Strengthening Financial Cybersecurity with SAP HANA: Deep Neural Networks and ERP-Integrated DevSecOps for MFA Credit Card Fraud Detection

Authors

  • Liam Conor MacCarthy Doyle Data Engineer, Ireland Author

DOI:

https://doi.org/10.15662/IJARCST.2023.0605007

Keywords:

SAP HANA, Financial cybersecurity, Deep neural networks, Credit card fraud detection, Multi-factor authentication, ERP integration, DevSecOps, Real-time analytics, Fraud prevention, Machine learning, Behavioral anomaly detection, Secure fintech systems, SAP-driven security, Cyber threat detection, Financial data analytics

Abstract

Financial institutions face escalating cyber threats, particularly in the domain of credit card fraud, where attackers increasingly exploit digital payment infrastructures and authentication gaps. This paper presents an advanced cybersecurity framework that integrates SAP HANA’s in-memory processing capabilities with deep neural network models and ERP-aligned DevSecOps pipelines to enhance multi-factor authentication (MFA)–based fraud detection. The proposed architecture leverages SAP HANA’s real-time analytics to rapidly process transactional big data, enabling neural networks to identify subtle behavioral anomalies, high-risk patterns, and emerging fraud vectors. The DevSecOps integration ensures secure, automated deployment of fraud detection models across ERP environments, embedding continuous security testing, policy enforcement, and runtime monitoring into the development lifecycle. Additionally, MFA data is incorporated as a dynamic feature set to improve prediction accuracy and reduce false positives. Experimental results show significant improvements in detection speed, adaptability, and resilience against evolving cyber threats. This framework demonstrates a scalable, intelligent, and secure approach for modernizing financial cybersecurity through SAP-driven analytics, deep learning, and ERP-embedded DevSecOps practices.

References

1. Bennett, C. C., & Hauser, K. (2013). Artificial Intelligence Framework for Simulating Clinical Decision Making: A Markov Decision Process Approach. arXiv. arXiv

2. Usha, G., Babu, M. R., & Kumar, S. S. (2017). Dynamic anomaly detection using cross layer security in MANET. Computers & Electrical Engineering, 59, 231-241.

3. Anand, L., & Neelanarayanan, V. (2019). Feature Selection for Liver Disease using Particle Swarm Optimization Algorithm. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 6434-6439.

4. Singh, H. (2025). AI-Powered Chatbots Transforming Customer Support through Personalized and Automated Interactions. Available at SSRN 5267858.

5. Kapadia, V., Jensen, J., McBride, G., Sundaramoothy, J., Deshmukh, R., Sacheti, P., & Althati, C. (2015). U.S. Patent No. 8,965,820. Washington, DC: U.S. Patent and Trademark Office.

6. Pasumarthi, A. (2023). Dynamic Repurpose Architecture for SAP Hana Transforming DR Systems into Active Quality Environments without Compromising Resilience. International Journal of Engineering & Extended Technologies Research (IJEETR), 5(2), 6263-6274.

7. Inampudi, R. K., Pichaimani, T., & Surampudi, Y. (2022). AI-enhanced fraud detection in real-time payment systems: leveraging machine learning and anomaly detection to secure digital transactions. Australian Journal of Machine Learning Research & Applications, 2(1), 483-523.

8. Suchitra, R. (2023). Cloud-Native AI model for real-time project risk prediction using transaction analysis and caching strategies. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 6(1), 8006–8013. https://doi.org/10.15662/IJRPETM.2023.0601002

9. Muthusamy, M. (2022). AI-Enhanced DevSecOps architecture for cloud-native banking secure distributed systems with deep neural networks and automated risk analytics. International Journal of Research Publication and Engineering Technology Management, 6(1), 7807–7813. https://doi.org/10.15662/IJRPETM.2022.0506014

10. Mani, R. (2022). Enhancing SAP HANA Resilience and Performance on RHEL using Pacemaker: A Strategic Approach to Migration Optimization and Dual-Function Infrastructure Design. International Journal of Computer Technology and Electronics Communication, 5(6), 6061-6074.

