An Integrative Framework for Recognizing Fraudulent Behavior in Shared Online Exchanges


Authors : N. Bhavana; B.R. Vyshnavi

Volume/Issue : Volume 10 - 2025, Issue 5 - May


Google Scholar : https://tinyurl.com/5ckj22ke

DOI : https://doi.org/10.38124/ijisrt/25may1566

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : The main goal of transaction security systems has always been to detect and stop fraudulent transactions on e- commerce platforms. However, it is difficult to catch offenders using only previous order data because of the secret nature of e-commerce. Many research have attempted to create technologies that prevent fraud, but they have failed to take into account the dynamic behavior of users from various angles, which results in ineffective fraud detection. This study offers a revolutionary fraud detection method that combines process mining and machine learning models to track user activity in real time in order to address this problem. First, we create a process model for the B2C e-commerce platform that includes user behavior detection. Second, an anomaly analysis technique that can identify noteworthy aspects in event logs is introduced. The collected features are then fed into a classification model that uses Support Vector Machines (SVM) to identify fraudulent activity. We show through experiments how well our approach captures dynamic fraudulent actions in e-commerce platforms.

Keywords : Fraud, Users, Ecommerce, Transactions.

References :

  1. R. A. Kuscu, Y. Cicekcisoy, and U. Bozoklu, Electronic Payment Systems in Electronic Commerce. Turkey: IGI Global, 2020, pp. 114– 139.
  2. M. Abdelrhim, and A. Elsayed, “The Effect of COVID-19 Spread on the e-commerce market: The case of the 5 largest e-commerce companies in the world.” Available at SSRN 3621166, 2020, doi: 10.2139/ssrn.3621166.
  3. P. Rao et al., “The e-commerce supply chain and environmental sustainability: An empirical investigation on the online retail sector.” Cogent. Bus. Manag., vol. 8, no. 1, pp. 1938377, 2021.
  4. S. D. Dhobe, K. K. Tighare, and S. S. Dake, “A review on prevention of fraud in electronic payment gateway using secret code,” Int. J. Res. Eng. Sci. Manag., vol. 3, no. 1, pp. 602-606, Jun. 2020.
  5. A. Abdallah, M. A. Maarof, and A. Zainal, “Fraud detection system: A survey,” J. Netw. Comput. Appl., vol. 68, pp. 90-113, Apr. 2016.
  6. E. A. Minastireanu, and G. Mesnita, “An Analysis of the Most Used Machine Learning Algorithms for Online Fraud Detection,” Info. Econ., vol. 23, no. 1, 2019.
  7. X. Niu, L. Wang, and X. Yang, “A comparison study of credit card fraud detection: Supervised versus unsupervised,” arXiv preprint arXiv: vol. 1904, no. 10604, 2019, doi: 10.48550/arXiv.1904.10604.
  8. L. Zheng et al., “Transaction Fraud Detection Based on Total Order Relation and Behavior Diversity,” IEEE Trans. Computat. Social Syst., vol. 5, no. 3, pp. 796-806, 2018.
  9. Z. Li, G. Liu, and C. Jiang, “Deep Representation Learning With Full Center Loss for Credit Card Fraud Detection,” IEEE Trans. Computat. Social Syst., vol. 7, no. 2, pp. 569-579, 2020.
  10. I. M. Mary, and M. Priyadharsini, “Online Transaction Fraud Detection System,” in 2021 Int. Conf. Adv. C. Inno. Tech. Engr. (ICA ITE), 2021, pp. 14-16

The main goal of transaction security systems has always been to detect and stop fraudulent transactions on e- commerce platforms. However, it is difficult to catch offenders using only previous order data because of the secret nature of e-commerce. Many research have attempted to create technologies that prevent fraud, but they have failed to take into account the dynamic behavior of users from various angles, which results in ineffective fraud detection. This study offers a revolutionary fraud detection method that combines process mining and machine learning models to track user activity in real time in order to address this problem. First, we create a process model for the B2C e-commerce platform that includes user behavior detection. Second, an anomaly analysis technique that can identify noteworthy aspects in event logs is introduced. The collected features are then fed into a classification model that uses Support Vector Machines (SVM) to identify fraudulent activity. We show through experiments how well our approach captures dynamic fraudulent actions in e-commerce platforms.

Keywords : Fraud, Users, Ecommerce, Transactions.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe