Edge enabled digital payment analytics ecosystem machine learning based suspicious activity identification uncertainty scoring model
Keywords:
Edge computing, digital payment systems, fraud detection, machine learningAbstract
The rapid expansion of edge-enabled digital payment ecosystems has significantly transformed global financial transactions by enabling real-time, low-latency, and distributed payment processing. However, this evolution has also intensified the exposure of digital financial infrastructures to sophisticated cyber threats, including fraudulent transactions, ransomware-driven extortion, anonymized illicit transfers, and blockchain-based laundering activities. Existing rule-based fraud detection systems are insufficient in addressing the dynamic, adaptive, and obfuscated nature of modern financial crimes.
This research proposes an Edge Enabled Digital Payment Analytics Ecosystem (EEDPAE) integrated with a machine learning-based suspicious activity identification framework enhanced by an uncertainty scoring model. The proposed system leverages edge computing architecture to enable localized transaction analytics while maintaining global intelligence synchronization through centralized learning nodes. Machine learning classifiers are employed to detect anomalous transaction behaviors across digital payment networks, while uncertainty quantification mechanisms provide probabilistic confidence scores for each detection outcome.
The framework is conceptually grounded in blockchain forensics and cryptocurrency behavior analysis literature, including studies on Bitcoin transaction graph analysis, anonymization challenges, and ransomware payment tracking (Nakamoto, 2008; Meiklejohn et al., 2013; Reid & Harrigan, 2013). Additionally, insights from cybersecurity threat intelligence reports and empirical machine learning comparisons support the design of robust classification and anomaly detection models (Caruana & Niculescu-Mizil, 2006; Symantec Corporation, 2017).
A key contribution of this study is the integration of uncertainty scoring into edge-based fraud detection pipelines, allowing the system to distinguish between high-confidence suspicious activities and ambiguous transactions requiring further verification. Furthermore, the architecture aligns with cloud-assisted fintech intelligence paradigms that emphasize scalability, adaptive learning, and real-time risk assessment in financial ecosystems (Goyal et al., 2026).
Experimental synthesis from literature indicates that hybrid machine learning models combined with graph-based transaction analysis significantly improve detection accuracy in digital payment systems. The proposed framework enhances interpretability, reduces false positives, and strengthens resilience against evolving cyber-financial threats.
References
K. Cabaj, P. Gawkowski, K. Grochowski, and D. Osojca Network activity analysis of CryptoWall ransomware. Przeglad Elektrotechniczny, 91 (11), 201–204, 2015.
R. Caruana and A. Niculescu-Mizil, An empirical comparison of supervised learning algorithms, 3rd ed. International Proceedings of the 23rd international conference on Machine learning (pp. 161–168 ). ACM, 2006.
N. Christin, Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace, 3rd ed. Proceedings of the 22nd international conference on World Wide Web (pp. 213–224 ), ACM, 2013.
A. Cuthbertson, Bitcoin now accepted by 100, 000 merchants worldwide, International Business Times. IBTimes Co., Ltd. [Accessed November 20, 2015 ].
FBI: Cyber Intelligence Section and Criminal Intelligence Section, Bitcoins Virtual Currency: Unique Features Present Challenges for Deterring Illicit Activity, FBI. 24 April 2012 [Accessed November 2, 2014 ].
G. Hileman and M. Rauchs, Global cryptocurrency benchmarking study, Cambridge Centre for Alternative Finance, 2017.
M. A. Harlev, H. Sun Yin, K. C. Langenheldt, R. Mukkamala, and R. Vatrapu Breaking Bad: De-Anonymising Entity Types on the Bitcoin Blockchain Using Supervised Machine Learning, Proceedings of 51st Hawaii International Conference on System Sciences (HICSS), 2018.
J. Hirshman, Y. Huang, and S. Macke Unsupervised approaches to detecting anomalous behavior in the bitcoin transaction network, Technical report, Stanford University, 2013.
K. Liao, Z. Zhao, A. Doup, and G.J. Ahn, Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin, 3rd ed. Electronic Crime Research (eCrime), 2016 APWG Symposium on (pp. 1–13 ), IEEE, 2016.
S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M. Voelker, and S. Savage Afistful of bitcoins: characterizing payments among men with no names, 3rd ed. Proceedings of the 2013 conference on Internet measurement conference (pp. 127–140 ), ACM, 2013.
M. Mser, Anonymity of bitcoin transactions, 3rd ed. Mnster bitcoin conference (pp. 17–18 ), 2013.
A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction, 3rd ed. Princeton University Press, 2016.
S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008.
D. Reid and A. Shamir, Quantitative analysis of the full bitcoin transaction graph, 3rd ed. International Conference on Financial Cryptography and Data Security (pp. 6–24 ). Springer, 2013.
F. Reid and M. Harrigan, An analysis of anonymity in the bitcoin system, 3rd ed. Security and privacy in social networks (pp. 197–223 ). Springer New York, 2013.
M. Spagnuolo, F. Maggi, and S. ZaneroBitiodine : Extracting intelligence from the bitcoin network, 3rd ed. International Conference on Financial Cryptography and Data Security (pp. 457–468 ). Springer, 2014.
Symantec Corporation, Internet Security Threat Report: Volume 22, 2017.
Symantec Corporation, Ransomware and Businesses 2016. Symantec Corporation, 2016.






Azerbaijan
Türkiye
Uzbekistan
Kazakhstan
Turkmenistan
Kyrgyzstan
Republic of Korea
Japan
India
United States of America
Kosovo