11. Adari, V. K. (2021). Building trust in AI-first banking: Ethical models, explainability, and responsible governance. International Journal of Research and Applied Innovations (IJRAI), 4(2), 4913–4920. https://doi.org/10.15662/IJRAI.2021.0402004

12. Granlund, T., Kopponen, A., Stirbu, V., Myllyaho, L., & Mikkonen, T. (2021). MLOps Challenges in Multi Organization Setup: Experiences from Two Real World Cases. arXiv. arXiv

13. Zhao, S., Talasila, M., Jacobson, G., Borcea, C., Aftab, S. A., & Murray, J. F. (2018). Packaging and Sharing Machine Learning Models via the Acumos AI Open Platform. arXiv. arXiv

14. Sezer, O. B., Gudelek, M. U., & Ozbayoglu, A. M. (2019). Financial Time Series Forecasting with Deep Learning: A Systematic Literature Review (2005–2019). arXiv. arXiv

15. Nagarajan, G. (2022). An integrated cloud and network-aware AI architecture for optimizing project prioritization in healthcare strategic portfolios. International Journal of Research and Applied Innovations, 5(1), 6444–6450. https://doi.org/10.15662/IJRAI.2022.0501004

16. Kumar, R. K. (2022). AI-driven secure cloud workspaces for strengthening coordination and safety compliance in distributed project teams. International Journal of Research and Applied Innovations (IJRAI), 5(6), 8075–8084. https://doi.org/10.15662/IJRAI.2022.0506017

17. Kang, A. (2017). Artificial intelligence and machine learning in financial services. FSB. Financial Stability Board

18. Pachyappan, R., Vijayaboopathy, V., & Paul, D. (2022). Enhanced Security and Scalability in Cloud Architectures Using AWS KMS and Lambda Authorizers: A Novel Framework. Newark Journal of Human-Centric AI and Robotics Interaction, 2, 87-119.

19. Sivaraju, P. S. (2022). Enterprise-Scale Data Center Migration and Consolidation: Private Bank's Strategic Transition to HP Infrastructure. International Journal of Computer Technology and Electronics Communication, 5(6), 6123-6134.

20. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian journal of science and technology, 8(35), 1-5.

21. Thangavelu, K., Sethuraman, S., & Hasenkhan, F. (2021). AI-Driven Network Security in Financial Markets: Ensuring 100% Uptime for Stock Exchange Transactions. American Journal of Autonomous Systems and Robotics Engineering, 1, 100-130.

22. Udayakumar, S. Y. P. D. (2023). Real-time migration risk analysis model for improved immigrant development using psychological factors.

23. Ramakrishna, S. (2022). AI-augmented cloud performance metrics with integrated caching and transaction analytics for superior project monitoring and quality assurance. International Journal of Engineering & Extended Technologies Research (IJEETR), 4(6), 5647–5655. https://doi.org/10.15662/IJEETR.2022.0406005

24. Vasugi, T. (2023). AI-empowered neural security framework for protected financial transactions in distributed cloud banking ecosystems. International Journal of Advanced Research in Computer Science & Technology, 6(2), 7941–7950. https://doi.org/0.15662/IJARCST.2023.0602004

25. Arora, Anuj. "Challenges of Integrating Artificial Intelligence in Legacy Systems and Potential Solutions for Seamless Integration." The Research Journal (TRJ), vol. 6, no. 6, Nov.–Dec. 2020, pp. 44–51. ISSN 2454-7301 (Print), 2454-4930 (Online).

26. Sugumar, R. (2023). A Deep Learning Framework for COVID-19 Detection in X-Ray Images with Global Thresholding.

27. Navandar, P. (2021). Fortifying cybersecurity in Healthcare ERP systems: unveiling challenges, proposing solutions, and envisioning future perspectives. Int J Sci Res, 10(5), 1322-1325.

28. Kumar, R., Al-Turjman, F., Anand, L., Kumar, A., Magesh, S., Vengatesan, K., ... & Rajesh, M. (2021). Genomic sequence analysis of lung infections using artificial intelligence technique. Interdisciplinary Sciences: Computational Life Sciences, 13(2), 192-200.

29. Vinay Kumar Ch, Srinivas G, Kishor Kumar A, Praveen Kumar K, Vijay Kumar A. (2021). Real-time optical wireless mobile communication with high physical layer reliability Using GRA Method. J Comp Sci Appl Inform Technol. 6(1): 1-7. DOI: 10.15226/2474-9257/6/1/00149

30. National Academy of Medicine (NAM). (2019). Artificial Intelligence in Health Care: The Hope, the Hype, the Promise, the Peril. NAM. NAM

Downloads

Published

2023-09-07

How to Cite

Strengthening Financial Cybersecurity with SAP HANA: Deep Neural Networks and ERP-Integrated DevSecOps for MFA Credit Card Fraud Detection. (2023). International Journal of Advanced Research in Computer Science & Technology(IJARCST), 6(5), 8991-8998. https://doi.org/10.15662/IJARCST.2023.0605007