Secure AI- and LLM-Powered Cloud Platforms for Financial Fraud Analytics Using ETL Pipelines in Web Application Development

Authors

  • Leonardo Samuel Moura Senior Systems Engineer, Brazil Author

DOI:

https://doi.org/10.15662/IJEETR.2024.0603004

Keywords:

financial fraud analytics, cloud computing, AI models, large language models (LLMs), ETL pipelines, web application development, secure platforms

Abstract

In the modern digital economy, financial institutions face ever-increasing threats from sophisticated fraud attempts that exploit vulnerabilities in transactional systems. This research explores the design and implementation of secure cloud-based platforms that integrate artificial intelligence (AI) and large language models (LLMs) with Extract-Transform-Load (ETL) pipelines for advanced financial fraud analytics within web application ecosystems. Leveraging scalable cloud infrastructure and state-of-the-art machine learning models, this approach enables real-time detection, classification, and prediction of fraudulent activities. The proposed framework emphasizes end-to-end security, data integrity, and compliance with regulatory standards while ensuring responsiveness and interpretability of results. We discuss the system architecture, data processing workflows, model training strategies, and integration of ETL processes for seamless ingestion and transformation of heterogeneous financial data. Our evaluation demonstrates significant improvements in detection accuracy, reduced false positives, and efficient processing of high-velocity transactional streams. The study highlights advantages such as scalability, adaptability to evolving fraud patterns, and enhanced decision support, while also addressing challenges including model explainability and security trade-offs. Findings from this research offer actionable insights for developers, analysts, and decision-makers seeking to enhance fraud analytics capabilities in web-based financial platforms.

References

1. Bolton, R. J., & Hand, D. J. (2002). Statistical fraud detection: A review. Statistical Science, 17(3), 235–255.

2. Bhattacharyya, S., Jha, S., Tharakunnel, K., & Westland, J. C. (2011). Data mining for credit card fraud: A comparative study. Decision Support Systems, 50(3), 602–613.

3. Kesavan, E. (2023). ML-Based Detection of Credit Card Fraud Using Synthetic Minority Oversampling. International Journal of Innovations in Science, Engineering And Management, 55-62.

4. Chen, Y., Paxson, V., & Katz, R. H. (2014). What’s new about cloud computing security? University of California, Berkeley Report.

5. Vasugi, T. (2023). An Intelligent AI-Based Predictive Cybersecurity Architecture for Financial Workflows and Wastewater Analytics. International Journal of Computer Technology and Electronics Communication, 6(5), 7595-7602.

6. Anand, P. V., & Anand, L. (2023, December). An Enhanced Breast Cancer Diagnosis using RESNET50. In 2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES) (pp. 1-5). IEEE.

7. Adari, V. K., Chunduru, V. K., Gonepally, S., Amuda, K. K., & Kumbum, P. K. (2023). Ethical analysis and decision-making framework for marketing communications: A weighted product model approach. Data Analytics and Artificial Intelligence, 3 (5), 44–53.

8. Vimal Raja, G. (2022). Leveraging Machine Learning for Real-Time Short-Term Snowfall Forecasting Using MultiSource Atmospheric and Terrain Data Integration. International Journal of Multidisciplinary Research in Science, Engineering and Technology, 5(8), 1336-1339.

9. Singh, A. (2022). Enhancing VoIP quality in the era of 5G and SD-WAN. International Journal of Computer Technology and Electronics Communication, 5(3), 5140–5145. https://doi.org/10.15680/IJCTECE.2022.0503006

10. Madabathula, L. (2023). Scalable risk-aware ETL pipelines for enterprise subledger analytics. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(6), 9737–9745. https://doi.org/10.15662/IJRPETM.2023.0606015

11. Nagarajan, G. (2024). A Cybersecurity-First Deep Learning Architecture for Healthcare Cost Optimization and Real-Time Predictive Analytics in SAP-Based Digital Banking Systems. International Journal of Humanities and Information Technology, 6(01), 36-43.

