SlideShare a Scribd company logo
1 of 4
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 03 Issue: 02 December 2014,Pages No.30- 33
ISSN: 2278-2400
30
SCAM Detection in Credit Card Application
M.Sanjeeevkumar1
,A.Kamakshi2
1
Student, Department of CSE, Jayam College of Engineering & Technology, DharmapuriTamilnadu, India
2
Asst. Professor, Department of CSE, Jayam College of Engineering & Technology, Dharmapuri, Tamilnadu, India
Email: sanjeevkumarmecse@gmail.com , dhivya.kamakshi@gmail.com
Abstract-Identity crime is well known, prevalent, and costly, and
credit application scam is a specific case of identity crime. The
existing no data mining recognition system of business rules and
scorecards and known scam matching have confines. To address
these confines and combat identity crime in real time, this paper
proposes a new multilayered discovery system complemented
with two additional layers: communal detection (CD) and spike
detection (SD). CD finds real social relationships to reduce the
suspicion score, and is tamper unaffected to synthetic social
relationships. It is the whitelist-oriented methodology on a fixed
set of attributes. SD finds spikes in false to increase the suspicion
score, and is probe-unaffected for elements. It is the
attribute-oriented approach on a variable-size set of elements.
Together, CD and SD can detect more types of attacks, better
account for changing legal activities, and remove the redundant
elements. Experiments were carried out on CD and SD with
several million real credit applications. Results on the data
support the suggestion that successful credit application scam
patterns are sudden and exhibit sharp spikes in false. Although
this research is specific to credit application scam recognition,
the concept of flexibility, together with adaptively and quality
data discussed in the paper, are general to the model,
implementation, and evaluation of all recognition systems.
Keywords— Data mining-based scam detection, security, data
stream mining, anomaly detection.
I. INTRODUCTION
Identity Scam Detection is the process of detecting the scam that
uses a false identity for obtaining goods or services. This paper
detects the application scam that arises in the credit card
industry. This paper increases the effectiveness of the existing
system. This paper aims at identifying application scam by
achieving flexibility by adding data mining-based layers. This
paper makes use of these powerful layers to identify the identity
scam named application scam. This paper consists mainly of two
parts i.e. identifying scam lent application and comparing the
performance of these data mining based layers.
Credit-card-based purchases categorized into two types: 1)
physical card and 2) virtual card. In a physical-card based
purchase, the card defender presents his card physically to a
merchant for making payment. To carry out scam lent
transactions in this purchase, an attacker has to steal the credit
card. If the card defender does not realize the loss of card, it can
lead to a plentiful financial loss to the credit card company. In
the second purchase, only some important information about the
card (card number, expiration date, secure code) is mandatory to
make the payment. Such purchases are customarily done on the
Internet or over the telephone. To commit scam in these types of
purchases, a scamster simply needs to know the card details.
Most of the time, the genuine card defender is not aware that
someone else has seen or stolen his card information. The only
way to detect this scam is to analyze the spending patterns on
every card and to figure out any inconsistency with respect to the
"usual" spending patterns. Scam detection based on the analysis
of existing purchase data of the card defender is a promising way
to reduce the rate of successful credit card scams. This paper is
the continuity of existing model. Application scam is when
someone applies for a credit card with false information. For
detect application scam, the solution is to implement a scam
system that allows identifying suspicious applications. For
detect application scam, two different situations have to be
distinguished: when applications come from the same individual
with the same details, the so-called duplicates, and when
applications come from different individuals with similar details,
the so called identity fakes.
In most banks, to be eligible for a credit card, applicants need to
complete an application form. This application form is
mandatory except for social fields. The information mandatory
includes identification information, location information,
contact information, confidential information and additional
