Skip to main content
Log in

Fraud Prediction in Smart Societies Using Logistic Regression and k-fold Machine Learning Techniques

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The credit/debit card deceit detection is an enormously difficult task. However, it is a well known problem of our cloud based mobile internet society and it must be solved by technocrats in the welfare of societal mental harassments. The main problem in executing credit/debit card fraud detection technique is the availability of limited amount of fraud related data like transaction amount, transaction date, transaction time, address, and vendor category code related to the frauds. It is the truth of mobile internet world that there are billions of potential places and e-commerce websites where a credit/debit card can be used by fraudulent people for online transactions and payments which make it exceedingly thorny to trace the pattern of frauds. Moreover, the problem of fraud detection in cloud— Internet of Things (IoT) based smart societies has numerous constraints like continuous change in the behavior of normal and fraudulent persons, the fraudulent people try to develop and use new method for executing frauds, and very little availability of frauds related bench mark data sets. In this research article, the authors have presented logistic regression based k-fold machine learning technique (MLT) for fraud detection and prevention in cloud-IoT based smart societal environment. The k-fold method creates multiple folds of bank transactions related data before implementing logistic regression and MLT. The logistic regression performs logic based regression analysis and the intelligent machine learning approach performs registration, classification, clustering, dimensionality reduction, deep learning, training, and reinforcement learning steps on the received bank transactions data. The implementation of proposed methodology and its further analysis using intelligent machine learning tools like ROC (Receiver Operating Characteristic) curve, confusion matrix, mean-recall score value, and precision recall curves for European banks day-to-day transactions related bench mark data set reveal that the proposed methodology is efficient, accurate, and reliable for detecting frauds in cloud-IoT based smart societal environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Aleskerov, E., Freisleben, B., & Rao, B. (1997). CARDWATCH: A neural network-based database mining system for credit card fraud detection. In Proceedings of the IEEE/IAFE on computational intelligence for financial engineering (pp. 220–226).

  2. Anderson, R. (2007). The credit scoring toolkit: Theory and practice for retail credit risk management and decision automation. Oxford University Press.

    Google Scholar 

  3. APACS, Association for Payment Cleaning Services, no date. Card Fraud Facts and Figures. Retrieved February 2020, from http://www.apacs.org.uk/resources_publications/card_fraud_facts_and_figures.html.

  4. Bellis, M. Who Invented Credit Cards-the History of Credit Cards. Retrieved February 2020, from http://inventors.about.com/od/cstartinventions/a/credit_cards.htm.

  5. Retrieved March 2020, from http://mlg.ulb.ac.be.

  6. Mena, J. (2003). Investigate data mining for security and criminal detection (pp. 1–272). Elsevier.

    Google Scholar 

  7. Ray, S., Mishra, K. N., & Dutta, S. (2020). Big data security issues from the perspective of IoT and cloud computing: a review. Recent Advances in Computer Science and Communications, Benthem Science Journal, 13, 1–25.

    Article  Google Scholar 

  8. Chen, R., Chiu, M., Huang, Y., & Chen, L. (2004). Detecting credit card fraud by using questionnaire responded transaction model based on SVMs. In Proceedings of IDEAL2004 (pp. 800–806).

  9. Bolton, R. J., & Hand, D. J. (2002). Statistical fraud detection: A review. Statistical Science, 28(3), 235–255.

    MathSciNet  MATH  Google Scholar 

  10. Kou, Y., Lu, C.-T., Sirwongwattana, S., & Huang, Y. P. (2004). Survey of fraud detection techniques. In Proceedings of the 2004 IEEE International Conference on Networking, Sensing and Control, Taipei (pp. 1–6).

  11. Phua, C., Lee, V., Smith, K., & Gayler, R. (2005). A comprehensive survey of data mining-based fraud detection research. Artificial Intelligence Review, 24, 1–14.

    Google Scholar 

  12. Sahin, Y., & Duman, E. (2011). Detecting credit card fraud by ANN and logistic regression. In International symposium on innovations in intelligent systems and applications (pp. 315–319).

