IJISA Vol. 18, No. 2, 8 Apr. 2026
Cover page and Table of Contents: PDF (size: 1192KB)
PDF (1192KB), PP.110-124
Views: 0 Downloads: 0
Credit Card, Online Transaction, Fraud Transaction, Knowledge Discovery, Machine Learning
Electronic devices and internet purchasing are more common today. For online line shopping most of people are using internet banking and credit for doing payment for purchasing. For time saving and various offers on credit card and debit card customer prefer on line shopping like various platform Amazon, Flip cart, big basket etc. For online transaction security is prime concern. There is various type of attack possible during online transaction, stealing of password, fraud transaction, and meet in middle attack etc. During the online transaction stealing confidential information like OTP, transfer money from someone account to another account is a crime. In the digital world fraud during the online transaction day by day increases exponentially. To detect the unauthenticated transaction and fraud during online used various methods. Data is playing very important role during the online fraud. So, knowledge discovery is most frequently used to protect online fraud. In this paper suggested a technique based on knowledge discovery and machine learning methods, we strive to develop the best model possible in this research study to predict transactions involving fraud and transactions involving no fraud. Fraud detection uses a variety of machine learning techniques, including K-Means clustering methods, Support Vector Classifier, Logistic Regression, and Anomaly Detection Algorithm Techniques. After analysis it was found that Anomaly Detection Algorithm Techniques gives best accuracy for fraud detection 99.85%.
Himanshu Sirohi, Pradeep Kumar, Anuradha Singh, Bijendra Tyagi, Niraj Singhal, Avimanyou Vatsa, "Identification of Deceptive Online Transactions Using Machine Learning Driven Knowledge Discovery", International Journal of Intelligent Systems and Applications(IJISA), Vol.18, No.2, pp.110-124, 2026. DOI:10.5815/ijisa.2026.02.08
[1]A. Ali et al., “Financial Fraud Detection Based on Machine Learning: A Systematic Literature Review,” Appl. Sci., vol. 12, no. 19, 2022, doi: 10.3390/app12199637.
[2]V. Chang, B. Ali, L. Golightly, M. A. Ganatra, and M. Mohamed, “Investigating Credit Card Payment Fraud with Detection Methods Using Advanced Machine Learning,” Inf., vol. 15, no. 8, pp. 1–20, 2024, doi: 10.3390/info15080478.
[3]S. El Kafhali, M. Tayebi, and H. Sulimani, “An Optimized Deep Learning Approach for Detecting Fraudulent Transactions,” Inf., vol. 15, no. 4, pp. 1–25, 2024, doi: 10.3390/info15040227.
[4]M. Wazid, A. K. Das, V. Chamola, and Y. Park, “Uniting cyber security and machine learning: Advantages, challenges and future research,” ICT Express, vol. 8, no. 3, pp. 313–321, 2022, doi: 10.1016/j.icte.2022.04.007.
[5]M. H. Rezayati, A. Amirany, M. H. Moaiyeri, and K. Jafari, “A new method for securing binary deep neural networks against model replication attacks using magnetic tunnel junctions,” Int. J. Inf. Secur., vol. 24, no. 1, 2025, doi: 10.1007/s10207-024-00976-z.
[6]S. M. N. Nobel et al., “Unmasking Banking Fraud: Unleashing the Power of Machine Learning and Explainable AI (XAI) on Imbalanced Data,” Inf., vol. 15, no. 6, pp. 1–22, 2024, doi: 10.3390/info15060298.
[7]M. Aljabri et al., “Machine Learning-Based Detection for Unauthorized Access to IoT Devices,” J. Sens. Actuator Networks, vol. 12, no. 2, 2023, doi: 10.3390/jsan12020027.
[8]M. Sánchez-Aguayo, L. Urquiza-Aguiar, and J. Estrada-Jiménez, “Fraud detection using the fraud triangle theory and data mining techniques: A literature review,” Computers, vol. 10, no. 10, pp. 1–22, 2021, doi: 10.3390/computers10100121.
[9]X. Feng and S. K. Kim, “Novel Machine Learning Based Credit Card Fraud Detection Systems,” Mathematics, vol. 12, no. 12, 2024, doi: 10.3390/math12121869.
[10]T. Ashfaq et al., “Detection Mechanism,” pp. 1–20, 2022.
[11]V. N. Dornadula and S. Geetha, “Credit Card Fraud Detection using Machine Learning Algorithms,” Procedia Comput. Sci., vol. 165, pp. 631–641, 2019, doi: 10.1016/j.procs.2020.01.057.
[12]N. Rtayli and N. Enneya, “Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization,” J. Inf. Secur. Appl., vol. 55, no. September, p. 102596, 2020, doi: 10.1016/j.jisa.2020.102596.
[13]P. Kumar, N. Singhal, D. Pandey, and A. Vatsa, “Secure Mobile Agent Migration Using Lagrange Interpolation and Fast Fourier Transformation,” Int. J. Comput. Netw. Inf. Secur., vol. 15, no. 4, pp. 72–83, 2023, doi: 10.5815/ijcnis.2023.04.07.
[14]E. Ileberi, Y. Sun, and Z. Wang, “A machine learning based credit card fraud detection using the GA algorithm for feature selection,” J. Big Data, vol. 9, no. 1, 2022, doi: 10.1186/s40537-022-00573-8.
[15]J. Diakoumakos, E. Chaskos, N. Kolokotronis, and G. Lepouras, “Cyber-security gamification in federation of cyber ranges : design , implementation , and evaluation,” Int. J. Inf. Secur., vol. 123, pp. 1–23, 2025, doi: 10.1007/s10207-024-00974-1.
[16]C. Yang, Y. Ma, B. Xie, Y. Li, and S. Cong, “Multi-user covert communication in power internet of things networks,” Int. J. Inf. Secur., vol. 24, no. 1, 2025, doi: 10.1007/s10207-024-00960-7.
[17]F. Binbeshr, M. L. Mat Kiah, L. Y. Por, and A. A. Zaidan, “A systematic review of PIN-entry methods resistant to shoulder-surfing attacks,” Comput. Secur., vol. 101, 2021, doi: 10.1016/j.cose.2020.102116.
[18]I. H. Sarker, “Machine Learning for Intelligent Data Analysis and Automation in Cybersecurity: Current and Future Prospects,” Ann. Data Sci., vol. 10, no. 6, pp. 1473–1498, 2023, doi: 10.1007/s40745-022-00444-2.
[19]I. H. Sarker, A. S. M. Kayes, S. Badsha, H. Alqahtani, P. Watters, and A. Ng, “Cybersecurity data science: an overview from machine learning perspective,” J. Big Data, vol. 7, no. 1, 2020, doi: 10.1186/s40537-020-00318-5.