IJSMT Journal

International Journal of Science, Strategic Management and Technology

An International, Peer-Reviewed, Open Access Scholarly Journal Indexed in recognized academic databases · DOI via Crossref The journal adheres to established scholarly publishing, peer-review, and research ethics guidelines set by the UGC

ISSN: 3108-1762 (Online)
webp (1)

Plagiarism Passed
Peer reviewed
Open Access

AN ANALYTICAL STUDY ON THE APPLICATION OF MACHINE LEARNING TECHNIQUES IN FRAUD DETECTION SYSTEMS

AUTHORS:
Laksh Agarwal
Mentor
Shruti Rawat
Affiliation
BBA (Third Year) Quantum University, Roorkee, Uttarakhand
CC BY 4.0 License:
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract

Fraud detection has become one of the most critical challenges confronting the modern digital economy, with global financial losses attributable to fraudulent transactions projected to surpass USD 400 billion over the next decade. Traditional rule-based systems, while interpretable, are increasingly inadequate against dynamic, adaptive fraud schemes orchestrated through coordinated fraud rings, synthetic identities, and adversarial transaction manipulation. This review paper presents a systematic and analytical examination of machine learning (ML) techniques applied to fraud detection across financial, e-commerce, insurance, and healthcare sectors. Employing a structured literature survey methodology aligned with PRISMA guidelines, this study synthesizes findings from over 60 peer-reviewed publications spanning 2019 to 2025. The review comprehensively covers classical supervised methods (Logistic Regression, Decision Trees, Random Forest, Support Vector Machines), ensemble techniques (XGBoost, LightGBM, CatBoost), deep learning architectures (LSTM, Autoencoder, CNN, Transformer), and cutting-edge Graph Neural Network (GNN) models such as CARE-GNN, STA-GT, and FraudGT. Persistent challenges including class imbalance, concept drift, adversarial evasion, computational latency, and regulatory interpretability requirements are critically analyzed alongside mitigation strategies. Emerging paradigms including federated learning, explainable AI (XAI), and large language model (LLM)-based approaches are identified as defining future directions. This review serves as a consolidated reference for researchers and practitioners navigating the rapidly evolving landscape of ML-driven fraud detection.

Keywords
Article Metrics
Article Views
34
PDF Downloads
0
HOW TO CITE
APA

MLA

Chicago

Copy

Agarwal, L. (2026). An Analytical Study on the Application of Machine Learning Techniques in Fraud Detection Systems. International Journal of Science, Strategic Management and Technology, 02(05). https://doi.org/10.55041/ijsmt.v2i5.208

Agarwal, Laksh. "An Analytical Study on the Application of Machine Learning Techniques in Fraud Detection Systems." International Journal of Science, Strategic Management and Technology, vol. 02, no. 05, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i5.208.

Agarwal, Laksh. "An Analytical Study on the Application of Machine Learning Techniques in Fraud Detection Systems." International Journal of Science, Strategic Management and Technology 02, no. 05 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i5.208.

References
1.Abdallah, A., Maarof, M. A., & Zainal, A. (2016). Fraud detection system: A survey. Journal of Network and Computer Applications, 68, 90–113.

2.Adewumi, A. O., & Akinyelu, A. A. (2017). A survey of machine learning and nature-inspired based credit card fraud detection techniques. International Journal of System Assurance Engineering and Management, 8(2), 937–953.

3.Ahmed, M., Mahmood, A. N., & Islam, M. R. (2016). A survey of anomaly detection techniques in financial domain. Future Generation Computer Systems, 55, 278–288.

4.Bahnsen, A. C., Aouada, D., Stojanovic, A., & Ottersten, B. (2016). Feature engineering strategies for credit card fraud detection. Expert Systems with Applications, 51, 134–142.

5.Bhattacharyya, S., Jha, S., Tharakunnel, K., & Westland, J. C. (2011). Data mining for credit card fraud: A comparative study. Decision Support Systems, 50(3), 602–613.

6.Breiman, L. (2001). Random forests. Machine Learning, 45(1), 5–32.

7.Carneiro, N., Figueira, G., & Costa, M. (2017). A data mining based system for credit-card fraud detection in e-tail. Decision Support Systems, 95, 91–101.

8.Chawla, N. V., Bowyer, K. W., Hall, L. O., & Kegelmeyer, W. P. (2002). SMOTE: Synthetic minority over-sampling technique. Journal of Artificial Intelligence Research, 16, 321–357.

9.Chen, T., & Guestrin, C. (2016). XGBoost: A scalable tree boosting system. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 785–794.

10.Dal Pozzolo, A., Caelen, O., Johnson, R. A., & Bontempi, G. (2015). Calibrating probability with undersampling for unbalanced classification. IEEE Symposium Series on Computational Intelligence, 159–166.

 
Ethics and Compliance
✓ All ethical standards met
This article has undergone plagiarism screening and double-blind peer review. Editorial policies have been followed. Authors retain copyright under CC BY-NC 4.0 license. The research complies with ethical standards and institutional guidelines.
Indexed In
Similar Articles
Neuro-Synthetic Memory Assistant
string(18) "Prasad B. Sonavane" Sonavane, P. B.
(2026)
DOI: 10.55041/ijsmt.v2i5.363
Adversarial Attacks and Defense Mechanisms in Autonomous Vehicles
string(17) "Antony Adwin Luiz" Luiz, A. A.
(2026)
DOI: 10.55041/ijsmt.v2i5.125
Utilization of Waste Rubber Tube in the Production of Sustainable Lightweight Concrete
string(10) "A. Anusuya" Anusuya, A.et al.
(2026)
DOI: 10.55041/ijsmt.v2i4.129
Scroll to Top