SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3498
Group level model based online payment fraud detection
Sujithra K M1& Mr. Sivaprasad Manivannan I2
12nd YEAR PG STUDENT, Rohini College of Engineeringand Technology
2 ASSISTANT PROFESSOR Rohini College of Engineeringand Technology
---------------------------------------------------------------------***--------------------------------------------------------------------
Abstract — The overwhelming advancement of web
based business breeds cybercrime. Online payment fraud
recognition, a test looked by on the web administration,
assumes a significant part in quickly developing web based
business. Conduct based techniques are perceived as a
promising strategy for online installment misrepresentation
recognition. Be that as it may, it is a major test to construct
high-goal social models by utilizing bad quality conduct
information. In this work, we mostly address this issue from
information upgrade for social displaying. Remove fine-
grained co-event connections of value-based credits by
utilizing an information chart. Moreover, the heterogeneous
organization implanting to learn and improve addressing
complete connections. Especially, we investigate tweaked
network installing plans for various kinds of conduct
models, for example, the populace level models, individual-
level models, and summed up agent based models. The
exhibition gain of our strategy is approved by the
investigations over the genuine dataset from a business
bank. It can assist delegate conduct models with working on
fundamentally the exhibition of web based financial
installment misrepresentation recognition. To the best of
our insight, this is the primary work to acknowledge
information upgrade for differentiated conduct models by
carrying out network installing calculations on property
level co-event connections.
Key Words: Online Payment Services, Fraud Detection,
Network Embedding, User Behavioural Modelling
I INTRODUCTION
Online payment services have entered into individuals
lives. The expanded comfort, however, accompanies
intrinsic security chances [1]. The cybercrime including
online installment benefits frequently has the attributes
of broadening, specialization, industrialization,
camouflage, situation, and cross-locale, which makes the
security anticipation and control of online installment
very testing [2]. There is a pressing requirement for
acknowledging powerful and far reaching on the online
payment
fraud detection. The behavior based technique is
perceived as a powerful worldview for online
installment extortion recognition . By and large, its
benefits can be summed up as follows: Firstly, conduct
based strategies take on the non-interruption
recognition plan to ensure the client experience without
client activity in the execution cycle. Furthermore, it
changes the extortion discovery design from one-time to
persistent and can check every exchange. Thirdly,
regardless of whether the fraudster mirrors the day to
day activity propensities for the person in question, the
fraudster should go amiss from the client conduct to
acquire the advantage of the person in question. The
deviation can be recognized by conduct based strategies.
At long last, this conduct based technique can be utilized
helpfully as a subsequent security line, instead of
supplanting with different sorts of recognition strategies.
Notwithstanding, the adequacy of conduct put together
techniques frequently depends intensely with respect to
the adequacy of client social information [4]. Truly, client
social information that can be utilized for online
installment extortion recognition are in many cases bad
quality or confined because of the trouble of information
assortment and client protection prerequisites [5]. As
the primary commitment of our work to really model the
co-events among value-based credits for elite execution
social models. For this reason, to embrace the
heterogeneous connection organization, an
extraordinary type of the information diagram [6],to
successfully address the co-events. Here, a network hub
(or say an element) compares to a trait esteem in
exchanges, and an edge compares to a heterogeneous
relationship between various characteristic values.
Albeit the connection organization can communicate the
information all the more properly, it can't at long last
settle the information defect issue for conduct
demonstrating, that is to say, it affects improving the
first bad quality information. A viable information
portrayal safeguarding these thorough connections can
go about as a significant mean of social information
improvement. present network portrayal learning
(NRL), which successfully catch profound connections
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3499
[7]. Profound connections compensate for bad quality
information in misrepresentation identification and
work on the presentation of misrepresentation
identification models. By working out the likeness
between inserting vectors, more potential connections
could be construed. It part of the way tackles the
information defect issue. Notwithstanding information
upgrade, NRL changes the conventional organization
investigation from the falsely characterized element to
the programmed learned highlight, which separates
profound connections from various exchanges.
The final performance of behavioral modeling for online
fraud detection directly depends on the harmonious
cooperation of data enhancement and model
enhancement. Different types of behavioral models need
matching network embedding schemes to achieve
excellent performance. This is one of the significant
technical problems in our work. We aim to investigate
the appropriate network embedding schemes for
population-level models, individual-level models, and
models with different generalized behavioral agents.
More specifically, for population-level models, we design
a label-free heterogeneous network to reconstruct
online transactions and then feed the features generated
in embedding space into the state-of-the-art classifiers
based on machine learning to predict fraud risks; while,
for individual-level models, we turn to a label-aware
heterogeneous network that distinguishes the relations
between attributes of fraudulent transaction, and further
design multiple naïve individual-level models that match
the representations generated from the label-aware
network. Furthermore, we combine the population-level
and individual-level models to realize the
complementary effects by overcoming each other’s
weaknesses.
II RELATED WORK
Many researchers concentrated on individual-level
behavioural models to detect abnormal behavior which
is quite different from individual historical behavior.
These works paid attention to user behavior which was
almost impossible to forge at the terminal, or focused on
user online business behavior which had some different
behavioural patterns from normal ones. Vedran et al.
[19] explored the complex interaction between social
and geospatial behavior and demonstrated that social
behavior could be predicted with high precision. Yin et
al. [4] proposed a probabilistic generative model
combining use spatiotemporal data and semantic
information to predict user behavior. Naini et al. [7]
studied the task of identifying the users by matching the
histograms of their data in the anonymous dataset with
the histograms from the original dataset. Egele et al. [8]
proposed a behavior-based method to identify
compromises of high-profile accounts. Ruan et al. [3]
conducted a study on online user behavior by collecting
and analyzing user clickstreams of a well known OSN.
