SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 6 Issue 7, November-December 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 940
Credit Cards Frauds and Cybersecurity Threats: Machine
Learning Detection Algorithms as Countermeasures
Obodoeze Fidelis C.1
, Oliver Ifeoma Catherine2
, Onyemachi George Olisamaka2
,
Udeh Ifeanyi Frank Gideon3
, Obiokafor, Ifeyinwa Nkemdilim4
1
Department of Computer Engineering, Akanu Ibiam Federal Polytechnic Unwana, Ebonyi State, Nigeria
2
Department of Computer Science, Akanu Ibiam Federal Polytechnic Unwana, Ebonyi State, Nigeria
3
Department of Computer Science, Federal College of Agriculture, Ishiagu, Ebonyi State, Nigeria
4
Department of Computer Science, Anambra State Polytechnic, Mgbakwu, Anambra State, Nigeria
ABSTRACT
Credit and Debit cards have become the choice mode of payment
online as a result of the proliferation of electronic transactions and
advancement in Information and Communication Technology (ICT).
Because of the increased use of credit cards for payment online, the
number of fraud cases associated with it has also increased;
scammers and fraudsters are stealing credit card information of
victims online and thereby stealing their monies. There is the need
therefore to stop or abate these frauds using very powerful fraud
detection system that detects patterns of credit card frauds in order to
prevent it from occurring. In this paper we x-rayed the concept of
credit card frauds and how they are carried out by fraudsters. Python
3.7.6 programming language, Jupyter Notebook 6.0.3 and Anaconda
Navigator 1.9.12 were used as experimental test bed. Also, we
implemented two different supervised machine learning algorithms
on an imbalanced dataset such as Decision Tree and Random forest
techniques. A comparative analysis of the credit card detection
capabilities of these machine learning algorithms were carried out to
ascertain the best detection algorithm using different performance
evaluation metrics such as accuracy, precision, recall, f1 score,
confusion matrix. Experimental results showed that Random Forest
outperformed Decision Tree algorithm slightly in performance
metrics used for performance evaluation.
KEYWORDS: Credit Card frauds, Accuracy, f1 score, precision,
recall, support, fraud detection, fraud patterns, machine learning
algorithms
How to cite this paper: Obodoeze
Fidelis C. | Oliver Ifeoma Catherine |
Onyemachi George Olisamaka | Udeh
Ifeanyi Frank Gideon | Obiokafor,
Ifeyinwa Nkemdilim "Credit Cards
Frauds and Cybersecurity Threats:
Machine Learning Detection Algorithms
as Countermeasures" Published in
International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN:
2456-6470,
Volume-6 | Issue-7,
December 2022,
pp.940-948, URL:
www.ijtsrd.com/papers/ijtsrd52440.pdf
Copyright © 2022 by author (s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an
Open Access article
distributed under the
terms of the Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
1. INTRODUCTION:
Cybersecurity is becoming increasingly significant in
our daily lives. When addressing digital life security,
the main issue is identifying anomalous behavior.
When making purchases from online e-commerce
stores or conducting business online, many people
frequently prefer using credit cards as well as debit
cards. Occasionally, we can make purchases even
when we don't have the cash on hand thanks to credit
card credit limitations.
On the other hand, scammers and online attackers
abuse these features. To solve this problem, there is
need for a system that can abort the transaction if it
finds anything fishy or anomalous patterns in the
whole financial transaction.
Here, a system that can monitor the patterns of all
transactions is required, and if any patterns are
abnormal, the transaction should be stopped or
terminated.
Credit card information should always be kept private
or confidential. Information about credit card privacy
should not be compromised. Phishing websites, stolen
or lost credit cards, fake credit cards, the theft of card
information, intercepted cards, etc. are some
examples of ways to steal credit card information
(Anderson, 2007). The aforementioned activities
should be avoided for security reasons. Online fraud
simply requires the card information and takes place
IJTSRD52440
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 941
remotely. At the time of purchase, neither a manual
signature nor a PIN or card imprint are necessary. The
legitimate cardholder is typically unaware that
someone else has seen or stolen his or her card
information.
The easiest way to spot this kind of fraud is to
examine each card's purchasing habits and look for
any deviations from the "normal" spending habits. The
greatest strategy to lower the number of successful
credit card frauds is to detect fraud by examining the
current cardholder data purchases. Since the outcomes
are not made public and the data sets are unavailable.
The logged data and user behavior are two data types
that can be used to identify fraud incidents. Currently,
a variety of techniques, including data mining,
statistics, and artificial intelligence, are used to detect
fraud.
Currently, there are many supervised machine
