Detecting Fraudulent Transaction in Banking Sector Using Rule-Based Model and Machine Learning

  • Cut Dinda Rizki Amirillah Computer Science Program, School of Computer Science, Bina Nusantara University, Jakarta Barat, DKI Jakarta 11530, Indonesia
Keywords: Machine Learning, Isolation Forest (IF), Rule-Based Model (RBM), Banking Sector

Abstract

This research aims to develop an effective fraud detection model in banking transactions using the rule-based model (RBM) approach and the isolation forest (IF) machine learning algorithm. Based on data from the Ministry of Communication and Information Technology, there were more than 405,000 online fraud cases during the 2019–2022 period, indicating the need for a reliable fraud detection system to protect customers. The research method involves collecting banking transaction data for four months through channels such as ATM, internet banking, and mobile banking. The RBM model was used as an initial approach, detecting suspicious transaction patterns based on defined rules. However, it has limitations in detecting transactions that are not defined in the rules. To complement this shortcoming, this research implemented IF, an effective unsupervised learning model for detecting anomalies using the isolation tree (iTree) technique to identify suspicious transactions. The results showed that the IF model could detect anomalous patterns not covered by RBM, thereby improving the accuracy of fraud transaction identification. The precision data of 99% indicates that the model’s predictions of anomalies are indeed anomalies, while a recall value of 1.0 shows that the model successfully identified all anomalies in the dataset. In conclusion, the combination of RBM and IF provides a comprehensive approach to fraud detection in the banking sector. IF’s ability to detect anomalies more dynamically and accurately can reduce fraud losses in the industry.

References

[1] B.H. Reddy and N.T. Rao, “Fraud Detection in Financial Transactions”, Int. J. Eng. Res. Sci. Technol., vol. 20, no. 4, pp. 92-98, Nov. 2024.

“Penerapan Strategi Anti Fraud bagi Bank Umum,” Peraturan Otoritas Jasa Keuangan, No. 39/POJK.03/2019, 2019.

“Penyedia Jasa Pembayaran,” Peraturan Bank Indonesia, No. 23/6/PBI/2021, 2021.

A. Olushola and J. Mart, “Fraud detection using machine learning,” Jan. 2024.

E.R. Kismawadi, U.D.A. Muddatstsir, and A. Hamid, Fraud pada Lembaga Keuangan dan Non Keuangan. Depok, Indonesia: PT. RajaGrafindo Persada, 2020.

R. Abdulahi and N. Mansor, “Fraud triangle theory and fraud diamond theory. Understanding the convergent and divergent for future research,” Int. J. Acad. Res. Account. Finance Manag. Sci., vol. 5, no. 4, pp. 54–64, Dec. 2015, doi: 10.6007/ijarafms/v5-i4/1823.

ACFE Indonesia Chapter, “Survei Fraud Indonesia 2019,” 2020. [Online]. Availabe: https://acfe-indonesia.or.id/wp-content/uploads/2021/02/SURVEI-FRAUD-INDONESIA-2019.pdf

S. Islam, M.M. Haque, and A.N.M.R. Karim, “A rule-based machine learning model for financial fraud detection,” Int. J. Electr. Comput. Eng. (IJECE), vol. 14, no. 1, pp. 759–771, Feb. 2024, doi: 10.11591/ijece.v14i1.pp759-771.

M. Baumann, “Improving a rule-based fraud detection system with classification based on association rule mining,” in Proc. Ges. Inform., 2021, pp. 1121–1134, doi: 10.18420/informatik2021-091.

S. Adewale and A.B. Madu, “Credit card fraud detection using machine learning,” unpublished.

[11] I. Nwade et al., “Development of credit cards fraud detection model,” LAUTECH J. Eng. Technol., vol. 17, no. 2, pp. 1–8, 2023.

M.G. Saragih et al., “Machine learning methods for analysis fraud credit card transaction,” Int. J. Eng. Adv. Technol. (IJEAT), vol. 8, no. 6S, pp. 870–874, Aug. 2019, doi: 10.35940/ijeat.F1164.0886S19.

A. Bănărescu, “Detecting and preventing fraud with data analytics,” Procedia Econ. Finance, vol. 32, pp. 1827–1836, 2015, doi: 10.1016/s2212-5671(15)01485-9.