Rzecki et al. [20] designed a data acquisition system to
analyze the execution of single-finger gestures on a
mobile device screen and indicated the best
classification method for person recognition based on
proposed surveys. Alzubaidi et al.[9] investigated the
representative methods for user authentication on
smartphone devices in smartphone authentication
including seven types of behavioral biometrics, which
are hand waving, gait, touchscreen, keystroke, voice,
signature and general profiling. These works mainly
detected anomalous behaviors at the population-level
that are strongly different from other behaviors, while
they did not consider that the individual-level coherence
of user behavioral patterns can be utilized to detect
online identity thieves. Mazzawi et al. [10] presented a
novel approach for detecting malicious user activity in
databases by checking user’s self-consistency and global-
consistency. Lee and Kim [21] proposed a suspicious
URL detection system to recognize user anomalous
behaviors on Twitter. Cao et al. [11] designed and
implemented a malicious account detection system for
detecting both fake and compromised real user accounts.
Zhou et al. [12] proposed an FRUI algorithm to match
users among multiple OSNs. Stringhini et al. [22]
designed a system named EVILCOHORT, which can
detect malicious accounts on any online service with the
mapping between an online account and an IP address.
Meng et al. [23] presented a static sentence-level
attention model for text-based speaker change detection
by formulating it as a matching problem of utterances
before and after a certain decision point. Rawat et al.
[24] proposed three methodologies to cope up with
suspicious and anomalous activities, such as continuous
creation of fake user accounts, hacking of accounts and
other illegitimate acts in social networks. VanDam et al.
[25] focused on studying compromised accounts in
Twitter to understand who were hackers, what type of
content did hackers tweet, and what features could help
distinguish between compromised tweets and normal
tweets. They also showed that extra meta-information
could help improve the detection of compromised
accounts.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3500
III OVERVIEW OF OUR SOLUTION
Under the real-time requirement of online payment
fraud detection, it is intolerable to perform network
embedding operation for every new transaction due to
the response latency lead by large computing overhead.
Thus, the uniqueness of transaction number (i.e.,
identifier) directly destroys the possibility of adopting
network embedding online. There is no need to embed
the identifier, say the transaction number, into the
vector space, since it’s not a valid feature to represent
user behavioral patterns. Interested in the co-occurrence
relationships among different behavioral entities rather
than the relationship between a unique identifier and its
entities. Therefore, we need generate a new derivative
network of transaction attributes based on the native
graph, preparing for the network embedding. To
propose a novel effective data enhancement scheme for
behavioral modeling by representing and mining more
fine-grained attribute-level co-occurrences. Adopt the
heterogeneous relation networks to represent the
attribute-level co-occurrences, and extract those
relationships by heterogeneous network embedding
algorithms in depth. To devise a unified interface
between network embedding algorithms and behavioral
models by customizing the preserved relationship
networks according to the classification of behavioral
models. Implement the proposed methods on a real
world online banking payment service scenario.
The fraud detection issue in a regular example of online
installment administrations, i.e., online B2C (Businessto-
Client) installment exchanges. Here, to procure the
casualty's cash, cheats ordinarily contrast from the
person in question's everyday way of behaving. This is
the crucial suspicion of the plausibility of conduct based
extortion location. Based on this presumption, the
examination local area is committed to planning social
models to recognize actually the distinction concerning
personal conduct standards. The principal challenge of
this issue is to fabricate a great conduct model by
utilizing inferior quality social information. Normally,
from the two perspectives, there are two relating ways
of taking care of this issue: information improvement
and model improvement.
Fig-1 System Architecture
In this work, target contriving the comparing information
upgrade plans for the cutting edge conduct models that go
about as the all around perceived approaches of model
improvement [14]. All the more explicitly, to understand
information upgrade for conduct displaying successfully,
we take on the connection diagram and heterogeneous
organization inserting methods to address and mine more
finegrained co-events among value-based ascribes. Then,
at that point, in view of the upgraded information, the
comparing social models (or improved conduct models)
can be embraced to acknowledge misrepresentation
discovery. Thereout, as outlined in Fig. 1, the entire
progression of the information driven misrepresentation
identification framework comprises of three primary
parts: information portrayal, information upgrade and
model information upgrade.
III PROPOSED ALGORITHMS
A. Data Representation
Online payment transaction records are typically social
information that comprise of various elements
addressing the properties in exchanges. Lossless Native
Graph. Each quality of an exchange is viewed as the
element. For every exchange, we lay out the connections
between every substance and its identifier, e.g., the
exchange number. Moreover, we join every identifier a
name to signify whether this exchange is false or typical.
As indicated by the property of exchanges, the
arrangement of exchanges, meant by T , can be isolated
into two disconnected subsets, i.e., the ordinary and fake
exchange sets, signified by T0 and T1. Since an element
might show up in various exchanges, we utilize the co-
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3501
event relationship to additionally associate the diagrams
shaped by various exchanges.
B. Data Enhancement
In this work, use network implanting procedures to
understand the information upgrade for conduct
demonstrating. The organization construction to be
protected ought still up in the air before an organization
implanting activity is sent off. The organization
implanting that protects the organization construction of
local chart can't straightforwardly help social
demonstrating for online installment misrepresentation
identification. Under the continuous necessity of online
installment extortion identification, it is unbearable to
perform network inserting activity for each new
exchange because of the reaction inactivity lead by huge
processing upward. In this manner, the uniqueness of
exchange number (i.e., identifier) straightforwardly
obliterates the chance of taking on network implanting
on the web. There is compelling reason need to insert
the identifier, say the exchange number, into the vector
space, since it's anything but a substantial component to
address client standards of conduct. Redone Derivative
Networks. In the information we gathered, there are
both B2C and C2C exchanges. The extent of cheats in C2C
exchanges is tiny to that in B2C exchanges. In addition,
the component of C2C misrepresentation exchanges is
basically not the same as that of B2C ones. Subsequently,
limit the extent of this work into online B2C false
exchange Detection. Use C2C exchanges as advantageous
(excessive) data for separating the connections among
conduct specialists of B2C exchanges, i.e., account
numbers, from the local diagram.