learning approaches based on Artificial Intelligence
(AI) that can classify odd or anomalous transactions.
The only prerequisites are historical data and an
algorithm that can more closely match the data.
In order to identify frauds and potential cyber risks,
decision tree and random forest machine learning
(ML) algorithms were utilized in this paper to identify
unusual or odd and unexpected patterns in credit card
transactions. The performance of the two ML
algorithms is evaluated experimentallyusing a variety
of performance evaluation criteria, including
accuracy, precision, recall and F1 score.
1.1. How Credit Card Fraud works
Credit cards are very important in making purchases
online especially when finances are not readily
available. Credit cards are one of the most popular
financial tools used to make online purchases and
payments for commodities such as electronic gadgets
such TVs, computer hardware and software, website
domain registration and hosting, mobile phones, fuel,
groceries, air ticket booking, books hotels and other
items. When using credit cards for various purchases,
they are most valuable because they offer numerous
rewards in terms of points. Making payments with
credit cards is equally easy and seamless. But the
challenge of using credit cards for online payments is
as a result of activities of hackers and scammers.
According to ProjectPro (2022), today's credit card
fraud falls into a number of different categories:
Lost or stolen cards: Online shopping credit
cards are stolen and used fraudulently on the
owner's behalf. The process of canceling stolen
credit cards and reissuing them is difficult for
both customers and credit card providers. Several
banking organizations limit the use of credit cards
until it is certain that the card's legitimate owner
has received it.
Card Abuse: The customer uses a credit card to
make purchases, but he or she has no intention of
returning the money that the bank has charged for
those purchases. When the due date for payment
approaches, some customers quit returning calls.
They even occasionally file for bankruptcy; every
year, this kind of scam causes losses in the
millions to banks.
Identity Theft: Customers submit false
information while applying for credit cards, and
they may even steal the personal information of a
real client to do so. Even card blocking cannot
prevent the credit card from getting into the
wrong hands in such circumstances.
Merchant Abuse: Some online merchants
display fictitious unlawful transactions to
facilitate money laundering. Legal information of
legitimate credit card customers is stolen to create
counterfeit cards and be used for these illegal
transactions.
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 942
Fig.1 shows a comprehensive list of credit card frauds that can compromise the cybersecurity of credit
cards and financial systems.
Fig.1. Types of Fraud (Anderson, 2007)
To identify credit card fraud, several traditional, obsolete techniques have been used since the dawn of time,
including CVV verification, geolocation tracking, IP address verification, etc. However, since thieves improve
their skills with time, it is challenging to put an end to them all using only traditional methods. In today's
environment, when millions of transactions occur every second, human intelligence is incapable of processing
all the data and identifying the patterns of behavior of fraudsters. Machine learning-based credit card fraud
detection is essential in this situation.
Financial organizations are increasingly depending on automated machine learning algorithms to make informed
judgments and prevent large losses. These safety measures greatly reduce the risk involved in conducting online
transactions. Machine learning algorithms use historical transaction data to appraise present and future
transactions in a manner similar to how people do. Despite the fact that computers may not be as intelligent as
people and may need some additional supervision, the speed at which data is processed and calculations are
performed is an advantage. Machines are also more adept than people at recognizing and recalling patterns in
vast volumes of data. Anomaly detection is the term most often used to describe these methods.
1.2. Credit Card Fraud Detection Techniques using Machine Learning
In the past, credit card fraud has been identified using the following machine learning techniques:
Unsupervised Learning - Algorithms for machine learning, such as Isolation Forest, One-class SVM, LOF,
etc., train models without the need of labeled training data. They look for patterns in the data and attempt to
group the data points based on apparent similarities in patterns.
Supervised Learning – These machine Learning Algorithms include KNN, Artificial Neural Networks
(ANNs), Auto encoders, Random Forest, XGBoost, LightGBM, etc. These algorithms learn to anticipate the
labels or patterns for the unobserved data by training on labeled data. It can be costly and difficult to collect
labeled data for machine learning modeling.
2. Materials and Methods
In this paper, we used Supervised Learning ML algorithms such as Decision Tree, Random Forest and XGBoost
