Authors :
Eric Jhessim
Volume/Issue :
Volume 10 - 2025, Issue 7 - July
Google Scholar :
https://tinyurl.com/5et94r2c
Scribd :
https://tinyurl.com/42334rnx
DOI :
https://doi.org/10.38124/ijisrt/25jul835
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
Behavioral analytics is a cutting-edge tool in the fight for financial cybersecurity. It uses advanced AI and
machine learning to pinpoint dangers that outdated methods might miss. This study examines how well these AI-based
tools work and the challenges encountered, especially when trying to mitigate and prevent security breaches in the digital
currency world and financial markets. The case study analysis of three large-scale security incidents, namely a
cryptocurrency exchange, a banking institution an advanced persistent threat (APT), and a DeFi platform, identified the
current state of behavioral analytics implementation. Key findings show that while AI-based solutions can efficiently
identify threats that rely on the volume and behavioral patterns of the underlying systems, they struggle with more refined
attacks that exploit legitimate features. Consequently, these systems exhibit high false positives and low response times.
The cross-case analysis indicates that the behavioral correlations across domains and the threshold off-peak periods are
not adequately addressed. The study offers recommendations on better implementation for algorithm development and
data integration as well as policy formulation. Therefore, the main contributions are: 1: Common behavioral indicators
can be derived from the financial platform. 2: Human-AI cooperation is required to obtain an effective identification
process, and 3: The security and operation continuity requirements can be balanced by adjusting the threshold level in
real time.
Keywords :
Behavioral Analytics, Financial Cybersecurity, Cyber Defense Systems, Defense Systems, Digital Currency, AI.
References :
- Aghazadeh Ardebili, A., Hasidi, O., Bendaouia, A., Khalil, A., Khalil, S., Luceri, D., ... & Ficarella, A. (2024). Enhancing resilience in complex energy systems through real-time anomaly detection: a systematic literature review. Energy Informatics, 7(1), 96.
- Agrawal, A. (2020). Approaches for Detecting Anomaly in Real-Time Network.
- Alhashmi, A.A., Alashjaee, A.M., Darem, A.A., Alanazi, A.F., & Effghi, R. (2023). An ensemble-based fraud detection model for financial transaction cyber threat classification and countermeasures. Engineering, Technology & Applied Science Research, 13(6), 12433-12439.
- Al-Jeshi, S., Tarfa, A., Al-Aswad, H., Elmedany, W., & Balakrishna, C. (2022). A Blockchain-Enabled System for Enhancing Fintech Industry of the Core Banking Systems. 2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), 209-213.
- Alkhdour, T., AlWadi, B. M., & Alrawad, M. (2024). Assessment of Cybersecurity Risks and Threats on Banking and Financial Services. Journal of Internet Services and Information Security, 14(3), 167-190.
- Almazroi, A.A., & Ayub, N. (2023). Online payment fraud detection model using machine learning techniques. IEEE Access, 11, 137188-137203.
- Basheer, M.Y.I., Ali, A.M., Osman, R., Abdul Hamid, N.H., Nordin, S., Ariffin, M.A.M., & Martinez, J.A.I. (2024). Empowering Anomaly Detection Algorithm: A Review. IAES International Journal of Artificial Intelligence (IJ-AI), 13(1), 9–22.
- Bhomia, Y., Sahu, S., & Singh, S.P. (2019). Machine Learning for Anomaly Detection Approaches, Challenges, and Applications. The Pharma Innovation Journal, 8(3), 24–27.
- Botha, R. (2019). The Potential Anti-Money Laundering and Counter-Terrorism Financing Risks and Implications of Virtual Currencies on the Prevailing South African Regulatory and Supervisory Regime (Master’s thesis, University of Pretoria, South Africa).
- Bozzetto, C. (2023). Cryptocurrency markets microstructure, with a machine learning application to the Binance bitcoin market.
- Chalapathy, R., & Chawla, S. (2019). Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407.
- Chatterjee, P., & Das, A. (2024). AI-Powered Anomaly Detection for Real-Time Performance Monitoring in Cloud Systems. International Journal of Scientific Research in Science and Technology.