information. Recurrent information available would be for
identification purposes, such as the full name and the date of
birth. The applicant would inform the bank about his/her
location details: the address, the postal code, the city and the
country. The bank would also ask for contact details, such as
e-mail address, land-line and mobile phone numbers.
Confidential information will be the password. In addition, the
gender will be given. All those characteristics may use while
searching for duplicates.As in identity scam, credit application
scam has reached a critical mass of fakes who are exceedingly
experienced, organized, and high-tech. Their visible patterns can
be different for each other and constantly change. They are
relentless, due to the high financial rewards, and the risk and
endeavor involved are minimal. Based on anecdotal reflections
of experienced credit application investigators, fakes can use
software automation to manipulate particular values within the
application and increase frequency of successful values.
II. EXISTING SYSTEM
 There are non data mining layers of defence to protect
against credit application scam, each with its unique strengths
and weaknesses. The first existing defence made up of business
rules and scorecards.
 In Australia, one business rule is the hundred-point physical
identity check test which requires the applicant to provide
sufficient point-weighted identity documents face-to-face. They
must hang together to at tiniest 100 points, where a passport is
worth 70 points.
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 03 Issue: 02 December 2014,Pages No.30- 33
ISSN: 2278-2400
31
 Another business rule is to contact (or investigate) the
applicant over the telephone or Internet. The above two business
rules are exceedingly effective, but human resource intensive.
 For rely less on human resources, common business rule is to
match an application's identity number, address, or phone
number against exterior databases. That was convenient, but the
public telephone and address handbooks, semi-public voters'
register, and credit history data can have data quality misgivings
of accuracy, completeness, and timeliness.
 Another existing defence knew scam matching. Here, known
scams are complete applications that were confirmed to have the
intent to descam and usually periodically recorded into a
blacklist. Afterward, the current applications are matched
against the blacklist.
 That has the benefit and clarity of hindsight because patterns
often reiteration themselves. However, there are two main
problems in using known scams. First, they are untimely due to
long time delays, in days or months, for scam to reveal itself, and
be chronicled and recorded.
Drawbacks of an Existing System
 For rely less on human resources, common business rule is
to match an application's identity n umber, address, or phone
number against exterior databases.
 Not Efficient process for crime detection.
 Security level is low.
 Not Cost Effective.
III. PROPOSED SYSTEM
 If The main fact-based of this research is to realize flexibility
by adding two new, real time, data mining-based layers to
complement the two existing non data mining layers discussed in
the paper.
 The main contribution of this paper is the demonstration of
flexibility, with adaptively and quality data in real-time data
mining-based discovery algorithms. The first new layer is
Communal Detection (CD): the white list-oriented approach on a
fixed set of attributes. To complement and strength CD.
 The second new layer is Spike Detection (SD): the
attribute-oriented approach on a variable-size set of attributes.
The second involvement is the significant extension of
knowledge in credit application scam detection because
publications in this area are rare.
 The last involvement is the recommendation of credit
application scam detection as one of the many solutions to
identity lawbreaking. Being at the first stage of the credit life
cycle, credit application scam detection also prevents some
credit transactional scam, gives an overview of related work in
credit application scam detection and other domains.
 Before the testing and interpretation of CD and SD results,
final Section considers the legal and ethical responsibility of
handling application data and describes the data, evaluation
measures, and experimental design.
Advantages of Proposed System
 Accuracy
 Find scam applications very closely and accuracy.
IV. SYSTEM ARCHITECTURE
A system architecture or systems architecture is the conceptual
model that defines the structure, behavior, and more views of a
system. It serves a model to describe/analyze a system.
Fig 1.System Architecture for Creating White List.
