Analysis of Credit Card Fraud Detection Using Fusion Classifiers

  • Priyanka KumariEmail author
  • Smita Prava Mishra
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 711)


Credit card fraud detection is a critical problem that has been faced by online vendors at the finance marketplace every now and then. The rapid and fast growth of the modern technologies causes the fraud and heavy financial losses for many financial sectors. Different data mining and soft computing-based classification algorithms have been used by most of the researchers, and it plays an essential role in fraud detection. In this paper, we have analyzed some ensemble classifiers such as Bagging, Random Forest, Classification via Regression, Voting and compared them with some effective single classifiers like K-NN, Naïve Bayes, SVM, RBF Classifier, MLP, Decision Tree. The evaluation of these algorithms is carried out through three different datasets and treated with SMOTE, to deal with the class imbalance problem. The comparison is based on some evaluation metrics like accuracy, precision, true positive rate or recall, and false positive rate.


Credit card fraud Fraud detection SMOTE Cross-validation MLP Bagging Voting Random forest Classification via regression 



I would like to express my heartfelt thanks to Prof. Dr. Debahuti Mishra, Head of the Dept (Computer Science and Engineering) at ITER, for her encouragements and support throughout the work.


  1. 1.
    Ravindra P. S., Vijayalaxmi K., “Survey on Credit Card Fraud Detection Techniques”, International Journal of Engineering and Computer Science, Vol. 4, No. 11, pp. 15010–15015, 2015.Google Scholar
  2. 2.
    Linda D., Hussein A., Pointon J., “Credit card fraud and detection techniques: a Review”, Banks and Bank Systems, Vol. 4, No. 2, 2009.Google Scholar
  3. 3.
    Bolton R. J., Hand D. J., “Statistical fraud detection: a review”, Statistical Science, Vol. 17, No. 3, pp. 235–255, 2002.MathSciNetCrossRefGoogle Scholar
  4. 4.
    Bhattacharyya S., Jha S., Tharakunnel K., Westland J. C., “Data mining for credit card fraud: a comparative study”, Decision Support Systems, Vol. 50, No. 3, pp. 602–613, 2011.CrossRefGoogle Scholar
  5. 5.
    Ngai E. W. T., Hu Y., Wong Y. H., Chen Y., Sun X., ‘‘The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature”, Decision Support Systems, Vol. 50, No. 3, pp. 559–569, 2011.CrossRefGoogle Scholar
  6. 6.
    Carter C., Catlett J., “Assessing credit card applications using machine learning”, IEEE Expert: intelligent systems and their applications, Vol. 2, pp. 71–79, 1987.CrossRefGoogle Scholar
  7. 7.
    Hanagandi V., Dhar A., Buescher K., “Density-based clustering and radial basis function modeling to generate credit card fraud scores”, Computational Intelligence for Financial Engineering, 1996.Google Scholar
  8. 8.
    Ghosh S., Reilly D. L., “Credit card fraud detection with a neural network”, In Proceedings of the 27 th Hawaii International Conference on System Sciences, Vol. 3, pp. 621–630, 1994.Google Scholar
  9. 9.
    Dorronsoro J. R., Ginel F., Sanchez C., Cruz C. S., “Neural fraud detection in credit card operations”, IEEE Transactions on Neural Networks, Vol. 8, pp. 827–834, 1997.CrossRefGoogle Scholar
  10. 10.
    Seeja K. R., Masoumeh Z., “Fraud Miner: a novel credit card fraud detection model based on frequent itemset mining”, The Scientific World Journal, Vol. 10, pp. 1–10, 2014.CrossRefGoogle Scholar
  11. 11.
    Suganya S., Kamalra M., “Meta classification technique for improving credit card fraud detection”, International Journal of Scientific and Technical Advancements, Vol. 2, No. 1, pp. 101–105, 2016.Google Scholar
  12. 12.