- Cheng, S., Li, J., Luo, L., & Zhu, Y. (2024). Cybersecurity Governance and Digital Finance: Evidence from Sovereign States. Finance Research Letters.
- Chen, J., & Ran, X. (2019). Deep learning with edge computing: A review. Proceedings of the IEEE, 107(8), 1655-1674.
- Devineni, S.K., Kathiriya, S., & Shende, A. (2023). Machine Learning-Powered Anomaly Detection: Enhancing Data Security and Integrity. Journal of Artificial Intelligence & Cloud Computing, 2(2), 1–9.
- Domlur Seetharama, Y. (2021). Anomaly Detection: Enhancing Systems with Machine Learning. International Journal of Science and Research (IJSR).
- Donald, O., Ajala, O.A., Okoye, C.C., Ofodile, O.C., Arinze, C.A., & Daraojimba, O.D. (2024). Review of AI and machine learning applications to predict and Thwart cyber-attacks in real-time. Magna Scientia Advanced Research and Reviews.
- Elluri, L., Nagar, A., & Joshi, K. P. (2018, December). An Integrated Knowledge Graph to Automate GDPR and PCI DSS Compliance. In 2018 IEEE International Conference on Big Data (Big Data) (pp. 1266-1271). IEEE.
- Erondu, C. I., & Erondu, U. I. (2023). The Role of Cyber Security in a Digitalizing Economy: A Development Perspective. International Journal of Research and Innovation in Social Science, 7(11), 1558-1570.
- Falade, P.V. (2023). Decoding the threat landscape: Chatgpt, fraudgpt, and Wormgpt in social engineering attacks. arXiv preprint arXiv:2310.05595.
- Fendt, M., Parsons, M.H., Apfelbach, R., Carthey, A.J., Dickman, C.R., Endres, T., ... & Blumstein, D.T. (2020). Context and trade-offs characterize real-world threat detection systems: a review and comprehensive framework to improve research practice and resolve the translational crisis. Neuroscience & Biobehavioral Reviews, 115, 25–33.
- Galavis, J. (2018). Blame it on the blockchain: cryptocurrencies boom amidst global regulations. U. Miami Int'l & Comp. L. Rev., 26, 561.
- Gandhi, H., Tandon, K., Gite, S., Pradhan, B., & Alamri, A. (2024). Navigating the complexity of money laundering: anti-money laundering advancements with AI/ML insights. International Journal on Smart Sensing and Intelligent Systems.
- Gracy, M., Jeyavadhanam, B.R., Babu, P.K., Karthick, S., & Chandru, R. (2023). Growing Threats Of Cyber Security: Protecting Yourself In A Digital World. 2023 International Conference on Networking and Communications (ICNWC), 1–5.
- Gray, G.L. (2024). An Exploration of the Money Laundering Associated with the Bitfinex Bitcoin Hack. Journal of Emerging Technologies in Accounting.
- Harris, L. (2024). The Role of Artificial Intelligence in Advancing Blockchain Technology.
- Immadisetty, A. (2024). Machine Learning for Real-Time Anomaly Detection. International Journal For Multidisciplinary Research.
- Ivleva, E.S., Makarov, M.Y., & Bobrov, A.G. (2024). Development of the circulation of digital financial assets in the world in the context of digital transformation. Economics and Management.
- Jankov, D., Sikdar, S., Mukherjee, R., Teymourian, K., & Jermaine, C. (2017, June). Real-time high-performance anomaly detection over data streams: Grand challenge. In Proceedings of the 11th ACM International Conference on distributed and event-based systems (pp. 292–297).
- Jidiga, G.R., & Sammulal, P. (2014). Anomaly detection using machine learning with a case study. 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, 1060–1065.
- Kumar, R., Swarnkar, M., Singal, G., & Kumar, N. (2021). IoT network traffic classification using machine learning algorithms: An experimental analysis. IEEE Internet of Things Journal, 9(2), 989-1008.
- Kumar, S., Datta, S., Singh, V., Datta, D., Singh, S.K., & Sharma, R. (2024). Applications, challenges, and future directions of human-in-the-loop learning. IEEE Access.
