Implementation of Data Mining in Detecting Financial Transaction Anomalies in the Company
DOI:
https://doi.org/10.59890/ijels.v3i5.47Keywords:
Data Mining, Decision Tree, Anomaly Detection, Financial Transactions, FraudAbstract
This study aims to evaluate the application of the decision tree algorithm in detecting anomalies in corporate financial transactions, focusing on the identification of unbalanced fraudulent transactions. The data imbalance between normal transactions and fraud is often a major challenge in fraud detection systems. This study uses a quantitative approach with an experimental design, where the company's financial transaction data is processed and analyzed using a decision tree algorithm. The analysis techniques applied include data preprocessing, normalization, and model evaluation based on accuracy, precision, and recall. The results showed that although the decision tree was effective in identifying fraudulent transactions, the model was more likely to classify transactions as normal (false negatives), which shows the importance of addressing data imbalances to improve model performance
References
Asif, H., Min, S., Wang, X., & Vaidya, J. (2024). U.S.-U.K. PETs Prize Challenge: Anomaly Detection via Privacy-Enhanced Federated Learning. IEEE Trans. Privacy, 1, 3–18. https://doi.org/10.1109/tp.2024.3392721
Chai, H., Li, R., Wang, X., & Ye, J. (n.d.). A data mining-based method of transaction anomaly detection. https://doi.org/10.3969/j.issn.1000-386x.2013.01.040
Cholevas, C., Angeli, E., Sereti, Z., Mavrikos, E., & Tsekouras, G. E. (2024). Anomaly Detection in Blockchain Networks Using Unsupervised Learning: A Survey. Algorithms, 17(5), 201. https://doi.org/10.3390/a17050201
Elmasri, & Navathe. (2013). Database Systems 7th Edition. In Webseiten entwickeln mit ASP.NET. Pearson Education. https://doi.org/10.3139/9783446437845.011
Ghaith, S., Wang, M., Perry, P., Jiang, Z. M., O’Sullivan, P., & Murphy, J. (2015). Anomaly Detection in Performance Regression Testing by Transaction Profile Estimation. Software Testing Verification and Reliability, 26(1), 4–39. https://doi.org/10.1002/stvr.1573
Gupta, R. (2019). Data Mining for Fraud Detection: An Overview of Techniques and Applications. Turkish Journal of Computer and Mathematics Education (Turcomat), 10(1), 561–567. https://doi.org/10.17762/turcomat.v10i1.13549
Li, J., Zhang, C., Bao, R., & Chen, W. (2019). Research Laboratory on the Mechanics of Smart Materials and Structures, Zhejiang University. Journal of Zhejiang University Science A, 20(4), 305–310. https://doi.org/10.1631/jzus.a19lr002
Manorom, P., Detthamrong, U., & Chansanam, W. (2024). Comparative Assessment of Fraudulent Financial Transactions Using the Machine Learning Algorithms Decision Tree, Logistic Regression, Naïve Bayes, K-Nearest Neighbor, and Random Forest. Engineering Technology & Applied Science Research, 14(4), 15676–15680. https://doi.org/10.48084/etasr.7774
Mohaimin, M. D. R., Sumsuzoha, M., Pabel, M. A. H., & Nasrullah, F. (2024). Detecting Financial Fraud Using Anomaly Detection Techniques: A Comparative Study of Machine Learning Algorithms. Journal of Computer Science and Technology Studies, 6(3), 1–14. https://doi.org/10.32996/jcsts.2024.6.3.1
Mousa, A. (2021). Detecting Financial Fraud Using Data Mining Techniques: A Decade Review from 2004 to 2015. Journal of Data Science, 14(3), 553–570. https://doi.org/10.6339/JDS.201607_14(3).0010
Mousa, A. (2022). Detecting Financial Fraud Using Data Mining Techniques: A Decade Review From 2004 to 2015. Journal of Data Science, 14(3), 553–570. https://doi.org/10.6339/jds.201607_14(3).0010
Pramana, I., Sudiarsa, I. W., & ... (2023). Penerapan Algoritma Naive Bayes Untuk Prediksi Penjualan Produk Terlaris Pada CV Akusara Jaya Abadi. JATISI (Jurnal Teknik …, 10(4), 518–534. https://jurnal.mdp.ac.id/index.php/jatisi/article/view/6498%0Ahttps://jurnal.mdp.ac.id/index.php/jatisi/article/download/6498/1694
Saha, P., Aanand, S., Shah, P., Khatwani, R. A., Mitra, P. K., & Sekhar, R. (2023). Comparative Analysis of ML Algorithms for Fraud Detection in Financial Transactions. 1–6. https://doi.org/10.1109/icaeeci58247.2023.10370930
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Fitria, Emy, Heldalina, Aneta Rakhmawati

This work is licensed under a Creative Commons Attribution 4.0 International License.






