Skip to main content

2024 | OriginalPaper | Buchkapitel

A Machine Learning Framework for Enhancing Security of Transaction in Saudi Banks Based on User Behavior

verfasst von : Haneen Almayouf, Shoaa Almudhibri, Wejdan Alsayegh, Meshaiel Alsheail, Salam Almneiy, Arwa Albelaihi, Haya Duhisan

Erschienen in: Advances in Emerging Information and Communication Technology

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, with most of the world operating remotely, online banking is very popular in Saudi Arabia. However, fraudsters often set up fake websites or apps to obtain bank account information, which they use to scam and steal money. They may create fake transactions or manipulate genuine ones to transfer funds to another account they own. This widespread problem requires solutions from banks to reduce the incidence of bank fraud. Our proposed system aims to tackle this issue by analyzing user behavior, identifying unusual behavior, and alerting users to stop the process if necessary. In this research, we applied two different models with two alternative datasets: one is real dataset, while the second simulated dataset. This research evaluated the performance of two different models: first is hybrid neuro-fuzzy model based on combination of deep neural networks and fuzzy logic algorithm (DNF), while the second is deep neural network (DNN) model. The result of our experiment showed that the DNN model achieved the highest accuracy by reaching 99.95%, while the DNF model is faster which seems to be more acceptable in real-time transactions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat R. Akerkar, P. Sajja, Knowledge-Based Systems (Jones & Bartlett Publishers, 2009) R. Akerkar, P. Sajja, Knowledge-Based Systems (Jones & Bartlett Publishers, 2009)
6.
Zurück zum Zitat M. Ussath, D. Jaeger, F. Cheng, C. Meinel, Identifying suspicious user behavior with neural networks, in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), (IEEE, 2017), pp. 255–263CrossRef M. Ussath, D. Jaeger, F. Cheng, C. Meinel, Identifying suspicious user behavior with neural networks, in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), (IEEE, 2017), pp. 255–263CrossRef
7.
Zurück zum Zitat A.G. Martín, A. Fernández-Isabel, I. Martín de Diego, M. Beltrán, A survey for user behavior analysis based on machine learning techniques: Current models and applications. Appl. Intell. 51(8), 6029–6055 (2021)CrossRef A.G. Martín, A. Fernández-Isabel, I. Martín de Diego, M. Beltrán, A survey for user behavior analysis based on machine learning techniques: Current models and applications. Appl. Intell. 51(8), 6029–6055 (2021)CrossRef
8.
Zurück zum Zitat J.M. Helm, A.M. Swiergosz, H.S. Haeberle, J.M. Karnuta, J.L. Schaffer, V.E. Krebs, A.I. Spitzer, P.N. Ramkumar, Machine learning and artificial intelligence: Definitions, applications, and future directions. Curr. Rev. Musculoskelet. Med. 13(1), 69–76 (2020)CrossRef J.M. Helm, A.M. Swiergosz, H.S. Haeberle, J.M. Karnuta, J.L. Schaffer, V.E. Krebs, A.I. Spitzer, P.N. Ramkumar, Machine learning and artificial intelligence: Definitions, applications, and future directions. Curr. Rev. Musculoskelet. Med. 13(1), 69–76 (2020)CrossRef
9.
Zurück zum Zitat S. Parmar, “Computer, Internet and Network Systems Scurity,” 2010 S. Parmar, “Computer, Internet and Network Systems Scurity,” 2010
11.
Zurück zum Zitat V. Dutt, V. Chaudhry, I. Khan, Pattern recognition: an overview. American Journal of Intelligent Systems 2, 23–27 (2012)CrossRef V. Dutt, V. Chaudhry, I. Khan, Pattern recognition: an overview. American Journal of Intelligent Systems 2, 23–27 (2012)CrossRef
12.
Zurück zum Zitat E. Alpaydin, Introduction to Machine Learning (MIT Press, 2020) E. Alpaydin, Introduction to Machine Learning (MIT Press, 2020)
13.
Zurück zum Zitat A. Dongare, R. Kharde, A.D. Kachare, et al., Introduction to artificial neural network. IJEIT 2(1), 189–194 (2012) A. Dongare, R. Kharde, A.D. Kachare, et al., Introduction to artificial neural network. IJEIT 2(1), 189–194 (2012)
14.
Zurück zum Zitat J. Vieira, F. Morgado-Dias, A. Mota, Neuro-fuzzy systems: A survey. WSEAS Transactions on Systems 3, 414–419 (2004) J. Vieira, F. Morgado-Dias, A. Mota, Neuro-fuzzy systems: A survey. WSEAS Transactions on Systems 3, 414–419 (2004)
15.
Zurück zum Zitat J.T.S. Quah, M. Sriganesh, Real time credit card fraud detection using computational intelligence. Int. J. Conf. Neural Network 2007, 863–868 (2007)CrossRef J.T.S. Quah, M. Sriganesh, Real time credit card fraud detection using computational intelligence. Int. J. Conf. Neural Network 2007, 863–868 (2007)CrossRef
16.
Zurück zum Zitat S. Panigrahi, A. Kundu, S. Sural, A.K. Majumdar, Credit card fraud detection: A fusion approach using dempster–Shafer theory and bayesian learning. Inf. Fusion 10(4), 354–363 (2009)CrossRef S. Panigrahi, A. Kundu, S. Sural, A.K. Majumdar, Credit card fraud detection: A fusion approach using dempster–Shafer theory and bayesian learning. Inf. Fusion 10(4), 354–363 (2009)CrossRef
