Fraud Detection in Mobile Phone Recharge Transactions Using K-Means and T-SNE Visualization

Authors

  • Irwin Sakti Pradita University
  • Arvin
  • Ito Wasito

DOI:

10.33395/sinkron.v9i1.14330

Keywords:

Anomaly Detection, Autoencoder, Clustering Evaluation, Data Visualization, Financial Security, Fraud Detection, K-Means Clustering, Mobile Recharge Systems, t-SNE Visualization, Unsupervised Learning

Abstract

The surge in digital transactions has introduced vulnerabilities in mobile recharge systems, making them susceptible to fraudulent activities that compromise financial security and operational integrity. This study presents to address these challenges by employing a novel fraud detection framework that integrates K-Means clustering and t-Distributed Stochastic Neighbour Embedding (t-SNE) visualization. This work advances the field by integrating scalable, unsupervised learning techniques with robust visualization tools, offering a practical framework for fraud detection in mobile recharge systems. Leveraging a dataset of over 200,000 transactions, this research systematically identifies anomalies indicative of fraudulent behaviour, focusing on key transactional attributes such as processing times, geographic patterns, and error frequencies. The methodology begins with data preprocessing to ensure consistency, followed by the application of K-Means clustering to partition transactions into meaningful clusters. To enhance interpretability, t-SNE visualization is employed, enabling a clear representation of high-dimensional data and the identification of anomalous patterns. A comparative analysis with Autoencoders highlights the strengths of K-Means in terms of computational efficiency, interpretability, and clustering quality, as evidenced by higher Silhouette Scores (0.6215) and lower Davies-Bouldin Index values (0.7074). The combination of K-Means and t-SNE enables service providers to identify fraudulent activities with greater precision, offering actionable insights to mitigate financial risks. This study not only addresses the critical need for robust fraud detection systems but also lays a strong foundation for future advancements through the integration of hybrid models and enhanced feature engineering, demonstrating its adaptability to similar domains.

GS Cited Analysis

Downloads

Download data is not yet available.

References

Abbassi, H., Mendili, S. El, & Gahi, Y. (2024). Real-Time Online Banking Fraud Detection Model by

Unsupervised Learning Fusion. HighTech and Innovation Journal, 5(1), 185–199.

https://doi.org/10.28991/HIJ-2024-05-01-014

Ahmed, M., Seraj, R., & Islam, S. M. S. (2020). The k-means algorithm: A comprehensive survey and

performance evaluation. In Electronics (Switzerland) (Vol. 9, Issue 8, pp. 1–12). MDPI AG.

https://doi.org/10.3390/electronics9081295

Ball, R., & Drevin, L. (2023). Anomaly detection using autoencoders with network analysis features. ORION,

(1). https://doi.org/10.5784/39-1-711

Du, H. C., Lv, L., Wang, H., & Guo, A. (2024). A novel method for detecting credit card fraud problems. PLoS

ONE, 19(3 March). https://doi.org/10.1371/journal.pone.0294537

Dwi Aulia, D., & Nurahman, N. (2023). Comparison Performance of K-Medoids and K-Means Algorithms In

Clustering Community Education Levels. Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI),

(2), 273–282. https://doi.org/10.23887/janapati.v12i2.59789

Wasito, I. (2024). Lecture Week9- Descriptive_Modeling_part2.

Cho S., D. W. , T. B. C. (2023). Fraud Detection in Malaysian Financial Institutions using Data Mining and

Machine Learning. Journal of Information and Technology, 7(1), 13–21.

https://doi.org/10.53819/81018102t4152

Goh, C. H., Wong, K. K., Tan, M. P., Ng, S. C., Chuah, Y. D., & Kwan, B. H. (2022). Development of an

effective clustering algorithm for older fallers. PLoS ONE, 17(11 November).

https://doi.org/10.1371/journal.pone.0277966

Hanae, A., Abdellah, B., Saida, E., & Youssef, G. (n.d.). End-to-End Real-time Architecture for Fraud Detection

in Online Digital Transactions. In IJACSA) International Journal of Advanced Computer Science and

Applications (Vol. 14, Issue 6). www.ijacsa.thesai.org

Huang, M., Wang, L., & Zhang, Z. (n.d.). IMPROVED DEEP FOREST MODE FOR DETECTION OF

FRAUDULENT ONLINE TRANSACTION. Computing and Informatics, 39(2020), 1082–1098.

https://doi.org/10.31577/cai

Huang, Z., Zheng, H., Li, C., & Che, C. (2024). Application of Machine Learning-Based K-means Clustering for

Financial Fraud Detection. In Academic Journal of Science and Technology (Vol. 10, Issue 1).

