SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD30688 | Volume – 4 | Issue – 3 | March-April 2020 Page 801
A Study on Credit Card Fraud Detection using Machine Learning
Ajayi Kemi Patience, Dr. Lakshmi J. V. N
Department of Masters of Computer Applications,
JAIN (Deemed-to-be University), Bengaluru, Karnataka, India
ABSTRACT
Due to the high level of growth in each number of transactions done using
credit card has led to high rise in fraudulent activities. Fraud is one of the
major issues related to credit card business, since each individual do more of
offline or online purchase of product via internet there is need to developed a
secured approach of detecting if the credit card been used is a fraudulent
transaction or not. Pattern involves in the fraud detection hastobere-analyze
to change from reactive approach to a proactive approach. In this paper, our
objectives are to detect at least 95% of fraudulent activities using machine
learning to deployed anomaly detection system such as logistic regression, k-
nearest neighbor and support vector machine algorithm.
KEYWORDS:CreditCard, FraudDetection, MachineLearning, LogisticRegression,
K-Nearest Neighbor, Support Vector Machine Algorithm
How to cite this paper: Ajayi Kemi
Patience | Dr. Lakshmi J. V. N "A Study on
Credit Card Fraud Detection using
Machine Learning" Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-3, April 2020,
pp.801-804, URL:
www.ijtsrd.com/papers/ijtsrd30688.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
1. INTRODUCTION
In recent years banking sector as be paramount among
services offered to customer by its bank which involves in
credit card facility that is offered. However, credit card
issues as increase drastically in the aspect of security threat
such as, theft of credit card used in fraudulent transaction or
using method of hacking people credit card. Early detection
of credit card improves and enable protection of each
transaction done, database size constantly changing which
are vital information needs to develop effectively algorithm
to help analyze each activity involves, the data stream
analysis can be done.
Fraud is an unauthorized use of account that belong to
someone that is not the owner of the account. Fraud
detection involves in various method used to prevent
activities of unauthorized usage of credit card by using
detection methodology. A fraud detection system (FDS)
should effectively and efficiently detect fraudulent used of
credit card transaction. The theory increditcarddetectionis
either fraudulent transaction or legitimate transaction, our
propose system model will predict fraud activities and
reduce false positive and false negative hypothesis.
However, the common use of online shopping and
ecommerce by entering the Card verification value (CVV),
customer credit card passwords and vital informationare at
risk. The traditional method ofdetectingfraudulent behavior
is replace with online fraud detection software using
machine leaning algorithm. Method used are fraudulent
pattern and prediction of the transaction. machine learning
has successfully rate of fraud detecting using supervised
algorithm, unsupervised algorithm and reinforcement. The
existing system uses cluster analysis and artificial neural
networks on fraud detection in this paper is to proposed
credit card fraud detection system using supervised
algorithm.
Fig. 1: Fraud Detection Process
IJTSRD30688
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30688 | Volume – 4 | Issue – 3 | March-April 2020 Page 802
2. RELATED WORK
1. “Machine Learning Approaches for Credit Card
Fraud Detection”. “S. Venkata Suryanarayana, G.N.
Balaji G. Venkateswara Rao”.
This paper proposes four algorithms in which are Naïve
Bayes, Decision tree, K-Nearest Neighbour and support
vector machine algorithm. The model wastrainedandtested
using Waikato environmentforknowledgeanalysis(WEKA).
It was developed in java by university of Waikato in New
Zealand, the approach ensures that all data that was
represented once as attest data and multiple trainingdata to
produce accurate output.
2. “Detection and Prediction of Credit Card
Transaction Using Machine Learning”.
“Kaithekuzhical Leena Kurian and Dr. Ajeet
Chikkamannur”.
In this study, the classification model on logistic regression
and random forest are developed and applied to fraud
detection. Its techniques suggest a well-suitedsystemmodel
that prove that the predicted fraudulent transaction is
genuine. Its main objective is to detect and predict various
credit card transaction used in an unauthorised way. It also
states the limitation of random forest is due to multiple tree
in forest which enable the algorithm to be slow.
3. “Credit Card Fraud Detection Using Machine
Learning and Data Science”. “Aditya Saini, Swarna