C. Model Enhancement
In this work, we order client social models into two sorts
as per the granularity of conduct specialists, i.e., the
populace level model and individual-level model.
Populace Level Models. The populace level models
distinguish the extortion by identifying the populace
level social irregularities, e.g., conduct exception
recognition and abuse location. The classifiers in view of
social information can go about as this sort of models.
For information upgrade for them, we really want just
information refactoring for classifiers by safeguarding
the co-event recurrence of social credits. To this end, we
create a subsidiary organization where the vertices are
exchange credits and the edges with loads address the
cooccurrence recurrence, failing to assess exchange
names. Individual-Level Models. The individual-level
models distinguish the extortion by recognizing the
conduct abnormalities of people. They are viewed as a
promising worldview of extortion location. The viability
vigorously relies upon the adequacy of social
information. To assemble the individual-level
standard/typical conduct models, we really want
address the routineness and ordinariness of exchange
social information. Then, we ought to consider the marks
while producing the subordinate organization. Separate
positive connections created from T0 and negative
connections produced from T1. The positive relationship
improves the connection between's the specialists in
question, while the negative relationship debilitates the
relationship. say such a subsidiary organization is mark
mindful.
IV.RESULTS
A single-agent behavior model can only give a certain
fraud judgment. The normal judgment may not
reliabledue to the release of transactions that cannot be
checked. In this work, we imitate the one-veto
mechanism to synthesize the final results returned by
multi-agent models. That is only an agent behavioral
model returns a judgment marked as fraud, the final
result is marked fraud.
FIG-2 Customer Registration
The transaction is detected as fraudulent transactions if
and only if the result from both models are judged as
fraudulent transactions. The consistency of judgment on
fraudulent transactions reduces the probability of
misjudgment of normal transactions, and ensures that it
has better performance than a single model, i.e., the
population model or individual model. For different
performance objectives, other combinations can be also
tried, which will be reserved for future research.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3502
FIG-3 Fraud detection notification
FIG-4 The performance of data enhancement
ROC curves of different network embedding methods in
the population-level model. We observe that all models
cooperating with different network embedding methods
have a similar performance. HIN2Vec and metapath2Vec
have a better performance than node2vec and transE. The
lower performance of node2vec mainly stems from its
inability to distinguish the types of nodes. In transE, the
method focuses on resolving relationships between
different entities but taking no account of the weight of
relationships. Most embedding methods are feasible as
data enhancements, with only slight differences in terms of
performance.
V CONCLUSION
For behavioral models in online payment fraud detection,
An effective data enhancement scheme by modeling co-
occurrence relationships of transactional attributes.
Accordingly, we design customized co-occurrence relation
networks, and introduce the technique of heterogeneous
network embedding to represent online transaction data
for different types of behavioral models, e.g., the
individual-level and population-level models. The methods
are validated by the implementation on a real-world
dataset. They outperform the stateof- the-art classifiers
with lightweight feature engineering methods. Therefore,
our methods can also serve as a feasible paradigm of
automatic feature engineering.
There are some interesting issues left to study: (1) An
interesting future work is to extend the data enhancement
scheme into other types of behavioral models, e.g., the
group-level models and generalized-agent-based models,
except the population-level and individual-level models
studied in this work. (2) It would be interesting to
investigate the dedicated enhancement schemes for more
advanced individual-level models, since the adopted naive
individual-level model does not fully capture the
advantages of the proposed data representation scheme
based on the techniques of heterogeneous network
embedding. (3) It is anticipated to demonstrate the
generality of the proposed method by applying it to
different real-life application scenarios.
REFERENCES
[1] B. Cao, M. Mao, S. Viidu, and P. S. Yu, “Hitfraud: A broad
learning approach for collective fraud detection in
heterogeneous information networks,” in Proc. IEEE ICDM
2017, New Orleans, LA, USA, November 18-21, 2017, pp.
769–774.
[2] M. A. Ali, B. Arief, M. Emms, and A. P. A. van Moorsel,
“Does the online card payment landscape unwittingly
facilitate fraud?” IEEE Security & Privacy, vol. 15, no. 2, pp.
78–86, 2017.
[3] X. Ruan, Z. Wu, H. Wang, and S. Jajodia, “Profiling online
social behaviors for compromised account detection,” IEEE
Trans. Information Forensics and Security, vol. 11, no. 1,
pp. 176–187, 2016.
[4] H. Yin, Z. Hu, X. Zhou, H. Wang, K. Zheng, N. Q. V. Hung,
and S. W. Sadiq, “Discovering interpretable geo-social
communities for user behavior prediction,” in Proc. IEEE
ICDE 2016, Helsinki, Finland, May 16-20, 2016, pp. 942–
953.
[5] Y.-A. De Montjoye, L. Radaelli, V. K. Singh et al., “Unique
in the shopping mall: On the reidentifiability of credit card
metadata,” Science, vol. 347, no. 6221, pp. 536–539, 2015.
[6] A. Khodadadi, S. A. Hosseini, E. Tavakoli, and H. R.
Rabiee, “Continuous-time user modeling in presence of
badges: A probabilistic approach,” ACM Trans. Knowledge
Discovery from Data, vol. 12, no. 3, pp. 37:1–37:30, 2018.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3503
[7] F. M. Naini, J. Unnikrishnan, P. Thiran, and M. Vetterli,
“Where you are is who you are: User identification by
matching statistics,” IEEE Trans. Information Forensics
and Security, vol. 11, no. 2, pp. 358–372, 2016.
