Fraud Detection in Transaction
Fraud Detection in Transaction
Received January 18, 2020, accepted January 26, 2020, date of publication January 31, 2020, date of current version February 10, 2020.
Digital Object Identifier 10.1109/ACCESS.2020.2970614
ABSTRACT The effectiveness of transaction fraud detection methods directly affects the loss of users in
online transactions. However, for low-frequency users with small transaction volume, the existing methods
cannot accurately describe their transaction behaviors for each user, or lead to a high misjudgment rate.
So we propose a new method for individual behavior construction, which can make the behavior of
low-frequency users more accurate by migrating the current transaction group behavior and transaction
status. Firstly, we consider the user’s only historical transactions, combined with the optimal risk threshold
determination algorithm, to form the user’s own transaction behavior benchmark. Secondly, through the
DBSCAN clustering algorithm, the behavior characteristics of all current normal samples and fraud samples
are extracted to form the common behavior of the current transaction group. Finally, based on historical
transaction records, the current transaction status is extracted using a sliding window mechanism. The
combination of the three constitutes a new transaction behavior of the user. On this basis, a multi-behavior
detection model based on new transaction behavior is proposed. According to the result of each behavior,
Naive Bayes model is used to calculate the probability that current transaction belongs to fraud, and finally
determine whether current transaction is fraud. Experiments prove that the method proposed in this paper
can have a good effect on low-frequency users, which can accurately identify fraud transactions and has a
low misjudgment rate for normal transactions.
INDEX TERMS Transaction detection, low-frequency users, individual behavior, group behavior,
DBSCAN, Naive Bayes.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see http://creativecommons.org/licenses/by/4.0/
25210 VOLUME 8, 2020
Z. Zhang et al.: Fraud Detection Method for Low-Frequency Transaction
financial institutions mainly adopt the following methods to method, the fifth section introduces data source and exper-
verify identity and behavior of users. The first is based on imental results, and the sixth section summarizes research
account password matching mechanism [2], however exist- results and future prospects.
ing matching mechanisms are only used to verify password,
and can’t identify the malicious user’s network behavior. II. RELATED WORK
The second is to use expert system based on expert rules to Fraud detection is similar to classification problems.
achieve fraud detection by anti-fraud experts [3]. However, Therefore, based on user group behavior, using machine
expert system can’t adapt to new fraud methods, and there learning or deep learning to detect fraud transactions has
will be rule redundancy [19]. The third is to analyze group been widely studied in recent years. Zhang et al. [4] used
trading users and use machine learning and deep learning the features of the convolutional neural network to derive
methods to mine common behaviors of users, such as neu- features. By inputting the original features and adding a fea-
ral networks [4], random forests [7], [8], relationship net- ture arrangement layer to combine the inputs, they achieved
works [13], HMM [14], and so on. However, these methods good results in fraud detection. Zhou et al. [5] proposed a
train models based on transaction data for all users. They can siamese neural network structure based on CNN and LSTM.
