Classification of e-commerce financial transaction logs using machine learning approach
Keywords:
Financial Transaction logs, Log Classification, E-Commerce, Logistic Regression, Support Vector MachineAbstract
E-Commerce becomes inevitable in the current world. Especially in this pandemic period, almost activities have been carried out through digital mode to serve the customers with more safety. The financial transactions are much secured in the e-commerce payment. Still, many intruders are making these transactions into fail and hacking the customers’ information when the financial transactions are carried out. Along with, sometimes the transactions may get failed due to the network issues. Hence, the E-Commerce organizations are maintaining the transaction logs to check and take necessary action over the failed transactions. Out of huge transaction logs, identifying the suspicious failed transactions in manual method is not encouraged. Lot of technologies have come to support the detection of suspicious failed transactions such as Artificial Neural Network, Machine Learning, Deep Learning and other statistical methods. As the above methods are proved as more suitable for detecting and classifying the failed transaction logs, still the accuracy of classification has not been achieved much, which motivated to propose the machine learning based classification of E-Commerce Financial Transaction Logs.
Downloads
References
Zeufack, Vannel, "An Unsupervised Anomaly Detection Framework for Detecting Anomalies in Real Time through Network System’s Log Files Analysis", 2020.
Sri Sai Manoj Kommineni, AkhilaDindi, “Automating Log Analysis”, Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science 2021.
Suman, R, “An Approach to Server Log Analysis for Abnormal Behaviour Detection”, University of Calgary, Calgary, AB 2021.
S. Fatonah, A. Yulandari, and F. W. Wibowo, “A review of e-payment system in e-commerce,” Journal of Physics: Conference Series. IOP Publishing, vol. 1140, no. 1, article 012033, 2018.
A. Abdallah, M. A. Maarof, and A. Zainal, “Fraud detection system: a survey,” Journal of Network and Computer Applications, vol. 68, pp. 90–113, 2016.
L. Zheng, G. Liu, C. Yan, and C. Jiang, “Transaction fraud detection based on total order relation and behavior diversity,” IEEE Transactions on Computational Social Systems, vol. 5, no. 3, pp. 796–806, 2018.
A. Rozinat and W. M. P. Van der Aalst, “Conformance checking of processes based on monitoring real behavior,” Information Systems, vol. 33, no. 1, pp. 64–95, 2008.
Yadi Wang, Wangyang Yu, Peng Teng, Guanjun Liu, and Dongming Xiang ,“A Detection Method for Abnormal Transactions in E-Commerce Based on Extended Data Flow Conformance Checking”, Volume 2022 , Article ID 4434714,04 Jan 2022.
Raja Sekar, Jayaram & Selvakumar, N. & Radha, P. & Johnsonselva, J.V., “ Supervised and Unsupervised learning for characterizing the industrial material defects”, International Journal of Business Intelligence and Data Mining, 1(1):1, 2022.
Maheswari, K. & Rajesh, S., “A novel QIM-DCT based fusion approach for classification of remote sensing images via PSO and SVM models”, Soft Computing, 24, 2020.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.