[8] M. Egele, G. Stringhini, C. Kruegel, and G. Vigna,
“Towards detecting compromised accounts on social
networks,” IEEE Trans. Dependable and Secure Computing,
vol. 14, no. 4, pp. 447–460, 2017.
[9] A. Alzubaidi and J. Kalita, “Authentication of
smartphone users using behavioral biometrics,” IEEE
Communications Surveys and Tutorials, vol. 18, no. 3, pp.
1998–2026, 2016.
[10] H. Mazzawi, G. Dalaly, D. Rozenblatz, L. Ein-Dor, M.
Ninio, and O. Lavi, “Anomaly detection in large databases
using behavioural patterning,” in Proc. IEEE ICDE 2017, pp.
1140–1149.
[11] Q. Cao, X. Yang, J. Yu, and C. Palow, “Uncovering large
groups of active malicious accounts in online social
networks,” in Proc. ACM SIGSAC 2014, pp. 477–488.
[12] X. Zhou, X. Liang, H. Zhang, and Y. Ma, “Cross-platform
identification of anonymous identical users in multiple
social media networks,” IEEE Trans. Knowledge and Data
Engineering, vol. 28, no. 2, pp. 411–424, 2016.
[13] T. W¨ uchner, A. Cislak, M. Ochoa, and A. Pretschner,
“Leveraging compression-based graph mining for
behavior-based malware detection,” IEEE Trans.
Dependable Secure Computing, vol. 16, no. 1, pp. 99–112,
2019.
[14] T. Chen and C. Guestrin, “Xgboost: A scalable tree
boosting system,” in Proc. ACM SIGKDD 2016, CA, USA,
August 13-17, 2016, pp. 785–794.
[15] B. Jia, C. Dong, Z. Chen, K. Chang, N. Sullivan, and G.
Chen, “Pattern discovery and anomaly detection via
knowledge graph,” in Proc. FUSION 2018, Cambridge, UK,
July 10-13, 2018, pp. 2392–2399.
[16] P. Cui, X. Wang, J. Pei, and W. Zhu, “A survey on
network embedding,” IEEE Trans. Knowledge and Data
Engineering, vol. 31, no. 5, pp. 833–852, 2019.
[17] M. Abouelenien, V. P´erez-Rosas, R. Mihalcea, and M.
Burzo, “Detecting deceptive behavior via integration of
discriminative features from multiple modalities,” IEEE
Trans. Information Forensics and Security, vol. 12, no. 5,
pp. 1042–1055, 2017.
[18] W. Youyou, M. Kosinski, and D. Stillwell, “Computer-
based personality judgments are more accurate than those
made by humans,” PNAS, vol. 112, no. 4, pp. 1036–1040,
2015.
[19] V. Sekara, A. Stopczynski, and S. Lehmann,
“Fundamental structures of dynamic social networks,”
PNAS, vol. 113, no. 36, pp. 9977–9982, 2016.
[20] K. Rzecki, P. Plawiak, M. Niedzwiecki, T. Sosnicki, J.
Leskow, and M. Ciesielski, “Person recognition based on
touch screen gestures using computational intelligence
methods,” Information Science, vol. 415, pp. 70–84, 2017.
[21] S. Lee and J. Kim, “Warningbird: Detecting suspicious
urls in twitter stream,” in Proc. NDSS 2012, San Diego,
California, USA, February 5-8, 2012, vol. 12, pp. 1–13.
[22] G. Stringhini, P. Mourlanne, G. Jacob, M. Egele, C.
Kruegel, and G. Vigna, “EVILCOHORT: detecting
communities of malicious accounts on online services,” in
Proc. USENIX Security 2015, Washington, D.C., USA, August
12-14, 2015, pp. 563–578.
[23] Z. Meng, L. Mou, and Z. Jin, “Hierarchical RNN with
static sentence-level attention for text-based speaker
change detection,” in Proc. ACM CIKM 2017, Singapore,
November 06 - 10, 2017, pp. 2203–2206.
[24] A. Rawat, G. Gugnani, M. Shastri, and P. Kumar,
“Anomaly recognition in online social networks,”
International Journal of Security and Its Applications, vol.
9, no. 7, pp. 109–118, 2015.
[25] C. VanDam, J. Tang, and P. Tan, “Understanding
compromised accounts on twitter,” in Proc. ACM WI 2017 ,
Leipzig, Germany, August 23-26, 2017, pp. 737–744.

More Related Content

PDF
Online Transaction Fraud Detection System Based on Machine Learning
PDF
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
PDF
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
PDF
Cyberbullying Detection on Social Networks Using Machine Learning Approaches
PDF
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
PDF
A Comparative Study on Credit Card Fraud Detection
PDF
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
PDF
IRJET- Fraud Detection Algorithms for a Credit Card
Online Transaction Fraud Detection System Based on Machine Learning
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Cyberbullying Detection on Social Networks Using Machine Learning Approaches
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
A Comparative Study on Credit Card Fraud Detection
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
IRJET- Fraud Detection Algorithms for a Credit Card

Similar to Group level model based online payment fraud detection (20)

PDF
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
PDF
IRJET- Cyber Bullying Detection in Web Chat Application
PDF
Trustworthy Service Enhancement in Mobile Social Network
PDF
Ijciet 08 02_003
PDF
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
PDF
IRJET- Credit Card Fraud Detection using Random Forest
PDF
E-Commerce Transaction Fraud Detection through Machine Learning
PDF
Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones
PDF
IRJET- A Mobile Payment System Based on Face Recognition
PDF
Customer Adoption of Internet Banking in Mauritius
PDF
Controlling Anti Ragging System using Android
PDF
Sandip Finwmwmmwmwmmmenenneal Project.pdf
PDF
Concept drift and machine learning model for detecting fraudulent transaction...