Fig 2System Architecture for Checking Efficiency of the
System
V. MODULE DESCRIPTION
a. Multi-attribute link.
b. Communal relationship.
c. White list creation.
d. Spike detection.
e. Identifying scam lent application & evaluation
Measures.
f. Performance of cd-sd.
Multi-attribute Link
This module is used to find the multi attribute link between
current application and applications in the data set. For
calculating this multi attribute link, string similarity measure
Jaro-Winkler used.
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 03 Issue: 02 December 2014,Pages No.30- 33
ISSN: 2278-2400
32
Input / Output of the Module
Input: Name, Surname, Address, State, Driving License,
Passport_ID, Organization Name (string), DOB, Date
received-date, Postcode, Home Number (integer).
Output: Multi attribute link
Steps:
1. Set the initial values to string similarity threshold, attribute
threshold and number of link types
2. Get the inputs from user
 Calculate single attribute match between the current
application and applications in data set by comparing its
attributes. Computing similarity measure does it. The match
is set to 1 if it exceeds string similarity threshold, otherwise
set to 0
 For string similarity measure, use Jaro-Winkler method.
Jaro distance (dj):
dj = (1/3) (m/s1 + m/s2 + (m - t) / m)
m - Number of matching characters
t - Half the number of transpositions
s1 - length of string1
s2 - length of string2
Jaro-Winkler distance (dw):
dw = dj + (p (1- dj)/10)
p - Length of common prefix
 Calculate multi-attribute link by comparing all the attributes
between current application and applications in dataset, so that it
yields multi attribute link such as 00111110, 11111110 and so.
A.Communal Relationship
This module is used to find the communal relationship between
the incoming application and the applications in dataset. The
communal relationships such as Twins, Brothers, Spouse,
Neighbors, House mates, Office mates, Duplicates can found.
Input / Output of the Module:
Input: Multi-attribute link
Output: Communal Relationship
Module Description
Steps:
1. Get the multi-attribute link
2. Based on the multi attribute link, find the communal
relationship as Twins/Brothers/..Etc
B.White List Creation
Input / Output of the Module
Input: Multi attribute link - integer
Output: White list
Module Description
Steps:
1. Calculate Single link score by comparing Multi attribute link
against sorted link type in the white list to calculate single link
score.
 If link type is available for the match in white list,
Sk = Ek * (1/N) * Wk
Sk - single link score
Ek - single attribute match
N - Number of attributes
Wk - weight of the zth link type
 If link type is not available for the match in white list,
Sk = Ek * (1/N)
2. Calculate Single link average previous score by
taking ratio of suspicion score and number of links
SSk
Bk = -------- Ok
Bk - Single link average previous score
SSk - suspicion score
Ok - Number of out links
3. Calculate suspicion score using link score and its previous
score
SSk= SK + Bk
4. Then update the white list.
C.Spike Detection
Input / Output of the Module
Input: Current application, string similarity threshold,
exponential smoothing factor – integer
Output: Suspicion score, Attribute weight - integer
Module Description
Steps:
1. If there is a match between applications, calculate single
attribute match as in multi attribute link module
In case of non match,
Ek St = ------------------- K
St - single step scaled count
Ek - single attribute match
K - Number of values
2. Calculate every current application’s score as follows
Ck = St * Wk
Ck - Current application score
Wk - attribute weight
3. SD attributes selection: Select the attributes for the Spike
Detection suspicion Score
Integrated Intelligent Research(IIR) International Journal of Business Intelligent
Volume: 03 Issue: 02 December 2014,Pages No.30- 33
ISSN: 2278-2400
33
4. CD attribute weights change: Change the attribute weight
Ck New attribute weight = -------------- Wk
in white list
D. Identifying Scam lent Application & Evaluation Measures
Input / Output of the Module
Input: Suspicion score, exact positive, exact
Negative - integer
Output: Scam lent application
Precision, Recall, F measure - integer
Module Description
Steps:
1. Get the suspicion score from spike detection
2. Find the higher suspicion score
3. Return the application as scam lent application which have
higher suspicion score
4. Calculate precision, recall and F-measure
E.Performance Of CD-SD
Input / Output of the Module
Input: Precision, recall measures of CD-SD and Naive Bayesian,
SVM
Output: Performance of CD-SD
Module Description
Steps:
1. Get the precision, recall measures for CD-SD and other data
