Sie sind auf Seite 1von 4

2018 IEEE International Conference on Information Reuse and Integration for Data Science

Supervised Machine Learning Algorithms for Credit Card Fraudulent


Transaction Detection: A Comparative Study
Sahil Dhankhad Emad A. Mohammed
Electrical and Computer Engineering Software Engineering Department
Lakehead University Lakehead University
Thunder Bay, ON, Canada Thunder Bay, ON, Canada
sdhankh1@lakeheadu.ca emohamme@lakeheadu.ca

Behrouz Far
Electrical and Computer Engineering pattern [3]. Early analysis of big data was centred
Calgary University primarily on data volume, for example, general public
Calgary, Canada database [4], biometrics, financial analysis [5], [6].
far@ucalgary.ca For frauds, the credit card is an easy and friendly
target because without any risk a significant amount
Abstract-The goal of data analytics is to of money is obtained within a short period [7]. To
commit credit card fraud, fraudsters try to steal
delineate hidden patterns and use them to
sensitive information such as credit card number,
support informed decisions in a variety of bank account and social security number [8], [6].
situations. Credit card fraud is escalating Fraudsters try to make every fraudulent transaction
significantly with the advancement of legitimate which makes fraud detection a challenging
modernized technology and became an easy problem [9]. Increased credit card transactions show
that approximately 70% of the people in the US can
target for frauds. Credit card fraud has
fall into the trap of these fraudsters [10].
highly imbalanced publicly available Credit card dataset is highly imbalanced dataset
datasets. In this paper, we apply many because it carries more legitimate transactions as
supervised machine learning algorithms to compared to the fraudulent one [11]. That means
detect credit card fraudulent transactions prediction will get very high accuracy score without
detecting a fraud transaction. To handle this kind of
using a real-world dataset. Furthermore, we
problem one better way is to class distribution, i.e.,
employ these algorithms to implement a sampling minority classes [12]. In sampling minority,
super classifier using ensemble learning class training example can be increased in proportion
methods. We identify the most important to the majority class to raise the chance of correct
variables that may lead to higher accuracy prediction by the algorithm [13].
in credit card fraudulent transaction In this paper, we use ten machine learning models
and compare their Accuracy, TPR, FPR, G-mean,
detection. Additionally, we compare and Recall, Precision, Specificity and F1-Score. All
discuss the performance of various machine learning algorithm is evaluated using a real-
supervised machine learning algorithms that world credit card transaction to identity fraud or non-
exist in literature against the super classifier fraud transaction. The main motive of this paper to
apply supervised learning method on the real-world
that we implemented in this paper.
dataset [14].

Keywords Credit Card, Fraud detection, 2. Related Studies


Supervised machine learning, Classification, Logistic regression and artificial neural network
Imbalanced dataset, Sampling. give flags whenever fraudulent and legitimate
transaction happens based upon their transaction
1. Introduction score. The performance of all the machine learning
Today, all around the world data is available very models decreases because of the skewness of the
easily, from small to big organizations are storing training dataset [15].
information that has high volume, variety, speed and To make the unbalanced dataset balanced two
worth. This information comes from tons of sources different methods are used namely, intrinsic features
like social media followers, likes and comments, and network-based features [16]. Intrinsic features
user’s purchase behaviours[1],[2].All this information compare customer’s past transactions looks for any
used for analysis andvisualization of the hidden data
pattern in it. Network-based features work by
exploiting the network of credit card holders and
merchants and deriving a time-dependent

