Machine Learning Based Predictive Models for Secure Financial Transactions and Cyber Threat Detection
DOI:
https://doi.org/10.15662/IJEETR.2023.0501005Keywords:
Machine Learning, Financial Security, Fraud Detection, Cyber Threat Detection, Predictive Models, Anomaly Detection, Neural Networks, Data Mining, Cybersecurity, Risk AnalysisAbstract
The rapid growth of digital financial systems has significantly increased the risk of cyber threats, including fraud, identity theft, and unauthorized transactions. Traditional rule-based security mechanisms are often inadequate in detecting sophisticated and evolving attack patterns. This study explores the application of machine learning–based predictive models to enhance the security of financial transactions and improve cyber threat detection. By leveraging historical transaction data and behavioral analytics, machine learning algorithms such as decision trees, support vector machines, neural networks, and ensemble methods can identify anomalies and predict fraudulent activities in real time. The proposed approach focuses on developing adaptive models capable of learning from dynamic datasets to detect both known and unknown threats. Additionally, feature engineering, data preprocessing, and model optimization techniques are discussed to improve prediction accuracy and reduce false positives. The research highlights the importance of integrating machine learning systems into financial infrastructures to ensure robust cybersecurity frameworks. Experimental results demonstrate that predictive models significantly outperform traditional methods in terms of accuracy, efficiency, and scalability. The study concludes that machine learning offers a proactive and intelligent solution for safeguarding financial systems against emerging cyber threats.References
1. Adepu, G. (2022). Machine learning-driven environmental monitoring systems for real-time regulatory compliance and risk detection. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(2), 22–37.
2. Anand, L., Krishnan, M. B. M., Senthil Kumar, K. U., & Jeeva, S. (2020). AI multi agent shopping cart system based web development. AIP Conference Proceedings, 2282(1), 020041.
3. Sugumar, R. (2025). Unified AI framework for predictive data engineering and real time prescription and billing systems. International Journal of Advanced Engineering Science and Information Technology (IJAESIT), 8(5), 17261.
4. Mallireddy, S. (2022). Digital services and usage of ServiceNow among patients and citizens living at homes. International Journal of Future Innovative Science and Technology, 5(2), 1–3.
5. Lanka, S. (2022). Building smarter security systems with AI: Inside Citrix analytics for security. Journal of Advanced Research Engineering and Technology (JARET), 1(2), 93–109. https://doi.org/10.34218/JARET_01_02_009
6. Garg, V. K., Soundappan, S. J., & Kaur, E. M. (2020). Enhancement in intrusion detection system for WLAN using genetic algorithms. South Asian Research Journal of Engineering and Technology, 2(6), 62–64.
7. Jayaraman, S., Rajendran, S., & P, S. P. (2019). Fuzzy c-means clustering and elliptic curve cryptography using privacy preserving in cloud. International Journal of Business Intelligence and Data Mining, 15(3), 273–287.
8. Narayanan, S. (2022). Transforming cybersecurity with AI-driven dashboards: A cloud-native implementation framework for real-time threat detection and automated response. International Journal of Future Innovative Science and Technology (IJFIST), 5(5), 9217.
9. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant use of cloud by a novel framework of encrypted biometric authentication and multi level data protection. Indian Journal of Science and Technology, 9, 44.
10. Mathew, A. (2022). Leveraging big data analytics to power AI and ML automation. Educational Research (IJMCER), 4(5), 131–134.
11. Adepu, R. (2022). Building secure multi-cloud infrastructure for mission-critical enterprise workloads. International Journal of Research Publications in Engineering, Technology and Management, 5(5), 14–32.
12. Sengupta, J. (2019). Automated inception network based cardiac image segmentation analysis. International Journal of Advanced Science and Technology, 28(20), 953–962.
13. Gopinathan, V. R. (2024). Secure explainable AI on Databricks–SAP cloud for risk-sensitive healthcare analytics and swarm-based QoS control. International Journal of Engineering & Extended Technologies Research (IJEETR), 6(4), 8452–8459.