only mine the common characteristics of all users, it is diffi- They used the siamese neural network structure to solve
cult to learn the individual behavior of each user [15], [24], the problem of sample imbalance in online transactions, and
and such models cannot effectively identify new types of used the LSTM structure to make model memory user’s
fraud [19]–[21]. The fourth is to extract user behavior pattern transaction information.Wang et al. [6] used neural network-
from the perspective of individual user, and then determine based embedding to capture detailed information about user
whether user’s current behavior is fraud, including user’s click actions, and used recurrent neural networks to model
browsing behavior [15], mouse and keystrokes behavior [16], such click sequences. Xuan et al. [8] used random forests to
transaction behavior [17], [20], [21], etc. However, if user train the characteristics of normal and abnormal behaviors,
does not have enough historical transaction records, it is compared two random forest models with different base clas-
difficult to ensure that the extracted user behavior pattern sifiers, and proved that random forests perform well in credit
is accurate enough [14], [22]–[26]. In addition, in view of fraud detection. Whitrow et al. [9] considered a framework
imbalanced characteristics of financial transaction samples, for transaction aggregation and used various classification
there are currently many studies to alleviate this problem, methods and cost-based indicators to evaluate the effective-
such as the GMM-based undersampling method [27] and the ness of various transaction detection methods, and found
hybrid cross feature extraction method [28]. that random forests outperform other methods. Fu et al. [10]
In summary, the current main problem is that it is difficult proposed the derived characteristics of transaction entropy to
for the existing individual behavior models to accurately learn characterize the user’s transaction behavior, and converted
the behavior characteristics of low-frequency users with low the original one-dimensional transaction data into a two-
transaction volume, which leads to a high misjudgment rate dimensional transaction matrix and input the convolutional
for low-frequency users. Considering that fraudsters often neural network to establish a credit card fraud detection
commit fraud against multiple people, this article proposes model based on deep learning. Dal Pozzolo et al. [11] Con-
that it is easier to find traces of fraudster behavior by sup- sidered a concept drift and sample imbalance in fraud detec-
plementing the transaction behavior and transaction status tion, proposed a new learning strategy, and verified it on
of the current transaction group, the specific contributions real data. Kim et al. [12] Made in-depth comparisons of
are as follows. First, it is proved through experiments that hybrid-to-hybrid integration and deep learning methods, and
the frequency of transactions has a great impact on accu- developed two detection models. The real data proved that the
racy of individual behaviors. Existing models can’t accu- deep learning model has good performance. Meng et al. [13]
rately describe transaction behaviors of low-frequency users. Proposed a detection method based on relational networks
Secondly, a new low-frequency user transaction behavior and boosting trees. First, a transaction relationship network
construction method is proposed. The clustering algorithm is was constructed for users, and secondly, information was
used to extract current group user’s behavior to supplement extracted through the network for transaction identification,
low-frequency user’s behavior, and considering current trans- which can well identify fraudulent transactions.
action status, the behavior of low-frequency user can be fully From another perspective, most of the existing fraud meth-
characterized. Finally, this paper proposes a multi-behavior ods use direct or indirect methods to steal user information
detection model based on user behavior, and uses the Naive and use the identity of normal users to perform fraud. There-
Bayes formula to determine whether the current transaction is fore, there have been some studies in recent years to solve
a fraudulent transaction based on the results of each behavior the problem of transaction fraud from the perspective of indi-
detection. vidual user behavior. Ji et al. [18] proposed a method for e-
The rest of this paper is organized as follows. The sec- commerce user abnormal behavior detection research, based
ond section introduces the related work, the third section on user historical behavior data to establish user’s normal
discusses the construction process of low-frequency user behavior pattern, and finally used the pattern comparison
behavior, the fourth section introduces transaction detection method to determine user’s transactions. K`‘ult´’ur et al. [19]
people at the same time. So, this paper analyzes the fraud
transactions and normal transactions that have occurred, and
uses algorithms to extract the respective behavior patterns of group GBB = [TBB, FBB], where TBB and FBB are the
normal transactions and fraud transactions to compensate the normal transaction behavior matrix and fraud transaction
transaction behavior of low-frequency users. behavior matrix.
As the distribution of transaction data is uneven, and TARW 1 , TAC W 1, TIW W 1 , TTRW 1, TFAW 1, TIPW 1
the data shape is different, the number of transaction cate-
TBB = ...
gories can’t be predicted in advance. Therefore, the DBSCAN
method is used to cluster historical transaction records. TAR , TAC , TIW , TTR , TFA , TIP
WQ WQ WQ WQ WQ WQ
C. TRANSACTION DETECTION
After the user’s own behavior detection and the current group
behavior detection, the judgment results URt and GRt of the
transaction will be obtained, combined with current transac-
tion status St , using Naive Bayes model judges the current
transaction results.
FIGURE 4. Data set.
P (Y = k) , k = 0, 1 (7)
TABLE 1. Data set D1.