to perform modeling experiments in Python 3.7.6 and Jupyter Notebook 6.0.3 in order to detect credit card
patterns that are abnormal and unusual that may contain some frauds in the credit card dataset.
The historical credit card dataset used in the experiments contains transactions made by credit cards in
September 2013 by European cardholders.
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 943
This dataset presents transactions that occurred in two days, where we have 492 frauds out of 284,807
transactions. The dataset was downloaded online at https://www.kaggle.com/datasets/mlg-ulb/creditcardfraud.
Fig. 2 shows the methodology adopted in the experiments.
The system architecture of the proposed machine learning method is shown in Fig.3.
Fig. 2: Credit card fraud detection methodology using Machine Learning Algorithms
Fig. 3: Credit card fraud detection system architecture
The following tools were used for the programming and modeling of the credit card detection models using
machine learning algorithms:
Python – 3.7.6
Numpy – 1.19.2
Scikit-learn – 0.24.1
Matplotlib – 3.3.4
Anaconda Navigator 1.9.12
Jupyter Notebook 6.0.3
Perform Exploratory Data Analysis
(EDA) on the dataset
Fit the ML algorithms on the dataset
and predict credit card fraud patterns
Train and evaluate the models on the
dataset
Select the better model for credit card
fraud detection
Clean up the dataset and prepare it for
ML modeling
Evaluate the fraud detection
performances of the ML algorithms
Import the credit card historical dataset
to Python testbed
Credit card
dataset
Exploratory Data
Analysis and sampling
Clean up the dataset
Divide the dataset into Training set
(70%) and Testing set (30%)
Decision Tree Random Forest XGBoost
Credit card fraud prediction and testing
Performance Evaluation of ML models
Test
Data
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 944
Algorithm steps for finding the Best algorithm for Credit fraud detection:
Step1: Import the credit card dataset into Pandas data frame
Step2: Convert the data into data frames format suitable for machine learning modeling
Step3: Do random sampling
Step4: Split dataset into training set (70%) and testing set (30%)
Step5: Fit the training dataset to the machine learning algorithms
Step6: Apply the algorithms to the training dataset and create the prediction models
Step7: Make Credit card fraud prediction for test dataset for each algorithm
Step8: Compute the performance metrics for each machine learning algorithm
Random Forest ML algorithm:
Random forest (one of the most popular algorithms) is a supervised machine learning algorithm. It creates a
“forest” out of an ensemble of “decision trees”, which are normally trained using the “bagging” technique. The
bagging method’s basic principle is that combining different learning models improves the prediction outcome.
To get a more precise and reliable forecast, random forest creates several decision trees and merges them. Fig.4
shows the Random Forest algorithm’s anomaly detection technique using majority class rule.
Fig 4: Random Forest anomaly detection using Majority class technique
Decision Tree ML algorithm:
A decision tree is a non-parametric supervised learning algorithm, which is utilized for both classification and
regression tasks. It has a hierarchical, tree structure, which consists of a root node, branches, internal nodes and
leaf nodes (IBM, 2022).
The experiments were carried out in Anaconda Navigator running Python 3.0 and Tensorflow environment as
shown in Fig. 5.
Fig.5: Anaconda Navigator Development Environment for Python
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 945
2.1. Exploratory Data Analysis
Exploratory data analysis (EDA) was carried out in Python 3, Jypyter Notebook and several statistical data
analysis tool. Figs. 6 and 7 show the credit card data analysis carried out in Pandas dataframe.
Fig. 6: Data Analysis showing credit card dataframe in Pandas
Fig.7: Data Analysis showing data types in Pandas
Fig.8 shows the printout of the percentage of credit card frauds in the database used for the experiments.
Fig.8: Data Analysis showing percentage of credit card incidences in the dataset
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 946
Fig.9 shows the printout of the dataset ratio split used for the experiments. The dataset was divided into two sets,
training set was allocated 70% while testing and evaluation set was allocated 30%.
Fig.9: The Dataset split into Training and Testing ratio
Performance Evaluation Tools:
The following performance evaluation metrics were used to evaluate the credit card prediction performances of
the machine learning algorithms used in this paper. These metrics (Accuracy, Precision, Recall and F1- Score)
are calculated using True Positive (TP), True Negative (TN), False Positive (FP), and False Negative (FN)
parameters.
When TP is likely to cause most kidney issues in a kidney patient; FPs will likely find that the rate at which
kidney disease is detected is the rate at which a healthy person is found. TN hopes to reveal that a person with
kidney disease is healthy. FN is prescribed when a healthy man or woman has kidney disease.
Accuracy:
Accuracy is the proportion of instances that are accurately classified. It is one of the most popular performance
