Abstract
This paper discusses the ways in which big data analytics and behavioral biometrics can prevent or detect digital fraud. We used Random Forests and Neural Networks as our machine learning models to learn the dynamics of users' keystroke, mouse movement, and touch interaction patterns to identify fraud. It enhanced the relevancy and utility of the data and made the database algorithms and queries easier to manage over half a terabyte of online source raw data by applying data pre-processing and normalization to reduce noise, standardize data format, and make the data more relevant. This paper reveals that a behavioral observation system and a concept of big data that can be followed in real-time greatly enhance the fraud detection methodology and system flexibility. Another contribution of the paper is that such continuous user authentication will reduce the level of intrusiveness and improve security. Related literature indicates that our technology is comparable to practices in other fields and provides a versatile way of fighting new and advanced fraud. The idea of increased collaboration between industries and improvements in AI algorithms to detect fraud replaced the potential data privacy, compliance and computational power limitations. The study validates the notion that additional actionable plans are needed to combat next generation fraud and improve online security.
Topics

No keywords indexed for this article. Browse by subject →

References
23
[1]
S. Perumal, and K. Devarajan, “Comparative performance analysis of machine learning algorithms: Random cut forest, robust random cut forest, and Amazon Sage Maker random cut forest for intrusion detection systems using the CIS IDS 2017 dataset,” Turkish Journal of Engineering, vol. 9, no. 3, pp. 535-543, 2025. doi: 10.31127/tuje.1614930 10.31127/tuje.1614930
[2]
K. Rezaee, S. M. Rezakhani, M. R. Khosravi, and M. K. Moghimi, “A survey on deep learning-based real-time crowd anomaly detection for secure distributed video surveillance,” Personal and Ubiquitous Computing, vol. 28, no. 1, pp. 135-151, 2024. doi: 10.1007/s00779-021-01586-5 10.1007/s00779-021-01586-5
[3]
Y. B. W. Piugie, “Performance and security evaluation of behavioral biometric systems,” Ph.D. dissertation, Université de Caen Normandie, Caen, France, 2023.
[4]
S. Oduri, “Continuous authentication and behavioral biometrics: Enhancing cybersecurity in the digital era,” International Journal of Innovative Research in Science Engineering and Technology, vol. 13, no. 7, pp. 13632-13640, 2024.
[5]
M. Williams, M. F. Yussuf, and A. O. Olukoya, “Machine learning for proactive cybersecurity risk analysis and fraud prevention in digital finance ecosystems,” Ecosystems, vol. 20, p. 21, 2021.
[6]
A. I. Awad, A. Babu, E. Barka, and K. Shuaib, “AI-powered biometrics for Internet of Things security: A review and future vision,” Journal of Information Security and Applications, vol. 82, Art. no. 103748, 2024. doi: 10.1016/j.jisa.2024.103748 10.1016/j.jisa.2024.103748
[7]
A. Ferreira, and P. Sandner, “Eu search for regulatory answers to crypto assets and their place in the financial markets’ infrastructure,” Computer Law & Security Review, vol. 43, Art. no. 105632, 2021. doi: 10.1016/j.clsr.2021.105632 10.1016/j.clsr.2021.105632
[8]
L. Cascone, M. Nappi, F. Narducci, and C. Pero, “Touch keystroke dynamics for demographic classification,” Pattern Recognition Letters, vol. 158, pp. 63-70, 2022. doi: 10.1016/j.patrec.2022.04.023 10.1016/j.patrec.2022.04.023
[9]
M. Bernhardt, et al., “Active label cleaning for improved dataset quality under resource constraints,” Nature Communications, vol. 13, no. 1, Art. no. 1161, 2022. doi: 10.1038/s41467-022-28818-3 10.1038/s41467-022-28818-3
[10]
C. López, et al., “Adversarial attacks against mouse-and keyboard-based biometric authentication: black-box versus domain-specific techniques,” International Journal of Information Security, vol. 22, no. 6, pp. 1665-1685, 2023. doi: 10.1007/s10207-023-00711-0 10.1007/s10207-023-00711-0
[11]
Ł. Wyciślik, P. Wylężek, and A. Momot, “The improved biometric identification of keystroke dynamics based on deep learning approaches,” Sensors, vol. 24, no. 12, Art. no. 3763, 2024. doi: 10.3390/s24123763 10.3390/s24123763
[12]
F. Schade, “Dark sides of data transparency: Organized immaturity after GDPR?” Business Ethics Quarterly, vol. 33, no. 3, pp. 473-501, 2023. doi: 10.1017/beq.2022.30 10.1017/beq.2022.30
[13]
Normalization Techniques in Training DNNs: Methodology, Analysis and Application

Lei Huang, Jie Qin, Yi Zhou et al.