P (X = x | Y = k) V. EXPERIMENTAL RESULTS
(1) (1) (n) (n) This section describes the detection effects of the proposed
=P(X =x , . . . ,X =x |Y = k) (8)
model. First introduce the source of the experimental data,
then introduce the low-frequency user division and clustering
Calculate the conditional probability distribution accord-
results, and finally introduce the comparison of this paper
ing to the historical transaction record, where X is the random
with other models.
vector in the input space. In this paper, X = (UR, GR, S).
Because the user’s own detection result, the current trading
A. DATA SET
group detection result and the current transaction status do
not affect each other, and the conditions of the independent The data set comes from a domestic bank data, which
hypothesis are met. The conditional probability formula is as covers 3 months transactions and contains 92133 users,
shown in (9). 3502048 transaction records, each transaction record is
marked by the bank for the label. In Fig. 4, all transactions are
P (X = x | Y = k) referred to as data set A, and all fraud transactions are in data
set F, which contains 65138 transaction data for 14751 users.
=P X (1) =x (1) , . . . ,X (n) =x (n) | Y = k The data set shows that the main types of fraud include
Yn
phishing sites, Trojan viruses, etc. Transactions involving
= P X (j) =x (j) | Y = k (9)
j=1 14751 users are in data set B, all transactions for fraud-free
transaction users are in data set C. We randomly extract
For the current transaction r u , according to the user’s own transaction data of any number of users from dataset B as
behavior and the current group behavior, the judgment results experimental data. The test set and the training set are divided
of this transaction are URt and GRt , and the transaction according to time, the data of April and May are used as the
status St , x = (URt , GRt , St ) is the current input. Then, training set, and the data of June is used as the test set.
using (10) and (11), the transaction ru is calculated to belong
to the fraud probability P (Y = 1 | X = x) and the normal B. DIVISION OF LOW-FREQUENCY USERS
probability P (Y = 0 | X = x).
In order to solve the problem of high misjudgment rate of
low-frequency users, it is first necessary to determine what
P (Y = 1 | X = x)
is a low-frequency user. Literature [17] proposed that the
P (X = x | Y = 1) P(Y = 1)
= P1 model detection effect is related to the frequency of user
k=0 P (X = x | Y = k) P(Y = k) transactions, and the results shown in the Fig. 5 also confirm
P (X = x | Y = 1) P(Y = 1) this. Therefore, this paper uses its proposed model, and uses
= P1 (10)
(j) (j)
Qn
the model detection precision as an evaluation index to divide
k=0 P(Y = k) j=1 P X =x | Y = k
P (Y = 0 | X = x) high-frequency users and low-frequency users.
P (X = x | Y = 0) P(Y = 0) In this paper, three sets of data D1, D2 and D3 are randomly
= P1 selected in data set B, each set of data contains three months
k=0 P (X = x | Y = k) P(Y = k) of transaction data of 150 users. Among them, each set of
P (X = x | Y = 0) P(Y = 0) data set Di contains ten sets of data, denoted as Dij , 0 ≤j ≤ 9,
= P1 (11)
(j) (j)
Qn
k=0 P(Y = k) j=1 P X =x | Y = k
the transaction frequency is between j × 10 ∼ (j + 1) × 10,
the details are shown in table 1 to 3. The precision of each
If P (Y = 1 | X = x) > P (Y = 0 | X = x), the transaction group of users is calculated by the hyper-sphere model to
r u belongs to a fraud transaction, otherwise it belongs to determine the range of low-frequency user transaction vol-
normal transaction. ume. The experimental results are shown in Fig. 5. When the
C. CLUSTERING RESULTS
Fig. 6 shows the distribution of historical transactions, with
the distribution of fraud samples is (a) and the normal sample
is (b). As can be seen from the figures, the data is not cluster-
like and has different shapes. The traditional K-means clus-
tering algorithm is not suitable for such data sets. Therefore,
when extracting the behavior of the current trading group,
FIGURE 7. Clustering effect comparison.
