Adaptive Machine Learning for Dynamic Fraud Detection in Cloud-Native Environments

Authors

  • Suresh Varma Dendukuri

Keywords:

Adaptive Machine Learning, Fraud Detection, Cloud-Native Systems, Concept Drift, Anomaly Detection, Explainable AI

Abstract

The rapid digital transformation of financial and enterprise systems has significantly increased the scale, complexity, and sophistication of fraudulent activities. Traditional rule-based fraud detection systems are increasingly ineffective in cloud-native ecosystems characterized by high-velocity data streams, distributed architectures, and evolving threat patterns. This paper presents a comprehensive analysis of adaptive machine learning (AML) approaches for dynamic fraud detection in cloud-native environments. It synthesizes contemporary research on online learning, anomaly detection, reinforcement learning, and hybrid architectures, and examines their integration within cloud-native infrastructures such as microservices and containerized platforms. The study further explores challenges including concept drift, adversarial attacks, data imbalance, and explainability, proposing architectural and algorithmic solutions. The paper concludes with future research directions focusing on federated learning, explainable AI, and real-time streaming analytics.

DOI: https://doi.org/10.17762/ijisae.v12i3.8199

Downloads

Download data is not yet available.

References

Bahnsen, A. C., Aouada, D., Stojanovic, A., & Ottersten, B. (2018). Feature engineering strategies for credit card fraud detection. Expert Systems with Applications, 51, 134–142.

Bhattacharyya, S., Jha, S., Tharakunnel, K., & Westland, J. C. (2011). Data mining for credit card fraud: A comparative study. Decision Support Systems, 50(3), 602–613.

Bifet, A., & Gavaldà, R. (2007). Learning from time-changing data with adaptive windowing. In Proceedings of the 2007 SIAM International Conference on Data Mining (pp. 443–448).

Bolton, R. J., & Hand, D. J. (2002). Statistical fraud detection: A review. Statistical Science, 17(3), 235–255.

Carcillo, F., Dal Pozzolo, A., Le Borgne, Y.-A., Caelen, O., Mazzer, Y., & Bontempi, G. (2021). Combining unsupervised and supervised learning in credit card fraud detection. Information Sciences, 557, 317–331.

Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1–58.

Chen, C., Li, X., Huang, L., & Wang, Y. (2022). Adaptive fraud detection using deep learning and streaming data. IEEE Access, 10, 23456–23469.

Dou, Y., Liu, Z., Sun, L., Deng, Y., Peng, H., & Yu, P. S. (2020). Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In Proceedings of the 29th ACM International Conference on Information & Knowledge Management (CIKM).

Dragoni, N., Giallorenzo, S., Lafuente, A. L., Mazzara, M., Montesi, F., Mustafin, R., & Safina, L. (2017). Microservices: Yesterday, today, and tomorrow. In Present and Ulterior Software Engineering (pp. 195–216). Springer.

Goodfellow, I., McDaniel, P., & Papernot, N. (2018). Making machine learning robust against adversarial inputs. Communications of the ACM, 61(7), 56–66.

Hochreiter, S., & Schmidhuber, J. (1997). Long short-term memory. Neural Computation, 9(8), 1735–1780.

Kshetri, N. (2021). Cybercrime and cybersecurity in the global south. Palgrave Macmillan.

LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436–444.

Lundberg, S. M., & Lee, S.-I. (2017). A unified approach to interpreting model predictions. In Advances in Neural Information Processing Systems (NeurIPS).

Ngai, E. W. T., Hu, Y., Wong, Y. H., Chen, Y., & Sun, X. (2011). The application of data mining techniques in financial fraud detection: A classification framework and an academic review. Decision Support Systems, 50(3), 559–569.

Ribeiro, M. T., Singh, S., & Guestrin, C. (2016). “Why should I trust you?” Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD).

Sutton, R. S., & Barto, A. G. (2018). Reinforcement Learning: An Introduction (2nd ed.). MIT Press.

Zaharia, M., Das, T., Li, H., Hunter, T., Shenker, S., & Stoica, I. (2016). Discretized streams: Fault-tolerant streaming computation at scale. In Proceedings of the 24th ACM Symposium on Operating Systems Principles (SOSP).

Downloads

Published

30.03.2024

How to Cite

Suresh Varma Dendukuri. (2024). Adaptive Machine Learning for Dynamic Fraud Detection in Cloud-Native Environments. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 4561 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/8199

Issue

Section

Research Article