measures for machine learning categorization.
Accuracy = ……………………… (1)
Where TP, TN, FP and FN are referred to as True Positives, True Negatives, False Positives and False Negatives
respectively as used in binary classification machine learning tasks.
Precision:
Precision is the number of classified Positive or fraudulent instances that actually are positive instances.
Precision = ……………………………………………………………… (2)
Recall:
Recall is a metric that measures the proportion of accurate positive predictions among all possible positive
predictions. Recall gives an indicator of missed positive predictions, unlike precision, which only comments on
the accurate positive predictions out of all positive predictions. The number of true positives divided by the sum
of true positives and false negatives is used to determine recall.
Recall = ………………………………………………….………………(3)
F1-Score:
F1 Score is the weighted average of Precision and Recall. Therefore, this score takes both false positives and
false negatives into account.
F1-Score = ………………………………….………………(4)
3. Results and Discussions
This section describes the results obtained from several experiments as carried out in the testbed. Fig. 9 shows
the modeling prediction of credit card fraud by Decision Tree and Random Forest machine learning algorithms.
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 947
Fig. 10: Modeling prediction results for credit card frauds by Decision Tree and Random Forest
Algorithms
From Fig.10, it is clear that Random Forest algorithm outperformed the Decision Tree Algorithm by Accuracy
Score of 99.96% while Decision Tree scored 99.93%.
We also carried out another experiment to comprehensively evaluate the performance of the Decision Tree and
Random Forest algorithms using standard performance evaluation metrics such as Accuracy, precision, Recall
and f1-score. Fig.11 and Table 1 shows the performance evaluation results obtained for Decision Tree algorithm.
Decision Tree performed very well in credit card pattern detection with Accuracy score of 0.99932 or 99.93%
and Precision of 0.76712, Recall=0.82353 and F1-score of 0.79433.
Fig. 11: Modeling prediction performance evaluation for Decision Tree Algorithm
Table 1: Decision Tree credit card fraud detection results
Performance Metric Score
Accuracy 0.99932
Precision 0.76712
Recall 0.82353
F1-score 0.79433
Fig.12 and Table 2 show the performance evaluation results obtained for Random Forest algorithm. Random
Forest performed very well (better than Decision Tree algorithm) in credit card pattern detection with Accuracy
score of 0.99961or 99.96% and Precision of 0.94783, Recall=0.80147 and F1-score of 0.86853.
Fig. 12: Modeling prediction performance evaluation for Random Forest Algorithm
International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 948
Table 2: Random Forest credit card fraud detection results
Performance Metric Score
Accuracy 0.99961
Precision 0.94783
Recall 0.80147
F1-score 0.86853
Table 3 shows the comparative prediction performances between Decision Tree and Random Forest algorithms.
It is very clear here that Random Forest outperformed Decision Tree algorithm in credit card fraud detection
with higher Accuracy, Precision and F1-score and lower Recall score.
Table 3: Comparison of credit card frauds prediction performances between Decision Tree and
Random Forest algorithms
Performance Metric Score ML Algorithm
Accuracy
0.99932 Decision Tree
0.99961 Random Forest
Precision
0.76712 Decision Tree
0.94783 Random Forest
Recall
0.82353 Decision Tree
0.80147 Random Forest
F1-score
0.79433 Decision Tree
0.86853 Random Forest
4. Summary and Conclusion
In this paper, we built a binary classifier using three
machine learning algorithms such as Random Forest
and Decision Trees classifiers to detect credit card
fraud transactions. Through this project, we
understood and applied techniques to address the
class imbalance issues and achieved an accuracy of
more than 99%.
We applied different performance evaluation metrics
such as Precision, Recall, f1-score, support and
accuracy to evaluate the performance of the two
Machine learning algorithms. Our comparative
performance evaluation shows that Random Forest
outperformed the Decision Tree algorithm in credit
card fraud patterns detection.
The results obtained from the experiments show that
Machine learning classification algorithms such as
Decision Tree and Random Forest are well suited to
detect any credit card fraud before it occurs.
4.1. Future Scope
Future experiments will be carried to determine the
performances of hybrid ensemble machine learning
algorithms by combining ensemble algorithms such
as XGBoost, Random Forest with Decision Trees
algorithm in carrying out fraud detection in credit
cards.
References:
[1] Anderson, R. 2007. The Credit Scoring Toolkit:
theory and practice for retail credit risk
management and decision automation. New
York: Oxford University Press.
[2] IBM (2022).” What is a decision Tree?”.
Retrieved online at
https://www.ibm.com/topics/decision-trees
[3] ProjectPro (2022).”How does Credit Card
Fraud work?”. Accessed online at
https://www.projectpro.io/article/credit-card-
fraud-detection-project-with-source-code-in-
python/568