12. Panda, M. R., & Chinthalapelly, P. R. (2023). Banking Sandbox Evaluation for Open Banking Ecosystems Using Agent-Based Modeling. European Journal of Quantum Computing and Intelligent Agents, 7, 66-100.

13. Kubam, C. S. (2026). Agentic AI Microservice Framework for Deepfake and Document Fraud Detection in KYC Pipelines. arXiv preprint arXiv:2601.06241.

14. Jurgovsky, J., Granitzer, M., Ziegler, K., Calabretto, S., Portier, P.-E., He-Guelton, L., & Caelen, O. (2018). Sequence classification for credit-card fraud detection. Expert Systems with Applications, 100, 234–245.

15. Kimball, R., & Caserta, J. (2004). The Data Warehouse ETL Toolkit. Wiley.

16. Marinos, A., & Briscoe, G. (2009). Community cloud computing. Cloud Computing, 177–190.

17. Ngai, E. W. T., Hu, Y., Wong, Y. H., Chen, Y., & Sun, X. (2011). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision Support Systems, 50(3), 559–569.

18. Chivukula, V. (2020). IMPACT OF MATCH RATES ON COST BASIS METRICS IN PRIVACY- PRESERVING DIGITAL ADVERTISING. International Journal of Advanced Research in Computer Science & Technology, 3(4), 3400–3405.

19. Ramakrishna, S. (2023). Cloud-Native AI Platform for Real-Time Resource Optimization in Governance-Driven Project and Network Operations. International Journal of Engineering & Extended Technologies Research (IJEETR), 5(2), 6282-6291.

20. S. Roy and S. Saravana Kumar, “Feature Construction Through Inductive Transfer Learning in Computer Vision,” in Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2020, Springer, 2021, pp. 95–107.

21. Udayakumar, R., Joshi, A., Boomiga, S. S., & Sugumar, R. (2023). Deep fraud Net: A deep learning approach for cyber security and financial fraud detection and classification. Journal of Internet Services and Information Security, 13(3), 138-157.

22. Raghavan, S., Barua, P., & Jha, S. (2019). Security challenges in multi-tenant cloud computing. International Journal of Cloud Computing.

23. Natta, P. K. (2023). Robust supply chain systems in cloud-distributed environments: Design patterns and insights. International Journal of Research and Applied Innovations (IJRAI), 6(4), 9222–9231. https://doi.org/10.15662/IJRAI.2023.0604006

24. Kasireddy, J. R. (2023). Optimizing multi-TB market data workloads: Advanced partitioning and skew mitigation strategies for Hive and Spark on EMR. International Journal of Computer Technology and Electronics Communication (IJCTEC), 6(3), 6982–6990. https://doi.org/10.15680/IJCTECE.2023.0603005

25. Phua, C., Lee, V., Smith, K., & Gayler, R. (2010). A comprehensive survey of data mining-based fraud detection research. arXiv.

26. Navandar, P. (2022). SMART: Security Model Adversarial Risk-based Tool. International Journal of Research and Applied Innovations, 5(2), 6741-6752.

27. Pimpale, S. (2025). Synergistic Development of Cybersecurity and Functional Safety for Smart Electric Vehicles. arXiv preprint arXiv:2511.07713.

28. Kumar, S. S. (2023). AI-Based Data Analytics for Financial Risk Governance and Integrity-Assured Cybersecurity in Cloud-Based Healthcare. International Journal of Humanities and Information Technology, 5(04), 96-102.

29. Sauer, S. (2010). A practitioner’s guide to data warehousing. Information Systems Management.

Downloads

Published

2024-05-06

How to Cite

Secure AI- and LLM-Powered Cloud Platforms for Financial Fraud Analytics Using ETL Pipelines in Web Application Development. (2024). International Journal of Engineering & Extended Technologies Research (IJEETR), 6(3), 8122-8130. https://doi.org/10.15662/IJEETR.2024.0603004