Veri Madenciliği ile E-Ticarette Kredi Kartı Dolandırıcılığının Tespiti

Kredi kartı ile ödeme, e-ticaret sitelerinin en çok tercih edilen yöntemlerinden biridir. Dolandırıcılık şüphesi olan siparişler, alışverişsiteleri için en büyük endişe kaynağıdır. Sahtekarlık işlemleri sadece müşterileri değil, aynı zamanda şirketleri ve bankaları da etkiler.Bu nedenle, şirketler siparişleri sınıflandırabilmeli ve şüpheli işlemlere karşı önlemler alabilmelidir. Bankacılık tarafında, müşterilerhakkında daha fazla bilgi olması nedeniyle sınıflandırma daha kolaydır, ancak bu süreci e-ticaret sitelerinde belirlemek daha zordur. Buçalışmada, özel bir e-ticaret girişiminin gerçek sipariş verileri incelenmiş ve şüpheli işlemler belirlenmiştir. Öncelikle, tüm siparişverileri analiz edilir ve filtrelenir. Sınıflandırma için en iyi değişkenler değişken seçim algoritmaları ile belirlenmiştir. Daha sonrasınıflandırma algoritmaları uygulanır ve %92 başarı oranı ile şüpheli siparişler belirlenir. Karşılaştırmalı veri madenciliği yöntemleriolarak Naive Bayesian, Karar Ağaçları ve Yapay Sinir Ağı kullanılmıştır.

Detection of Credit Card Fraud in E-Commerce Using Data Mining

Credit card payment is one of the most preferred methods of e-commerce sites. Fraud orders are the biggest concerns for online shoppingsites. Fraud operations affect not only customers but also companies and banks. Hence, companies should be able to classify orders andtake measures against suspicious transactions. Classification is easier on the banking side because of more information about customers,but it is more difficult to determine this process on e-commerce sites. In this study, the actual order data of a private e-commerceenterprise has been examined and suspicious transactions are determined. First of all, all order data is analyzed and filtered. The bestvariables for classification are determined by variable selection algorithms. Afterwards, classification algorithms are applied andsuspicious orders are determined with 92% success rate. Naïve Bayesian, Decision Trees and Artificial Neural Network have been usedas comparative data mining methods.

