SlideShare a Scribd company logo
1 of 7
Download to read offline
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
K. RAJA RAJESH REDDY
CSE-IOT
CHANDIGARH UNIVERSITY
MOHALI,PUNJAB
21BCS4795@cuchd.in
R.SESHENDRA KRISHNA
CSE-IOT
CHANDIGARH UNIVERSITY
MOHALI,PUNJAB
21BCS4555@cuchd.in
Y.ARAVIND KUMAR
CSE-IOT
CHANDIGARH UNIVERSITY
MOHALI,PUNJAB
19BCS4655@cuchd.in
PRIYA ANAND
CSE-IOT
CHANDIGARH UNIVERSITY
MOHALI,PUNJAB
21BCS9502@cuchd.in
Abstract - The rapid progress, in electronic commerce
technology has led to an increase in credit card usage as the
method of payment. However this surge in credit card usage
has also resulted in a rise in activities associated with these
cards. To effectively combat fraud cases we urgently need a
fraud detection system that can accurately identify and
prevent fraudulent transactions. In this paper we explore
the complexities of credit card fraud. Investigate various
machine learning algorithms applied to a dataset. These
algorithms include regression, naive Bayes, random forest
well as ensemble classifiers using boosting techniques.
Our research involves an examination of both existing and
proposed models for detecting credit card fraud. We
conducted a analysis of these techniques to determine their
effectiveness in addressing this critical issue. To evaluate the
performance of classification models we utilize metrics such
as accuracy, precision, recall, F1 score, support and
confusion matrix. Through our study our goal is to identify
the classifier by employing supervised learning techniques
for training and testing purposes. Ultimately we aim to
provide a solution, to combat credit card fraud.
Keyword - Accuracy, f1 score, precision, recall, support,
fraud detection, supervised techniques, credit card
I. INTRODUCTION
Credit card fraud has inflicted substantial financial losses
and reputational damage within the financial sector.
Detecting fraud in this context is challenging due to
fraudsters' diverse tactics, including using stolen or
counterfeit credit card information. Traditional rule-based
systems and conventional methods fall short of identifying
complex fraud patterns.
Machine learning, known for handling vast datasets and
uncovering intricate patterns, offers a promising solution
for credit card fraud detection. By utilizing extensive credit
card transaction data, machine learning algorithms swiftly
learn to spot fraudulent trends, enabling real-time
prevention.
This research expands the use of machine learning in
detecting credit card fraud. It explores machine learning
methods, including supervised, deep learning techniques
to assess how effectively they can identify fraudulent
transactions. The study emphasizes the importance of
creating features, interpreting models and ensuring data
quality to build fraud detection systems.
Additionally it addresses the challenges of implementing
these systems, such, as model bias, interpretability
concerns and safeguarding data privacy. Ultimately this
research aims to support institutions card issuers and
retailers in implementing fraud detection systems based
on machine learning. This will improve accuracy. Speed up
the identification of activities to protect customers and the
financial sector.
II. LITERATURE REVIEW
Various techniques have been applied to forecast
fraudulent transactions, encompassing outlier detection,
unsupervised outlier detection, peer group analysis, and
breakpoint analysis.
Outlier detection focuses on identifying transactions that
exhibit substantial deviations in scale, range, or
transaction type compared to a user's historical
transactions. However, this method carries the risk of
generating false alarms, as some of these transactions may
indeed be legitimate customer activities.
In contrast, unsupervised outlier detection is centered on
comprehending customer transaction behavior without
making explicit predictions. Its primary goal is to
scrutinize transaction patterns rather than directly
forecast fraud. Peer group analysis, meanwhile, relies on
the comparison of entities sharing similar characteristics.
International Research Journal Of Engineering And Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 386
International Research Journal Of Engineering And Technology (IRJET) e-ISSN: 2395-0056
This technique leverages common attributes to pinpoint
potentially fraudulent activities.
Additionally, the examination of breakpoints, which signify
structural shifts or anomalies in data, can offer valuable
insights. Breakpoint analysis endeavors to enhance our
understanding of the presence and occurrence of these
anomalies.
While supervised learning methods are widely utilized in
fraud detection, they are not foolproof and may encounter
limitations in specific scenarios.