978-1-5386-2659-7/18/$31.00 ©2018 IEEE 122


DOI 10.1109/IRI.2018.00025
suspiciousness score for each network object. These each one is slightly different from each other [8], [6].
two methods lead to a very high accuracy score in With first introduction in 1995 Navies Bayes using
Random Forest getting a 1% false positive making the Bayes theorem for independence hypothesis[27].
perfect model obtaining fraudulent transaction [11]. K-Nearest Neighborhood (KNN) is a necessary
Comparisons are made between different calculation which stores every single accessible
modelling and algorithm techniques on a real dataset. occurrence [28]. The Gradient Boosted Tree Classifier
Some of the algorithms underperform because of the (GBT) is a collection of classification and regression
unbalanced dataset [11]. To learn from (non-stream models. Boosting supports improve the tree accuracy.
credit card and data stream) unbalanced dataset has XGB (XG boost Classifier) is the most refined
three different methods used (static, update and classifier that works with all type of dataset.
DataStream). They also used two methods of under- The support vector machines (SVM) are initially
sampling SMOTE and Easy Ensemble to make their presented in 1995, and they have been observed to be
dataset balanced from an unbalanced dataset [17]. extremely fruitful in an assortment of exemplary
While in RF &SVM there is a decrement to see in classification tasks [6]. The MLP organize comprises
AUC and increment in F-measure [18]. of no less than three layers of hubs, i.e., input, covered
The neural network architecture used upon an up, and yield [26].
unsupervised method of using real-time transaction Ensemble learning (also known as meta-classifier)
entry [4]. Self-organizing map of the neural network helps to improve the results by combining multiple
by using optical classification it can solve the problem machine learning classifier to improve the predictive
for each associated with an associated group[19]. outcomes. Accuracy is one important method to
With 95% detection of fraud with ROC curve without compare the performance of classification models we
causing any false alarm. also look at the other factors like F1-Score, Precision,
Data Mining reports the development & TPR, FPR, Recall, G-mean and Specificity. All these
implementation of a fraud detection system in a large evaluations measures adequately reveal validation of
e-tail merchant [20]. Using a cost-based performance the study very well.
to train the algorithm to get the business outcomes
take longer time [21]. A bank seller decision support 4. Results and Discussion
system that used in outline banking fraud analysis and
investigation, that automatically find the fraud give We used 70% of the data is used for training and
them ranks and understand the user spending habits 30% used for the testing set. Data was balanced by
using their past transaction (based on mathematically using an under-sampling technique. So, we used
and statistical technique) [22]. Accuracy, F1-Score, Recall, Precision, G-Mean, FPR,
TRP and specificity are used to compare the models.
3. Material and Methods Table 1 shows all classifier results and
A. Supervised learning and unsupervised comparisons. In table 1, stacking classifier (0.9527
learning accuracies) is leading the other classifiers, followed
Using supervised method helps to find out the by the random forest (0.94594 accuracies) and XGB
label on past transaction, they tend to not recognized classifier (0.94594 accuracies) is helpful only when
fraud pattern that has occurred in the past [23], [24]. we have a symmetric dataset. Having a high precision
While unsupervised technique helps to find out the is related to the low false rate. In Figure (1) Random
class of transactions [22]. forest, stacking and XGB classifier all have the same
B. Unbalanced data precision score of 0.95 followed by the Gradient
It is quite challenging to learn from an unbalanced boosting and logistic regression with the precision
dataset and for balancing it, the sampling method score of 0.94. We find out recall also developed the
used. same ranking of precision in Figure (2). The F1-score
A publicly available dataset that contains 284,807 is the weighted median of precision and recall, and its
transactions made in Sep. 2013 by European score take false positive and false negative into
cardholders [25], [11]. The dataset includes 492 fraud account F1-score. F1-score also followed the same
transactions, which is highly imbalanced. Hence, ranking of Precision and Recall in Figure (3).
under-sampling was applied [14]. SVM has the highest ranking with 0.5360 FPR,
C. Fraud Detection Classifier and stacking classifier has the lowest ranking with
Logistic Regression can handle the data with 0.0335 in Figure (4). TPR of the logistic regression
theoretical and statistical characteristics. Decision has the highest ranking followed by the MLP and
Tree is a supervised learning method that widely uses stacking classifier. We find out the top five features in
models for classification and regression tasks [26]. table 2. Features 14 is the essential features and
Random Forest method used for classification and features and got selected by all algorithms. And V4 is
regression using the collection of the decision tree, decided by four features.