IEEE Transactions on Pattern Analysis and Machine... 10.1109/tpami.2023.3250241
[14]
M. Shantal, Z. Othman, and A. A. Bakar, “A novel approach for data feature weighting using correlation coefficients and min–max normalization,” Symmetry, vol. 15, no. 12, Art. no. 2185, 2023. doi: 10.3390/sym15122185 10.3390/sym15122185
[15]
D. Iacobucci, S. Román, S. Moon, and D. Rouziès, “A tutorial on what to do with skewness, kurtosis, and outliers: New insights to help scholars conduct and defend their research,” Psychology & Marketing, 2025. doi: 10.1002/mar.22187 10.1002/mar.22187
[16]
A. Mazarei, R. Sousa, J. Mendes-Moreira, S. Molchanov, and H. M. Ferreira, “Online boxplot derived outlier detection,” International Journal of Data Science and Analytics, vol. 19, no. 1, pp. 83-97, 2025. doi: 10.1007/s41060-024-00559-0 10.1007/s41060-024-00559-0
[17]
H. Zhang, et al., “Understanding the effects of restraining finger coactivation in mid-air typing: from a neuromechanical perspective,” in Proceedings of the 37th Annual ACM Symposium on User Interface Software and Technology, Art. No. 51, pp. 1- 18, 2024. doi: 10.1145/3654777.3676441 10.1145/3654777.3676441
[18]
A. Dalsaniya, “AI for behavioral biometrics in cybersecurity: Enhancing authentication and fraud detection,” International Research Journal, vol. 10, pp. a108-a122, 2023.
[19]
N. Ibrahim, A. Abbas, and F. Khorsheed, “A systematic review for misuses attack detection based on data mining in NFV,” Sakarya University Journal of Computer and Information Sciences, vol. 6, no. 3, pp. 239-252, 2023. doi: 10.35377/saucis...1379047 10.35377/saucis...1379047
[20]
W. Mao, et al., “Capability of arterial spin labeling and intravoxel incoherent motion diffusion-weighted imaging to detect early kidney injury in chronic kidney disease,” European Radiology, vol. 33, no. 5, pp. 3286-3294, 2023. 10.1007/s00330-022-09331-z
[21]
T. S. Madhuri, E. R. Babu, B. Uma, and B. M. Lakshmi, “Big-data driven approaches in materials science for real-time detection and prevention of fraud,” Materials Today: Proceedings, vol. 81, pp. 969-976, 2023. doi: 10.1016/j.matpr.2021.04.323 10.1016/j.matpr.2021.04.323
[22]
M. Jangjou, and M. K. Sohrabi, “A comprehensive survey on security challenges in different network layers in cloud computing,” Archives of Computational Methods in Engineering, vol. 29, no. 6, pp. 3587-3608, 2022. 10.1007/s11831-022-09708-9
[23]
A. R. Fathima, and A. Saravanan, “An approach to cloud user access control using behavioral biometric-based authentication and continuous monitoring,” International Journal of Advanced Technology and Engineering Exploration, vol. 11, no. 119, Art. no. 1469, 2024. doi: 10.19101/IJATEE.2024.111100516 10.19101/ijatee.2024.111100516
Metrics
0
Citations
23
References
Details
Published
Mar 15, 2026
Vol/Issue
9(1)
Pages
8-20
Cite This Article
Ahmed Abbas, Tareq Abed Mohammed, Zena Ez Dallalbash, et al. (2026). Integrating Big Data Analytics and Behavioral Biometrics for Advanced Fraud Detection. Sakarya University Journal of Computer and Information Sciences, 9(1), 8-20. https://doi.org/10.35377/saucis...1729803