2. Get the precision, recall measures for CD-SD and other data
mining techniques
3. Compare the measures among them
4. Show how much CD-SD is efficient than others
VI. CONCLUSION
The implementation of Communal Detection algorithm is
practical because this algorithm designed for use to complement
the existing detection system. The algorithm can search with a
larger moving window number of link types in the white list, and
a number of attributes. Communal Detection updated after every
period; it is not a true evaluation as the fakes do not get a chance
to react and change their strategy in response to Communal
Detection as would occur if they deployed in real life. The main
focus of this paper is Identity Scam Detection in Credit card
application. It has documented the development and evaluation
in the data mining layers of defense for a real-time credit
application scam detection system. It produces some few
concepts which increase the detection system's effectiveness.
These concepts are adaptive, which accounts for changing scam
and legal behavior and quality data, which deals real-time
removal of data errors. Finally, the last contribution is the
recommendation of credit application scam detection is one of
the many solutions to identity scam.Comparison of the incoming
application with the applications in the moving window of the
data set for generating links for attributes consumes lot of time
when the window size is large. Parallelizing the code to run on
multicore architectures would drastically reduce the execution
time of the paper.
REFERENCES
[1] Anthony Brabazon, Jane Cahill, Peter Keenan & Daniel Walsh,
“Identifying Online Credit Card Fraud using Artificial Immune Systems”,
IEEE 2010.
[2] Brause.R, Langsdorf.T, Hepp.M: Credit Card Fraud Detection by
Adaptive Neural Data Mining, J.W.Goethe- University, Comp. Sc. Dep.,
Report 7/99, Frankfurt, Germany (1999).
[3] Chao-Tung Yang, Tzu-Chieh Chang, Hsien-Yi Wang, William C.C.Chu,
Chih-Hung Chang, “Performance comparison with open MP
parallelization for multi-core systems”, Ninth IEEE International
Symposium on Parallel and Distributed Processing with Applications,
IEEE, 2011.
[4] Clifton Phua, Kate Smith, Vincent Lee & Ross Gayler, “Resilient Identity
Crime Detection”, IEEE Transactions on Knowledge & Data
Engineering”, IEEE Transactions On Knowledge and Data Engineering,
March 2012.
[5] Clifton Phua, Kate Smith, & Ross Gayler, “Resilient Identity Crime
Detection”,IEEE Transactions on Knowledge & Data Engineering”,
IEEE Transactions On Knowledge And Data Engineering, March
2012,Vol.24,No.3,pp 533-546
[6] Ghosh.S, Reilly.D.L: Credit Card Fraud Detection with a
Neural-Network; Proc. 27th Annual Hawaii Int. Conf. on System
Science, IEEE Comp. Soc. Press, Vol.3, pp.621-630 (1994).
[7] Hamdi.M, Mine Isik, Ekram Duman, Tugba Cevik, “Improving a credit
card fraud detection system using Genetic algorithm”, International
Conference on Networking and Information Technology, IEEE 2010.
[8] John Talburt and Chia-Chu Chiang, “Attributed Identity Resolution for
Fraud Detection and Prevention”, IEEE 2009.
[9] Linda Delamaire, Hussein Abdou, John Pointon, “Credit card fraud and
detection techniques: A review”, Banks and Bank Systems, 2009.
[10] Mikhail Bilenko, Raymond Mooney, ”Adaptive Name Matching in
Information Integration” IEEE Intelligent systems, IEEE 2003.
[11] Neville.J, Simsek.O, Jensen.D, Komoroske.J, Palmer.K, and Goldberg.H,
“Using Relational Knowledge Discovery to Prevent Securities Fraud,”
Proc. 11th ACM SIGKDD Int’l Conf. Knowledge Discovery in Data
Mining (KDD ’05), 2005.
[12] Smith.L.A, Bull.J.M, Obdrzalek.J, “A parallel Java Grande benchmark
suite”, ACM/IEEE Conference, 2001.
[13] Sherly K.K, Nedunchezhian, “Boat adaptive credit card fraud detection
system”, IEEE 2010.
[14] Sahin.Y and Duman.E, “Detecting Credit Card Fraud by Artificial Neural
Network and Logistic Regression”, IEEE 2011.
[15] Tatsuya Minegishi, Ayahiko Niimi, “Proposal of Credit Card Fraudulent
Use Detection by Online-type Decision Tree Construction and
Verification of Generality”, International Journal for Information
Security Research (IJISR),December 2011, Vol-1, Issue 4.
[16] William Yancey.E, “An Adaptive String Comparator for Record Linkage”,
research report series, U.S. Bureau of the Census, 2004.
[17] Wen-Fang YU, Na Wang, “Research on Credit Card Fraud Detection
Model Based on Distance Sum”, International Joint Conference on
Artificial Intelligence, 2009, pp 353-356.
[18] Wong.W, Moore. A, Cooper.G, and Wagner.M, “Bayesian Network
Anomaly Pattern Detection for Detecting Disease Outbreaks,” Proc. 20th
Int’l Conf. Machine Learning (ICML ’03), pp. 808- 815, 2003.