Deep Sarkar, Shadab Ahmed, S P Maniraj”.
This research paper focus on analysis and pre-processing of
each data set by deployinganomalydetectionalgorithmsuch
as local outlier factor and isolation forest algorithm. The
paper suggests the approach ofJupyter notebook platform to
make a program in python, this program can be executed in
cloud using google collab platform which support all python
notebook files.
4. “Machine Learning Based Credit Card Analysis
Modelling, Detection, And Deployment”.
“Shivakumar Goel And Hitesh Patil”
The study represents how the combination of different
clustering and machine learning algorithm can be used to
developed a very large scale to detect the fraudulent
transaction and use to ensure that credibilityofthepayment
system. This paper analyses the factor mapping use to
connect different factor that mainly associated with credit
card. After then pattern matching model using clustering
algorithm and lastly prediction model using artificial neural
network (ANN).
5. “Credit Card Fraud Detection Using Random Forest”
“Devi Meenakshi. B, Janani. B, Gayathri .S , Mrs
Indira N”
There is a phenomenal growth in the number of credit card
transaction, the paper applies the use of random forest
algorithm for classification of credit card dataset. The
algorithm estimates the general error and to be resistant to
over fitting, the propose system rank the important of
variable in a regression or classification problem. Random
forest is an advanced version of decision tree, the study
explains the tree de-correlated and prune thetree byfixinga
stopping criterion for node split.
3. METHODOLOGY
Fraud detection is a classification task usetopredictfraudor
legist transaction. this approach uses machine learning
algorithm to detect anomaly transaction which are logistic
regression, k-nearest neighbor, support vector machine
algorithm. The performance of the algorithm is compare
based on specificity, accuracy and precision. The diagram
below represents the system architecture.
Fig. 2: System Architecture
3.1. CLASSIFICATION TECHNIQUES
1. Logistic regression
Logistic regression is a supervised classification algorithm
based on the decision that brought into the pictures. The
aspect of regression is relying on classification of problems.
It used dichotomous (binary) variablessuchasfemale/male
or true/ false, there are two values labeled“0”and“1”.Italso
estimates the relationship between dependent variables to
one or more independent variables using sigmoid function
also called logistic function. In classification based oflogistic
regression can only take discrete values for a set of
elements(or features) X & Y, it dealswiththeargumentusing
the threshold which are, high recall/ low precision this
reduce the total number of false negative without reducing
the total number of false positive while low recall/high
precision this reduce the total number of false positive
without reducing number of false positive. Logistic
regression categories are based on binomial, ordinal and
multinomial.
Application of logistic regression
logistic regression helps in medical field, it predicts the
probability of risk of patient in developing a disease. In
marketing logistic regression help the customer purchase
property and it will predict if the value of the property will
rise or not.
2. K-Nearest Neighbor (KNN)
K-nearest neighbor is a machine learning algorithm that is
used by regression and classification problem also the
output depends if (KNN) is used for either regression or
classification. Some examples are lazy learning, instance
base learning. Each function is locally and all calculation is
delay until each of the function is evaluated.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30688 | Volume – 4 | Issue – 3 | March-April 2020 Page 803
KNN performance is influence using three factors:
Number of neighbor use to arrange each new sample.
Distance metric used to discover the nearest neighbor.
Distance act use to extract a classified k-nearest
neighbor.
Some of the dataset is generated for training set use by the
algorithm but no exact training step is followed.
Application of K-Nearest Neighbor
K-nearest neighbor is used in terms of finance it includes
currency exchange rate, stock market planning investment
strategies. It’s also used for medical predictionforanalysisof
micro array gene (KNN) is mostlypopularalgorithmthat can
easily categories text or text mining
3. Support vector machine
Support vector machine it analyzes each data used for
regression and classification. It effectively uses a non-linear
classification called kernel trick.
The concept of SVM involve are:
Margin it is the gap along two lines on the short
distance point of dissimilar classes.