III. PROBLEM STATEMENT
The task of credit card fraud detection is crucial for
preventing financial losses for both card issuers and
customers. It revolves around the real-time identification
of fraudulent credit card transactions. Several significant
challenges hinder effective credit card fraud detection:
 Transaction Volume: Credit card transactions occur
frequently and in large numbers, making it a daunting
task to differentiate between legitimate and
fraudulent transactions.
 Evolving Fraud Tactics: Fraudulent activities are in a
constant state of evolution, with fraudsters
continuously devising new strategies to evade
detection mechanisms.
 Real-time Necessity: Real-time detection is
imperative to thwart further fraud and minimize
financial losses. Identifying fraudulent transactions
promptly is essential.
To address these challenges, the proposed solution
combines rule-based systems, machine learning
algorithms, behavioral analytics, and biometric
authentication. This multifaceted approach aims to
enhance the accuracy and efficiency of credit card fraud
detection. The system's goal is to swiftly and accurately
flag fraudulent transactions using these advanced
technologies, all while minimizing false positives and
improving customer satisfaction. Moreover, the system
must remain adaptable to changing fraud patterns,
fostering continuous learning and refinement.
IV. EXISTING SYSTEM
The current approach to credit card fraud detection relies
on a combination of rule-based systems, machine learning
algorithms, and human expertise. Financial institutions
employ various methods to detect and prevent credit card
fraud, including:
 Rule-Based Systems: These systems analyze historical
data to identify potentially fraudulent transactions
based on predefined rules. These rules may
encompass transaction thresholds related to amounts,
frequency, and location. However, rule-based systems
have limitations in recognizing well-established fraud
patterns and may struggle with detecting
undiscovered fraud patterns.
 Machine Learning Algorithms: Real-time machine
learning algorithms are used to identify both known
and unknown fraud behaviors. These algorithms
leverage historical transaction data to detect trends
and anomalies in new transactions. The effectiveness
of machine learning algorithms is heavily influenced
by the accuracy and volume of the training data they
receive.
 Human Experts: Banks and financial organizations
also involve human experts who assess potentially
fraudulent transactions and validate transaction
legitimacy. Human experts rely on their expertise and
judgment to identify emerging fraud trends and
provide insights to improve system performance.
However, the current system has several drawbacks,
including a high false-positive rate that can lead to
legitimate transactions being declined. Moreover, the
system may struggle to identify newly emerging fraud
patterns and novel types of fraud not covered by existing
rules or training data. Additionally, the system may face
challenges in handling the complexity of evolving fraud
patterns and the increasing volume of transactions.
V. PROPOSED SYSTEM
The accuracy and effectiveness of the current system can
be increased by using more sophisticated techniques, such
as behavioral analytics and biometric authentication.
Biometric authentication can prove the identity of the
cardholder and stop unauthorized use of the card, while
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 387
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
International Research Journal Of Engineering And Technology (IRJET) e-ISSN: 2395-0056
behavioral analytics can spot patterns in user behavior
that may be signs of fraud. Banks and other financial
organizations can increase the efficiency of credit card
fraud detection and prevention by integrating these
techniques with the current system.
To analyze a lot of transaction data and find fraudulent
trends, machine learning is widely employed in credit card
fraud detection. The following are the primary processes
for utilizing machine learning to detect credit card fraud:
The first step is to gather transaction data and preprocess
it to weed out any unnecessary or redundant information.
The machine-learning models are then trained using this
data.
Engineering features The process of feature engineering
involves choosing and modifying the pertinent traits or
variables that can be used to spot fraudulent credit card
transactions. Variables like transaction value, time, place,
kind of merchant, and user behavior may be included in
this.
Model training: Utilizing the pre-processed and engineered
data, the machine learning models will then be trained.
The models are taught to recognize data patterns that
point to unauthorized credit card transactions.
Model evaluation: Following training, the models are
assessed on a different dataset to ascertain their precision
and efficiency in identifying fraudulent credit card
transactions.
Last but not least, the trained machine learning models are
put into use in a real-world setting to continuously track
credit card transactions and spot fraudulent activity.
Among the machine learning algorithms used to detect
credit card fraud are:
By utilizing input features in conjunction with statistical
technique logistic regression analysis can be employed to
determine whether a given transaction is fraudulent or
not. To enhance prediction accuracy multiple decision
trees are combined using a technique called forest
learning.
Gradient boosting is a machine learning technique that
develops a strong learner by assembling a set of weak
learner models, which can be used to spot fraudulent
transactions.
