Fraud Prediction in Smart Societies Using Logistic Regression and k-fold Machine Learning Techniques

被引:1
作者
Kamta Nath Mishra
Subhash Chandra Pandey
机构
[1] Birla Institute of Technology,Department of Computer Science and Engineering
来源
Wireless Personal Communications | 2021年 / 119卷
关键词
Cloud-IoT based distributed environment; Confusion matrix; Fraud detection; Fraudulent; Logistic regression; Machine learning; Mean-recall-score; ROC curve;
D O I
暂无
中图分类号
学科分类号
摘要
The credit/debit card deceit detection is an enormously difficult task. However, it is a well known problem of our cloud based mobile internet society and it must be solved by technocrats in the welfare of societal mental harassments. The main problem in executing credit/debit card fraud detection technique is the availability of limited amount of fraud related data like transaction amount, transaction date, transaction time, address, and vendor category code related to the frauds. It is the truth of mobile internet world that there are billions of potential places and e-commerce websites where a credit/debit card can be used by fraudulent people for online transactions and payments which make it exceedingly thorny to trace the pattern of frauds. Moreover, the problem of fraud detection in cloud— Internet of Things (IoT) based smart societies has numerous constraints like continuous change in the behavior of normal and fraudulent persons, the fraudulent people try to develop and use new method for executing frauds, and very little availability of frauds related bench mark data sets. In this research article, the authors have presented logistic regression based k-fold machine learning technique (MLT) for fraud detection and prevention in cloud-IoT based smart societal environment. The k-fold method creates multiple folds of bank transactions related data before implementing logistic regression and MLT. The logistic regression performs logic based regression analysis and the intelligent machine learning approach performs registration, classification, clustering, dimensionality reduction, deep learning, training, and reinforcement learning steps on the received bank transactions data. The implementation of proposed methodology and its further analysis using intelligent machine learning tools like ROC (Receiver Operating Characteristic) curve, confusion matrix, mean-recall score value, and precision recall curves for European banks day-to-day transactions related bench mark data set reveal that the proposed methodology is efficient, accurate, and reliable for detecting frauds in cloud-IoT based smart societal environment.
引用
收藏
页码:1341 / 1367
页数:26
相关论文
共 46 条
  • [1] Ray S(2020)Big data security issues from the perspective of IoT and cloud computing: a review Recent Advances in Computer Science and Communications, Benthem Science Journal 13 1-25
  • [2] Mishra KN(2002)Statistical fraud detection: A review Statistical Science 28 235-255
  • [3] Dutta S(2005)A comprehensive survey of data mining-based fraud detection research Artificial Intelligence Review 29 1-14
  • [4] Bolton RJ(2018)Credit card fraud detection using machine learning models and collating machine learning models International Journal of Pure and Applied Mathematics 118 825-837
  • [5] Hand DJ(2009)Association rules applied to credit card fraud detection Expert Systems with Applications 36 3630-3640
  • [6] Phua C(2009)Credit card fraud detection: A fusion approach using Dempster–Shafer theory and Bayesian learning Information Fusion 10 354-363
  • [7] Lee V(2018)Computational intelligence approaches for energy load forecasting in smart energy management grids: state of the art, future challenges, and research directions Energies 11 1-31
  • [8] Smith K(2011)Research on credit card fraud detection model based on class weighted support vector machine Journal of Convergence Information Technology 6 62-68
  • [9] Gayler R(2018)Predictive modelling for credit card fraud detection using data analytics Procedia Computer Science 132 385-395
  • [10] Navanshu K(2012)Analysis of credit card fraud detection techniques: Based on certain design criteria International Journal of Computer Applications 52 35-42