M. Pełka and A. Dudek, “Isolation forests for symbolic data as a tool for outlier mining,” Econom., Ekonom., Adv. Appl. Data Anal., vol. 28, no. 1, pp. 1–10, Jan. 2024, doi: 10.15611/eada.2024.1.01.

M.K.M. Almansoori and M. Telek, “Anomaly detection using combination of autoencoder and isolation forest,” in 1st Workshop Intell. Infocommunication Netw. Syst. Serv. (WI2NS2), 2023, pp. 25–30, doi: 10.3311/wins2023-005.

A. Nursanti and I. Trinugroho, “The effect of financial literacy on the ability to detect investment fraud,” Int. J. Soc. Sci. Res. Rev., vol. 6, no. 12, pp. 323–337, Dec. 2023, doi: 10.47814/ijssrr.v6i12.1840.

K.F. Andriani, K. Budiartha, M.M.R. Sari, and A.A.G.P. Widanaputra, “Fraud pentagon elements in detecting fraudulent financial statement,” Linguist. Cult. Rev., vol. 6, pp. 686–710, Jan. 2022, doi: 10.21744/lingcure.v6ns1.2145.

M. Sirigineedi et al., “Fake credit transaction detection using machine learning,” Int. J. Res. Sci. Eng., vol. 4, no. 3, pp. 1–9, Apr./May 2024, doi: 10.55529/ijrise.43.1.9.

E. Pan, “Machine learning in financial transaction fraud detection and prevention,” Trans. Econ. Bus. Manag. Res., vol. 5, pp. 243-249, Mar. 2024, doi: 10.62051/16r3aa10.

H. Kamel and M.Z. Abdullah, “Distributed denial of service attacks detection for software defined networks based on evolutionary decision tree model,” Bull. Electr. Eng. Inform., vol. 11, no. 4, pp. 2322–2330, Aug. 2022, doi: 10.11591/eei.v11i4.3835.

N.S. Arunraj et al., “Comparison of supervised, semi-supervised and unsupervised learning methods in network intrusion detection system (NIDS) application,” AKWI, no. 6, pp. 10–19, Dec. 2017, doi: 10.26034/lu.akwi.2017.3183.

G.M. Rao and D. Ramesh, “Ranger random forest-based efficient ensemble learning approach for detecting malicious URLs,” in Proc. Int. Conf. Recent Trends Mach. Learn. IoT Smart Cities Appl., V.K. Gunjan and J.M. Zurada, Eds., 2020, pp. 599-608, doi: 10.1007/978-981-15-7234-0_56.

M.I. Akazue et al., “UNMASKING FRAUDSTERS: Ensemble features selection to enhance random forest fraud detection,” J. Comput. Theor. Appl., vol. 1, no. 2, pp. 201–211, Dec. 2023, doi: 10.33633/jcta.v1i2.9462.

V. Vijayakumar, N.S. Divya, P. Sarojini, and K. Sonika, “Isolation forest and local outlier factor for credit card fraud detection system,” Int. J. Eng. Adv. Technol. (IJEAT), vol. 9, no. 4, pp. 261–265, Apr. 2020, doi: 10.35940/ijeat.D6815.049420.

M.L.V. Nalupa, J.R.D. Fernandez, W.J.C. Dacay, and M.M. Bergado, “Fraud detection using isolation forest for RFID-based attendance monitoring system,” Sci. Int., vol. 6, no. 34, pp. 511-517, Dec. 2022.

A. Zulfikar, F.A. Rahmani, and N. Azizah, “Deteksi anomali menggunakan isolation forest belanja barang persediaan konsumsi pada satuan kerja Kepolisian Republik Indonesia,” J. Manaj. Perbendaharaan, vol. 4, no. 1, pp. 1–15, Jun. 2023, doi: 10.33105/jmp.v4i1.435.

H. John and S. Naaz, “Credit card fraud detection using local outlier factor and isolation forest,” Int. J. Comput. Sci. Eng., vol. 7, no. 4, pp. 1060–1064, Apr. 2019, doi: 10.26438/ijcse/v7i4.10601064.

Published
2025-05-27
How to Cite
Cut Dinda Rizki Amirillah. (2025). Detecting Fraudulent Transaction in Banking Sector Using Rule-Based Model and Machine Learning. Jurnal Nasional Teknik Elektro Dan Teknologi Informasi, 14(2), 96-102. https://doi.org/10.22146/jnteti.v14i2.17410