E-commerce Security: An Overview of AI Driven Threat / Anomaly Detection
E-commerce Security: An Overview of AI Driven Threat / Anomaly Detection |
||
![]() |
![]() |
|
© 2025 by IJETT Journal | ||
Volume-73 Issue-6 |
||
Year of Publication : 2025 | ||
Author : M. Sakthivanitha, S. Silvia Priscila, Praveen B.M | ||
DOI : 10.14445/22315381/IJETT-V73I6P114 |
How to Cite?
M. Sakthivanitha, S. Silvia Priscila, Praveen B.M, "E-commerce Security: An Overview of AI Driven Threat / Anomaly Detection," International Journal of Engineering Trends and Technology, vol. 73, no. 6, pp.157-172, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I6P114
Abstract
The current marketplaces have changed from physical to online electronic markets (e-commerce) due to substantial advancements in information technology. Governments worldwide, especially those in developing countries, have supported and encouraged smaller and medium-sized businesses to conduct business online. Businesses need to discover a better approach to integrating e-commerce (EC) while maintaining its security as it develops. Resolving the core issue of insufficient security on EC web servers and customers' computer systems is necessary for the rapid expansion of EC. This study aims to conduct a Systematic Literature Review (SLR) to identify the vulnerabilities found in EC platforms. Globally, EC has enhanced consumer convenience and technology. EC has a fraud issue. Platforms and merchants combat fraud to safeguard their clients and companies. One effective technique for spotting odd trends and possible fraud is anomaly detection. The article addresses various methods for putting anomaly detection technology into practice and examines its application in EC fraud detection. Therefore, security concerns and suggested fixes pertaining to EC systems will be discussed in the conclusion. These findings can be used as a starting point for more research on EC security concerns, including suggestions and solutions for a safe EC platform.
Keywords
E-Commerce Security, Artificial Intelligence (AI), Threats, Anomaly Detection, Machine Learning (ML), Deep Learning (DL), Fraud Detection.
References
[1] Abdul Karim et al., “Phishing Detection System through Hybrid Machine Learning Based on URL,” IEEE Access, vol. 11, pp. 36805-36822, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] B. Girimurugan, “AI and Machine Learning in E-Commerce Security: Emerging Trends and Practices,” Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning, pp. 29-53, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Ozgur Koray Sahingoz, Ebubekir BUBEr, and Emin Kugu, “DEPHIDES: Deep Learning Based Phishing Detection System,” IEEE Access, vol. 12, pp. 8052-8070, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Tung, Tean Thong, “Detection of SQL Injection Attack Using Machine Learning,” Bachelor’s Thesis, Faculty of Information and Communication Technology (Kampar Campus), Universiti Tunku Abdul Rahman, 2024.
[Publisher Link]
[5] Ruchi Rai, Ankur Rohilla, and Abhishek Rai, “Understanding Cybersecurity Threats in E-Commerce,” Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning, pp. 501-522, 2024.
[Publisher Link]
[6] Dipok Deb, “Application and Analysis of Machine Learning and Deep Learning Algorithms in Detection of DDoS Cyberattacks,” Master's Thesis, The University of Texas Rio Grande Valley, 2024.
[Google Scholar] [Publisher Link]
[7] Masoud Hemmatpour, Changgang Zheng, and Noa Zilberman, “E-Commerce Bot Traffic: In-Network Impact, Detection, and Mitigation,” 2024 27th Conference on Innovation in Clouds, Internet and Networks (ICIN), Paris, France, pp. 179-185, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Jian Liu, Xin Gu, and Chao Shang, “Quantitative Detection of Financial Fraud Based on Deep Learning with Combination of E‐Commerce Big Data,” Complexity, vol. 2020, no. 1, pp. 19-11, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Nitin Rane, Saurabh Choudhary, and Jayesh Rane, “Artificial Intelligence and Machine Learning in Business Intelligence, Finance, and E-commerce: A Review,” SSRN, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Xiuli Ma, and Zehao Wang, “Computer Security Technology in E-Commerce Platform Business Model Construction,” Heliyon, vol. 10, no. 7, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Surendranadha Reddy Byrapu Reddy et al., “Effective Fraud Detection in e-Commerce: Leveraging Machine Learning and Big Data Analytics,” Measurement: Sensors, vol. 33, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Meet Ashokkumar Joshi, “Artificial Intelligence in E-commerce: a Comprehensive Analysis,” International Journal of Innovative Research in Science, Engineering and Technology, vol. 3, no. 3, pp. 1309-1314, 2024.