Support vector data point that areshortdistancetothe
hyperplane is called support vector.
Hyperplane it is a decision space which is along a set of
objects having dissimilar classes.
Outline by separate hyperplane if given a training data the
output from the algorithm is optimal hyperplane.
Application of Support vector machine
Support vector machine can recognize handwritten
characters and help in hypertextcategoriestoreducethe use
of hand label training. (SVM) algorithm canclassifiedimages
and also used by scientist and biologist.
4. EXPERIMENTS ANALYSIS AND COMPARISON
Fig. 3: System Analysis
Dataset
Firstly, our dataset was obtained from Kaggle in order to
import the dataset and convert the data into data frames
format. Our dataset has 12 attributes features placed in the
dataset that was obtained and do random sampling of each
data.
Training and testing data
Testing is done on each dataset that was provided after
training process occur. Giving 70% data training and
remaining 30% testing dataset, the outcome of test will then
compare the algorithm with the accuracy and performance
of each transaction.
Applying algorithm
We demonstrate the performanceofeachalgorithmmention
above. The following classification of algorithm use to train
and test dataset, the metricsusesconfusionmatric,precision
and recall score.
A. logistic regression
The performance of logisticregressionisdescribedasbelow:
Cross validation mean score of logistic regression: 97.2%
Model accuracy 97%
Confusion matrix
[273 5]
[4 42]
Table 1: Classification report for logistic regression:
B. K- nearest neighbor
The performance of K- nearest neighbor is describe as
below:
Cross validation mean score of K-Nearest Neighbor: 96.5%
Model accuracy 97%
Confusion matrix
[272 5]
[5 42]
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30688 | Volume – 4 | Issue – 3 | March-April 2020 Page 804
Table 2: Classification report for K- nearest neighbor
C. Support vector machine
The performance of Support vector machine is described as
below:
Cross validation meanscore ofSupportvectormachine:98%
Model accuracy 98%
Confusion matrix
[276 7]
[1 40]
Table 3: Classification report for Support vector
machine:
Fig. 4: ROC Curve for all the three models.
5. FUTURE SCOPE
This project enables us to analyze using logistic regression,
k-nearest neighbor, support vector machine algorithm for
credit card fraud detection technique. In the further
enhancement of the project we can use neural network with
combination of Naïve-Bayes may help to detect anomaly
behavior in fraud detection.
6. CONCLUSION
Credit card monitoring is an essential task for merchant
bank which involve the customer anditsbank,effective need
for better improvement by using the combination of one or
more algorithm. This paper has explained in detail the
involvement of machine learning in use for fraud detection
alongside with its algorithm. Analysis and comparisonofthe
three algorithm and also enumerate the various application
of each algorithm.
REFERENCE
[1] “Machine learning approaches for credit card fraud
detection”. “S. Venkata Suryanarayana, G. N. Balaji G.
Venkateswara Rao”. International journal of
engineering and technology (IJET) 7(2) PP. 917-920
(2018).
[2] “Detection and prediction of credit card transaction
using machine learning”. “Kaithekuzhical Leena Kurian
and Dr. Ajeet Chikkamannur”. International journal of
engineering science and research technology(IJESRT):
8(3) ISSN: 277-9655 (2019).
[3] “Credit card fraud detection using machine learning
and data science”. “Aditya Saini, Swarna Deep Sarkar,
Shadab Ahmed, S P Maniraj”. International journal of
engineering research and technology (IJERT) vol:8
issue 09 ISSN: 2278-0181(2019).
[4] “Machine learning based credit card analysis
modelling, detection, and deployment”. “Shivkumar
Goel and Hitesh Patil” International journal of
advanced research (IJAR) ISSN: 2320-5407 (2017).
[5] “Credit card fraud detection using Random forest”
“Devi Meenakshi. B, Janani. B, Gayathri.S,MrsIndira.N”
International research journal of engineering and
technology (IRJET) VOL. 06 issue: 03 ISSN 2395-0072.
(2019)
[6] “Detecting Credit Card Fraud by Decision Trees and
Support Vector Machines”. Hong Kong, China: The
International Multi Conference of Engineers and
Computer Scientists. Sahin, Y., & Duman, E. (2011).
[7] “A Comparative Study of Credit Card Fraud Detection
Using Machine Learning for United Kingdom Dataset”.
“V. Sandeep, T. Supriya, P. Hiranya, Dr.M.SUJATHA”
International Journal of Computer Science and
Information Security (IJCSIS), Vol.17,No.9,September
(2019).
[8] “Credit card fraud detection using anti-K-Nearest
Neighbour algorithm” by Venkata Ganji,Siva Naga
Prasad Mannem International Journal on Computer
Science and Engineering(IJCSE), Vol.4 No. 06 June(
2015).

