The Use of Supervised and Unsupervised Learning Methods for Detecting Auditing Anomalies
Keywords:
Audit anomaly detection; Machine learning; Supervised learning; Unsupervised learning; Fraud detectionAbstract
The rapid growth in transaction volumes and increasing sophistication of fraudulent schemes have reduced the effectiveness of traditional audit sampling in modern financial systems. This study evaluates supervised and unsupervised machine learning techniques for audit anomaly detection and compares their effectiveness across anomaly types and organizational contexts. Using a real-world dataset of 247,683 financial transactions, we implemented five supervised algorithms—Logistic Regression, Random Forest, Support Vector Machines, XGBoost, and Artificial Neural Networks—and five unsupervised methods—K-means, DBSCAN, Isolation Forest, Local Outlier Factor, and Autoencoders. Supervised models were evaluated using precision, recall, F1-score, and AUC-ROC, while unsupervised models were assessed using detection rate, false positive rate, anomaly scores, and silhouette coefficients. Results show that ensemble supervised techniques perform best when labeled data are available. XGBoost achieved the highest performance with an F1-score of 0.89 and AUC of 0.94, while maintaining a false positive rate below 1%. Among unsupervised approaches, Isolation Forest achieved an 87.3% detection rate with a 4.2% false positive rate, and autoencoders demonstrated competitive performance in high-dimensional anomaly detection. The findings indicate that supervised models are more accurate for detecting known fraud patterns, whereas unsupervised methods are essential for identifying emerging or previously unseen anomalies, particularly in environments with limited labeled data. The study supports the adoption of hybrid audit analytics frameworks that combine both paradigms to improve detection coverage while balancing interpretability, computational efficiency, and operational feasibility. These results provide practical guidance for auditors implementing machine learning–based anomaly detection syste
Downloads
Published
Issue
Section
Most read articles by the same author(s)
- Olatunde Ayeomoni, Enhancing Data Provenance, Integrity, Security, and Trustworthiness in Distributed and Federated Multi-Cloud Computing Environments , Communication In Physical Sciences: Vol. 11 No. 4 (2024): VOLUME 11 ISSUE 4
Similar Articles
- Dahunsi Samuel Adeyemi, Effectiveness of Machine Learning Models in Intrusion Detection Systems: A Systematic Review , Communication In Physical Sciences: Vol. 11 No. 4 (2024): VOLUME 11 ISSUE 4
- Emmanuel Oluwemimo Falodun, Faith, Technology, and Safety: A Theoretical Framework for Religious Leaders Using Artificial Intelligence to Advocate for Gun Violence Prevention , Communication In Physical Sciences: Vol. 8 No. 4 (2022): VOLUME 8 ISSUE 4
- Joy Nnenna Okolo, A Review of Machine and Deep Learning Approaches for Enhancing Cybersecurity and Privacy in the Internet of Devices , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- Olaleye Ibiyeye, Joy Nnenna Okolo, Samuel Adetayo Adeniji, A Comprehensive Evaluation of AI-Driven Data Science Models in Cybersecurity: Covering Intrusion Detection, Threat Analysis, Intelligent Automation, and Adaptive Decision-Making Systems , Communication In Physical Sciences: Vol. 8 No. 4 (2022): VOLUME 8 ISSUE 4
- Fatima Binta Adamu, Muhammad Bashir Abdullahi, Sulaimon Adebayo Bashir, Abiodun Musa Aibinu, Conceptual Design Of A Hybrid Deep Learning Model For Classification Of Cervical Cancer Acetic Acid Images , Communication In Physical Sciences: Vol. 12 No. 2 (2025): VOLUME 12 ISSUE 2
- Joy Nnenna Okolo, A Systematic Analysis of Artificial Intelligence and Data Science Integration for Proactive Cyber Defense: Exploring Methods, Implementation Obstacles, Emerging Innovations, and Future Security Prospects , Communication In Physical Sciences: Vol. 7 No. 4 (2021): VOLUME 7 ISSUE 4
- Edoise Areghan, From Data Breaches to Deepfakes: A Comprehensive Review of Evolving Cyber Threats and Online Risk Management , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- Precious Ogechi Ufomba, Ogochukwu Susan Ndibe, IoT and Network Security: Researching Network Intrusion and Security Challenges in Smart Devices , Communication In Physical Sciences: Vol. 9 No. 4 (2023): VOLUME 9 ISSUE 4
- Michael Oladipo Akinsanya, Oluwafemi Clement Adeusi, Kazeem Bamidele Ajanaku, A Detailed Review of Contemporary Cyber/Network Security Approaches and Emerging Challenges , Communication In Physical Sciences: Vol. 8 No. 4 (2022): VOLUME 8 ISSUE 4
- Olatunde Ayeomoni, Enhancing Data Provenance, Integrity, Security, and Trustworthiness in Distributed and Federated Multi-Cloud Computing Environments , Communication In Physical Sciences: Vol. 11 No. 4 (2024): VOLUME 11 ISSUE 4
You may also start an advanced similarity search for this article.