PDF
e-AGE 2014 Proceedings_1st article
PDF
Malicious Link Detection System
PDF
Transformation from Identity Stone Age to Digital Identity
PDF
Automated Mess Service Based on User's Location
PDF
IRJET- Analysis on Credit Card Fraud Detection using Capsule Network
PDF
Websites using touchless interaction having graphical
PDF
Digital Lost and Found Item Portal
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
IRJET- Cyber Bullying Detection in Web Chat Application
Trustworthy Service Enhancement in Mobile Social Network
Ijciet 08 02_003
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING
IRJET- Credit Card Fraud Detection using Random Forest
E-Commerce Transaction Fraud Detection through Machine Learning
Mobile Agents: An Intelligent Multi-Agent System for Mobile Phones
IRJET- A Mobile Payment System Based on Face Recognition
Customer Adoption of Internet Banking in Mauritius
Controlling Anti Ragging System using Android
Sandip Finwmwmmwmwmmmenenneal Project.pdf
Concept drift and machine learning model for detecting fraudulent transaction...
e-AGE 2014 Proceedings_1st article
Malicious Link Detection System
Transformation from Identity Stone Age to Digital Identity
Automated Mess Service Based on User's Location
IRJET- Analysis on Credit Card Fraud Detection using Capsule Network
Websites using touchless interaction having graphical
Digital Lost and Found Item Portal
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Ad

Recently uploaded (20)

PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
additive manufacturing of ss316l using mig welding
PPT
introduction to datamining and warehousing
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
OOP with Java - Java Introduction (Basics)
PPT
Project quality management in manufacturing
PPTX
Sustainable Sites - Green Building Construction
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT
Mechanical Engineering MATERIALS Selection
PDF
composite construction of structures.pdf
PDF
PPT on Performance Review to get promotions
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Automation-in-Manufacturing-Chapter-Introduction.pdf
additive manufacturing of ss316l using mig welding
introduction to datamining and warehousing
CYBER-CRIMES AND SECURITY A guide to understanding
OOP with Java - Java Introduction (Basics)
Project quality management in manufacturing
Sustainable Sites - Green Building Construction
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Mechanical Engineering MATERIALS Selection
composite construction of structures.pdf
PPT on Performance Review to get promotions
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Internet of Things (IOT) - A guide to understanding
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
CH1 Production IntroductoryConcepts.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026

Group level model based online payment fraud detection

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3498 Group level model based online payment fraud detection Sujithra K M1& Mr. Sivaprasad Manivannan I2 12nd YEAR PG STUDENT, Rohini College of Engineeringand Technology 2 ASSISTANT PROFESSOR Rohini College of Engineeringand Technology ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract — The overwhelming advancement of web based business breeds cybercrime. Online payment fraud recognition, a test looked by on the web administration, assumes a significant part in quickly developing web based business. Conduct based techniques are perceived as a promising strategy for online installment misrepresentation recognition. Be that as it may, it is a major test to construct high-goal social models by utilizing bad quality conduct information. In this work, we mostly address this issue from information upgrade for social displaying. Remove fine- grained co-event connections of value-based credits by utilizing an information chart. Moreover, the heterogeneous organization implanting to learn and improve addressing complete connections. Especially, we investigate tweaked network installing plans for various kinds of conduct models, for example, the populace level models, individual- level models, and summed up agent based models. The exhibition gain of our strategy is approved by the investigations over the genuine dataset from a business bank. It can assist delegate conduct models with working on fundamentally the exhibition of web based financial installment misrepresentation recognition. To the best of our insight, this is the primary work to acknowledge information upgrade for differentiated conduct models by carrying out network installing calculations on property level co-event connections. Key Words: Online Payment Services, Fraud Detection, Network Embedding, User Behavioural Modelling I INTRODUCTION Online payment services have entered into individuals lives. The expanded comfort, however, accompanies intrinsic security chances [1]. The cybercrime including online installment benefits frequently has the attributes of broadening, specialization, industrialization, camouflage, situation, and cross-locale, which makes the security anticipation and control of online installment very testing [2]. There is a pressing requirement for acknowledging powerful and far reaching on the online payment fraud detection. The behavior based technique is perceived as a powerful worldview for online installment extortion recognition . By and large, its benefits can be summed up as follows: Firstly, conduct based strategies take on the non-interruption recognition plan to ensure the client experience without client activity in the execution cycle. Furthermore, it changes the extortion discovery design from one-time to persistent and can check every exchange. Thirdly, regardless of whether the fraudster mirrors the day to day activity propensities for the person in question, the fraudster should go amiss from the client conduct to acquire the advantage of the person in question. The deviation can be recognized by conduct based strategies. At long last, this conduct based technique can be utilized helpfully as a subsequent security line, instead of supplanting with different sorts of recognition strategies. Notwithstanding, the adequacy of conduct put together techniques frequently depends intensely with respect to the adequacy of client social information [4]. Truly, client social information that can be utilized for online installment extortion recognition are in many cases bad quality or confined because of the trouble of information assortment and client protection prerequisites [5]. As the primary commitment of our work to really model the co-events among value-based credits for elite execution social models. For this reason, to embrace the heterogeneous connection organization, an extraordinary type of the information diagram [6],to successfully address the co-events. Here, a network hub (or say an element) compares to a trait esteem in exchanges, and an edge compares to a heterogeneous relationship between various characteristic values. Albeit the connection organization can communicate the information all the more properly, it can't at long last settle the information defect issue for conduct demonstrating, that is to say, it affects improving the first bad quality information. A viable information portrayal safeguarding these thorough connections can go about as a significant mean of social information improvement. present network portrayal learning (NRL), which successfully catch profound connections