123
5. Conclusion • We can work on top ten features and find-out
• Under-sampling is done for balancing the the accuracy, Recall, Precision, Confusion
unbalanced dataset. matrix and compare it with our old result.
• The learning model’s evaluation is based on
their accuracy, recall, precision, TPR, FPR,
specificity and G-mean.
• The result of all the purposed models were
superior in overall performance.
• Overall results show that stacking classifier
which is used LR as meta classifier is most
promising for predicting fraud transaction in
the dataset, followed by the random forest
and XGB classifier.

Table 1. Performance evaluation of different Figure 3. Classifier ranking based on F1-score


classifiers.
Table 2. Feature rankings
g of dataset

Figure 1. Classifier ranking based on precision score

Figure 4. TPR and FPR performance of all the


classifier

Reference
[1] S. Bhattacharyya, S. Jha, K. Tharakunnel,
and J. C. Westland, “Data mining for credit
card fraud: A comparative study,” Decis.
Support Syst., vol. 50, no. 3, pp. 602–613,
2011.
[2] K. Chaudhary, J. Yadav, and B. Mallick, “A
Figure 2. Classifier ranking based on Recall score
review of Fraud Detection Techniques:
Credit Card,” Int. J. Comput. Appl., vol. 45,
6. Future implications no. 1, pp. 975–8887, 2012.
[3] “Mining of Massive Datasets Second
• Future work will be conducting the using the Edition.”
voting classifier and check the performance [4] F. N. Ogwueleka, “Data Mining Application
with other ML learning methods, increase in Credit Card Fraud Detection System,” vol.
the size of training and testing dataset. 6, no. 3, pp. 311–322, 2011.
• We can work on using the all the machine [5] H. Nordberg, K. Bhatia, K. Wang, and Z.
learning algorithm to find out the features Wang, “BioPig: a Hadoop-based analytic
importance.

