Skip to main content
Top
Published in: Wireless Personal Communications 2/2021

27-02-2021

Fraud Prediction in Smart Societies Using Logistic Regression and k-fold Machine Learning Techniques

Authors: Kamta Nath Mishra, Subhash Chandra Pandey

Published in: Wireless Personal Communications | Issue 2/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The credit/debit card deceit detection is an enormously difficult task. However, it is a well known problem of our cloud based mobile internet society and it must be solved by technocrats in the welfare of societal mental harassments. The main problem in executing credit/debit card fraud detection technique is the availability of limited amount of fraud related data like transaction amount, transaction date, transaction time, address, and vendor category code related to the frauds. It is the truth of mobile internet world that there are billions of potential places and e-commerce websites where a credit/debit card can be used by fraudulent people for online transactions and payments which make it exceedingly thorny to trace the pattern of frauds. Moreover, the problem of fraud detection in cloud— Internet of Things (IoT) based smart societies has numerous constraints like continuous change in the behavior of normal and fraudulent persons, the fraudulent people try to develop and use new method for executing frauds, and very little availability of frauds related bench mark data sets. In this research article, the authors have presented logistic regression based k-fold machine learning technique (MLT) for fraud detection and prevention in cloud-IoT based smart societal environment. The k-fold method creates multiple folds of bank transactions related data before implementing logistic regression and MLT. The logistic regression performs logic based regression analysis and the intelligent machine learning approach performs registration, classification, clustering, dimensionality reduction, deep learning, training, and reinforcement learning steps on the received bank transactions data. The implementation of proposed methodology and its further analysis using intelligent machine learning tools like ROC (Receiver Operating Characteristic) curve, confusion matrix, mean-recall score value, and precision recall curves for European banks day-to-day transactions related bench mark data set reveal that the proposed methodology is efficient, accurate, and reliable for detecting frauds in cloud-IoT based smart societal environment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Aleskerov, E., Freisleben, B., & Rao, B. (1997). CARDWATCH: A neural network-based database mining system for credit card fraud detection. In Proceedings of the IEEE/IAFE on computational intelligence for financial engineering (pp. 220–226). Aleskerov, E., Freisleben, B., & Rao, B. (1997). CARDWATCH: A neural network-based database mining system for credit card fraud detection. In Proceedings of the IEEE/IAFE on computational intelligence for financial engineering (pp. 220–226).
2.
go back to reference Anderson, R. (2007). The credit scoring toolkit: Theory and practice for retail credit risk management and decision automation. Oxford University Press. Anderson, R. (2007). The credit scoring toolkit: Theory and practice for retail credit risk management and decision automation. Oxford University Press.
6.
go back to reference Mena, J. (2003). Investigate data mining for security and criminal detection (pp. 1–272). Elsevier. Mena, J. (2003). Investigate data mining for security and criminal detection (pp. 1–272). Elsevier.
7.
go back to reference Ray, S., Mishra, K. N., & Dutta, S. (2020). Big data security issues from the perspective of IoT and cloud computing: a review. Recent Advances in Computer Science and Communications, Benthem Science Journal, 13, 1–25.CrossRef Ray, S., Mishra, K. N., & Dutta, S. (2020). Big data security issues from the perspective of IoT and cloud computing: a review. Recent Advances in Computer Science and Communications, Benthem Science Journal, 13, 1–25.CrossRef
8.
go back to reference Chen, R., Chiu, M., Huang, Y., & Chen, L. (2004). Detecting credit card fraud by using questionnaire responded transaction model based on SVMs. In Proceedings of IDEAL2004 (pp. 800–806). Chen, R., Chiu, M., Huang, Y., & Chen, L. (2004). Detecting credit card fraud by using questionnaire responded transaction model based on SVMs. In Proceedings of IDEAL2004 (pp. 800–806).