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3499 [7]. Profound connections compensate for bad quality information in misrepresentation identification and work on the presentation of misrepresentation identification models. By working out the likeness between inserting vectors, more potential connections could be construed. It part of the way tackles the information defect issue. Notwithstanding information upgrade, NRL changes the conventional organization investigation from the falsely characterized element to the programmed learned highlight, which separates profound connections from various exchanges. The final performance of behavioral modeling for online fraud detection directly depends on the harmonious cooperation of data enhancement and model enhancement. Different types of behavioral models need matching network embedding schemes to achieve excellent performance. This is one of the significant technical problems in our work. We aim to investigate the appropriate network embedding schemes for population-level models, individual-level models, and models with different generalized behavioral agents. More specifically, for population-level models, we design a label-free heterogeneous network to reconstruct online transactions and then feed the features generated in embedding space into the state-of-the-art classifiers based on machine learning to predict fraud risks; while, for individual-level models, we turn to a label-aware heterogeneous network that distinguishes the relations between attributes of fraudulent transaction, and further design multiple naïve individual-level models that match the representations generated from the label-aware network. Furthermore, we combine the population-level and individual-level models to realize the complementary effects by overcoming each other’s weaknesses. II RELATED WORK Many researchers concentrated on individual-level behavioural models to detect abnormal behavior which is quite different from individual historical behavior. These works paid attention to user behavior which was almost impossible to forge at the terminal, or focused on user online business behavior which had some different behavioural patterns from normal ones. Vedran et al. [19] explored the complex interaction between social and geospatial behavior and demonstrated that social behavior could be predicted with high precision. Yin et al. [4] proposed a probabilistic generative model combining use spatiotemporal data and semantic information to predict user behavior. Naini et al. [7] studied the task of identifying the users by matching the histograms of their data in the anonymous dataset with the histograms from the original dataset. Egele et al. [8] proposed a behavior-based method to identify compromises of high-profile accounts. Ruan et al. [3] conducted a study on online user behavior by collecting and analyzing user clickstreams of a well known OSN. Rzecki et al. [20] designed a data acquisition system to analyze the execution of single-finger gestures on a mobile device screen and indicated the best classification method for person recognition based on proposed surveys. Alzubaidi et al.[9] investigated the representative methods for user authentication on smartphone devices in smartphone authentication including seven types of behavioral biometrics, which are hand waving, gait, touchscreen, keystroke, voice, signature and general profiling. These works mainly detected anomalous behaviors at the population-level that are strongly different from other behaviors, while they did not consider that the individual-level coherence of user behavioral patterns can be utilized to detect online identity thieves. Mazzawi et al. [10] presented a novel approach for detecting malicious user activity in databases by checking user’s self-consistency and global- consistency. Lee and Kim [21] proposed a suspicious URL detection system to recognize user anomalous behaviors on Twitter. Cao et al. [11] designed and implemented a malicious account detection system for detecting both fake and compromised real user accounts. Zhou et al. [12] proposed an FRUI algorithm to match users among multiple OSNs. Stringhini et al. [22] designed a system named EVILCOHORT, which can detect malicious accounts on any online service with the mapping between an online account and an IP address. Meng et al. [23] presented a static sentence-level attention model for text-based speaker change detection by formulating it as a matching problem of utterances before and after a certain decision point. Rawat et al. [24] proposed three methodologies to cope up with suspicious and anomalous activities, such as continuous creation of fake user accounts, hacking of accounts and other illegitimate acts in social networks. VanDam et al. [25] focused on studying compromised accounts in Twitter to understand who were hackers, what type of content did hackers tweet, and what features could help distinguish between compromised tweets and normal tweets. They also showed that extra meta-information could help improve the detection of compromised accounts.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3500 III OVERVIEW OF OUR SOLUTION Under the real-time requirement of online payment fraud detection, it is intolerable to perform network embedding operation for every new transaction due to the response latency lead by large computing overhead. Thus, the uniqueness of transaction number (i.e., identifier) directly destroys the possibility of adopting network embedding online. There is no need to embed the identifier, say the transaction number, into the vector space, since it’s not a valid feature to represent user behavioral patterns. Interested in the co-occurrence relationships among different behavioral entities rather than the relationship between a unique identifier and its entities. Therefore, we need generate a new derivative network of transaction attributes based on the native graph, preparing for the network embedding. To propose a novel effective data enhancement scheme for behavioral modeling by representing and mining more fine-grained attribute-level co-occurrences. Adopt the heterogeneous relation networks to represent the attribute-level co-occurrences, and extract those relationships by heterogeneous network embedding algorithms in depth. To devise a unified interface between network embedding algorithms and behavioral models by customizing the preserved