More Related Content

Similar to SCAM Detection in Credit Card Application

Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyIJMER
 
Claims Fraud Network Analysis
Claims Fraud Network AnalysisClaims Fraud Network Analysis
Claims Fraud Network AnalysisCogitate.us
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET Journal
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudGeo Coelho
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A ReviewIRJET Journal
 
Problem Reduction in Online Payment System Using Hybrid Model
Problem Reduction in Online Payment System Using Hybrid ModelProblem Reduction in Online Payment System Using Hybrid Model
Problem Reduction in Online Payment System Using Hybrid ModelIJMIT JOURNAL
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionIRJET Journal
 
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET Journal
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesIJSRD
 
Fraud Detection using Data Mining Project
Fraud Detection using Data Mining ProjectFraud Detection using Data Mining Project
Fraud Detection using Data Mining ProjectAlbert Kennedy III
 
Prevention of doctor shopping
Prevention of doctor shoppingPrevention of doctor shopping
Prevention of doctor shoppingDoug Brockway
 

Similar to SCAM Detection in Credit Card Application (20)

Credit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptxCredit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptx
 
Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A Survey
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
 
Claims Fraud Network Analysis
Claims Fraud Network AnalysisClaims Fraud Network Analysis
Claims Fraud Network Analysis
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
H029044050
H029044050H029044050
H029044050
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
Online Fraud Detection- A Review
Online Fraud Detection- A ReviewOnline Fraud Detection- A Review
Online Fraud Detection- A Review
 
Problem Reduction in Online Payment System Using Hybrid Model
Problem Reduction in Online Payment System Using Hybrid ModelProblem Reduction in Online Payment System Using Hybrid Model
Problem Reduction in Online Payment System Using Hybrid Model
 
West2016
West2016West2016
West2016
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud Detection
 
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
 
DRAFT 2 RP.docx
DRAFT 2 RP.docxDRAFT 2 RP.docx
DRAFT 2 RP.docx
 
Fraud Detection using Data Mining Project
Fraud Detection using Data Mining ProjectFraud Detection using Data Mining Project
Fraud Detection using Data Mining Project
 
Prevention of doctor shopping
Prevention of doctor shoppingPrevention of doctor shopping
Prevention of doctor shopping
 

More from ijcnes

A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...ijcnes
 
Economic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian EconomyEconomic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian Economyijcnes
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...ijcnes
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...ijcnes
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Omanijcnes
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage Systemijcnes
 
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniquesijcnes
 
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...ijcnes
 
Feature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image RetrievalFeature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image Retrievalijcnes
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...ijcnes
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...ijcnes
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehiclesijcnes
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networksijcnes
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorizationijcnes
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniquesijcnes
 
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...ijcnes
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNijcnes
 
Semantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based SystemSemantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based Systemijcnes
 

More from ijcnes (20)

A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...
 
Economic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian EconomyEconomic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian Economy
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Oman
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage System
 
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
 
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
 
Feature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image RetrievalFeature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image Retrieval
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networks
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorization
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniques
 
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSN
 
Semantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based SystemSemantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based System
 

Recently uploaded

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 

Recently uploaded (20)