  13. Navanshu, K., & Saad, Y. S. (2018). Credit card fraud detection using machine learning models and collating machine learning models. International Journal of Pure and Applied Mathematics, 118(20), 825–837.

    Google Scholar 

  14. Maes, S., Tuyls, K., Vanschoenwinkel, B., & Manderick, B. (1993). Credit card fraud detection using Baysian and Neural Network. In R. J. Maciunas (Ed.), Interactive image-guided neurosurgery (pp. 261–270). American Association Neurological Surgeons.

    Google Scholar 

  15. Kundu, A., Sural, S., & Majumdar, A. (2006). Two-stage credit card fraud detection using sequence alignment. In International conference on information systems security, LNCS (pp. 260–275).

  16. Seyedhossein, L., & Hashemi, M. R. (2010). Mining information from credit card time series for timelier fraud detection. In Telecommunications (IST), 5th international symposium on IEEE (pp. 619–624).

  17. Sánchez, D., et al. (2009). Association rules applied to credit card fraud detection. Expert Systems with Applications, 36(2), 3630–3640.

    Article  Google Scholar 

  18. Panigrahi, S., et al. (2009). Credit card fraud detection: A fusion approach using Dempster–Shafer theory and Bayesian learning. Information Fusion, 10(4), 354–363.

    Article  Google Scholar 

  19. Fallah, S. N., Deo, R. C., Shojafar, M., Conti, M., & Shamshirband, S. (2018). Computational intelligence approaches for energy load forecasting in smart energy management grids: state of the art, future challenges, and research directions. Energies, 11(3), 1–31.

    Article  Google Scholar 

  20. Chen, R.-C., et al. (2004). Detecting credit card fraud by using questionnaire-responded transaction model based on support vector machines. In Intelligent data engineering and automated learning–IDEAL (pp. 800–806).

  21. Lu, Q., & Ju, C. (2011). Research on credit card fraud detection model based on class weighted support vector machine. Journal of Convergence Information Technology, 6(1), 62–68.

    Article  Google Scholar 

  22. Patil, S., Nemade, V., & Soni, P. K. (2018). Predictive modelling for credit card fraud detection using data analytics. Procedia Computer Science, 132, 385–395.

    Article  Google Scholar 

  23. Ghosh, S., & Reilly, D. L. (1994). Credit card fraud detection with a neural-network. In Proceedings of 27th annual conference on system science (pp. 621–630).

  24. Zareapoor, M., Seeja, K. R., & Alam, M. A. (2012). Analysis of credit card fraud detection techniques: Based on certain design criteria. International Journal of Computer Applications, 52(3), 35–42.

    Article  Google Scholar 

  25. Syeda, M., Zhang, Y.-Q., & Pan, Y. (2002). Parallel granular neural networks for fast credit card fraud detection. In Proceedings of IEEE international conference (pp. 572–577).

  26. Zojaji, Z., Atani, R. E., & Monadjemi, A. H. (2016). A survey of credit card fraud detection techniques: Data and technique oriented perspective, cryptography and security (pp. 1–10).

  27. Juszczak, P., Adams, N. M., Hand, D. J., Whitrow, C., & Weston, D. J. (2008). Off-the-peg and bespoke classifiers for fraud detection. Computational Statistics & Data Analysis, 52(9), 4521–4532.

    Article  MathSciNet  MATH  Google Scholar 

  28. Quah, J. T., & Sriganesh, M. (2008). Real-time credit card fraud detection using computational intelligence. Expert Systems with Applications, 35(4), 1721–1732.

    Article  Google Scholar 

  29. van der Maaten, L. J. P., & Hinton, G. E. (2014). Visualizing high-dimensional data using t-SNE. Journal of Machine Learning Research, 9, 3221–3245.

    MATH  Google Scholar 

  30. Machine Learning Group — ULB, Credit Card Fraud Detection. (2018). Kaggle, 3784–3797. Retrieved March 2020, from https://www.kaggle.com/mlg-ulb/creditcardfraud.

  31. Japkowicz N (2000) Learning from imbalanced data sets: A comparison of various strategies. AAAI Technical Report WS-00–05

  32. Dermala, N., & Agrawal, A. N. (2016). Credit card fraud detection using SVM and reduction of false alarms. International Journal of Innovations in Engineering and Technology, 7(2), 176–182.