More Related Content

What's hot

Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
kalpesh1908
 

What's hot (20)

Credit card fraud detection using python machine learning
Credit card fraud detection using python machine learningCredit card fraud detection using python machine learning
Credit card fraud detection using python machine learning
 
Credit card fraud dection
Credit card fraud dectionCredit card fraud dection
Credit card fraud dection
 
Credit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning AlgorithmsCredit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning Algorithms
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Fraud detection ML
Fraud detection MLFraud detection ML
Fraud detection ML
 
How to identify credit card fraud
How to identify credit card fraudHow to identify credit card fraud
How to identify credit card fraud
 
Credit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
Credit Card Fraud Detection Using Unsupervised Machine Learning AlgorithmsCredit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
Credit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
 
Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)
 
Is Machine learning useful for Fraud Prevention?
Is Machine learning useful for Fraud Prevention?Is Machine learning useful for Fraud Prevention?
Is Machine learning useful for Fraud Prevention?
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)
 
credit card fraud detection
credit card fraud detectioncredit card fraud detection
credit card fraud detection
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Credit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksCredit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In Databricks
 
Credit card payment_fraud_detection
Credit card payment_fraud_detectionCredit card payment_fraud_detection
Credit card payment_fraud_detection
 
CREDIT_CARD.ppt
CREDIT_CARD.pptCREDIT_CARD.ppt
CREDIT_CARD.ppt
 
Comparative study of various approaches for transaction Fraud Detection using...
Comparative study of various approaches for transaction Fraud Detection using...Comparative study of various approaches for transaction Fraud Detection using...
Comparative study of various approaches for transaction Fraud Detection using...
 
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Machine learning
Machine learning Machine learning
Machine learning
 

Similar to A Study on Credit Card Fraud Detection using Machine Learning

Credit Card Fraud Detection Using Hybrid Machine Learning Algorithm
Credit Card Fraud Detection Using Hybrid Machine Learning AlgorithmCredit Card Fraud Detection Using Hybrid Machine Learning Algorithm
Credit Card Fraud Detection Using Hybrid Machine Learning Algorithm
ijtsrd
 
credit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractcredit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstract
Venkat Projects
 

Similar to A Study on Credit Card Fraud Detection using Machine Learning (20)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detection
 
IRJET- Credit Card Fraud Detection using Random Forest
IRJET-  	  Credit Card Fraud Detection using Random ForestIRJET-  	  Credit Card Fraud Detection using Random Forest
IRJET- Credit Card Fraud Detection using Random Forest
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
 
MACHINE LEARNING ALGORITHMS FOR CREDIT CARD FRAUD DETECTION
MACHINE LEARNING ALGORITHMS FOR CREDIT CARD FRAUD DETECTIONMACHINE LEARNING ALGORITHMS FOR CREDIT CARD FRAUD DETECTION
MACHINE LEARNING ALGORITHMS FOR CREDIT CARD FRAUD DETECTION
 
Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A Survey
 
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud Detection
 
CREDIT CARD FRAUD DETECTION AND AUTHENTICATION SYSTEM USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION AND AUTHENTICATION SYSTEM USING MACHINE LEARNINGCREDIT CARD FRAUD DETECTION AND AUTHENTICATION SYSTEM USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION AND AUTHENTICATION SYSTEM USING MACHINE LEARNING
 
Online Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningOnline Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine Learning
 
IRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud DetectionIRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud Detection
 
Credit Card Fraud Detection Using Hybrid Machine Learning Algorithm
Credit Card Fraud Detection Using Hybrid Machine Learning AlgorithmCredit Card Fraud Detection Using Hybrid Machine Learning Algorithm
Credit Card Fraud Detection Using Hybrid Machine Learning Algorithm
 
A rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detectionA rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detection
 
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNINGCREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
 
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
 
credit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractcredit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstract
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 

A Study on Credit Card Fraud Detection using Machine Learning

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD30688 | Volume – 4 | Issue – 3 | March-April 2020 Page 801 A Study on Credit Card Fraud Detection using Machine Learning Ajayi Kemi Patience, Dr. Lakshmi J. V. N Department of Masters of Computer Applications, JAIN (Deemed-to-be University), Bengaluru, Karnataka, India ABSTRACT Due to the high level of growth in each number of transactions done using credit card has led to high rise in fraudulent activities. Fraud is one of the major issues related to credit card business, since each individual do more of offline or online purchase of product via internet there is need to developed a secured approach of detecting if the credit card been used is a fraudulent transaction or not. Pattern involves in the fraud detection hastobere-analyze to change from reactive approach to a proactive approach. In this paper, our objectives are to detect at least 95% of fraudulent activities using machine learning to deployed anomaly detection system such as logistic regression, k- nearest neighbor and support vector machine algorithm. KEYWORDS:CreditCard, FraudDetection, MachineLearning, LogisticRegression, K-Nearest Neighbor, Support Vector Machine Algorithm How to cite this paper: Ajayi Kemi Patience | Dr. Lakshmi J. V. N "A Study on Credit Card Fraud Detection using Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-3, April 2020, pp.801-804, URL: www.ijtsrd.com/papers/ijtsrd30688.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) 1. INTRODUCTION In recent years banking sector as be paramount among services offered to customer by its bank which involves in credit card facility that is offered. However, credit card issues as increase drastically in the aspect of security threat such as, theft of credit card used in fraudulent transaction or using method of hacking people credit card. Early detection of credit card improves and enable protection of each transaction done, database size constantly changing which are vital information needs to develop effectively algorithm to help analyze each activity involves, the data stream analysis can be done. Fraud is an unauthorized use of account that belong to someone that is not the owner of the account. Fraud detection involves in various method used to prevent activities of unauthorized usage of credit card by using detection methodology. A fraud detection system (FDS) should effectively and efficiently detect fraudulent used of credit card transaction. The theory increditcarddetectionis either fraudulent transaction or legitimate transaction, our propose system model will predict fraud activities and reduce false positive and false negative hypothesis. However, the common use of online shopping and ecommerce by entering the Card verification value (CVV), customer credit card passwords and vital informationare at risk. The traditional method ofdetectingfraudulent behavior is replace with online fraud detection software using machine leaning algorithm. Method used are fraudulent pattern and prediction of the transaction. machine learning has successfully rate of fraud detecting using supervised algorithm, unsupervised algorithm and reinforcement. The existing system uses cluster analysis and artificial neural networks on fraud detection in this paper is to proposed credit card fraud detection system using supervised algorithm. Fig. 1: Fraud Detection Process IJTSRD30688
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30688 | Volume – 4 | Issue – 3 | March-April 2020 Page 802 2. RELATED WORK 1. “Machine Learning Approaches for Credit Card Fraud Detection”. “S. Venkata Suryanarayana, G.N. Balaji G. Venkateswara Rao”. This paper proposes four algorithms in which are Naïve Bayes, Decision tree, K-Nearest Neighbour and support vector machine algorithm. The model wastrainedandtested using Waikato environmentforknowledgeanalysis(WEKA). It was developed in java by university of Waikato in New Zealand, the approach ensures that all data that was represented once as attest data and multiple trainingdata to produce accurate output. 