More Related Content

Similar to Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algorithms as Countermeasures

Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET Journal
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
 
Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detectionijtsrd
 
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining TechniquesSurvey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining Techniquesijsrd.com
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET Journal
 
How to Start Payment Gateway Business in India
How to Start Payment Gateway Business in IndiaHow to Start Payment Gateway Business in India
How to Start Payment Gateway Business in IndiaMyOnlineCA.in
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSIRJET Journal
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesIRJET Journal
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGijmnct
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGijmnct
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersCognizant
 
A Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine LearningA Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine Learningijtsrd
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008ClubHack
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissectedamiable_indian
 
An overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions forAn overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions foreSAT Publishing House
 
An overview of plastic card frauds and solutions for avoiding fraudster trans...
An overview of plastic card frauds and solutions for avoiding fraudster trans...An overview of plastic card frauds and solutions for avoiding fraudster trans...
An overview of plastic card frauds and solutions for avoiding fraudster trans...eSAT Journals
 

Similar to Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algorithms as Countermeasures (20)

Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent TransactionIRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
 
Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detection
 
Credit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptxCredit Card Fraud PPT - Reena Prajapati.pptx
Credit Card Fraud PPT - Reena Prajapati.pptx
 
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining TechniquesSurvey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
How to Start Payment Gateway Business in India
How to Start Payment Gateway Business in IndiaHow to Start Payment Gateway Business in India
How to Start Payment Gateway Business in India
 
Requirement of PCI DSS in India.
Requirement of PCI DSS in India.Requirement of PCI DSS in India.
Requirement of PCI DSS in India.
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM services
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
 
A Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine LearningA Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine Learning
 
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
Harshad - Economic offenses through Credit Card Frauds Dissected - ClubHack2008
 
Economic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
 
An overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions forAn overview of plastic card frauds and solutions for
An overview of plastic card frauds and solutions for
 
An overview of plastic card frauds and solutions for avoiding fraudster trans...
An overview of plastic card frauds and solutions for avoiding fraudster trans...An overview of plastic card frauds and solutions for avoiding fraudster trans...
An overview of plastic card frauds and solutions for avoiding fraudster trans...
 
J017216164
J017216164J017216164
J017216164
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algorithms as Countermeasures