17.
Zurück zum Zitat I. Brosso, A. La Neve, G. Bressan, W.V. Ruggiero, A continuous authentication system based on user behavior analysis, in 2010 International Conference on Availability, Reliability and Security, (IEEE, 2010), pp. 380–385CrossRef I. Brosso, A. La Neve, G. Bressan, W.V. Ruggiero, A continuous authentication system based on user behavior analysis, in 2010 International Conference on Availability, Reliability and Security, (IEEE, 2010), pp. 380–385CrossRef
18.
Zurück zum Zitat S.M. Darwish, A bio-inspired credit card fraud detection model based on user behavior analysis suitable for business management in electronic banking. J. Ambient. Intell. Humaniz. Comput. 11(11), 4873–4887 (2020)CrossRef S.M. Darwish, A bio-inspired credit card fraud detection model based on user behavior analysis suitable for business management in electronic banking. J. Ambient. Intell. Humaniz. Comput. 11(11), 4873–4887 (2020)CrossRef
19.
Zurück zum Zitat H. Najadat, O. Altiti, A.A. Aqouleh, M. Younes, Credit card fraud detection based on machine and deep learning, in 2020 11th International Conference on Information and Communication Systems (ICICS), (IEEE, 2020), pp. 204–208CrossRef H. Najadat, O. Altiti, A.A. Aqouleh, M. Younes, Credit card fraud detection based on machine and deep learning, in 2020 11th International Conference on Information and Communication Systems (ICICS), (IEEE, 2020), pp. 204–208CrossRef
20.
Zurück zum Zitat A.F. Ghahfarokhi, T. Mansouri, M.R.S. Moghaddam, N. Bahrambeik, R. Yavari, M.F. Sani, Credit card fraud detection using asexual reproduction optimization. Kybernetes (2021) A.F. Ghahfarokhi, T. Mansouri, M.R.S. Moghaddam, N. Bahrambeik, R. Yavari, M.F. Sani, Credit card fraud detection using asexual reproduction optimization. Kybernetes (2021)
21.
Zurück zum Zitat F. Baratzadeh, S.M. Hasheminejad, Customer behavior analysis to improve detection of fraudulent transactions using deep learning. J. AI Data Min. 10(1), 87–101 (2022) F. Baratzadeh, S.M. Hasheminejad, Customer behavior analysis to improve detection of fraudulent transactions using deep learning. J. AI Data Min. 10(1), 87–101 (2022)
22.
Zurück zum Zitat S. Thapaliya, P.K. Sharma, Optimized deep neuro fuzzy network for cyber forensic investigation in big data-based iot infrastructures. IJISP 17(1), 1–22 (2023) S. Thapaliya, P.K. Sharma, Optimized deep neuro fuzzy network for cyber forensic investigation in big data-based iot infrastructures. IJISP 17(1), 1–22 (2023)
23.
Zurück zum Zitat N. Prabhakaran, R. Nedunchelian, et al., Oppositional cat swarm optimization-based feature selection approach for credit card fraud detection. Comput. Intell. Neurosci. 2023, 2693022 (2023)CrossRef N. Prabhakaran, R. Nedunchelian, et al., Oppositional cat swarm optimization-based feature selection approach for credit card fraud detection. Comput. Intell. Neurosci. 2023, 2693022 (2023)CrossRef
24.
Zurück zum Zitat A. Safi, S. Singh, A systematic literature review on phishing website detection techniques. J. King Saud Univ.-Comput. Inf. Sci. (2023) A. Safi, S. Singh, A systematic literature review on phishing website detection techniques. J. King Saud Univ.-Comput. Inf. Sci. (2023)
25.
Zurück zum Zitat K. Zheng, An Interface-Driven Analysis of User Behavior of an Electronic Health Records System (Ph.D. dissertation, The University of Michigan, 2029) K. Zheng, An Interface-Driven Analysis of User Behavior of an Electronic Health Records System (Ph.D. dissertation, The University of Michigan, 2029)
26.
Zurück zum Zitat T. Achmad, I. Ghozali, M.R.A. Helmina, D.I. Hapsari, I.D. Pamungkas, Detecting fraudulent financial reporting using the fraud hexagon model: Evidence from the banking sector in Indonesia. Economies 11(1), 5 (2022)CrossRef T. Achmad, I. Ghozali, M.R.A. Helmina, D.I. Hapsari, I.D. Pamungkas, Detecting fraudulent financial reporting using the fraud hexagon model: Evidence from the banking sector in Indonesia. Economies 11(1), 5 (2022)CrossRef
27.
Zurück zum Zitat K. Adane, B. Beyene, Email and website-based phishing attack: Examining online users security behavior in cyberspace environment. IJISM 21(1), 245–262 (2023) K. Adane, B. Beyene, Email and website-based phishing attack: Examining online users security behavior in cyberspace environment. IJISM 21(1), 245–262 (2023)
Metadaten
Titel
A Machine Learning Framework for Enhancing Security of Transaction in Saudi Banks Based on User Behavior
verfasst von
Haneen Almayouf
Shoaa Almudhibri
Wejdan Alsayegh
Meshaiel Alsheail
Salam Almneiy
Arwa Albelaihi
Haya Duhisan
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-53237-5_20

Premium Partner