Imac Pretty 1
Imac Pretty 1
ANOMALOUS PATTERNS IN
CYBERSECURITY: PROTECTING THE
BANKING SECTOR THROUGH ADVANCED
DETECTION
WRITTEN BY: KAROL NOLASCO, JESUS
RODRIGUEZ & DEMIAN PIÑA
legitimate users may behave unexpectedly due to financial services and simplify both consumption
human errors or compromised credentials. and fund administration. Credit cards allow
After analyzing all the risks, we identified the following: transactions without cash, providing flexibility in
payments by offering options for full settlement or
installment payments.
RESEARCH IN APPLIED MATHEMATICS AND COMPUTATION
banking services from mobile devices, facilitating compare specific models for predicting fraud related
constant monitoring of financial activity. Additionally, to banking cards.
they enable transfers, bill payments, and investments, These models are based on a self-learning system
granting users greater control over their resources. that identifies patterns and trends from historical
Despite their advantages, the use of credit cards and transactional data provided by customers. The aim is
banking applications carries potential risks, especially
to detect irregular circumstances in the use of bank
fraud. Account theft, such as phishing (where scammers
cards early and effectively.
impersonate legitimate entities to obtain confidential
information) and carding (unauthorized use of credit
Acquiring knowledge and applying machine
card information), poses a significant threat.
learning techniques to financial data with the aim of
Detecting fraud presents a complex challenge, given the creating an application capable of anticipating
constant change and diversity of methods this potential fraudulent activities in banking card
phenomenon has experienced. In the global financial transactions. This process involves:
sphere, statistics are employed alongside data mining Thoroughly researching fraud in banking card
tools and machine learning to identify patterns of transactions and its connection to machine
fraudulent behavior. learning.
Current detection systems typically offer two types of
Evaluating and comparing different models for
alerts: one based on probabilistic ratings and another on
fraud analysis in banking card transactions by
rule compliance. The former heavily relies on predictive
implementing various machine learning
models generating a "score," while the latter employs
techniques.
SQL command-based filters.
In this context, the aim is to apply machine learning Developing a predictive algorithm capable of
techniques to develop and compare models that can identifying potential fraudulent activities by
anticipate fraud related to banking cards. These analyzing historical transaction data of
techniques, such as data mining and machine learning, customers.
leverage efficient probabilistic models like generalized Phishing: Online deception where scammers
regression models, artificial neural networks, decision impersonate legitimate entities to fraudulently
trees, and Bayesian belief networks. These models seek
obtain confidential information.
to determine and predict the possibility of fraud through
Machine learning: A field of artificial intelligence
a probability rating or "score."
that develops algorithms and models enabling
Achieving this involves an autonomous learning system
computers to learn and enhance their
that identifies patterns and trends based on historical
data, primarily transactions conducted by customers. performance in specific tasks based on
This data allows for the rapid identification of anomalous experience, without explicit programming for
behaviors, signals that could indicate fraudulent each situation.
activities differing from a customer's usual behavior. Data mining: The process of discovering patterns,
Fraud, whether against businesses or individuals, often trends, or relevant information within large and
arises from mishandling personal or corporate complex datasets to gain useful insights and
information. Cybercriminals employ various methods
make decisions.
and techniques, such as phishing, to obtain stolen
information through malicious emails.
RESEARCH IN APPLIED MATHEMATICS AND COMPUTATION
Results
Estimation of original unprocessed data
An anticipation was performed using Neural
Standardizing the dataset Networks and Naive Bayes Bernoulli estimators
Classifying our columns into two distinct categories, employing the data in its original state, without any
categorical and numerical, is crucial. This allows us additional processing. The obtained results were as
to perform individualized preprocessing on each follows:
column type, facilitating the standardization of our
Neural Networks
data into a coherent matrix suitable for subsequent
analysis.
the image named 'Best Parameters. parameters through a grid search, evaluating the
average accuracy of each model across 10 training
iterations. Among the considered models, Neural
Networks demonstrated the best performance,
standing out for their closer approximation to the
desired outcomes. Subsequently, predictions were
made using the optimal model obtained through
the grid search, which is based on the Neural
Networks architecture. (Images "Confusion Matrix
NN")
REFERENCES
CONCLUSSION Tianming Hu and Sam Y. Sung. Detecting pattern-
After analyzing the results, it can be affirmed that based outliers. Pattern Recognition Letters, Vol
the neural network model, specifically the multi- 24, pp3059-3068,Dec 2003.
layer perceptron, shows higher efficacy in predicting M. Pal (2005): Random forest classifier for
fraudulent and non-fraudulent transactions
remote sensing classification, International
compared to Naive Bayes. In the realm of Machine
Journal of Remote Sensing, 26:1, 217-222.
Learning, it is crucial to normalize input variables to
S. N. Pang and D. Kim and S. Y. Bang. Fraud detection
optimize the performance of many algorithms.
using support vector machine ensemble. Pohang
Normalization involves adjusting variable values to a
specific range, but incorrect implementation or University of Science and Technology (POSTECH),
greatly enriches a system's ability to identify intelligence. Expert Systems with Applications,
anomalous and potentially fraudulent behaviors. 2007.