9.
go back to reference Bolton, R. J., & Hand, D. J. (2002). Statistical fraud detection: A review. Statistical Science, 28(3), 235–255.MathSciNetMATH Bolton, R. J., & Hand, D. J. (2002). Statistical fraud detection: A review. Statistical Science, 28(3), 235–255.MathSciNetMATH
10.
go back to reference Kou, Y., Lu, C.-T., Sirwongwattana, S., & Huang, Y. P. (2004). Survey of fraud detection techniques. In Proceedings of the 2004 IEEE International Conference on Networking, Sensing and Control, Taipei (pp. 1–6). Kou, Y., Lu, C.-T., Sirwongwattana, S., & Huang, Y. P. (2004). Survey of fraud detection techniques. In Proceedings of the 2004 IEEE International Conference on Networking, Sensing and Control, Taipei (pp. 1–6).
11.
go back to reference Phua, C., Lee, V., Smith, K., & Gayler, R. (2005). A comprehensive survey of data mining-based fraud detection research. Artificial Intelligence Review, 24, 1–14. Phua, C., Lee, V., Smith, K., & Gayler, R. (2005). A comprehensive survey of data mining-based fraud detection research. Artificial Intelligence Review, 24, 1–14.
12.
go back to reference Sahin, Y., & Duman, E. (2011). Detecting credit card fraud by ANN and logistic regression. In International symposium on innovations in intelligent systems and applications (pp. 315–319). Sahin, Y., & Duman, E. (2011). Detecting credit card fraud by ANN and logistic regression. In International symposium on innovations in intelligent systems and applications (pp. 315–319).
13.
go back to reference Navanshu, K., & Saad, Y. S. (2018). Credit card fraud detection using machine learning models and collating machine learning models. International Journal of Pure and Applied Mathematics, 118(20), 825–837. Navanshu, K., & Saad, Y. S. (2018). Credit card fraud detection using machine learning models and collating machine learning models. International Journal of Pure and Applied Mathematics, 118(20), 825–837.
14.
go back to reference Maes, S., Tuyls, K., Vanschoenwinkel, B., & Manderick, B. (1993). Credit card fraud detection using Baysian and Neural Network. In R. J. Maciunas (Ed.), Interactive image-guided neurosurgery (pp. 261–270). American Association Neurological Surgeons. Maes, S., Tuyls, K., Vanschoenwinkel, B., & Manderick, B. (1993). Credit card fraud detection using Baysian and Neural Network. In R. J. Maciunas (Ed.), Interactive image-guided neurosurgery (pp. 261–270). American Association Neurological Surgeons.
15.
go back to reference Kundu, A., Sural, S., & Majumdar, A. (2006). Two-stage credit card fraud detection using sequence alignment. In International conference on information systems security, LNCS (pp. 260–275). Kundu, A., Sural, S., & Majumdar, A. (2006). Two-stage credit card fraud detection using sequence alignment. In International conference on information systems security, LNCS (pp. 260–275).
16.
go back to reference Seyedhossein, L., & Hashemi, M. R. (2010). Mining information from credit card time series for timelier fraud detection. In Telecommunications (IST), 5th international symposium on IEEE (pp. 619–624). Seyedhossein, L., & Hashemi, M. R. (2010). Mining information from credit card time series for timelier fraud detection. In Telecommunications (IST), 5th international symposium on IEEE (pp. 619–624).
17.
go back to reference Sánchez, D., et al. (2009). Association rules applied to credit card fraud detection. Expert Systems with Applications, 36(2), 3630–3640.CrossRef Sánchez, D., et al. (2009). Association rules applied to credit card fraud detection. Expert Systems with Applications, 36(2), 3630–3640.CrossRef
18.
go back to reference Panigrahi, S., et al. (2009). Credit card fraud detection: A fusion approach using Dempster–Shafer theory and Bayesian learning. Information Fusion, 10(4), 354–363.CrossRef Panigrahi, S., et al. (2009). Credit card fraud detection: A fusion approach using Dempster–Shafer theory and Bayesian learning. Information Fusion, 10(4), 354–363.CrossRef
19.