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 

SCAM Detection in Credit Card Application

  • 1. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 03 Issue: 02 December 2014,Pages No.30- 33 ISSN: 2278-2400 30 SCAM Detection in Credit Card Application M.Sanjeeevkumar1 ,A.Kamakshi2 1 Student, Department of CSE, Jayam College of Engineering & Technology, DharmapuriTamilnadu, India 2 Asst. Professor, Department of CSE, Jayam College of Engineering & Technology, Dharmapuri, Tamilnadu, India Email: sanjeevkumarmecse@gmail.com , dhivya.kamakshi@gmail.com Abstract-Identity crime is well known, prevalent, and costly, and credit application scam is a specific case of identity crime. The existing no data mining recognition system of business rules and scorecards and known scam matching have confines. To address these confines and combat identity crime in real time, this paper proposes a new multilayered discovery system complemented with two additional layers: communal detection (CD) and spike detection (SD). CD finds real social relationships to reduce the suspicion score, and is tamper unaffected to synthetic social relationships. It is the whitelist-oriented methodology on a fixed set of attributes. SD finds spikes in false to increase the suspicion score, and is probe-unaffected for elements. It is the attribute-oriented approach on a variable-size set of elements. Together, CD and SD can detect more types of attacks, better account for changing legal activities, and remove the redundant elements. Experiments were carried out on CD and SD with several million real credit applications. Results on the data support the suggestion that successful credit application scam patterns are sudden and exhibit sharp spikes in false. Although this research is specific to credit application scam recognition, the concept of flexibility, together with adaptively and quality data discussed in the paper, are general to the model, implementation, and evaluation of all recognition systems. Keywords— Data mining-based scam detection, security, data stream mining, anomaly detection. I. INTRODUCTION Identity Scam Detection is the process of detecting the scam that uses a false identity for obtaining goods or services. This paper detects the application scam that arises in the credit card industry. This paper increases the effectiveness of the existing system. This paper aims at identifying application scam by achieving flexibility by adding data mining-based layers. This paper makes use of these powerful layers to identify the identity scam named application scam. This paper consists mainly of two parts i.e. identifying scam lent application and comparing the performance of these data mining based layers. Credit-card-based purchases categorized into two types: 1) physical card and 2) virtual card. In a physical-card based purchase, the card defender presents his card physically to a merchant for making payment. To carry out scam lent transactions in this purchase, an attacker has to steal the credit card. If the card defender does not realize the loss of card, it can lead to a plentiful financial loss to the credit card company. In the second purchase, only some important information about the card (card number, expiration date, secure code) is mandatory to make the payment. Such purchases are customarily done on the Internet or over the telephone. To commit scam in these types of purchases, a scamster simply needs to know the card details. Most of the time, the genuine card defender is not aware that someone else has seen or stolen his card information. The only way to detect this scam is to analyze the spending patterns on every card and to figure out any inconsistency with respect to the "usual" spending patterns. Scam detection based on the analysis of existing purchase data of the card defender is a promising way to reduce the rate of successful credit card scams. This paper is the continuity of existing model. Application scam is when someone applies for a credit card with false information. For detect application scam, the solution is to implement a scam system that allows identifying suspicious applications. For detect application scam, two different situations have to be distinguished: when applications come from the same individual with the same details, the so-called duplicates, and when applications come from different individuals with similar details, the so called identity fakes. In most banks, to be eligible for a credit card, applicants need to complete an application form. This application form is mandatory except for social fields. The information mandatory includes identification information, location information, contact information, confidential information and additional information. Recurrent information available would be for identification purposes, such as the full name and the date of birth. The applicant would inform the bank about his/her location details: the address, the postal code, the city and the country. The bank would also ask for contact details, such as e-mail address, land-line and mobile phone numbers. Confidential information will be the password. In addition, the gender will be given. All those characteristics may use while searching for duplicates.As in identity scam, credit application scam has reached a critical mass of fakes who are exceedingly experienced, organized, and high-tech. Their visible patterns can be different for each other and constantly change. They are relentless, due to the high financial rewards, and the risk and endeavor involved are minimal. Based on anecdotal reflections of experienced credit application investigators, fakes can use software automation to manipulate particular values within the application and increase frequency of successful values. II. EXISTING SYSTEM  There are non data mining layers of defence to protect against credit application scam, each with its unique strengths and weaknesses. The first existing defence made up of business rules and scorecards.  In Australia, one business rule is the hundred-point physical identity check test which requires the applicant to provide sufficient point-weighted identity documents face-to-face. They must hang together to at tiniest 100 points, where a passport is worth 70 points.