Ikeda, C., Ouazzane, K., Yu, Q., & Hubenova, S. (n.d.). New Feature Engineering Framework for Deep

Learning in Financial Fraud Detection. In IJACSA) International Journal of Advanced Computer Science

and Applications (Vol. 12, Issue 12). www.ijacsa.thesai.org

Jiang, S., Dong, R., Wang, J., & Xia, M. (2023). Credit Card Fraud Detection Based on Unsupervised

Attentional Anomaly Detection Network. Systems, 11(6). https://doi.org/10.3390/systems11060305

Josyula, H. P. (2023). Fraud Detection in Fintech Leveraging Machine Learning and Behavioral Analytics.

https://doi.org/10.21203/rs.3.rs-3548343/v1

Matloob, I., Khan, S. A., & Rahman, H. U. (2020). Sequence Mining and Prediction-Based Healthcare Fraud

Detection Methodology. IEEE Access, 8, 143256–143273. https://doi.org/10.1109/ACCESS.2020.3013962

Murena, P.-A., Sublime, J., Matei, B., & Cornuéjols, A. (2018). An Information Theory based Approach to

Multisource Clustering.

Olateju, O. O., Okon, S. U., Igwenagu, U. T. I., Salami, A. A., Oladoyinbo, T. O., & Olaniyi, O. O. (2024).

Combating the Challenges of False Positives in AI-Driven Anomaly Detection Systems and Enhancing

Data Security in the Cloud. Asian Journal of Research in Computer Science, 17(6), 264–292.

https://doi.org/10.9734/ajrcos/2024/v17i6472

Pumsirirat, A., & Yan, L. (2018). Credit Card Fraud Detection using Deep Learning based on Auto-Encoder and

Restricted Boltzmann Machine. In IJACSA) International Journal of Advanced Computer Science and

Applications (Vol. 9, Issue 1). www.ijacsa.thesai.org

Rezapour, M. (2019). Anomaly Detection using Unsupervised Methods: Credit Card Fraud Case Study. In

IJACSA) International Journal of Advanced Computer Science and Applications (Vol. 10, Issue 11).

www.ijacsa.thesai.org

Rosley, N., Tong, G.-K., Ng, K.-H., Kalid, S. N., & Khor, K.-C. (2022). Autoencoders with Reconstruction

Error and Dimensionality Reduction for Credit Card Fraud Detection. In Proceedings of the International

Conference on Computer, Information Technology and Intelligent Computing (CITIC 2022) (pp. 503–

. Atlantis Press International BV. https://doi.org/10.2991/978-94-6463-094-7_40

Sari, P. O. C., & Suharjito, S. (2022). Outlier Detection in Inpatient Claims Using DBSCAN and K-Means.

JURNAL TEKNIK INFORMATIKA, 15(1), 1–10. https://doi.org/10.15408/jti.v15i1.25682

Setiawan, R., Tjahjono, B., Firmansyah, G., & Akbar, H. (n.d.). Fraud Detection In Credit Card Transactions

Using HDBSCAN, UMAP And SMOTE Methods. In International Journal of Science.

http://ijstm.inarah.co.id1333

Sulaiman, S. S., Nadher, I., & Hameed, S. M. (2024). Credit Card Fraud Detection Using Improved Deep

Learning Models. Computers, Materials and Continua, 78(1), 1049–1069.

https://doi.org/10.32604/cmc.2023.046051

Tran, L., Tran, T., & Mai, A. (2019). Solve fraud detection problem by using graph based learning methods.

Journal of Engineering and Science Research, 3(4), 2289–7127.

https://doi.org/10.26666/rmp.jesr.2019.6.4

Wu, T., & Wang, Y. (2021). Locally Interpretable One-Class Anomaly Detection for Credit Card Fraud

Detection. http://arxiv.org/abs/2108.02501

Zhou, H., Sun, G., Fu, S., Jiang, W., & Xue, J. (2019). A scalable approach for fraud detection in online ecommerce

transactions with big data analytics. Computers, Materials and Continua, 60(1), 179–192.

https://doi.org/10.32604/cmc.2019.05214

Downloads


Crossmark Updates

How to Cite

Sakti, I., Mareta, A., & Wasito, I. (2025). Fraud Detection in Mobile Phone Recharge Transactions Using K-Means and T-SNE Visualization. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 9(1), 248-258. https://doi.org/10.33395/sinkron.v9i1.14330