[Google Scholar] [Publisher Link]
[13] Venkata Ashok K. Gorantla et al., “Utilizing Hybrid Cloud Strategies to Enhance Data Storage and Security in E-Commerce Applications,” 2024 2nd International Conference on Disruptive Technologies (ICDT), Greater Noida, India, pp. 494-499, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Lakshmi Nivas Nalla, and Vijay Mallik Reddy, “AI-Driven Big Data Analytics for Enhanced Customer Journeys: A New Paradigm in E-Commerce,” International Journal of Advanced Engineering Technologies and Innovations, vol. 2, no. 1, pp. 719-740, 2024.
[Google Scholar] [Publisher Link]
[15] Iqbal Hasan, and Sam Rizvi, “AI-Driven Fraud Detection and Mitigation in e-Commerce Transactions,” Proceedings of Data Analytics and Management, Singapore, pp. 403-414, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Rizwan Ur Rahman, and Deepak Singh Tomar, “Threats of Price Scraping on e-Commerce Websites: Attack Model and its Detection Using Neural Network,” Journal of Computer Virology and Hacking Techniques, vol. 17, pp. 75-89, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[17] JiaoLong Li, “E-Commerce Fraud Detection Model by Computer Artificial Intelligence Data Mining,” Computational Intelligence and Neuroscience, vol. 2022, pp. 1-9, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Simon Bell, and Peter Komisarczuk, “An Analysis of Phishing Blacklists: Google Safe Browsing OpenPhish and PhishTank,” ACSW '20: Proceedings of the Australasian Computer Science Week Multiconference, pp. 1-11, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Vijay Mallik Reddy, Lakshmi Nivas Nalla, and Manish Vishwanath, “Optimizing E-Commerce Supply Chains through Predictive Big Data Analytics: A Path to Agility and Efficiency,” International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 15, no. 1, pp. 555-585, 2024.
[Google Scholar] [Publisher Link]
[20] Murat Golyeri et al., “Fraud Detection on E-Commerce Transactions Using Machine Learning Techniques,” Artificial Intelligence Theory and Applications, vol. 3, no. 1 pp. 45-50, 2023.
[Google Scholar] [Publisher Link]
[21] Yanjiao Dong et al., “Real-Time Fraud Detection in e-Market Using Machine Learning Algorithms,” Journal of Multiple-Valued Logic & Soft Computing, vol. 36, pp. 1-3, 2021.
[Google Scholar] [Publisher Link]
[22] Ravi Teja Potla, “AI in Fraud Detection: Leveraging Real-Time Machine Learning for Financial Security,” Journal of Artificial Intelligence Research and Applications, vol. 3, no. 2, pp. 534-549, 2023.
[Google Scholar] [Publisher Link]
[23] G. Rajeshwari et al., “Fraud Detection in E-Commerce Transactions Using Machine Learning Techniques and Quantum Networks,” Quantum Networks and Their Applications in AI, pp. 146-162, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[24] WenLong Wang et al., “Two-Layer Generalization Boosting Model for Anomaly Detection of e-Commerce Orders,” Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023), vol. 269, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Abed Mutemi, and Fernando Bacao, “E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review,” Big Data Mining and Analytics, vol. 7, no. 2, pp. 419-444, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Shabeena Nafees et al., Intelligence Framework to Identify Malicious Activities for Safety, Emerging Trends in IoT and Computing Technologies, 21st ed., CRC Press, 2024.
