Deep Fraud Detection in Cloud-Based Banking Systems Using Recurrent Neural Networks and Graph Convolutional Networks

Authors

  • Venkata Sivakumar Musam Astute Solutions LLC, California, USA Author
  • Nagendra Kumar Musham Celer Systems Inc, California, USA Author
  • Sathiyendran Ganesan Troy, Michigan, USA Author
  • G. Arulkumaran Associate Professor, School of C&IT, REVA University, Bangalore, India Author

DOI:

https://doi.org/10.62647/

Keywords:

Fraud Detection, Recurrent Neural Networks (RNNs), Graph Convolutional Networks (GCNs), Cloud-Based Banking, Deep Learning in Finance

Abstract

Fraudulent rule detection in a cloud banking system has become a highly critical problem due to not only the complex sophisticated cyber era and fraud but also the complexity introduced by the conventional rule-based approaches. Such approaches tend to fail to detect sophisticated fraud patterns, thereby generating huge numbers of false positives and rendering the detection process inefficient. Thus, this paper presents a model incorporated into hybrid deep learning for enhancing the accuracy of fraud detection by combining Recurrent Neural Networks (RNNs) and Graph Convolutional Networks (GCNs). The RNNs learn temporal data in the sequence of transactions and the GCNs learn the relationships in the financial network. The model was tested with the PaySim dataset and had an accuracy of 96.5% precision and recall of 95.2% and 94.8%, and an AUC-ROC of 98.2%, thereby establishing its insensitivity to fraud classification. The results indicate that sequential and graphic performance enhances overall fraud detection efficiency, reducing false positives and negatives. This study will promote intelligent fraud detection systems that ensure security and reliability in all electronic financial transactions

Downloads

Download data is not yet available.

Downloads

Published

28-02-2023

How to Cite

Deep Fraud Detection in Cloud-Based Banking Systems Using Recurrent Neural Networks and Graph Convolutional Networks. (2023). International Journal of Information Technology and Computer Engineering, 11(2), 110-120. https://doi.org/10.62647/