Deep learning is a neural network-based method that may
be used to discover intricate relationships and patterns
between the input features and the target variable. It is
especially useful when working with enormous volumes of
data.
The algorithms that we have used to perform credit card
fraud detection are logistic regression, support vector
machine (SVM), and random forest.
Logistic Regression: Logistic regression is a statistical
technique commonly used in credit card fraud detection. It
operates by examining various features or attributes
associated with credit card transactions to determine
whether a transaction is fraudulent or legitimate. In
essence, it's like a detective looking for clues. For instance,
it might consider factors such as transaction amount,
location, time, and previous user behavior.
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 388
International Research Journal Of Engineering And Technology (IRJET) e-ISSN: 2395-0056
The core idea behind logistic regression is to create a
mathematical model that can predict the probability of a
transaction being fraudulent. If the probability surpasses a
predefined threshold, the transaction is flagged as
potentially fraudulent. This method is particularly useful
when dealing with binary classification problems like
fraud detection (fraudulent or not).
Support Vector Machine (SVM): Support Vector Machine,
or SVM, is another valuable tool in credit card fraud
detection. It's aims to drawing a line in a scatterplot that
best separates fraudulent transactions from legitimate
ones. This line, known as the hyperplane, maximizes the
margin between the two classes, making it a robust
method for distinguishing between the two.
In the context of credit card fraud detection, SVM can be
applied by considering various transaction features. It
works well when there's a clear boundary or distinction
between legitimate and fraudulent transactions in the data.
SVM strives to find this optimal boundary while
minimizing the risk of misclassifying transactions. It's a
versatile method and can handle complex datasets
effectively.
Random Forest:Random Forest is a technique commonly
used in credit card fraud detection that involves a group of
decision trees working together collectively to make
decisions. It leverages the wisdom of decision trees to
improve accuracy while also being robust against
overfitting. A situation where a model becomes too
specific, to training data and performs poorly on new data.
Each decision tree examines various features of a
transaction and casts a vote on whether it's fraudulent or
not.
When it comes to detecting credit card fraud many people
prefer using Random Forest because it can effectively
handle intricate datasets while accurately determining if a
transaction is authentic or not.
VI. METHODOLOGY
The methods for detecting credit card fraud include the
following steps:
Data Collection: Gathering transaction data from several
sources, such as credit card issuers, payment processors,
and merchants, is the initial stage. Information on
transaction amount, location, timing, merchant type, and
user behaviour should all be included in the data gathered.
Data Preprocessing: To make the data ready for future
examination, it should be preprocessed to remove any
unnecessary or duplicated information. This could involve
cleansing, normalizing, and transforming the data.
Feature Extraction: The process of feature engineering is
choosing and modifying the pertinent traits or variables
that can be used to spot fraudulent credit card
transactions. Variables like transaction amount, location,
time, merchant type, and user behaviour may be included
in this.
Model Selection and training: The following step is to
choose the best machine learning models based on the
type of data and the issue at hand. The chosen models
should be trained using the proper training methods on
the preprocessed and engineered data.
Model Evaluation: Upon training, the models should be
assessed on a different dataset to ascertain their precision
and efficiency in identifying fraudulent credit card
transactions.
The effectiveness of the models should be assessed using
evaluation criteria including precision, recall, and F1 score.
Model Deployment: In order to continuously monitor
credit card transactions and identify fraudulent behaviour
in real time, trained machine learning models need to be
deployed in a production environment.
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 389
International Research Journal Of Engineering And Technology (IRJET) e-ISSN: 2395-0056
The technique should also outl ine how to evaluate the
system's performance on an ongoing basis and alter it as
needed to increase accuracy and productivity. It should be
possible for the system to adjust to shifting fraud
tendencies as well as continuously learn and get better
over time. The approach should also guarantee adherence
to legal specifications for credit card fraud detection, such
as the Payment Card Industry Data Security Standards (PCI
DSS).
VII. FUTURE SCOPE
The future potential, for detecting fraud in credit card
transactions is extensive. Progressing rapidly. One of the
areas involves utilizing artificial intelligence (AI) and
machine learning (ML) to create more sophisticated and
accurate models for detecting fraudulent activity. By
analyzing sets of transactions these AI and ML models can
learn patterns and anomalies that may indicate fraudulent
behavior. This advanced approach enables the detection of
both unknown types of fraud in time.