- Kummari, D.N. (2020). Machine Learning Applications in Regulatory Compliance Monitoring for Industrial Operations. Global Research Development (GRD), 5(12), 75–95.
- Lenart, K. (2024). Comparison of Machine Learning and Statistical Approaches of Detecting Anomalies Using a Simulation Study. Econometrics.
- Mestre, A. (2024, May). Towards a Hybrid Intelligence Paradigm: Systematic Integration of Human and Artificial Capabilities. In International Conference on Research Challenges in Information Science (pp. 149–156). Cham: Springer Nature Switzerland.
- Naha, R.T., & Zhang, K. (2024, December). Cryptocurrencies Forensics With Real-Time Intelligence and Graph Database: A Comprehensive Review. In 2024 IEEE International Conference on Big Data (BigData) (pp. 1–12). IEEE.
- Olaniyi, O.O., Omogoroye, O.O., Olaniyi, F.G., Alao, A.I., & Oladoyinbo, T.O. (2024). CyberFusion protocols: Strategic integration of enterprise risk management, ISO 27001, and mobile forensics for advanced digital security in the modern business ecosystem. Journal of Engineering Research and Reports, 26(6), 31–49.
- Palaiokrassas, G., Scherrer, S., Ofeidis, I., & Tassiulas, L. (2023). Leveraging Machine Learning For Multichain DeFi Fraud Detection. 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 678–680.
- Pham, T., & Lee, S. (2016). Anomaly Detection in Bitcoin Network Using Unsupervised Learning Methods. arXiv:1611.03941.
- Raj, A., & Sharma, S. (2024). A Comprehensive Study on Anomaly Detection Methods Using Traditional and Machine Learning Approaches. International Journal of High School Research.
- Sabidi, M.L., & Zolkipli, M.F. (2024). The Role of Risk Management in Cybersecurity Protocols. Borneo International Journal, 7(2), 77–81.
- Song, A., Seo, E., & Kim, H. (2023). Anomaly VAE-Transformer: A Deep Learning Approach for Anomaly Detection in Decentralized Finance. IEEE Access, 11, 98115–98131.
- Vassilev, V., Donchev, D., & Tonchev, D. (2021). Impact of false positives and false negatives on security risks in transactions under threat.
- Xu, B., Wang, Y., Liao, X., & Wang, K. (2023). Efficient fraud detection using deep boosting decision trees. Decision Support Systems, 175, 114037.
- Xu, T. (2024). Leveraging Blockchain Empowered Machine Learning Architectures for Advanced Financial Risk Mitigation and Anomaly Detection.
- Youvan, D.C. (2024). Anatomy of a Financial Collapse: The Role of Technical Glitches in Modern Financial Systems.
Behavioral analytics is a cutting-edge tool in the fight for financial cybersecurity. It uses advanced AI and
machine learning to pinpoint dangers that outdated methods might miss. This study examines how well these AI-based
tools work and the challenges encountered, especially when trying to mitigate and prevent security breaches in the digital
currency world and financial markets. The case study analysis of three large-scale security incidents, namely a
cryptocurrency exchange, a banking institution an advanced persistent threat (APT), and a DeFi platform, identified the
current state of behavioral analytics implementation. Key findings show that while AI-based solutions can efficiently
identify threats that rely on the volume and behavioral patterns of the underlying systems, they struggle with more refined
attacks that exploit legitimate features. Consequently, these systems exhibit high false positives and low response times.
The cross-case analysis indicates that the behavioral correlations across domains and the threshold off-peak periods are
not adequately addressed. The study offers recommendations on better implementation for algorithm development and
data integration as well as policy formulation. Therefore, the main contributions are: 1: Common behavioral indicators
can be derived from the financial platform. 2: Human-AI cooperation is required to obtain an effective identification
process, and 3: The security and operation continuity requirements can be balanced by adjusting the threshold level in
real time.
Keywords :
Behavioral Analytics, Financial Cybersecurity, Cyber Defense Systems, Defense Systems, Digital Currency, AI.