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 6 Issue 7, November-December 2022 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 940 Credit Cards Frauds and Cybersecurity Threats: Machine Learning Detection Algorithms as Countermeasures Obodoeze Fidelis C.1 , Oliver Ifeoma Catherine2 , Onyemachi George Olisamaka2 , Udeh Ifeanyi Frank Gideon3 , Obiokafor, Ifeyinwa Nkemdilim4 1 Department of Computer Engineering, Akanu Ibiam Federal Polytechnic Unwana, Ebonyi State, Nigeria 2 Department of Computer Science, Akanu Ibiam Federal Polytechnic Unwana, Ebonyi State, Nigeria 3 Department of Computer Science, Federal College of Agriculture, Ishiagu, Ebonyi State, Nigeria 4 Department of Computer Science, Anambra State Polytechnic, Mgbakwu, Anambra State, Nigeria ABSTRACT Credit and Debit cards have become the choice mode of payment online as a result of the proliferation of electronic transactions and advancement in Information and Communication Technology (ICT). Because of the increased use of credit cards for payment online, the number of fraud cases associated with it has also increased; scammers and fraudsters are stealing credit card information of victims online and thereby stealing their monies. There is the need therefore to stop or abate these frauds using very powerful fraud detection system that detects patterns of credit card frauds in order to prevent it from occurring. In this paper we x-rayed the concept of credit card frauds and how they are carried out by fraudsters. Python 3.7.6 programming language, Jupyter Notebook 6.0.3 and Anaconda Navigator 1.9.12 were used as experimental test bed. Also, we implemented two different supervised machine learning algorithms on an imbalanced dataset such as Decision Tree and Random forest techniques. A comparative analysis of the credit card detection capabilities of these machine learning algorithms were carried out to ascertain the best detection algorithm using different performance evaluation metrics such as accuracy, precision, recall, f1 score, confusion matrix. Experimental results showed that Random Forest outperformed Decision Tree algorithm slightly in performance metrics used for performance evaluation. KEYWORDS: Credit Card frauds, Accuracy, f1 score, precision, recall, support, fraud detection, fraud patterns, machine learning algorithms How to cite this paper: Obodoeze Fidelis C. | Oliver Ifeoma Catherine | Onyemachi George Olisamaka | Udeh Ifeanyi Frank Gideon | Obiokafor, Ifeyinwa Nkemdilim "Credit Cards Frauds and Cybersecurity Threats: Machine Learning Detection Algorithms as Countermeasures" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7, December 2022, pp.940-948, URL: www.ijtsrd.com/papers/ijtsrd52440.pdf Copyright © 2022 by author (s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) 1. INTRODUCTION: Cybersecurity is becoming increasingly significant in our daily lives. When addressing digital life security, the main issue is identifying anomalous behavior. When making purchases from online e-commerce stores or conducting business online, many people frequently prefer using credit cards as well as debit cards. Occasionally, we can make purchases even when we don't have the cash on hand thanks to credit card credit limitations. On the other hand, scammers and online attackers abuse these features. To solve this problem, there is need for a system that can abort the transaction if it finds anything fishy or anomalous patterns in the whole financial transaction. Here, a system that can monitor the patterns of all transactions is required, and if any patterns are abnormal, the transaction should be stopped or terminated. Credit card information should always be kept private or confidential. Information about credit card privacy should not be compromised. Phishing websites, stolen or lost credit cards, fake credit cards, the theft of card information, intercepted cards, etc. are some examples of ways to steal credit card information (Anderson, 2007). The aforementioned activities should be avoided for security reasons. Online fraud simply requires the card information and takes place IJTSRD52440
  • 2. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 941 remotely. At the time of purchase, neither a manual signature nor a PIN or card imprint are necessary. The legitimate cardholder is typically unaware that someone else has seen or stolen his or her card information. The easiest way to spot this kind of fraud is to examine each card's purchasing habits and look for any deviations from the "normal" spending habits. The greatest strategy to lower the number of successful credit card frauds is to detect fraud by examining the current cardholder data purchases. Since the outcomes are not made public and the data sets are unavailable. The logged data and user behavior are two data types that can be used to identify fraud incidents. Currently, a variety of techniques, including data mining, statistics, and artificial intelligence, are used to detect fraud. Currently, there are many supervised machine learning approaches based on Artificial Intelligence (AI) that can classify odd or anomalous transactions. The only prerequisites are historical data and an algorithm that can more closely match the data. In order to identify frauds and potential cyber risks, decision tree and random forest machine learning (ML) algorithms were utilized in this paper to identify unusual or odd and unexpected patterns in credit card transactions. The performance of the two ML algorithms is evaluated experimentallyusing a variety of performance evaluation criteria, including accuracy, precision, recall and F1 score. 1.1. How Credit Card Fraud works Credit cards are very important in making purchases online especially when finances are not readily available. Credit cards are one of the most popular financial tools used to make online purchases and payments for commodities such as electronic gadgets such TVs, computer hardware and software, website domain registration and hosting, mobile phones, fuel, groceries, air ticket booking, books hotels and other items. When using credit cards for various purchases, they are most valuable because they offer numerous rewards in terms of points. Making payments with credit cards is equally easy and seamless. But the challenge of using credit cards for online payments is as a result of activities of hackers and scammers. According to ProjectPro (2022), today's credit card fraud falls into a number of different categories: Lost or stolen cards: Online shopping credit cards are stolen and used fraudulently on the owner's behalf. The process of canceling stolen credit cards and reissuing them is difficult for both customers and credit card providers. Several banking organizations limit the use of credit cards until it is certain that the card's legitimate owner has received it. Card Abuse: The customer uses a credit card to make purchases, but he or she has no intention of returning the money that the bank has charged for those purchases. When the due date for payment approaches, some customers quit returning calls. They even occasionally file for bankruptcy; every year, this kind of scam causes losses in the millions to banks. Identity Theft: Customers submit false information while applying for credit cards, and they may even steal the personal information of a real client to do so. Even card blocking cannot prevent the credit card from getting into the wrong hands in such circumstances. Merchant Abuse: Some online merchants display fictitious unlawful transactions to facilitate money laundering. Legal information of legitimate credit card customers is stolen to create counterfeit cards and be used for these illegal transactions.