  • 2. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 03 Issue: 02 December 2014,Pages No.30- 33 ISSN: 2278-2400 31  Another business rule is to contact (or investigate) the applicant over the telephone or Internet. The above two business rules are exceedingly effective, but human resource intensive.  For rely less on human resources, common business rule is to match an application's identity number, address, or phone number against exterior databases. That was convenient, but the public telephone and address handbooks, semi-public voters' register, and credit history data can have data quality misgivings of accuracy, completeness, and timeliness.  Another existing defence knew scam matching. Here, known scams are complete applications that were confirmed to have the intent to descam and usually periodically recorded into a blacklist. Afterward, the current applications are matched against the blacklist.  That has the benefit and clarity of hindsight because patterns often reiteration themselves. However, there are two main problems in using known scams. First, they are untimely due to long time delays, in days or months, for scam to reveal itself, and be chronicled and recorded. Drawbacks of an Existing System  For rely less on human resources, common business rule is to match an application's identity n umber, address, or phone number against exterior databases.  Not Efficient process for crime detection.  Security level is low.  Not Cost Effective. III. PROPOSED SYSTEM  If The main fact-based of this research is to realize flexibility by adding two new, real time, data mining-based layers to complement the two existing non data mining layers discussed in the paper.  The main contribution of this paper is the demonstration of flexibility, with adaptively and quality data in real-time data mining-based discovery algorithms. The first new layer is Communal Detection (CD): the white list-oriented approach on a fixed set of attributes. To complement and strength CD.  The second new layer is Spike Detection (SD): the attribute-oriented approach on a variable-size set of attributes. The second involvement is the significant extension of knowledge in credit application scam detection because publications in this area are rare.  The last involvement is the recommendation of credit application scam detection as one of the many solutions to identity lawbreaking. Being at the first stage of the credit life cycle, credit application scam detection also prevents some credit transactional scam, gives an overview of related work in credit application scam detection and other domains.  Before the testing and interpretation of CD and SD results, final Section considers the legal and ethical responsibility of handling application data and describes the data, evaluation measures, and experimental design. Advantages of Proposed System  Accuracy  Find scam applications very closely and accuracy. IV. SYSTEM ARCHITECTURE A system architecture or systems architecture is the conceptual model that defines the structure, behavior, and more views of a system. It serves a model to describe/analyze a system. Fig 1.System Architecture for Creating White List. Fig 2System Architecture for Checking Efficiency of the System V. MODULE DESCRIPTION a. Multi-attribute link. b. Communal relationship. c. White list creation. d. Spike detection. e. Identifying scam lent application & evaluation Measures. f. Performance of cd-sd. Multi-attribute Link This module is used to find the multi attribute link between current application and applications in the data set. For calculating this multi attribute link, string similarity measure Jaro-Winkler used.
  • 3. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 03 Issue: 02 December 2014,Pages No.30- 33 ISSN: 2278-2400 32 Input / Output of the Module Input: Name, Surname, Address, State, Driving License, Passport_ID, Organization Name (string), DOB, Date received-date, Postcode, Home Number (integer). Output: Multi attribute link Steps: 1. Set the initial values to string similarity threshold, attribute threshold and number of link types 2. Get the inputs from user  Calculate single attribute match between the current application and applications in data set by comparing its attributes. Computing similarity measure does it. The match is set to 1 if it exceeds string similarity threshold, otherwise set to 0  For string similarity measure, use Jaro-Winkler method. Jaro distance (dj): dj = (1/3) (m/s1 + m/s2 + (m - t) / m) m - Number of matching characters t - Half the number of transpositions s1 - length of string1 s2 - length of string2 Jaro-Winkler distance (dw): dw = dj + (p (1- dj)/10) p - Length of common prefix  Calculate multi-attribute link by comparing all the attributes between current application and applications in dataset, so that it yields multi attribute link such as 00111110, 11111110 and so. A.Communal Relationship This module is used to find the communal relationship between the incoming application and the applications in dataset. The communal relationships such as Twins, Brothers, Spouse, Neighbors, House mates, Office mates, Duplicates can found. Input / Output of the Module: Input: Multi-attribute link Output: Communal Relationship Module Description Steps: 1. Get the multi-attribute link 2. Based on the multi attribute link, find the communal relationship as Twins/Brothers/..Etc B.White List Creation Input / Output of the Module Input: Multi attribute link - integer Output: White list Module Description Steps: 1. Calculate Single link score by comparing Multi attribute link against sorted link type in the white list to calculate single link score.  If link type is available for the match in white list, Sk = Ek * (1/N) * Wk Sk - single link score Ek - single attribute match N - Number of attributes Wk - weight of the zth link type  If link type is not available for the match in white list, Sk = Ek * (1/N) 2. Calculate Single link average previous score by taking ratio of suspicion score and number of links SSk Bk = -------- Ok Bk - Single link average previous score SSk - suspicion score Ok - Number of out links 3. Calculate suspicion score using link score and its previous score SSk= SK + Bk 4. Then update the white list. C.Spike Detection Input / Output of the Module Input: Current application, string similarity threshold, exponential smoothing factor – integer Output: Suspicion score, Attribute weight - integer Module Description Steps: 1. If there is a match between applications, calculate single attribute match as in multi attribute link module In case of non match, Ek St = ------------------- K St - single step scaled count Ek - single attribute match K - Number of values 2. Calculate every current application’s score as follows Ck = St * Wk Ck - Current application score Wk - attribute weight 3. SD attributes selection: Select the attributes for the Spike Detection suspicion Score