go back to reference Fallah, S. N., Deo, R. C., Shojafar, M., Conti, M., & Shamshirband, S. (2018). Computational intelligence approaches for energy load forecasting in smart energy management grids: state of the art, future challenges, and research directions. Energies, 11(3), 1–31.CrossRef Fallah, S. N., Deo, R. C., Shojafar, M., Conti, M., & Shamshirband, S. (2018). Computational intelligence approaches for energy load forecasting in smart energy management grids: state of the art, future challenges, and research directions. Energies, 11(3), 1–31.CrossRef
20.
go back to reference Chen, R.-C., et al. (2004). Detecting credit card fraud by using questionnaire-responded transaction model based on support vector machines. In Intelligent data engineering and automated learning–IDEAL (pp. 800–806). Chen, R.-C., et al. (2004). Detecting credit card fraud by using questionnaire-responded transaction model based on support vector machines. In Intelligent data engineering and automated learning–IDEAL (pp. 800–806).
21.
go back to reference Lu, Q., & Ju, C. (2011). Research on credit card fraud detection model based on class weighted support vector machine. Journal of Convergence Information Technology, 6(1), 62–68.CrossRef Lu, Q., & Ju, C. (2011). Research on credit card fraud detection model based on class weighted support vector machine. Journal of Convergence Information Technology, 6(1), 62–68.CrossRef
22.
go back to reference Patil, S., Nemade, V., & Soni, P. K. (2018). Predictive modelling for credit card fraud detection using data analytics. Procedia Computer Science, 132, 385–395.CrossRef Patil, S., Nemade, V., & Soni, P. K. (2018). Predictive modelling for credit card fraud detection using data analytics. Procedia Computer Science, 132, 385–395.CrossRef
23.
go back to reference Ghosh, S., & Reilly, D. L. (1994). Credit card fraud detection with a neural-network. In Proceedings of 27th annual conference on system science (pp. 621–630). Ghosh, S., & Reilly, D. L. (1994). Credit card fraud detection with a neural-network. In Proceedings of 27th annual conference on system science (pp. 621–630).
24.
go back to reference Zareapoor, M., Seeja, K. R., & Alam, M. A. (2012). Analysis of credit card fraud detection techniques: Based on certain design criteria. International Journal of Computer Applications, 52(3), 35–42.CrossRef Zareapoor, M., Seeja, K. R., & Alam, M. A. (2012). Analysis of credit card fraud detection techniques: Based on certain design criteria. International Journal of Computer Applications, 52(3), 35–42.CrossRef
25.
go back to reference Syeda, M., Zhang, Y.-Q., & Pan, Y. (2002). Parallel granular neural networks for fast credit card fraud detection. In Proceedings of IEEE international conference (pp. 572–577). Syeda, M., Zhang, Y.-Q., & Pan, Y. (2002). Parallel granular neural networks for fast credit card fraud detection. In Proceedings of IEEE international conference (pp. 572–577).
26.
go back to reference Zojaji, Z., Atani, R. E., & Monadjemi, A. H. (2016). A survey of credit card fraud detection techniques: Data and technique oriented perspective, cryptography and security (pp. 1–10). Zojaji, Z., Atani, R. E., & Monadjemi, A. H. (2016). A survey of credit card fraud detection techniques: Data and technique oriented perspective, cryptography and security (pp. 1–10).
27.
go back to reference Juszczak, P., Adams, N. M., Hand, D. J., Whitrow, C., & Weston, D. J. (2008). Off-the-peg and bespoke classifiers for fraud detection. Computational Statistics & Data Analysis, 52(9), 4521–4532.MathSciNetMATHCrossRef Juszczak, P., Adams, N. M., Hand, D. J., Whitrow, C., & Weston, D. J. (2008). Off-the-peg and bespoke classifiers for fraud detection. Computational Statistics & Data Analysis, 52(9), 4521–4532.MathSciNetMATHCrossRef
28.
go back to reference Quah, J. T., & Sriganesh, M. (2008). Real-time credit card fraud detection using computational intelligence. Expert Systems with Applications, 35(4), 1721–1732.CrossRef Quah, J. T., & Sriganesh, M. (2008). Real-time credit card fraud detection using computational intelligence. Expert Systems with Applications, 35(4), 1721–1732.CrossRef
29.