relationship networks according to the classification of behavioral models. Implement the proposed methods on a real world online banking payment service scenario. The fraud detection issue in a regular example of online installment administrations, i.e., online B2C (Businessto- Client) installment exchanges. Here, to procure the casualty's cash, cheats ordinarily contrast from the person in question's everyday way of behaving. This is the crucial suspicion of the plausibility of conduct based extortion location. Based on this presumption, the examination local area is committed to planning social models to recognize actually the distinction concerning personal conduct standards. The principal challenge of this issue is to fabricate a great conduct model by utilizing inferior quality social information. Normally, from the two perspectives, there are two relating ways of taking care of this issue: information improvement and model improvement. Fig-1 System Architecture In this work, target contriving the comparing information upgrade plans for the cutting edge conduct models that go about as the all around perceived approaches of model improvement [14]. All the more explicitly, to understand information upgrade for conduct displaying successfully, we take on the connection diagram and heterogeneous organization inserting methods to address and mine more finegrained co-events among value-based ascribes. Then, at that point, in view of the upgraded information, the comparing social models (or improved conduct models) can be embraced to acknowledge misrepresentation discovery. Thereout, as outlined in Fig. 1, the entire progression of the information driven misrepresentation identification framework comprises of three primary parts: information portrayal, information upgrade and model information upgrade. III PROPOSED ALGORITHMS A. Data Representation Online payment transaction records are typically social information that comprise of various elements addressing the properties in exchanges. Lossless Native Graph. Each quality of an exchange is viewed as the element. For every exchange, we lay out the connections between every substance and its identifier, e.g., the exchange number. Moreover, we join every identifier a name to signify whether this exchange is false or typical. As indicated by the property of exchanges, the arrangement of exchanges, meant by T , can be isolated into two disconnected subsets, i.e., the ordinary and fake exchange sets, signified by T0 and T1. Since an element might show up in various exchanges, we utilize the co-
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3501 event relationship to additionally associate the diagrams shaped by various exchanges. B. Data Enhancement In this work, use network implanting procedures to understand the information upgrade for conduct demonstrating. The organization construction to be protected ought still up in the air before an organization implanting activity is sent off. The organization implanting that protects the organization construction of local chart can't straightforwardly help social demonstrating for online installment misrepresentation identification. Under the continuous necessity of online installment extortion identification, it is unbearable to perform network inserting activity for each new exchange because of the reaction inactivity lead by huge processing upward. In this manner, the uniqueness of exchange number (i.e., identifier) straightforwardly obliterates the chance of taking on network implanting on the web. There is compelling reason need to insert the identifier, say the exchange number, into the vector space, since it's anything but a substantial component to address client standards of conduct. Redone Derivative Networks. In the information we gathered, there are both B2C and C2C exchanges. The extent of cheats in C2C exchanges is tiny to that in B2C exchanges. In addition, the component of C2C misrepresentation exchanges is basically not the same as that of B2C ones. Subsequently, limit the extent of this work into online B2C false exchange Detection. Use C2C exchanges as advantageous (excessive) data for separating the connections among conduct specialists of B2C exchanges, i.e., account numbers, from the local diagram. C. Model Enhancement In this work, we order client social models into two sorts as per the granularity of conduct specialists, i.e., the populace level model and individual-level model. Populace Level Models. The populace level models distinguish the extortion by identifying the populace level social irregularities, e.g., conduct exception recognition and abuse location. The classifiers in view of social information can go about as this sort of models. For information upgrade for them, we really want just information refactoring for classifiers by safeguarding the co-event recurrence of social credits. To this end, we create a subsidiary organization where the vertices are exchange credits and the edges with loads address the cooccurrence recurrence, failing to assess exchange names. Individual-Level Models. The individual-level models distinguish the extortion by recognizing the conduct abnormalities of people. They are viewed as a promising worldview of extortion location. The viability vigorously relies upon the adequacy of social information. To assemble the individual-level standard/typical conduct models, we really want address the routineness and ordinariness of exchange social information. Then, we ought to consider the marks while producing the subordinate organization. Separate positive connections created from T0 and negative connections produced from T1. The positive relationship improves the connection between's the specialists in question, while the negative relationship debilitates the relationship. say such a subsidiary organization is mark mindful. IV.RESULTS A single-agent behavior model can only give a certain fraud judgment. The normal judgment may not reliabledue to the release of transactions that cannot be checked. In this work, we imitate the one-veto mechanism to synthesize the final results returned by multi-agent models. That is only an agent behavioral model returns a judgment marked as fraud, the final result is marked fraud. FIG-2 Customer Registration The transaction is detected as fraudulent transactions if and only if the result from both models are judged as fraudulent transactions. The consistency of judgment on fraudulent transactions reduces the probability of misjudgment of normal transactions, and ensures that it has better performance than a single model, i.e., the population model or individual model. For different performance objectives, other combinations can be also tried, which will be reserved for future research.