this paper uses the density clustering algorithm DBSCAN to
cluster the transactions. The following figures are compar-
ison of the clustering effects of the two methods on fraud where n denotes the number of clusters, k denotes the current
transactions. class, trB(k) denotes the trace of the inter-class dispersion
It can be seen from the Fig. 7. DBSCAN can clearly matrix, and trW (k) denotes the trace of the intra-class dis-
cluster the samples into different classes, but K-means can’t, persion matrix. If the larger the CH, the closer the class itself
so DBSCAN has better clustering effect. But the DBSCAN is, the more dispersed the classes are, the clustering result is
clustering effect is affected by two parameters, radius and better. As shown in Fig. 8, when the density is 3, the value of
density. In this paper, the CH index is used to judge the the radius is continuously adjusted. When the value of the CH
clustering effect of the algorithm, and its calculation method index reaches the maximum, the clustering effect is the best.
is shown in (12). At this time, the number of fraud sample clusters is 4 and the
number of normal sample clusters is 16. Therefore, the fraud
trB(k)/(k − 1) samples in this paper are divided into 4 categories, and the
CH (k) = (12)
trW (k)/(n − k) normal samples are divided into 16 categories.
the model NM proposes a sliding window mechanism to cal- proposes a comprehensive decision-making method based
culate the current transaction status. Moreover, the model NM on the detection results of various behaviors, which is more
fully considered than other models. Therefore, the overall [13] Y. Meng, Z. Zhang, W. Liu, L. Chen, Q. Liu, L. Yang, and P. Wang,
performance of the model NM is better than the model UR, ‘‘A novel method based on entity relationship for online transaction fraud
detection,’’ in Proc. Turing Celebration Conf. China, 2019, p. 121.
UBC, XR and XB. [14] X. Wang, H. Wu, and Z. Yi, ‘‘Research on bank anti-fraud model based on
K -means and Hidden Markov model,’’ in Proc. IEEE 3rd Int. Conf. Image,
VI. CONCLUSION Vis. Comput. (ICIVC), Jun. 2018, pp. 780–784.
[15] P. Zhao, C. Yan, and C. Jiang, ‘‘Authenticating Web user’s identity through
In this paper, a new method for low-frequency user transac- browsing sequences modeling,’’ in Proc. IEEE 16th Int. Conf. Data Mining
tion detection is proposed for the problem that low-frequency Workshops (ICDMW), Dec. 2016, pp. 335–342.
users cannot accurately describe transaction behavior. Com- [16] H. Zhang, C. Yan, P. Zhao, and M. Wang, ‘‘Model construction and authen-
tication algorithm of virtual keystroke dynamics for smart phone users,’’
pared with other methods, the proposed method not only con- in Proc. IEEE Int. Conf. Syst., Man, (SMC), Oct. 2016, pp. 171–175.
siders the low-frequency users’ own transaction behavior, but [17] L. Chen, Z. Zhang, Q. Liu, L. Yang, Y. Meng, and P. Wang, ‘‘A method for
also considers the current trading group behavior and current online transaction fraud detection based on individual behavior,’’ in Proc.
Turing Celebration Conf., 2019. p. 119.
transaction status, and constitutes a new low-frequency user [18] B. Ji, L. Hu, W. Han, and J. Yan, ‘‘Research on e-commerce-oriented user
behavior. Based on this, a method based on user behavior and abnormal behaviour detection,’’ Netinfo Secur., no. 9, p. 19, Jun. 2014.
Naive Bayes detection is proposed to judge the user’s current [19] Y. Kültür and M. U. Çaǧlayan, ‘‘A novel cardholder behavior model for
detecting credit card fraud,’’ Intell. Autom. Soft Comput., vol. 2, pp. 1–11,
transaction. And in the experiment, the division problem of Jul. 2017.
high-frequency users and low-frequency users is considered. [20] L. Zheng, G. Liu, W. Luan, Z. Li, Y. Zhang, C. Yan, and C. Jiang, ‘‘A new
Experiments prove that the precision and F1 of the proposed credit card fraud detecting method based on behavior certificate,’’ in Proc.