go back to reference van der Maaten, L. J. P., & Hinton, G. E. (2014). Visualizing high-dimensional data using t-SNE. Journal of Machine Learning Research, 9, 3221–3245.MATH van der Maaten, L. J. P., & Hinton, G. E. (2014). Visualizing high-dimensional data using t-SNE. Journal of Machine Learning Research, 9, 3221–3245.MATH
31.
go back to reference Japkowicz N (2000) Learning from imbalanced data sets: A comparison of various strategies. AAAI Technical Report WS-00–05 Japkowicz N (2000) Learning from imbalanced data sets: A comparison of various strategies. AAAI Technical Report WS-00–05
32.
go back to reference Dermala, N., & Agrawal, A. N. (2016). Credit card fraud detection using SVM and reduction of false alarms. International Journal of Innovations in Engineering and Technology, 7(2), 176–182. Dermala, N., & Agrawal, A. N. (2016). Credit card fraud detection using SVM and reduction of false alarms. International Journal of Innovations in Engineering and Technology, 7(2), 176–182.
33.
go back to reference Carneiro, E. M., Dias, L. A. V., Da Cunha, A. M., & Mialaret, L. F. S. (2015). Cluster analysis and artificial neural networks: A case study in credit card fraud detection. In 12th international conference on information technology new generations (pp. 122–126). Carneiro, E. M., Dias, L. A. V., Da Cunha, A. M., & Mialaret, L. F. S. (2015). Cluster analysis and artificial neural networks: A case study in credit card fraud detection. In 12th international conference on information technology new generations (pp. 122–126).
34.
go back to reference Suman, M. B. (2014). Survey paper on credit card fraud detection. International Journal of Advanced Research in Computer Engineering & Technology, 3(3), 827–832. Suman, M. B. (2014). Survey paper on credit card fraud detection. International Journal of Advanced Research in Computer Engineering & Technology, 3(3), 827–832.
35.
go back to reference Bahnsen, A.C., Stojanovic, A., Aouada, D., & Ottersten, B. (2013). Cost sensitive credit card fraud detection using Bayes minimum risk. In 12th international conference on machine learning and apps (ICMLA) (pp. 333–338). Bahnsen, A.C., Stojanovic, A., Aouada, D., & Ottersten, B. (2013). Cost sensitive credit card fraud detection using Bayes minimum risk. In 12th international conference on machine learning and apps (ICMLA) (pp. 333–338).
36.
go back to reference Ozcelik, M. H., Duman, E., Isik, M., & Cevik, T. (2010). Improving a credit card fraud detection system using genetic algorithm. In International conference on information and network technologies (pp. 436–440). Ozcelik, M. H., Duman, E., Isik, M., & Cevik, T. (2010). Improving a credit card fraud detection system using genetic algorithm. In International conference on information and network technologies (pp. 436–440).
37.
go back to reference Dumana, Ekrem, & Hamdi Ozcelikb, M. (2011). Detecting credit card fraud by genetic algorithm and scatter search. Expert Systems with Applications, 38(10), 13057–13063.CrossRef Dumana, Ekrem, & Hamdi Ozcelikb, M. (2011). Detecting credit card fraud by genetic algorithm and scatter search. Expert Systems with Applications, 38(10), 13057–13063.CrossRef
38.
go back to reference Dheepa, V., & Dhanapal, R. (2012). Behavior based credit card fraud detection using spport vectors machines. ICTACT Journal on Soft Computing, 2(4), 391–397.CrossRef Dheepa, V., & Dhanapal, R. (2012). Behavior based credit card fraud detection using spport vectors machines. ICTACT Journal on Soft Computing, 2(4), 391–397.CrossRef
39.
go back to reference Pandey, S. C. (2019). Security issues of internet of things in health-care sector: An analytical approach. In Book: advancement of machine intelligence in interactive medical image analysis (pp. 307–329). Pandey, S. C. (2019). Security issues of internet of things in health-care sector: An analytical approach. In Book: advancement of machine intelligence in interactive medical image analysis (pp. 307–329).
