Causal Trace Miner–Powered AI Fraud Detection Using Deep Learning with DevSecOps and SAP HANA ERP Integration

Authors

  • Khalifa Saeed Mohammed Senior Software Engineer, UAE Author

DOI:

https://doi.org/10.15662/IJRAI.2021.0403004

Keywords:

Causal Trace Miner, Deep Learning, Fraud Detection, DevSecOps, SAP HANA ERP Analytics, Enterprise Security, Autoencoders, LSTM, Cloud Security, Process Mining, Anomaly Detection, AI-Driven Fraud Prevention

Abstract

Enterprise fraud has evolved into a sophisticated and multidimensional threat that spans financial operations, identity management, business processes, and cloud-native infrastructures. Traditional rule-based or statistical models fail to capture temporal dependencies, causal relationships, and high-dimensional patterns embedded in enterprise activity logs. This paper introduces a Causal Trace Miner–powered AI fraud detection framework that leverages deep learning, DevSecOps automation, and SAP HANA ERP integration to address modern fraud detection challenges. Causal Trace Miner (CTM) reconstructs event dependencies across business workflows, enabling early identification of process deviations and multi-step fraudulent sequences. Deep learning models—including LSTM, Autoencoders, and Attention mechanisms—enhance detection accuracy by learning temporal patterns and behavioral anomalies. The adoption of cloud-native DevSecOps pipelines ensures continuous security validation, automated deployment, and resilience against adversarial manipulation. SAP HANA ERP integration provides real-time analytics, fraud insights, and embedded operational intelligence. Extensive evaluation demonstrates substantial improvements in fraud detection accuracy, reduction in false positives, and enhanced process transparency. This research contributes a unified, scalable, and enterprise-ready fraud detection architecture that addresses emerging threats across digital ecosystems, ERP modules, and cloud environments.

References

1. Schreyer, M., Sattarov, T., Borth, D., Dengel, A., & Reimer, B. (2017).

Detection of anomalies in large scale accounting data using deep autoencoder networks (Preprint). arXiv. https://doi.org/10.48550/arXiv.1709.05254

2. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant Use of Cloud by a Novel Framework of Encrypted Biometric Authentication and Multi Level Data Protection. Indian Journal of Science and Technology, 9, 44.

3. Sugumar, R. (2016). Conditional Entropy with Swarm Optimization Approach for Privacy Preservation of Datasets in Cloud.

4. Rao, S. X., Zhang, S., Han, Z., Zhang, Z., Min, W., Chen, Z., Shan, Y., & Zhao, Y. (2020).

xFraud: Explainable fraud transaction detection (Preprint). arXiv. https://doi.org/10.48550/arXiv.2011.12193

5. Das, D., Vijayaboopathy, V., & Rao, S. B. S. (2018). Causal Trace Miner: Root-Cause Analysis via Temporal Contrastive Learning. American Journal of Cognitive Computing and AI Systems, 2, 134-167.

6. Dal Pozzolo, A., Caelen, O., Johnson, R. A., & Bontempi, G. (2015).

Application of the Isolation Forest algorithm for credit card fraud detection. In IEEE Symposium Series on Computational Intelligence.

7. Navandar, Pavan. "Enhancing Cybersecurity in Airline Operations through ERP Integration: A Comprehensive Approach." Journal of Scientific and Engineering Research 5, no. 4 (2018): 457-462.

8. Rao, S. X., Zhang, S., Han, Z., Zhang, Z., Min, W., Chen, Z., Shan, Y., & Zhao, Y. (2020). xFraud: Explainable fraud transaction detection [Preprint]. arXiv. https://doi.org/10.48550/arXiv.2011.12193

9. Adari, V. K. (2020). Intelligent Care at Scale AI-Powered Operations Transforming Hospital Efficiency. International Journal of Engineering & Extended Technologies Research (IJEETR), 2(3), 1240-1249.

10. Schreyer, M., Sattarov, T., Borth, D., Dengel, A., & Reimer, B. (2017). Detection of anomalies in large scale accounting data using deep autoencoder networks [Preprint]. arXiv. https://doi.org/10.48550/arXiv.1709.05254

11. Singh, H. (2020). Evaluating AI-enabled fraud detection systems for protecting businesses from financial losses and scams. The Research Journal (TRJ), 6(4).

12. Pichaimani, T., Inampudi, R. K., & Ratnala, A. K. (2021). Generative AI for Optimizing Enterprise Search: Leveraging Deep Learning Models to Automate Knowledge Discovery and Employee Onboarding Processes. Journal of Artificial Intelligence Research, 1(2), 109-148.

13. Arora, Anuj. "Challenges of Integrating Artificial Intelligence in Legacy Systems and Potential Solutions for Seamless Integration." The Research Journal (TRJ), vol. 6, no. 6, Nov.–Dec. 2020, pp. 44–51. ISSN 2454-7301 (Print), 2454-4930 (Online).

14. Anand, L., & Neelanarayanan, V. (2019). Feature Selection for Liver Disease using Particle Swarm Optimization Algorithm. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 6434-6439.

15. Paul, D.; Soundarapandiyan, R.; Krishnamoorthy, G. Security-First Approaches to CI/CD in Cloud-Computing Platforms: Enhancing DevSecOps Practices. Aust. J. Mach. Learn. Res. Appl. 2021, 1, 184–225.

16. Anbazhagan, R. S. K. (2016). A Proficient Two Level Security Contrivances for Storing Data in Cloud.

17. Selvi, R., Saravan Kumar, S., & Suresh, A. (2014). An intelligent intrusion detection system using average manhattan distance-based decision tree. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1 (pp. 205-212). New Delhi: Springer India.

18. Sharma, D., Bersani, R., & Chen, Y. (2017). Security-aware DevOps: Bringing security into DevOps practices. IEEE Security & Privacy Workshops, 26–33.

Downloads

Published

2023-05-04

How to Cite

Causal Trace Miner–Powered AI Fraud Detection Using Deep Learning with DevSecOps and SAP HANA ERP Integration. (2023). International Journal of Research and Applied Innovations, 4(3), 5214-5220. https://doi.org/10.15662/IJRAI.2021.0403004