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3502 FIG-3 Fraud detection notification FIG-4 The performance of data enhancement ROC curves of different network embedding methods in the population-level model. We observe that all models cooperating with different network embedding methods have a similar performance. HIN2Vec and metapath2Vec have a better performance than node2vec and transE. The lower performance of node2vec mainly stems from its inability to distinguish the types of nodes. In transE, the method focuses on resolving relationships between different entities but taking no account of the weight of relationships. Most embedding methods are feasible as data enhancements, with only slight differences in terms of performance. V CONCLUSION For behavioral models in online payment fraud detection, An effective data enhancement scheme by modeling co- occurrence relationships of transactional attributes. Accordingly, we design customized co-occurrence relation networks, and introduce the technique of heterogeneous network embedding to represent online transaction data for different types of behavioral models, e.g., the individual-level and population-level models. The methods are validated by the implementation on a real-world dataset. They outperform the stateof- the-art classifiers with lightweight feature engineering methods. Therefore, our methods can also serve as a feasible paradigm of automatic feature engineering. There are some interesting issues left to study: (1) An interesting future work is to extend the data enhancement scheme into other types of behavioral models, e.g., the group-level models and generalized-agent-based models, except the population-level and individual-level models studied in this work. (2) It would be interesting to investigate the dedicated enhancement schemes for more advanced individual-level models, since the adopted naive individual-level model does not fully capture the advantages of the proposed data representation scheme based on the techniques of heterogeneous network embedding. (3) It is anticipated to demonstrate the generality of the proposed method by applying it to different real-life application scenarios. REFERENCES [1] B. Cao, M. Mao, S. Viidu, and P. S. Yu, “Hitfraud: A broad learning approach for collective fraud detection in heterogeneous information networks,” in Proc. IEEE ICDM 2017, New Orleans, LA, USA, November 18-21, 2017, pp. 769–774. [2] M. A. Ali, B. Arief, M. Emms, and A. P. A. van Moorsel, “Does the online card payment landscape unwittingly facilitate fraud?” IEEE Security & Privacy, vol. 15, no. 2, pp. 78–86, 2017. [3] X. Ruan, Z. Wu, H. Wang, and S. Jajodia, “Profiling online social behaviors for compromised account detection,” IEEE Trans. Information Forensics and Security, vol. 11, no. 1, pp. 176–187, 2016. [4] H. Yin, Z. Hu, X. Zhou, H. Wang, K. Zheng, N. Q. V. Hung, and S. W. Sadiq, “Discovering interpretable geo-social communities for user behavior prediction,” in Proc. IEEE ICDE 2016, Helsinki, Finland, May 16-20, 2016, pp. 942– 953. [5] Y.-A. De Montjoye, L. Radaelli, V. K. Singh et al., “Unique in the shopping mall: On the reidentifiability of credit card metadata,” Science, vol. 347, no. 6221, pp. 536–539, 2015. [6] A. Khodadadi, S. A. Hosseini, E. Tavakoli, and H. R. Rabiee, “Continuous-time user modeling in presence of badges: A probabilistic approach,” ACM Trans. Knowledge Discovery from Data, vol. 12, no. 3, pp. 37:1–37:30, 2018.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3503 [7] F. M. Naini, J. Unnikrishnan, P. Thiran, and M. Vetterli, “Where you are is who you are: User identification by matching statistics,” IEEE Trans. Information Forensics and Security, vol. 11, no. 2, pp. 358–372, 2016. [8] M. Egele, G. Stringhini, C. Kruegel, and G. Vigna, “Towards detecting compromised accounts on social networks,” IEEE Trans. Dependable and Secure Computing, vol. 14, no. 4, pp. 447–460, 2017. [9] A. Alzubaidi and J. Kalita, “Authentication of smartphone users using behavioral biometrics,” IEEE Communications Surveys and Tutorials, vol. 18, no. 3, pp. 1998–2026, 2016. [10] H. Mazzawi, G. Dalaly, D. Rozenblatz, L. Ein-Dor, M. Ninio, and O. Lavi, “Anomaly detection in large databases using behavioural patterning,” in Proc. IEEE ICDE 2017, pp. 1140–1149. [11] Q. Cao, X. Yang, J. Yu, and C. Palow, “Uncovering large groups of active malicious accounts in online social networks,” in Proc. ACM SIGSAC 2014, pp. 477–488. [12] X. Zhou, X. Liang, H. Zhang, and Y. Ma, “Cross-platform identification of anonymous identical users in multiple social media networks,” IEEE Trans. Knowledge and Data Engineering, vol. 28, no. 2, pp. 411–424, 2016. [13] T. W¨ uchner, A. Cislak, M. Ochoa, and A. Pretschner, “Leveraging compression-based graph mining for behavior-based malware detection,” IEEE Trans. Dependable Secure Computing, vol. 16, no. 1, pp. 99–112, 2019. [14] T. Chen and C. Guestrin, “Xgboost: A scalable tree boosting system,” in Proc. ACM SIGKDD 2016, CA, USA, August 13-17, 2016, pp. 785–794. [15] B. Jia, C. Dong, Z. Chen, K. Chang, N. Sullivan, and G. Chen, “Pattern discovery and anomaly detection via knowledge graph,” in Proc. FUSION 2018, Cambridge, UK, July 10-13, 2018, pp. 2392–2399. [16] P. Cui, X. Wang, J. Pei, and W. Zhu, “A survey on network embedding,” IEEE Trans. Knowledge and Data Engineering, vol. 31, no. 5, pp. 833–852, 2019. [17] M. Abouelenien, V. P´erez-Rosas, R. Mihalcea, and M. Burzo, “Detecting deceptive behavior via integration of discriminative features from multiple modalities,” IEEE Trans. Information Forensics and Security, vol. 12, no. 5, pp. 1042–1055, 2017. [18] W. Youyou, M. Kosinski, and D. Stillwell, “Computer- based personality judgments are more accurate than those made by humans,” PNAS, vol. 112, no. 4, pp. 1036–1040, 2015. [19] V. Sekara, A. Stopczynski, and S. Lehmann, “Fundamental structures of dynamic social networks,” PNAS, vol. 113, no. 36, pp. 9977–9982, 2016. [20] K. Rzecki, P. Plawiak, M. Niedzwiecki, T. Sosnicki, J. Leskow, and M. Ciesielski, “Person recognition based on touch screen gestures using computational intelligence methods,” Information Science, vol. 415, pp. 70–84, 2017. [21] S. Lee and J. Kim, “Warningbird: Detecting suspicious urls in twitter stream,” in Proc. NDSS 2012, San Diego, California, USA, February 5-8, 2012, vol. 12, pp. 1–13. [22] G. Stringhini, P. Mourlanne, G. Jacob, M. Egele, C. Kruegel, and G. Vigna, “EVILCOHORT: detecting communities of malicious accounts on online services,” in Proc. USENIX Security 2015, Washington, D.C., USA, August 12-14, 2015, pp. 563–578. [23] Z. Meng, L. Mou, and Z. Jin, “Hierarchical RNN with static sentence-level attention for text-based speaker change detection,” in Proc. ACM CIKM 2017, Singapore, November 06 - 10, 2017, pp. 2203–2206. [24] A. Rawat, G. Gugnani, M. Shastri, and P. Kumar, “Anomaly recognition in online social networks,” International Journal of Security and Its Applications, vol. 9, no. 7, pp. 109–118, 2015. [25] C. VanDam, J. Tang, and P. Tan, “Understanding compromised accounts on twitter,” in Proc. ACM WI 2017 , Leipzig, Germany, August 23-26, 2017, pp. 737–744.