124
toolkit for large-scale sequence data,” [18] E. W. T. Ngai, Y. Hu, Y. H. Wong, Y. Chen,
Bioinformatics, vol. 29, no. 23, pp. 3014– and X. Sun, “The application of data mining
3019, Dec. 2013. techniques in financial fraud detection: A
[6] M. Hegazy, A. Madian, and M. Ragaie, classification framework and an academic
“Enhanced Fraud Miner: Credit Card Fraud review of literature,” Decis. Support Syst.,
Detection using Clustering Data Mining vol. 50, no. 3, pp. 559–569, 2011.
Techniques,” Egypt. Comput. Sci., no. 03, [19] C. C. Lin, A. A. Chiu, S. Y. Huang, and D.
pp. 72–81, 2016. C. Yen, “Detecting the financial statement
[7] M. Zareapoor and P. Shamsolmoali, fraud: The analysis of the differences
“Application of credit card fraud detection: between data mining techniques and experts’
Based on bagging ensemble classifier,” judgments,” Knowledge-Based Syst., vol. 89,
Procedia Comput. Sci., vol. 48, no. C, pp. pp. 459–470, 2015.
679–686, 2015. [20] N. Carneiro, G. Figueira, and M. Costa, “A
[8] O. S. Yee, S. Sagadevan, N. Hashimah, and data mining based system for credit-card
A. Hassain, “Credit Card Fraud Detection fraud detection in e-tail,” Decis. Support
Using Machine Learning As Data Mining Syst., vol. 95, pp. 91–101, 2017.
Technique,” vol. 10, no. 1, pp. 23–27. [21] A. C. Bahnsen, D. Aouada, and B. Ottersten,
[9] K. Randhawa, C. K. Loo, M. Seera, C. P. “Example-dependent cost-sensitive logistic
Lim, and A. K. Nandi, “Credit Card Fraud regression for credit scoring,” Proc. - 2014
Detection Using AdaBoost and Majority 13th Int. Conf. Mach. Learn. Appl. ICMLA
Voting,” IEEE Access, vol. 6, pp. 14277– 2014, pp. 263–269, 2014.
14284, 2018. [22] M. Carminati, R. Caron, F. Maggi, I. Epifani,
[10] N. Mahmoudi and E. Duman, “Detecting and S. Zanero, “BankSealer: A decision
credit card fraud by Modified Fisher support system for online banking fraud
Discriminant Analysis,” Expert Syst. Appl., analysis and investigation,” Comput. Secur.,
vol. 42, no. 5, pp. 2510–2516, 2015. vol. 53, pp. 175–186, 2015.
[11] A. Dal Pozzolo, O. Caelen, Y. A. Le Borgne, [23] C. Whitrow, D. J. Hand, P. Juszczak, D.
S. Waterschoot, and G. Bontempi, “Learned Weston, and N. M. Adams, “Transaction
lessons in credit card fraud detection from a aggregation as a strategy for credit card fraud
practitioner perspective,” Expert Syst. Appl., detection,” Data Min. Knowl. Discov., vol.
vol. 41, no. 10, pp. 4915–4928, 2014. 18, no. 1, pp. 30–55, Feb. 2009.
[12] M. A. Scholar, M. Ali, and P. Fellow, [24] G. Rushin, C. Stancil, M. Sun, S. Adams,
“Investigating the Performance of Smote for and P. Beling, “Horse race analysis in credit
Class Imbalanced Learning : A Case Study card fraud - Deep learning, logistic
of Credit Scoring Datasets,” vol. 13, no. 33, regression, and Gradient Boosted Tree,”
pp. 340–353, 2017. 2017 Syst. Inf. Eng. Des. Symp. SIEDS 2017,
[13] H. He, W. Zhang, and S. Zhang, “A novel pp. 117–121, 2017.
ensemble method for credit scoring: [25] R. J. Bolton, D. J. Hand, F. Provost, L.
Adaption of different imbalance ratios,” Breiman, R. J. Bolton, and D. J. Hand,
Expert Syst. Appl., vol. 98, pp. 105–117, “Statistical Fraud Detection: A
May 2018. ReviewCommentCommentRejoinder,” Stat.
[14] A. Dal Pozzolo, O. Caelen, R. A. Johnson, Sci., vol. 17, no. 3, pp. 235–255, 2002.
and G. Bontempi, “Calibrating Probability [26] X.-Y. Liu, J. Wu, and Z.-H. Zhou,
with Undersampling for Unbalanced “Exploratory Undersampling for Class-
Classification.” Imbalance Learning,” vol. 39, no. 2, 2009.
[15] Y. Sahin and E. Duman, “Detecting Credit [27] E. A. Mohammed, M. M. A. Mohamed, C.
Card Fraud by Decision Trees and Support Naugler, and B. H. Far, “Toward leveraging
Vector Machines,” Int. Multiconference Eng. big value from data: chronic lymphocytic
Comput. Sci., vol. I, pp. 442–447, 2011. leukemia cell classification,” Netw. Model.
[16] V. Van Vlasselaer et al., “APATE: A novel Anal. Heal. Informatics Bioinforma., vol. 6,
approach for automated credit card no. 1, p. 6, Dec. 2017.
transaction fraud detection using network- [28] G. H. John and P. Langley, “Estimating
based extensions,” Decis. Support Syst., vol. Continuous Distributions in Bayesian
75, pp. 38–48, 2015. Classifiers,” Feb. 2013.
[17] C. Phua, D. Alahakoon, and V. Lee,
“Minority report in fraud detection,” ACM
SIGKDD Explor. Newsl., vol. 6, no. 1, p. 50,
2004.

125

Das könnte Ihnen auch gefallen