14. Potel, R. (2020). AI-enabled post-quantum solutions for anti-counterfeiting and digital trust in global supply chains. International Journal of Computer Technology and Electronics Communication, 3(6), 2937–2944.
15. Thumala, S. R. (2022). Importance of business continuity and disaster recovery (BCDR) methodologies for organizations: A comparison study between AWS and Azure. International Journal of Science and Research (IJSR), 11(12), 1406–1415.
16. Mathew, A., & Alex, H. (2022). Detect & protect—medical device cybersecurity. Current Overview of Science and Technology Research, 1, 60–68.
17. Myakala, P. K. (2022). Adversarial robustness in transfer learning models. Iconic Research and Engineering Journals, 6(1), 772–779.
18. Gentyala, R. (2021). The silent interruption: Assessing the impact of an AI-driven sepsis alert on emergency clinician cognitive load and point-of-care efficiency. IACSE International Journal of Computer Technology, 2(1), 7–79.
19. Balamuralidhar Sarabu, V. (2021). System-of-record governance in enterprise retail platforms: Architectural design principles for financial data ownership and consistency. International Journal of Engineering & Extended Technologies Research (IJEETR), 3(2), 1–16.
20. Boddupally, H. L. (2022). Designing intelligent support bot frameworks for scalable enterprise production systems. Journal of Scientific and Engineering Research, 9(10), 108–115. https://doi.org/10.5281/zenodo.18085293
21. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian Journal of Science and Technology, 8(35), 1–5.
22. Sammy, F., Chettier, T., Boyina, V., Shingne, H., Saluja, K., Mali, M., ... & Shobana, A. (2025). Deep learning-driven visual analytics framework for next-generation environmental monitoring. Journal of Applied Science and Technology Trends, 114–122.
23. Soundappan, S. J. (2022). AI-based fault detection and isolation for reliability in modern power systems. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 5(4), 7106–7110.
24. Raja, G. V. (2022). Integrating network forensics with data mining for advanced cybercrime investigation. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(5), 5321–5326.
25. Dave, B. L. (2022). Unlocking the power of AI for Salesforce metadata: Migration strategies and business advantages. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(4), 83–92.
26. Yamsani, N. (2022). Predictive data stewardship as an enterprise control function: Machine learning approaches for quality anticipation and governance. European Journal of Advances in Engineering and Technology, 9(3), 213–223. https://doi.org/10.5281/zenodo.18629342
27. Kunadi, S. K. (2022). Building scalable master data management systems for enterprise data platforms. International Journal of Computer Technology and Electronics Communication (IJCTEC), 5(2), 4830–4843.
28. Nallamothu, T. K. (2022). Transforming clinical documentation and analytics using Power BI and DAX Copilot. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 5(4), 7111–7119.
29. Mohammad Ali, M. A., Md Shahadat Hossain, M. S. H., Md Whahidur Rahman, M. W. R., & Md Shahdat Hossain, M. S. H. (2025). AI-driven predictive modeling to detect and prevent financial fraud in US digital payment systems. AI-Driven Predictive Modeling to Detect and Prevent Financial Fraud in US Digital Payment Systems, 5(12), 228–255.
30. Vayyasi, N. K. (2020). Intelligent transaction prediction and fraud detection in crypto markets using Java and generative AI. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 3(1), 2765–2779.
31. Patel, P., & Chaturvedi, V. (2022). Development of an AI-based adaptive control system for real-time HVAC performance enhancement. International Journal of Engineering Science & Humanities, 12(2), 41–52.
32. Vankayala, S. C. (2021). Designing an Advanced Quality Assurance Framework to Ensure Accuracy, Regulatory Compliance, and Operational Reliability across End-to-End Mortgage Origination and Underwriting Platforms. International Journal of Engineering & Extended Technologies Research (IJEETR), 3(6), 4034-4044.