40.
go back to reference Pandey, S. C. (2018). Mind, Machine, and Image Processing, Deep Learning and Image Processing (pp. 1–26). IOS Press. Pandey, S. C. (2018). Mind, Machine, and Image Processing, Deep Learning and Image Processing (pp. 1–26). IOS Press.
41.
go back to reference Pandey, S. C. (2019). Recent developments in big data analysis tools using apache spark, book on big data processing using spark in cloud (pp. 217–236). Springer.CrossRef Pandey, S. C. (2019). Recent developments in big data analysis tools using apache spark, book on big data processing using spark in cloud (pp. 217–236). Springer.CrossRef
42.
go back to reference Pandey, S. C., & Nandi, G. C. (2015). TSD based framework for mining the induction rules. Journal of Computational Science, 5, 184–195.CrossRef Pandey, S. C., & Nandi, G. C. (2015). TSD based framework for mining the induction rules. Journal of Computational Science, 5, 184–195.CrossRef
43.
go back to reference Mishra, K. N., & Chakraborty, C. (2020). A novel approach towards enhancing the quality of life in smart cities using clouds and iot based technologies, a book on digital twins technologies and smart cities (pp. 19–35). Springer. Mishra, K. N., & Chakraborty, C. (2020). A novel approach towards enhancing the quality of life in smart cities using clouds and iot based technologies, a book on digital twins technologies and smart cities (pp. 19–35). Springer.
44.
go back to reference Mishra, K. N. (2018). Importance of AADhar based smartcard systems’s implementation in developing countries, a book on advances in soft computing and machine learning in image processing (pp. 443–457). Springer. Mishra, K. N. (2018). Importance of AADhar based smartcard systems’s implementation in developing countries, a book on advances in soft computing and machine learning in image processing (pp. 443–457). Springer.
45.
go back to reference Mishra, K. N. (2018). A novel mechanism for cloud data management in distributed environment, a book on data intensive computing applications for big data (pp. 386–413). IOS Press. Mishra, K. N. (2018). A novel mechanism for cloud data management in distributed environment, a book on data intensive computing applications for big data (pp. 386–413). IOS Press.
46.
go back to reference Mishra K. N. (2016). AAdhar based smartcard system for security management in South Asia. In 2nd IEEE international conference on control computing communication and materials (IEEE ICCCCM—2016) (pp. 106–111). Mishra K. N. (2016). AAdhar based smartcard system for security management in South Asia. In 2nd IEEE international conference on control computing communication and materials (IEEE ICCCCM—2016) (pp. 106–111).
47.
go back to reference Singh I., Mishra K. N., Antonio M. Alberti, Singh D., and Singh M., (2015) A novel privacy and security framework for the cloud network services. In 17th IEEE international conference on advanced communication technologies (IEEE ICACT—2015) (pp. 363–367). Singh I., Mishra K. N., Antonio M. Alberti, Singh D., and Singh M., (2015) A novel privacy and security framework for the cloud network services. In 17th IEEE international conference on advanced communication technologies (IEEE ICACT—2015) (pp. 363–367).
48.
go back to reference Mishra, K. N., & Kumar, N. (2020). Muli – server multi-CS based deadlock prevention in distributed systems using voting and priority based approaches. Natl. Acad. Sci. Lett., 43(1–6), 2020. Mishra, K. N., & Kumar, N. (2020). Muli – server multi-CS based deadlock prevention in distributed systems using voting and priority based approaches. Natl. Acad. Sci. Lett., 43(1–6), 2020.
Metadata
Title
Fraud Prediction in Smart Societies Using Logistic Regression and k-fold Machine Learning Techniques
Authors
Kamta Nath Mishra
Subhash Chandra Pandey
Publication date
27-02-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08283-9

Other articles of this Issue 2/2021

Wireless Personal Communications 2/2021 Go to the issue