2. “Detection and Prediction of Credit Card Transaction Using Machine Learning”. “Kaithekuzhical Leena Kurian and Dr. Ajeet Chikkamannur”. In this study, the classification model on logistic regression and random forest are developed and applied to fraud detection. Its techniques suggest a well-suitedsystemmodel that prove that the predicted fraudulent transaction is genuine. Its main objective is to detect and predict various credit card transaction used in an unauthorised way. It also states the limitation of random forest is due to multiple tree in forest which enable the algorithm to be slow. 3. “Credit Card Fraud Detection Using Machine Learning and Data Science”. “Aditya Saini, Swarna Deep Sarkar, Shadab Ahmed, S P Maniraj”. This research paper focus on analysis and pre-processing of each data set by deployinganomalydetectionalgorithmsuch as local outlier factor and isolation forest algorithm. The paper suggests the approach ofJupyter notebook platform to make a program in python, this program can be executed in cloud using google collab platform which support all python notebook files. 4. “Machine Learning Based Credit Card Analysis Modelling, Detection, And Deployment”. “Shivakumar Goel And Hitesh Patil” The study represents how the combination of different clustering and machine learning algorithm can be used to developed a very large scale to detect the fraudulent transaction and use to ensure that credibilityofthepayment system. This paper analyses the factor mapping use to connect different factor that mainly associated with credit card. After then pattern matching model using clustering algorithm and lastly prediction model using artificial neural network (ANN). 5. “Credit Card Fraud Detection Using Random Forest” “Devi Meenakshi. B, Janani. B, Gayathri .S , Mrs Indira N” There is a phenomenal growth in the number of credit card transaction, the paper applies the use of random forest algorithm for classification of credit card dataset. The algorithm estimates the general error and to be resistant to over fitting, the propose system rank the important of variable in a regression or classification problem. Random forest is an advanced version of decision tree, the study explains the tree de-correlated and prune thetree byfixinga stopping criterion for node split. 3. METHODOLOGY Fraud detection is a classification task usetopredictfraudor legist transaction. this approach uses machine learning algorithm to detect anomaly transaction which are logistic regression, k-nearest neighbor, support vector machine algorithm. The performance of the algorithm is compare based on specificity, accuracy and precision. The diagram below represents the system architecture. Fig. 2: System Architecture 3.1. CLASSIFICATION TECHNIQUES 1. Logistic regression Logistic regression is a supervised classification algorithm based on the decision that brought into the pictures. The aspect of regression is relying on classification of problems. It used dichotomous (binary) variablessuchasfemale/male or true/ false, there are two values labeled“0”and“1”.Italso estimates the relationship between dependent variables to one or more independent variables using sigmoid function also called logistic function. In classification based oflogistic regression can only take discrete values for a set of elements(or features) X & Y, it dealswiththeargumentusing the threshold which are, high recall/ low precision this reduce the total number of false negative without reducing the total number of false positive while low recall/high precision this reduce the total number of false positive without reducing number of false positive. Logistic regression categories are based on binomial, ordinal and multinomial. Application of logistic regression logistic regression helps in medical field, it predicts the probability of risk of patient in developing a disease. In marketing logistic regression help the customer purchase property and it will predict if the value of the property will rise or not. 2. K-Nearest Neighbor (KNN) K-nearest neighbor is a machine learning algorithm that is used by regression and classification problem also the output depends if (KNN) is used for either regression or classification. Some examples are lazy learning, instance base learning. Each function is locally and all calculation is delay until each of the function is evaluated.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30688 | Volume – 4 | Issue – 3 | March-April 2020 Page 803 KNN performance is influence using three factors: Number of neighbor use to arrange each new sample. Distance metric used to discover the nearest neighbor. Distance act use to extract a classified k-nearest neighbor. Some of the dataset is generated for training set use by the algorithm but no exact training step is followed. Application of K-Nearest Neighbor K-nearest neighbor is used in terms of finance it includes currency exchange rate, stock market planning investment strategies. It’s also used for medical predictionforanalysisof micro array gene (KNN) is mostlypopularalgorithmthat can easily categories text or text mining 3. Support vector machine Support vector machine it analyzes each data used for regression and classification. It effectively uses a non-linear classification called kernel trick. The concept of SVM involve are: Margin it is the gap along two lines on the short distance point of dissimilar classes. Support vector data point that areshortdistancetothe hyperplane is called support vector. Hyperplane it is a decision space which is along a set of objects having dissimilar classes. Outline by separate hyperplane if given a training data the output from the algorithm is optimal hyperplane. Application of Support vector machine Support vector machine can recognize handwritten characters and help in hypertextcategoriestoreducethe use of hand label training. (SVM) algorithm canclassifiedimages and also used by scientist and biologist. 