    Hassibi K., Lisboa P. J. G., Vellido A., Edisbury B., “Detecting payment card fraud with neural networks,” Business application of Neural Networks, Singapore: World Scientific, 2000.Google Scholar
  13. 13.
    Maes S., Tuyls K., Vanschoenwinkel B., Manderick B., “Credit card fraud detection using Bayesian and neural networks,” In Proceedings of the 1st International NAlSO Congress on Neuro Fuzzy Technologies, pp. 261–270, 1993.Google Scholar
  14. 14.
    Zaslavsky V., Strizhak A., “Credit card fraud detection using self organizing maps”, Information and Security, Vol. 18, pp. 48–63, 2006.Google Scholar
  15. 15.
    Quah J. T. C, Sriganesh M., “Real-time credit card fraud detection using computational intelligence”, Expert Systems with Applications, Vol. 35, No. 4, pp. 1721–1732, 2008.CrossRefGoogle Scholar
  16. 16.
    Srivastava L., Kundu A., Sural S., Majumdar A. K., “Credit card fraud detection using hidden Markov model”, IEEE Transactions on Dependable and Secure Computing, Vol. 5, No. 1, pp. 37–48, 2008.CrossRefGoogle Scholar
  17. 17.
    Sanchez D., Vila M. A., Cerda L., Serrano J. M., “Association rules applied to credit card fraud detection”, Expert Systems with Applications, Vol. 36, No. 2, pp. 3630–3640, 2009.CrossRefGoogle Scholar
  18. 18.
    Lu Q., Ju C., “Research on credit card fraud detection model based on class weighted support vector machine”, Journal of Convergence Information Technology, Vol. 6, No. 1, pp. 62–68, 2011.Google Scholar
  19. 19.
    Wong N., Ray P., Stephens G., Lewis L., “Artificial immune systems for the detection of credit card fraud”, Information Systems, Vol. 22, No. 1, pp. 53–76, 2012.Google Scholar
  20. 20.
    Zak S.H., (2003), “Systems and Control” NY: Oxford University Press.Google Scholar
  21. 21.
    Hassoun M.H., (1999), “Fundamentals of Artificial Neural Networks”, Cambridge, MA: MIT press.Google Scholar
  22. 22.
    Cortes C., Vapnik V., “Support vector network. Machine Learning”, Vol. 20, pp. 273–297, 1995.zbMATHGoogle Scholar
  23. 23.
    Burges C. J. C., “A Tutorial on Support Vector Machines for Pattern Recognition, Data Mining and Knowledge Discovery”, Vol. 2, No. 2, pp. 955–974, 1998.Google Scholar
  24. 24.
    Kim H. C., Pang S., Je H. M., Kim D., Bang S. Y., “Constructing support vector machine ensemble. Pattern Recognition”, Vol. 36, pp. 2757–2767, 2003.CrossRefGoogle Scholar
  25. 25.
    Chen R. C., Chen J., Chen T. S., Hsieh C. H., Chen T. Y., Wu K. Y., “Building an Intrusion Detection System Based on Support Vector Machine and Genetic Algorithm”, Lecture Notes in Computer Science (LNCS), Vol. 3498, pp. 409–414, 2005.Google Scholar
  26. 26.
    Louzada F., Ara A., “Bagging k-dependence probabilistic networks: An alternative powerful fraud detection tool”, Expert System Applications, Vol. 39, No. 14, pp. 11583–11592. 2012.CrossRefGoogle Scholar
  27. 27.
    Elghazel H., Aussem A., Perraud F., “Trading-off diversity and accuracy for optimal ensemble tree selection in random forests”, Ensembles in Machine Learning Applications Chennai, India, pp. 169–179, 2011.CrossRefGoogle Scholar
  28. 28.
    Río S., “On the use of Map Reduce for imbalanced big data using random forest. Information Sciences”, vol. 285, pp. 112–137, 2014.Google Scholar
  29. 29.
    Vaithiyanathan V., “Comparison of different classification techniques using different datasets”, International Journal of Advances in Engineering & Technology, Vol. 6, No. 2, pp. 764, 2013.Google Scholar
  30. 30.
    Fadaei N. F., Moattar M., “Ensemble classification and extended feature selection for credit card fraud detection”, Journal of AI and Data Mining, 2016.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Computer Science and Engineering, ITERSOA UniversityBhubaneswarIndia
  2. 2.Computer Science and Information Technology, ITERSOA UniversityBhubaneswarIndia

Personalised recommendations