learning AlgorithmsRandom ForestPerforms well in handling high-dimensional data with complex relationships, missing values, and outliers.Computationally expensive for massive datasets and challenging to interpret.
K-Nearest NeighborsEasy to implement and works well on small datasets, handling nonlinear relationships.Computationally expensive for large datasets sensitive to irrelevant features and distance metrics.
Logistic RegressionEasy to implement and interpret, good performance in handling categorical features.Assumes a linear relationship between features and target, and may not perform well on highly nonlinear data.
Stochastic Gradient Descent ClassifierPerforms well on large datasets and handles nonlinear relationships.Sensitive to hyperparameters and initialization converges to a suboptimal solution.
Naive BayesFast and straightforward, performing well in handling categorical features.Assumes independence between features. may not perform well on highly nonlinear data.
Decision TreeEasy to interpret and handles nonlinear relationships. Good performance on small to medium datasets.Easily overfits the data and is sensitive to small changes in data.
Support Vector MachinePerforms well on many problems, including nonlinear data, and handles high-dimensional data.Computationally expensive for large datasets. Sensitive to choice of kernel function and hyperparameters.
Metrics for model assessmentArea Under the Curve (AUC)A widely-used metric for binary classification problems that is easy to interpret and robust to imbalanced datasets.Does not provide information on optimal threshold for classification and unsuitable for multiclass classification problems.
Receiver Operating Characteristic (ROC)Provides a visual representation of the trade-off between sensitivity and specificity, help select the optimal threshold for classification.Challenging to interpret for datasets with many classes.
Data pre-processing techniquesStandardizationImproves the performance of specific algorithms, such as distance metrics and coefficients’ interpretability in linear models.Standardization is sensitive to outliers and leads to overfitting if applied to entire dataset (including test set).
UndersamplingImproves algorithms’ performance on imbalanced datasets and reduces computation time and memory usage.Results in loss of important information from the dataset and increases risk of overfitting if the validation set is not representative of the test set.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mytnyk, B.; Tkachyk, O.; Shakhovska, N.; Fedushko, S.; Syerov, Y. Application of Artificial Intelligence for Fraudulent Banking Operations Recognition. Big Data Cogn. Comput. 2023, 7, 93. https://doi.org/10.3390/bdcc7020093

AMA Style

Mytnyk B, Tkachyk O, Shakhovska N, Fedushko S, Syerov Y. Application of Artificial Intelligence for Fraudulent Banking Operations Recognition. Big Data and Cognitive Computing. 2023; 7(2):93. https://doi.org/10.3390/bdcc7020093

Chicago/Turabian Style

Mytnyk, Bohdan, Oleksandr Tkachyk, Nataliya Shakhovska, Solomiia Fedushko, and Yuriy Syerov. 2023. "Application of Artificial Intelligence for Fraudulent Banking Operations Recognition" Big Data and Cognitive Computing 7, no. 2: 93. https://doi.org/10.3390/bdcc7020093

Article Metrics

Back to TopTop