  • 4. Integrated Intelligent Research(IIR) International Journal of Business Intelligent Volume: 03 Issue: 02 December 2014,Pages No.30- 33 ISSN: 2278-2400 33 4. CD attribute weights change: Change the attribute weight Ck New attribute weight = -------------- Wk in white list D. Identifying Scam lent Application & Evaluation Measures Input / Output of the Module Input: Suspicion score, exact positive, exact Negative - integer Output: Scam lent application Precision, Recall, F measure - integer Module Description Steps: 1. Get the suspicion score from spike detection 2. Find the higher suspicion score 3. Return the application as scam lent application which have higher suspicion score 4. Calculate precision, recall and F-measure E.Performance Of CD-SD Input / Output of the Module Input: Precision, recall measures of CD-SD and Naive Bayesian, SVM Output: Performance of CD-SD Module Description Steps: 1. Get the precision, recall measures for CD-SD and other data 2. Get the precision, recall measures for CD-SD and other data mining techniques 3. Compare the measures among them 4. Show how much CD-SD is efficient than others VI. CONCLUSION The implementation of Communal Detection algorithm is practical because this algorithm designed for use to complement the existing detection system. The algorithm can search with a larger moving window number of link types in the white list, and a number of attributes. Communal Detection updated after every period; it is not a true evaluation as the fakes do not get a chance to react and change their strategy in response to Communal Detection as would occur if they deployed in real life. The main focus of this paper is Identity Scam Detection in Credit card application. It has documented the development and evaluation in the data mining layers of defense for a real-time credit application scam detection system. It produces some few concepts which increase the detection system's effectiveness. These concepts are adaptive, which accounts for changing scam and legal behavior and quality data, which deals real-time removal of data errors. Finally, the last contribution is the recommendation of credit application scam detection is one of the many solutions to identity scam.Comparison of the incoming application with the applications in the moving window of the data set for generating links for attributes consumes lot of time when the window size is large. Parallelizing the code to run on multicore architectures would drastically reduce the execution time of the paper. REFERENCES [1] Anthony Brabazon, Jane Cahill, Peter Keenan & Daniel Walsh, “Identifying Online Credit Card Fraud using Artificial Immune Systems”, IEEE 2010. [2] Brause.R, Langsdorf.T, Hepp.M: Credit Card Fraud Detection by Adaptive Neural Data Mining, J.W.Goethe- University, Comp. Sc. Dep., Report 7/99, Frankfurt, Germany (1999). [3] Chao-Tung Yang, Tzu-Chieh Chang, Hsien-Yi Wang, William C.C.Chu, Chih-Hung Chang, “Performance comparison with open MP parallelization for multi-core systems”, Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE, 2011. [4] Clifton Phua, Kate Smith, Vincent Lee & Ross Gayler, “Resilient Identity Crime Detection”, IEEE Transactions on Knowledge & Data Engineering”, IEEE Transactions On Knowledge and Data Engineering, March 2012. [5] Clifton Phua, Kate Smith, & Ross Gayler, “Resilient Identity Crime Detection”,IEEE Transactions on Knowledge & Data Engineering”, IEEE Transactions On Knowledge And Data Engineering, March 2012,Vol.24,No.3,pp 533-546 [6] Ghosh.S, Reilly.D.L: Credit Card Fraud Detection with a Neural-Network; Proc. 27th Annual Hawaii Int. Conf. on System Science, IEEE Comp. Soc. Press, Vol.3, pp.621-630 (1994). [7] Hamdi.M, Mine Isik, Ekram Duman, Tugba Cevik, “Improving a credit card fraud detection system using Genetic algorithm”, International Conference on Networking and Information Technology, IEEE 2010. [8] John Talburt and Chia-Chu Chiang, “Attributed Identity Resolution for Fraud Detection and Prevention”, IEEE 2009. [9] Linda Delamaire, Hussein Abdou, John Pointon, “Credit card fraud and detection techniques: A review”, Banks and Bank Systems, 2009. [10] Mikhail Bilenko, Raymond Mooney, ”Adaptive Name Matching in Information Integration” IEEE Intelligent systems, IEEE 2003. [11] Neville.J, Simsek.O, Jensen.D, Komoroske.J, Palmer.K, and Goldberg.H, “Using Relational Knowledge Discovery to Prevent Securities Fraud,” Proc. 11th ACM SIGKDD Int’l Conf. Knowledge Discovery in Data Mining (KDD ’05), 2005. [12] Smith.L.A, Bull.J.M, Obdrzalek.J, “A parallel Java Grande benchmark suite”, ACM/IEEE Conference, 2001. [13] Sherly K.K, Nedunchezhian, “Boat adaptive credit card fraud detection system”, IEEE 2010. [14] Sahin.Y and Duman.E, “Detecting Credit Card Fraud by Artificial Neural Network and Logistic Regression”, IEEE 2011. [15] Tatsuya Minegishi, Ayahiko Niimi, “Proposal of Credit Card Fraudulent Use Detection by Online-type Decision Tree Construction and Verification of Generality”, International Journal for Information Security Research (IJISR),December 2011, Vol-1, Issue 4. [16] William Yancey.E, “An Adaptive String Comparator for Record Linkage”, research report series, U.S. Bureau of the Census, 2004. [17] Wen-Fang YU, Na Wang, “Research on Credit Card Fraud Detection Model Based on Distance Sum”, International Joint Conference on Artificial Intelligence, 2009, pp 353-356. [18] Wong.W, Moore. A, Cooper.G, and Wagner.M, “Bayesian Network Anomaly Pattern Detection for Detecting Disease Outbreaks,” Proc. 20th Int’l Conf. Machine Learning (ICML ’03), pp. 808- 815, 2003.