___

  • [1] CyberSource a Visa Company. (2013, January) 2013 Online Fraud Report. Document.
  • [2] Djamila Aouada, Aleksandar Stojanovic, Björn Ottersten Alejandro Correa Bahnsen, "Feature engineering strategies for credit card fraud detection," Expert Systems with Applications, vol. 51, no. 1, pp. 134-142, June 2016.
  • [3] Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, Ian H. Witten Mark Hall, "The WEKA Data Mining Software: An Update," SIGKDD Explorations, vol. 11, no. 1, 2009.
  • [4] S. Benson Edwin Raj and A. Annie Portia, "Analysis on credit card fraud detection methods," in International Conference on Computer, Communication and Electrical Technology (ICCCET), 2011, pp. 152-156.
  • [5] P. K. Chan W. Fan A. L. Prodromidis and S. J. Stolfo, "Distributed data mining in credit card fraud detection," IEEE Intelligent Systems and their Applications, vol. 14, no. 6, pp. 67-74.
  • [6] Siddhartha Bhattacharyya, Sanjeev Jha, Tharakunnel Kurian , and J. Christopher Westland, "Data mining for credit card fraud: A comparative study," Decision Support Systems, vol. 50, no. 3, pp. 602-613, February 2011.
  • [7] Joyce, James (2003), "Bayes' Theorem", in Zalta, Edward N. (ed.), The Stanford Encyclopedia of Philosophy (Spring 2019 ed.), Metaphysics Research Lab, Stanford University, retrieved 2020-01-17
  • [8] Ian H. Witten and Eibe Frank, Data Mining Practical Machine Learning Tools and Techniques, Jim Gray, Ed.: Elsevier Morgan Kaufman Publishers, 2005.
  • [9] N. Kwak and Chong-Ho Choi, "Input feature selection for classification problems," IEEE Transactions on Neural Networks, vol. 13, no. 1, pp. 143-159, 2002.
  • [10]Akbulut S., Veri Madenciliği Teknikleri ile Bir Kozmetik Markanın Ayrılan Müşteri Analizi ve Müşteri Segmentasyonu.: Yüksek Lisans Tezi, Gazi Üniversitesi Fen Bilimleri Enstitüsü, 2006.
  • [11] Alpaydın, E., Introduction to Machine Learning , The MIT Press, Massachusetts, 2nd edition, 2010
  • [12]J. R Quinlan, C4.5: Programs for machine learning.: San Francisco: Morgan Kaufmann, 1993.
  • [13]Kohavi, "Scaling up the accuracy of Naïve Bayes classifiers: A decision tree hybrid.," in Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, Portland, 1996, pp. 202-207.
  • [14] O. Sutton, “Introduction to k Nearest Neighbour Classification and Condensed Nearest Neighbour Data Reduction The k Nearest Neighbours Algorithm,” pp. 1–10, 2012
  • [15]Wikipedia. [Online]. https://en.wikipedia.org/wiki/Knearest_neighbors_algorithm
  • [16]Zhang, A., Lipton, Z. C., Li, M. and Smola, A. J., «Dive into Deep Learning. » http://en.diveintodeeplearning.org, 2018, [Reach Date: 21.12.2019].
  • [17]Shanmugamani, R. «Deep Learning for Computer Vision» Pactc. 2018. ss 6-7
  • [18]Baughman, D.R., Liu, Y.A., in Neural Networks in Bioprocessing and Chemical Engineering, 1995
  • [19]O. Adepoju, J. Wosowei, S. lawte and H. Jaiman, "Comparative Evaluation of Credit Card Fraud Detection Using Machine Learning Techniques," 2019 Global Conference for Advancement in Technology (GCAT), BANGALURU, India, 2019, pp. 1-6, doi: 10.1109/GCAT47503.2019.8978372.
  • [20]H. M. M. H. Vidanelage, T. Tasnavijitvong, P. Suwimonsatein and P. Meesad, "Study on Machine Learning Techniques with Conventional Tools for Payment Fraud Detection," 2019 11th International Conference on Information Technology and Electrical Engineering (ICITEE), Pattaya, Thailand, 2019, pp. 1-5, doi: 10.1109/ICITEED.2019.8929952.
  • [21]Raghavan, Pradheepan, and Neamat El Gayar. "Fraud Detection using Machine Learning and Deep Learning." 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE). IEEE, 2019.
  • [22]P. Seemakurthi, S. Zhang and Y. Qi, "Detection of fraudulent financial reports with machine learning techniques," 2015 Systems and Information Engineering Design Symposium, Charlottesville, VA, 2015, pp. 358-361, doi: 10.1109/SIEDS.2015.7117005.
  • [23]S., Rajeswari & Kannan, Suthendran. (2019). Feature Selection Method based on Fisher’s Exact Test for Agricultural Data. 10.35940/ijrte.D1104.1284S219.
  • [24]R., Praveena & ml, Valarmathi & S., Sivakumari. (2011). Gain Ratio Based Feature Selection Method For Privacy Preservation. ICTACT Journal on Soft Computing. 01. 201- 205. 10.21917/ijsc.2011.0031.
  • [25]Osisanwo F.Y., Akinsola J.E.T., Awodele O., Hinmikaiye J. O., Olakanmi O., Akinjobi J. "Supervised Machine Learning Algorithms: Classification and Comparison". International Journal of Computer Trends and Technology (IJCTT) V48(3):128-138, June 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Avrupa Bilim ve Teknoloji Dergisi-Cover
  • Yayın Aralığı: Yılda 4 Sayı
  • Başlangıç: 2013
  • Yayıncı: Osman Sağdıç