[Google Scholar] [Publisher Link]
[27] Ishita Saha et al., “Phishing Attacks Detection Using Deep Learning Approach,” 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, pp. 1180-1185, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Sarvjeet Kaur Chatratha, G.S. Batrab, and Yogesh Chaba, “Handling Consumer Vulnerability in e-Commerce Product Images Using Machine Learning,” Heliyon, vol. 8, no. 9, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Ahmed Bensaoud, Jugal Kalita, and Mahmoud Bensaoud, “A Survey of Malware Detection Using Deep Learning,” Machine Learning with Applications, vol. 16, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[30] The Times, Marks & Spencer faces £300m hit from cyberattack. [Online]. Available: https://www.thetimes.com/business-money/companies/article/marks-and-spencer-300m-cost-cyberattack-9gln92jd9?utm_source=chatgpt.com®ion=global
[31] Ryan Holthouse, Serena Owens, and Suman Bhunia, “The 23 and Me Data Breach: Analyzing Credential Stuffing Attacks, Security Vulnerabilities, and Mitigation Strategies,” arXiv Preprint, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[32] SOCRadar, Top 10 Major Cyber Attacks Targeting E-Commerce Industry, 2024. [Online]. Available: https://socradar.io/top-10-cyber-attacks-targeting-e-commerce-industry/?utm_source=chatgpt.com
[33] Ban Mohammed Khammas, “Ransomware Detection Using Random Forest Technique,” ICT Express, vol. 6, no. 4, pp. 325-331, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Bhupinder Singh, and Christian Kaunert, “Unraveling Financial Fraud with AI and Machine Learning: Screening into Ad Clicks, Credit Card Management, and E-Commerce Transactions,” Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning, pp. 406-429, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Mustafa Mohamed Ismail, and Mohd Anul Haq, “Enhancing Enterprise Financial Fraud Detection Using Machine Learning,” Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 14854-14861, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Samuel Augustina Lata Jeyaraj et al., “Machine Learning Algorithms for E-Commerce Security: A Practical Approach,” Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning, pp. 361-385, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Feng Lu, “Online Shopping Consumer Perception Analysis and Future Network Security Service Technology Using Logistic Regression Model,” PeerJ Computer Science, vol. 10, pp. 1-23, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Renuka Sharma, Kiran Mehta, and Poonam Sharma, “Role of Artificial Intelligence and Machine Learning in Fraud Detection and Prevention,” Risks and Challenges of AI-Driven Finance: Bias, Ethics, and Security, pp. 90-120, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[39] L.A. Anto Gracious et al., “Advancing E-Commerce Security: Strategic Innovations and Future Directions in AI and ML,” Strategic Innovations of AI and ML for E-Commerce Data Security, pp. 79-106, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Yury Y. Festa, and Ivan A. Vorobyev, “A Hybrid Machine Learning Framework for e-Commerce Fraud Detection,” Model Assisted Statistics and Applications, vol. 17, no. 1, pp. 41-49, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Mark E. Lokanan, and Vikas Maddhesia, “Supply Chain Fraud Prediction with Machine Learning and Artificial Intelligence,” International Journal of Production Research, vol. 63, no. 1, pp. 286-313, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[42] T. Maheshwaran et al., “Securing E-Commerce Strategies with Cloud, Blockchain, AI, and ML,” Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning, pp. 470-500, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[43] Sami Ahmed Haider et al., “Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce,” IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 1631-1639, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[44] Yue Lin, “Anomaly Detection Combining Bidirectional Gated Recurrent Unit and Autoencoder in the Context of e-Commerce,” Engineering Research Express, vol. 6, no. 3, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[45] Oluwambo Tolulope Olowe et al., “Enhancing Cybersecurity through Advanced Fraud and Anomaly Detection Techniques: A Systematic Review,” 2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG), Omu-Aran, Nigeria, pp. 1-12, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[46] Alexander I-Chi Lai, and Hung-Chih Yang, “Deep Learning Based Behavior Anomaly Detection within the Context of Electronic Commerce,” 2023 IEEE International Conference on Intelligence and Security Informatics (ISI), Charlotte, NC, USA, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[47] Sara Farag, and Nahla Barakat, “Data and Model Centric Approaches for Card Fraud Detection,” 2023 International Conference on Computer and Applications (ICCA), Cairo, Egypt, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[48] Jia Li, Shaojiang Liu, and Jiajun Zou, “E-Commerce Data Anomaly Detection Method Based on Variational Autoencoder,” 2024 3rd International Conference on Artificial Intelligence, Internet of Things and Cloud Computing Technology (AIoTC), Wuhan, China, pp. 231-234, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[49] Sachin Dixit, “Advanced Generative AI Models for Fraud Detection and Prevention in FinTech: Leveraging Deep Learning and Adversarial Networks for Real-Time Anomaly Detection in Financial Transactions,” TechRxiv, 2024.
[CrossRef] [Google Scholar] [Publisher Link]