IEEE 15th Int. Conf. Netw., Sens. Control (ICNSC), Mar. 2018, pp. 1–6.
method is higher than other models, although the recall is not [21] L. Zheng, G. Liu, C. Yan, and C. Jiang, ‘‘Transaction fraud detection based
the highest on a few data sets, the disturbance rate has always on total order relation and behavior diversity,’’ IEEE Trans. Comput. Soc.
been lower than other models. It shows that in the detection Syst., vol. 5, no. 3, pp. 796–806, Sep. 2018.
[22] Y. Xie, G. Liu, R. Cao, Z. Li, C. Yan, and C. Jiang, ‘‘A feature extraction
of low-frequency user transactions, the model proposed in method for credit card fraud detection,’’ in Proc. 2nd Int. Conf. Intell. Auto.
this paper can more accurately identify fraud transactions and Syst. (ICoIAS), Singapore, Feb. 2019, pp. 70–75.
has lower misjudgment of normal transactions. In the future [23] S. Nami and M. Shajari, ‘‘Cost-sensitive payment card fraud detection
based on dynamic random forest and k -nearest neighbors,’’ Expert Syst.
we will pay more attention to the problem of online model Appl., vol. 110, pp. 381–392, Nov. 2018.
updating and make the method more effective. [24] C. Jiang, J. Song, G. Liu, L. Zheng, and W. Luan, ‘‘Credit card fraud
detection: A novel approach using aggregation strategy and feedback
mechanism,’’ IEEE Internet Things J., vol. 5, no. 5, pp. 3637–3647,
REFERENCES Oct. 2018.
[1] (2018). Research Report on the Trend of Network Fraud in 2017. [Online]. [25] C. Wand, J. Luo, B. Yang, and C. Jiang, ‘‘On complementary effect of
Available: https://www.sohu.com/a/222391501_100017648 blended behavioral analysis for identity theft detection in mobile social
[2] R. Soram and E. S. Meitei, ‘‘On the performance of RSA in virtual networks,’’ Commun. Comput. Inf. Sci., vol. 747, pp. 32–44, Dec. 2018.
banking,’’ in Proc. Int. Symp. Adv. Comput. Commun. (ISACC), Sep. 2015, [26] N. Soltani, M. K. Akbari, and M. Sargolzaei Javan, ‘‘A new user-based
pp. 352–359. model for credit card fraud detection based on artificial immune system,’’
[3] A. Jarovsky, T. Milo, S. Novgorodov, and W.-C. Tan, ‘‘Rule sharing for in Proc. 16th CSI Int. Symp. Artif. Intell. Signal Process. (AISP), May 2012,
fraud detection via adaptation,’’ in Proc. IEEE 34th Int. Conf. Data Eng. pp. 029–033.
(ICDE), Apr. 2018, pp. 125–136. [27] F. Zhang, G. Liu, Z. Li, C. Yan, and C. Jiang, ‘‘GMM-based undersampling
[4] Z. Zhang, X. Zhou, X. Zhang, L. Wang, and P. Wang, ‘‘A model based and its application for credit card fraud detection,’’ in Proc. Int. Joint Conf.
on convolutional neural network for online transaction fraud detection,’’ Neural Netw. (IJCNN), Jul. 2019, pp. 1–8.
Secur. Commun. Netw., vol. 2018, pp. 1–9, Aug. 2018. [28] H. Wu and G. Liu, ‘‘A hybrid model on learning cross features for trans-
[5] X. Zhou, Z. Zhang, L. Wang, and P. Wang, ‘‘A model based on siamese action fraud detection,’’ in Proc. 19th Ind. Conf. Data Mining (ICDM),
neural network for Online transaction fraud detection,’’ in Proc. Int. Joint New York, NY, USA, Jul. 2019, pp. 1–5.