  • 3. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 942 Fig.1 shows a comprehensive list of credit card frauds that can compromise the cybersecurity of credit cards and financial systems. Fig.1. Types of Fraud (Anderson, 2007) To identify credit card fraud, several traditional, obsolete techniques have been used since the dawn of time, including CVV verification, geolocation tracking, IP address verification, etc. However, since thieves improve their skills with time, it is challenging to put an end to them all using only traditional methods. In today's environment, when millions of transactions occur every second, human intelligence is incapable of processing all the data and identifying the patterns of behavior of fraudsters. Machine learning-based credit card fraud detection is essential in this situation. Financial organizations are increasingly depending on automated machine learning algorithms to make informed judgments and prevent large losses. These safety measures greatly reduce the risk involved in conducting online transactions. Machine learning algorithms use historical transaction data to appraise present and future transactions in a manner similar to how people do. Despite the fact that computers may not be as intelligent as people and may need some additional supervision, the speed at which data is processed and calculations are performed is an advantage. Machines are also more adept than people at recognizing and recalling patterns in vast volumes of data. Anomaly detection is the term most often used to describe these methods. 1.2. Credit Card Fraud Detection Techniques using Machine Learning In the past, credit card fraud has been identified using the following machine learning techniques: Unsupervised Learning - Algorithms for machine learning, such as Isolation Forest, One-class SVM, LOF, etc., train models without the need of labeled training data. They look for patterns in the data and attempt to group the data points based on apparent similarities in patterns. Supervised Learning – These machine Learning Algorithms include KNN, Artificial Neural Networks (ANNs), Auto encoders, Random Forest, XGBoost, LightGBM, etc. These algorithms learn to anticipate the labels or patterns for the unobserved data by training on labeled data. It can be costly and difficult to collect labeled data for machine learning modeling. 2. Materials and Methods In this paper, we used Supervised Learning ML algorithms such as Decision Tree, Random Forest and XGBoost to perform modeling experiments in Python 3.7.6 and Jupyter Notebook 6.0.3 in order to detect credit card patterns that are abnormal and unusual that may contain some frauds in the credit card dataset. The historical credit card dataset used in the experiments contains transactions made by credit cards in September 2013 by European cardholders.
  • 4. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 943 This dataset presents transactions that occurred in two days, where we have 492 frauds out of 284,807 transactions. The dataset was downloaded online at https://www.kaggle.com/datasets/mlg-ulb/creditcardfraud. Fig. 2 shows the methodology adopted in the experiments. The system architecture of the proposed machine learning method is shown in Fig.3. Fig. 2: Credit card fraud detection methodology using Machine Learning Algorithms Fig. 3: Credit card fraud detection system architecture The following tools were used for the programming and modeling of the credit card detection models using machine learning algorithms: Python – 3.7.6 Numpy – 1.19.2 Scikit-learn – 0.24.1 Matplotlib – 3.3.4 Anaconda Navigator 1.9.12 Jupyter Notebook 6.0.3 Perform Exploratory Data Analysis (EDA) on the dataset Fit the ML algorithms on the dataset and predict credit card fraud patterns Train and evaluate the models on the dataset Select the better model for credit card fraud detection Clean up the dataset and prepare it for ML modeling Evaluate the fraud detection performances of the ML algorithms Import the credit card historical dataset to Python testbed Credit card dataset Exploratory Data Analysis and sampling Clean up the dataset Divide the dataset into Training set (70%) and Testing set (30%) Decision Tree Random Forest XGBoost Credit card fraud prediction and testing Performance Evaluation of ML models Test Data
  • 5. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 944 Algorithm steps for finding the Best algorithm for Credit fraud detection: Step1: Import the credit card dataset into Pandas data frame Step2: Convert the data into data frames format suitable for machine learning modeling Step3: Do random sampling Step4: Split dataset into training set (70%) and testing set (30%) Step5: Fit the training dataset to the machine learning algorithms Step6: Apply the algorithms to the training dataset and create the prediction models Step7: Make Credit card fraud prediction for test dataset for each algorithm Step8: Compute the performance metrics for each machine learning algorithm Random Forest ML algorithm: Random forest (one of the most popular algorithms) is a supervised machine learning algorithm. It creates a “forest” out of an ensemble of “decision trees”, which are normally trained using the “bagging” technique. The bagging method’s basic principle is that combining different learning models improves the prediction outcome. To get a more precise and reliable forecast, random forest creates several decision trees and merges them. Fig.4 shows the Random Forest algorithm’s anomaly detection technique using majority class rule. Fig 4: Random Forest anomaly detection using Majority class technique Decision Tree ML algorithm: A decision tree is a non-parametric supervised learning algorithm, which is utilized for both classification and regression tasks. It has a hierarchical, tree structure, which consists of a root node, branches, internal nodes and leaf nodes (IBM, 2022). The experiments were carried out in Anaconda Navigator running Python 3.0 and Tensorflow environment as shown in Fig. 5. Fig.5: Anaconda Navigator Development Environment for Python
