Monitor and detect suspicious online transactions
【Author】 Sarkar, Swagata; Lincy, R. Babitha; Sasireka, P.; Mittal, Sonam
【Source】INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS
【影响因子】0.000
【Abstract】This article provides a thorough examination of phishing attempts, their use, several contemporary visual similarity-based phishing detection systems, and their comparison evaluation. This research article aims to propose an effective design technique for IDS with regard to online applications. We develop a new set of features based on time-frequency analytics that makes use of 2-D models of monetary operations for preventing money laundering systems. As a classification algorithm, random forest is used, and clustering algorithm is used to tune the hyperparameters. Our findings imply that bitcoin exchanges would behave in an excessive reporting manner more than private banks under this law. We specifically take into account the monetary operations as a digital signal and attempt to build a classifier using a collection of frequently mined rules. Our tests on a replicated transaction dataset based on actual banking operations demonstrate the effectiveness of our suggested approach.
【Keywords】random forest technique; time frequency research; graphical study
【发表时间】 Int. J. Electron. Secur. Digit. Forensics
【收录时间】2023-10-30
【文献类型】实证数据
【主题类别】
区块链治理-市场治理-数字货币
评论