International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 4 | Views: 204 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper | Computer Science & Engineering | United States of America | Volume 13 Issue 4, April 2024 | Popularity: 5.6 / 10


     

Anomaly Detection of Financial Data using Machine Learning

Khirod Chandra Panda


Abstract: Anomaly detection is critical in the financial sector, especially as financial environments evolve with increasing digitization, posing challenges for real - time anomaly detection. Recently, deep learning (DL) algorithms have emerged as promising solutions for this problem. This study presents a DL - based anomaly detection model utilizing various algorithms, including LSTM, GRU, and 1dCNN, applied to Tesla's stock market and Ethereum cryptocurrency data sets. Hyperparameter optimization is performed using grid search. Results show that the GRU algorithm achieves the highest prediction score in both datasets, while the 1dCNN algorithm performs the lowest. Additionally, anomaly values are graphically demonstrated using GRU for both datasets. Accurate bookkeeping is essential for legitimate business operations, yet the complexity of financial auditing requires new solutions. Supervised and unsupervised machine learning techniques are increasingly applied to detect fraud and anomalies in accounting data. This paper addresses the challenge of detecting financial misstatements in general ledger (GL) data, proposing seven supervised ML techniques, including deep learning, and two unsupervised ML techniques. Models are trained and evaluated on real - life GL datasets, demonstrating high potential in detecting predefined anomaly types and efficiently sampling data. Practical implications of these solutions in accounting and auditing contexts are discussed. The rapid development of computer networks brings both convenience and security challenges due to various abnormal flows. Traditional detection systems, like intrusion detection systems (IDS), have limitations, necessitating real - time updates to function effectively. With the advent of machine learning and data mining, new methods for abnormal network flow detection have emerged. This paper introduces the random forest algorithm for detecting abnormal samples, proposing the concept of an abnormal point scale to measure sample abnormality based on similarity. Simulation experiments demonstrate the superiority of random forest - based detection in terms of model accuracy and computing efficiency compared to other methods.


Keywords: accounting; auditing; anomaly detection; general ledger, machine learning, Anomaly detection, LSTM, GRU, 1dCNN


Edition: Volume 13 Issue 4, April 2024


Pages: 285 - 288


DOI: https://www.doi.org/10.21275/SR24403054826



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Khirod Chandra Panda, "Anomaly Detection of Financial Data using Machine Learning", International Journal of Science and Research (IJSR), Volume 13 Issue 4, April 2024, pp. 285-288, URL: https://www.ijsr.net/getabstract.php?paperid=SR24403054826, DOI: https://www.doi.org/10.21275/SR24403054826



Downloads: 656 | Views: 2004 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj


Downloads: 401 | Views: 722 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Computer Science & Engineering, India, Volume 7 Issue 11, November 2018

Pages: 1951 - 1955

Hadoop Performance Improvement using Metadata and Securing with Oauth Token

Swapnali A. Salunkhe, Amol B. Rajmane


Downloads: 386 | Views: 703 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.


Downloads: 354 | Views: 700 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Downloads: 336 | Views: 690 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2148 - 2152

The Impact and Application of 3D Printing Technology

Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera


Top