  • 6. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 945 2.1. Exploratory Data Analysis Exploratory data analysis (EDA) was carried out in Python 3, Jypyter Notebook and several statistical data analysis tool. Figs. 6 and 7 show the credit card data analysis carried out in Pandas dataframe. Fig. 6: Data Analysis showing credit card dataframe in Pandas Fig.7: Data Analysis showing data types in Pandas Fig.8 shows the printout of the percentage of credit card frauds in the database used for the experiments. Fig.8: Data Analysis showing percentage of credit card incidences in the dataset
  • 7. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 946 Fig.9 shows the printout of the dataset ratio split used for the experiments. The dataset was divided into two sets, training set was allocated 70% while testing and evaluation set was allocated 30%. Fig.9: The Dataset split into Training and Testing ratio Performance Evaluation Tools: The following performance evaluation metrics were used to evaluate the credit card prediction performances of the machine learning algorithms used in this paper. These metrics (Accuracy, Precision, Recall and F1- Score) are calculated using True Positive (TP), True Negative (TN), False Positive (FP), and False Negative (FN) parameters. When TP is likely to cause most kidney issues in a kidney patient; FPs will likely find that the rate at which kidney disease is detected is the rate at which a healthy person is found. TN hopes to reveal that a person with kidney disease is healthy. FN is prescribed when a healthy man or woman has kidney disease. Accuracy: Accuracy is the proportion of instances that are accurately classified. It is one of the most popular performance measures for machine learning categorization. Accuracy = ……………………… (1) Where TP, TN, FP and FN are referred to as True Positives, True Negatives, False Positives and False Negatives respectively as used in binary classification machine learning tasks. Precision: Precision is the number of classified Positive or fraudulent instances that actually are positive instances. Precision = ……………………………………………………………… (2) Recall: Recall is a metric that measures the proportion of accurate positive predictions among all possible positive predictions. Recall gives an indicator of missed positive predictions, unlike precision, which only comments on the accurate positive predictions out of all positive predictions. The number of true positives divided by the sum of true positives and false negatives is used to determine recall. Recall = ………………………………………………….………………(3) F1-Score: F1 Score is the weighted average of Precision and Recall. Therefore, this score takes both false positives and false negatives into account. F1-Score = ………………………………….………………(4) 3. Results and Discussions This section describes the results obtained from several experiments as carried out in the testbed. Fig. 9 shows the modeling prediction of credit card fraud by Decision Tree and Random Forest machine learning algorithms.
  • 8. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 947 Fig. 10: Modeling prediction results for credit card frauds by Decision Tree and Random Forest Algorithms From Fig.10, it is clear that Random Forest algorithm outperformed the Decision Tree Algorithm by Accuracy Score of 99.96% while Decision Tree scored 99.93%. We also carried out another experiment to comprehensively evaluate the performance of the Decision Tree and Random Forest algorithms using standard performance evaluation metrics such as Accuracy, precision, Recall and f1-score. Fig.11 and Table 1 shows the performance evaluation results obtained for Decision Tree algorithm. Decision Tree performed very well in credit card pattern detection with Accuracy score of 0.99932 or 99.93% and Precision of 0.76712, Recall=0.82353 and F1-score of 0.79433. Fig. 11: Modeling prediction performance evaluation for Decision Tree Algorithm Table 1: Decision Tree credit card fraud detection results Performance Metric Score Accuracy 0.99932 Precision 0.76712 Recall 0.82353 F1-score 0.79433 Fig.12 and Table 2 show the performance evaluation results obtained for Random Forest algorithm. Random Forest performed very well (better than Decision Tree algorithm) in credit card pattern detection with Accuracy score of 0.99961or 99.96% and Precision of 0.94783, Recall=0.80147 and F1-score of 0.86853. Fig. 12: Modeling prediction performance evaluation for Random Forest Algorithm
  • 9. International Journal of Trend in Scientific Research and Development @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD52440 | Volume – 6 | Issue – 7 | November-December 2022 Page 948 Table 2: Random Forest credit card fraud detection results Performance Metric Score Accuracy 0.99961 Precision 0.94783 Recall 0.80147 F1-score 0.86853 Table 3 shows the comparative prediction performances between Decision Tree and Random Forest algorithms. It is very clear here that Random Forest outperformed Decision Tree algorithm in credit card fraud detection with higher Accuracy, Precision and F1-score and lower Recall score. Table 3: Comparison of credit card frauds prediction performances between Decision Tree and Random Forest algorithms Performance Metric Score ML Algorithm Accuracy 0.99932 Decision Tree 0.99961 Random Forest Precision 0.76712 Decision Tree 0.94783 Random Forest Recall 0.82353 Decision Tree 0.80147 Random Forest F1-score 0.79433 Decision Tree 0.86853 Random Forest 4. Summary and Conclusion In this paper, we built a binary classifier using three machine learning algorithms such as Random Forest and Decision Trees classifiers to detect credit card fraud transactions. Through this project, we understood and applied techniques to address the class imbalance issues and achieved an accuracy of more than 99%. We applied different performance evaluation metrics such as Precision, Recall, f1-score, support and accuracy to evaluate the performance of the two Machine learning algorithms. Our comparative performance evaluation shows that Random Forest outperformed the Decision Tree algorithm in credit card fraud patterns detection. The results obtained from the experiments show that Machine learning classification algorithms such as Decision Tree and Random Forest are well suited to detect any credit card fraud before it occurs. 4.1. Future Scope Future experiments will be carried to determine the performances of hybrid ensemble machine learning algorithms by combining ensemble algorithms such as XGBoost, Random Forest with Decision Trees algorithm in carrying out fraud detection in credit cards. References: [1] Anderson, R. 2007. The Credit Scoring Toolkit: theory and practice for retail credit risk management and decision automation. New York: Oxford University Press. [2] IBM (2022).” What is a decision Tree?”. Retrieved online at https://www.ibm.com/topics/decision-trees [3] ProjectPro (2022).”How does Credit Card Fraud work?”. Accessed online at https://www.projectpro.io/article/credit-card- fraud-detection-project-with-source-code-in- python/568