4. EXPERIMENTS ANALYSIS AND COMPARISON Fig. 3: System Analysis Dataset Firstly, our dataset was obtained from Kaggle in order to import the dataset and convert the data into data frames format. Our dataset has 12 attributes features placed in the dataset that was obtained and do random sampling of each data. Training and testing data Testing is done on each dataset that was provided after training process occur. Giving 70% data training and remaining 30% testing dataset, the outcome of test will then compare the algorithm with the accuracy and performance of each transaction. Applying algorithm We demonstrate the performanceofeachalgorithmmention above. The following classification of algorithm use to train and test dataset, the metricsusesconfusionmatric,precision and recall score. A. logistic regression The performance of logisticregressionisdescribedasbelow: Cross validation mean score of logistic regression: 97.2% Model accuracy 97% Confusion matrix [273 5] [4 42] Table 1: Classification report for logistic regression: B. K- nearest neighbor The performance of K- nearest neighbor is describe as below: Cross validation mean score of K-Nearest Neighbor: 96.5% Model accuracy 97% Confusion matrix [272 5] [5 42]
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30688 | Volume – 4 | Issue – 3 | March-April 2020 Page 804 Table 2: Classification report for K- nearest neighbor C. Support vector machine The performance of Support vector machine is described as below: Cross validation meanscore ofSupportvectormachine:98% Model accuracy 98% Confusion matrix [276 7] [1 40] Table 3: Classification report for Support vector machine: Fig. 4: ROC Curve for all the three models. 5. FUTURE SCOPE This project enables us to analyze using logistic regression, k-nearest neighbor, support vector machine algorithm for credit card fraud detection technique. In the further enhancement of the project we can use neural network with combination of Naïve-Bayes may help to detect anomaly behavior in fraud detection. 6. CONCLUSION Credit card monitoring is an essential task for merchant bank which involve the customer anditsbank,effective need for better improvement by using the combination of one or more algorithm. This paper has explained in detail the involvement of machine learning in use for fraud detection alongside with its algorithm. Analysis and comparisonofthe three algorithm and also enumerate the various application of each algorithm. REFERENCE [1] “Machine learning approaches for credit card fraud detection”. “S. Venkata Suryanarayana, G. N. Balaji G. Venkateswara Rao”. International journal of engineering and technology (IJET) 7(2) PP. 917-920 (2018). [2] “Detection and prediction of credit card transaction using machine learning”. “Kaithekuzhical Leena Kurian and Dr. Ajeet Chikkamannur”. International journal of engineering science and research technology(IJESRT): 8(3) ISSN: 277-9655 (2019). [3] “Credit card fraud detection using machine learning and data science”. “Aditya Saini, Swarna Deep Sarkar, Shadab Ahmed, S P Maniraj”. International journal of engineering research and technology (IJERT) vol:8 issue 09 ISSN: 2278-0181(2019). [4] “Machine learning based credit card analysis modelling, detection, and deployment”. “Shivkumar Goel and Hitesh Patil” International journal of advanced research (IJAR) ISSN: 2320-5407 (2017). [5] “Credit card fraud detection using Random forest” “Devi Meenakshi. B, Janani. B, Gayathri.S,MrsIndira.N” International research journal of engineering and technology (IRJET) VOL. 06 issue: 03 ISSN 2395-0072. (2019) [6] “Detecting Credit Card Fraud by Decision Trees and Support Vector Machines”. Hong Kong, China: The International Multi Conference of Engineers and Computer Scientists. Sahin, Y., & Duman, E. (2011). [7] “A Comparative Study of Credit Card Fraud Detection Using Machine Learning for United Kingdom Dataset”. “V. Sandeep, T. Supriya, P. Hiranya, Dr.M.SUJATHA” International Journal of Computer Science and Information Security (IJCSIS), Vol.17,No.9,September (2019). [8] “Credit card fraud detection using anti-K-Nearest Neighbour algorithm” by Venkata Ganji,Siva Naga Prasad Mannem International Journal on Computer Science and Engineering(IJCSE), Vol.4 No. 06 June( 2015).