    Google Scholar 

  33. Carneiro, E. M., Dias, L. A. V., Da Cunha, A. M., & Mialaret, L. F. S. (2015). Cluster analysis and artificial neural networks: A case study in credit card fraud detection. In 12th international conference on information technology new generations (pp. 122–126).

  34. Suman, M. B. (2014). Survey paper on credit card fraud detection. International Journal of Advanced Research in Computer Engineering & Technology, 3(3), 827–832.

    Google Scholar 

  35. Bahnsen, A.C., Stojanovic, A., Aouada, D., & Ottersten, B. (2013). Cost sensitive credit card fraud detection using Bayes minimum risk. In 12th international conference on machine learning and apps (ICMLA) (pp. 333–338).

  36. Ozcelik, M. H., Duman, E., Isik, M., & Cevik, T. (2010). Improving a credit card fraud detection system using genetic algorithm. In International conference on information and network technologies (pp. 436–440).

  37. Dumana, Ekrem, & Hamdi Ozcelikb, M. (2011). Detecting credit card fraud by genetic algorithm and scatter search. Expert Systems with Applications, 38(10), 13057–13063.

    Article  Google Scholar 

  38. Dheepa, V., & Dhanapal, R. (2012). Behavior based credit card fraud detection using spport vectors machines. ICTACT Journal on Soft Computing, 2(4), 391–397.

    Article  Google Scholar 

  39. Pandey, S. C. (2019). Security issues of internet of things in health-care sector: An analytical approach. In Book: advancement of machine intelligence in interactive medical image analysis (pp. 307–329).

  40. Pandey, S. C. (2018). Mind, Machine, and Image Processing, Deep Learning and Image Processing (pp. 1–26). IOS Press.

    Google Scholar 

  41. Pandey, S. C. (2019). Recent developments in big data analysis tools using apache spark, book on big data processing using spark in cloud (pp. 217–236). Springer.

    Book  Google Scholar 

  42. Pandey, S. C., & Nandi, G. C. (2015). TSD based framework for mining the induction rules. Journal of Computational Science, 5, 184–195.

    Article  Google Scholar 

  43. Mishra, K. N., & Chakraborty, C. (2020). A novel approach towards enhancing the quality of life in smart cities using clouds and iot based technologies, a book on digital twins technologies and smart cities (pp. 19–35). Springer.

    Google Scholar 

  44. Mishra, K. N. (2018). Importance of AADhar based smartcard systems’s implementation in developing countries, a book on advances in soft computing and machine learning in image processing (pp. 443–457). Springer.

    Google Scholar 

  45. Mishra, K. N. (2018). A novel mechanism for cloud data management in distributed environment, a book on data intensive computing applications for big data (pp. 386–413). IOS Press.

    Google Scholar 

  46. Mishra K. N. (2016). AAdhar based smartcard system for security management in South Asia. In 2nd IEEE international conference on control computing communication and materials (IEEE ICCCCM—2016) (pp. 106–111).

  47. Singh I., Mishra K. N., Antonio M. Alberti, Singh D., and Singh M., (2015) A novel privacy and security framework for the cloud network services. In 17th IEEE international conference on advanced communication technologies (IEEE ICACT—2015) (pp. 363–367).

  48. Mishra, K. N., & Kumar, N. (2020). Muli – server multi-CS based deadlock prevention in distributed systems using voting and priority based approaches. Natl. Acad. Sci. Lett., 43(1–6), 2020.

    Google Scholar 

Download references

Funding

Funding was provided by Birla Institute of Scientific Research (Grant No. 0012).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kamta Nath Mishra.

Ethics declarations

Conflict of interest

The author declares that there is no conflict of interest with any person or organization in publishing this paper anywhere.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mishra, K.N., Pandey, S.C. Fraud Prediction in Smart Societies Using Logistic Regression and k-fold Machine Learning Techniques. Wireless Pers Commun 119, 1341–1367 (2021). https://doi.org/10.1007/s11277-021-08283-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08283-9

Keywords

Navigation