A Proposed Fraud Detection Model based on e-Payments Attributes a Case Study in Egyptian e-Payment Gateway

被引:0
作者
Nasr, Mohamed Hassan [1 ]
Nasr, Mona Mohamed [1 ]
Farrag, Mohamed Hassan [2 ]
机构
[1] Helwan Univ, Fac Comp & Informat Syst, Cairo, Egypt
[2] Fayoum Univ, Fac Comp & Informat Syst, Al Fayyum, Egypt
关键词
Data mining; decision tree; e-payments; fraud detection; e-payment gateways; e-commerce;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As per Payfort's 2017 report, titled State of payments in the Arab world; Egypt had a 22% yearly increase in the overall volume of internet payments in 2016, which was assessed at $6.2 billion. e-Payments are the major point of life nowadays in Egypt and the whole world; with tens of e-payments companies in Egypt and more than 5 million transactions done every day and 60 billion EGP volume of payments in 2018. Online and mobile fraud was estimated at $10.7 billion in 2015, as per Juniper Research, and is expected to reach $25.6 billion by the end of the decade. As the whole e-payments business is affected by fraud, e-payments firms and their consumers lose a lot of money. On the other hand, one of the most powerful techniques that could be used for fraud predictive is data mining techniques such as the decision tree. This paper introduces a prediction model for managing the risk of fraud in the Egyptian e-payment market that helps to reduce the loss of money. This model is developed using a real dataset from one of Egypt's top e-payment gateways based on the e-payment transaction attributes importance like transaction time, transaction amount, transaction limit, and transaction customer No. repetition limit. The importance of these attributes was determined using IBM SPSS modeler's decision tree and its predictors' importance. The model significantly assisted in the reduction of fraud cases by a very high rate, with an accuracy of 88.45% and a precision of 93.5% resulting in a savings of 101970.52 EGP out of 131297.83 EGP.
引用
收藏
页码:179 / 186
页数:8
相关论文
共 12 条
[1]   Fraud detection system: A survey [J].
Abdallah, Aisha ;
Maarof, Mohd Aizaini ;
Zainal, Anazida .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 68 :90-113
[2]  
[Anonymous], 2016, EUR J BUS MANAG
[3]  
Bamnote G R, 2012, INT J SOFT COMPUTING, V2, P231
[4]   ConvNets for Fraud Detection analysis [J].
Chouiekh, Alae ;
Ibn El Haj, El Hassane .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 :133-138
[5]  
Kabir M A., 2015, P INT C E COMM KUCH, P112
[6]  
Mwanza M., 2017, THESIS U ZAMBIA
[7]  
Nasr M.H., 2020, Int. J. Intell. Comput. Inf. Sci., V20, P16
[8]  
Nuruzzaman M., 2021, P 2021 5 INT C INT C, P1
[9]  
Rieke Roland, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P662, DOI 10.1109/ARES.2013.87
[10]  
Sahu A., 2020, P 2020 IEEE 17 IND C, P1, DOI [10.1109/INDICON49873.2020.9342462, DOI 10.1109/INDICON49873.2020.9342462]