Conf. Neural Netw. (IJCNN), Jul. 2019, pp. 1–7. [29] I. K. Savvas, A. V. Chernov, M. A. Butakova, and C. Chaikalis, ‘‘Increasing
[6] S. Wang, C. Liu, X. Gao, H. Qu, and W. Xu, ‘‘Session-based fraud detection the quality and performance of N -dimensional point anomaly detection
in online e-commerce transactions using recurrent neural networks,’’ in in traffic using PCA and DBSCAN,’’ in Proc. 26th Telecommun. Forum
Proc. Joint Eur. Conf. Mach. Learn. Knowl. Discovery Databases. Cham, (TELFOR), Nov. 2018, pp. 1–4.
Switzerland: Springer, 2017, pp. 241–252.
[7] C. Liu, Y. Chan, S. H. Alam Kazmi, and H. Fu, ‘‘Financial fraud detection
model: Based on random forest,’’ Int. J. Econ. Finance, vol. 7, no. 7,
pp. 178–188, Jul. 2015.
[8] S. Xuan, G. Liu, Z. Li, L. Zheng, S. Wang, and C. Jiang, ‘‘Random forest
for credit card fraud detection,’’ in Proc. IEEE 15th Int. Conf. Netw., Sens.
Control (ICNSC), Zhuhai, China, Mar. 2018, pp. 1–6.
[9] C. Whitrow, D. J. Hand, P. Juszczak, D. Weston, and N. M. Adams, ZHAOHUI ZHANG received the B.S. degree in
‘‘Transaction aggregation as a strategy for credit card fraud detection,’’ computer science from Anhui Normal Univer-
Data Mining Knowl. Discovery, vol. 18, no. 1, pp. 30–55, Feb. 2009. sity, Wuhu, China, in 1994, the master’s degree
[10] K. Fu, D. Cheng, Y. Tu, and L. Zhang, ‘‘Credit card fraud detection using
from the University of Science and Technology
convolutional neural network,’’ in Proc. Int. Conf. Neural Inf. Process.
of China, from 1999 to 2000, and the Ph.D.
Cham, Switzerland: Springer, 2016, pp. 483–490.
degree in computer science from Tongji Uni-
[11] A. Dal Pozzolo, G. Boracchi, O. Caelen, C. Alippi, and G. Bontempi,
‘‘Credit card fraud detection: A realistic modeling and a novel learn- versity, Shanghai, China, in 2007. He became a
ing strategy,’’ IEEE Trans. Neural Netw. Learn. Syst., vol. 29, no. 8, Teacher with Anhui Normal University. He was a
pp. 3784–3797, Aug. 2018. Professor with Anhui Normal University, in 2015.
[12] E. Kim, J. Lee, H. Shin, H. Yang, S. Cho, S.-K. Nam, Y. Song, J.-A. Yoon, He is currently a Professor with the School of
and J.-I. Kim, ‘‘Champion-challenger analysis for credit card fraud detec- Computer Science and Technology, Donghua University, Shanghai. His
tion: Hybrid ensemble and deep learning,’’ Expert Syst. Appl., vol. 128, research interests include network information services, service computing,
pp. 214–224, Aug. 2019. and cloud computing.
LIGONG CHEN was born in 1995. He received PENGWEI WANG received the B.S. and M.S.
the B.S. degree in Internet of Things engineering degrees in computer science from the Shandong
from Anhui Normal University. He is currently University of Science and Technology, Qingdao,
pursuing the M.S. degree with Donghua Univer- China, in 2005 and 2008, respectively, and the
sity. His research areas include artificial intel- Ph.D. degree in computer science from Tongji
ligence, big data, and financial transaction risk University, Shanghai, China, in 2013. He finished
prevention and control. his postdoctoral research work at the Department
of Computer Science, University of Pisa, Italy,
in 2015. He is currently an Associate Professor
with the School of Computer Science and Tech-
nology, Donghua University, Shanghai. His research interests include cloud
computing, service computing, and big data.