Security Analysis Of AI-Based Mobile Application For Fraud

Authors

  • Muhammad Ryan Valentino Institut Pertanian Bogor

DOI:

https://doi.org/10.37676/jki.v2i1.563

Keywords:

Security, Mobile Application, Fraud

Abstract

Fraud in digital transactions is increasing along with the development of technology. To address this issue, artificial intelligence (AI)-based mobile applications have been used in detecting and preventing fraudulent acts. This research aims to analyze the security of AI-based mobile applications in the context of fraud detection, as well as identify the weaknesses and challenges faced. The results of the analysis show that while AI-based applications have great potential in detecting fraud, there are several security risks that must be addressed, including data privacy issues and attacks on AI models. This study also provides recommendations to improve the security and effectiveness of applications in detecting fraud.

References

Alzubaidi, L., Zhang, J., Humaidi, A. J., Al-Dujaili, A., Duan, Y., Al-Shamma, O., ... & Farhan, L. (2021). Review of deep learning: Concepts, CNN architectures, challenges, applications, future directions. Journal of big Data, 8(1), 1-74.

Chen, T., Cornelius, C., Martin, J., & Chau, D. H. (2019). Shapeshifter: Robust physical adversarial attack on faster R-CNN object detector. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases (pp. 52-68). Springer, Cham.

Goodfellow, I. J., Shlens, J., & Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572.

Lin, J., Wang, W., & Fang, W. (2018). A survey on deep learning for mobile computing. Proceedings of the IEEE, 107(4), 903-924.

Liu, Q., Xu, W., Elsayed, G. F., & Darrell, T. (2019). Inference attacks against deep learning models. IEEE Transactions on Privacy and Security, 15(3), 2151-2163

Mosenia, A., Sur-Kolay, S., Raghunathan, A., & Jha, N. K. (2017). Wearable medical sensor-based system design: A survey. IEEE Transactions on Multi-Scale Computing Systems, 3(2), 124-138.

Niyato, D., Luong, N. C., Wang, P., & Kim, D. I. (2016). Joint optimization of resource allocation and performance in mobile cloud computing. IEEE Transactions on Wireless Communications, 15(8), 5041-5054.

Papernot, N., McDaniel, P., Wu, X., Jha, S., & Swami, A. (2016). Distillation as a defense to adversarial perturbations against deep neural networks. In 2016 IEEE Symposium on Security and Privacy (SP) (pp. 582-597). IEEE

Park, N., & Im, H. (2018). Applying blockchain to mobile payment systems: Middleman elimination, data transparency, and cost reduction. IEEE Communications Magazine, 56(5), 104-111.

Rajkomar, A., Dean, J., & Kohane, I. (2019). Machine learning in medicine. New England Journal of Medicine, 380(14), 1347-1358.

Reddy, G. S., Maheswari, M., & Gowri, N. (2020). Enhanced security framework for online transaction through artificial intelligence. Journal of Computational and Theoretical Nanoscience, 17(4), 1870-1875.

Russakovsky, O., Deng, J., Su, H., Krause, J., Satheesh, S., Ma, S., ... & Fei-Fei, L. (2015). ImageNet large scale visual recognition challenge. International journal of computer vision, 115(3), 211-252.

Sarker, I. H., Abushark, Y. B., & Abla, E. (2020). Context-aware security and privacy techniques in the Internet of Things: A survey. IEEE Internet of Things Journal, 7(8), 7067-7087.

Shokri, R., Stronati, M., Song, C., & Shmatikov, V. (2017). Membership inference attacks against machine learning models. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 3-18). IEEE.

Singh, A., & Muthuraman, K. (2019). AI in cybersecurity: Applications, challenges, and emerging solutions. IEEE Access, 7, 110037-110048.

Soni, S., & Arun, K. (2020). Secure AI-based authentication in mobile payment systems. Journal of Cyber Security and Mobility, 9(2), 189-210.

Srivastava, R., & Singh, A. (2017). Leveraging machine learning for mobile device security. IEEE Security & Privacy, 15(3), 28-37.

Downloads

Published

2023-06-30

How to Cite

Valentino, M. R. (2023). Security Analysis Of AI-Based Mobile Application For Fraud . Jurnal Komputer Indonesia, 2(1), 9–18. https://doi.org/10.37676/jki.v2i1.563

Issue

Section

Articles