Another important area of future development is the
integration of fraud detection systems with other
technologies, such as behavioral analytics and device
fingerprinting. This can help to create a more holistic view
of customer activity and identify suspicious behavior more
effectively. For example, a fraud detection system could
use behavioral analytics to identify customers who are
suddenly making large purchases or who are accessing
their account from unusual locations.
Finally, there is a growing need for fraud detection
systems to be able to work across multiple channels. This
is because fraudsters are increasingly targeting customers
across multiple channels, such as online, offline, and
mobile. Fraud detection systems need to be able to share
data and insights across channels in order to effectively
detect fraud.
VIII. RESULT & OUTPUTS
The results of algorithms that we have used to perform
the credit card fraud detection are:
Logistic Regression: Visualize the Confusion matrix for
Logistic regression algorithm
The evaluation metrics of the Logistic Regression model
will be as follows
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 390
International Research Journal Of Engineering And Technology (IRJET) e-ISSN: 2395-0056
Support Vector Machine: Visualize the Confusion matrix
for Support Vector Machine(SVM) algorithm
The evaluation metrics of the Support Vector
Machine(SVM) model will be as follows
Random Forest(RF): Visualize the Confusion matrix for
Random Forest algorithm
The evaluation metrics of the Random Forest model will
be as follows
IX. CONCLUSION
Credit card fraud is a major problem that costs millions of
dollars each year. Machine learning algorithms can now be
used to detect fraud in real time. This project proposes a
system that uses machine learning models to identify
credit card fraud.
The project team collected transactional data from various
sources, preprocessed it, extracted features, selected
machine learning models, trained them, and evaluated
their performance. The experimental environment was
designed to ensure that the machine learning models could
reliably, accurately, and efficiently identify fraudulent
credit card transactions.
The researchers used a variety of machine learning models,
performance metrics, and evaluation methods to assess
the system's performance. The results showed that the
proposed methodology could identify fraudulent
transactions with high precision and recall rates.
Implementing the proposed credit card fraud detection
system in an environment would allow monitoring of
credit card transactions helping to identify any suspicious
or fraudulent activities as they occur. Such a system would
be instrumental in reducing losses safeguarding customers
and enhancing the reputation of institutions.
In conclusion, the proposed machine learning model-based
credit card fraud detection system has the potential to
significantly improve the security of credit card
transactions and reduce the risk of fraud.
To sum up this project suggests utilizing a machine
learning model based system to detect credit card fraud,
with precision and recall rates. When implemented in real
time monitoring scenarios it has the potential to
significantly enhance the security of credit card
transactions while minimizing the risk of incidents.
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 391
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
X. REFERENCES
1. F. A. Almarshad, G. A. Gashgari and A. I. A. Alzahrani,
"Generative Adversarial Networks-Based Novel
Approach for Fraud Detection for the European
Cardholders 2013 Dataset," in IEEE Access, vol. 11, pp.
107348-107368,2023,doi: 10.1109/ACCESS.2023.332
0072.
2. V, Viswanatha and A.C, Ramachandra and V, Deeksha
and R, Ranjitha, Online Fraud Detection Using Machine
Learning Approach (August 7, 2023). International
Journal of Engineering and Management Research |
Volume-13, Issue-4 (August 2023), Available at
SSRN: https://ssrn.com/abstract=4533856.
3. Vaishnavi Nath Dornadula, S Geetha,Credit Card Fraud
Detection using Machine Learning Algorithms,Procedia
Computer Science,Volume 165,2019,Pages 631-
641,ISSN1877-
0509,https://doi.org/10.1016/j.procs.2020.
01.057.
4. Ryman-Tubb, Nick F., Paul Krause, and Wolfgang Garn.
"How Artificial Intelligence and machine learning
research impacts payment card fraud detection: A
survey and industry benchmark." Engineering
Applications of Artificial Intelligence 76 (2018): 130-
157.
5. Tiwari, P., Mehta, S., Sakhuja, N., Kumar, J., & Singh, A.
K. (2021). Credit card fraud detection using machine
learning: a study. arXiv preprint arXiv:2108.10005.
6. Maniraj, S. P., Saini, A., Ahmed, S., & Sarkar, S. (2019).
Credit card fraud detection using machine learning and
data science. International Journal of Engineering
Research, 8(9), 110-115.
7. Jonnalagadda, Vaishnave, Priya Gupta, and Eesita Sen.
"Credit card fraud detection using Random Forest
Algorithm." International Journal of Advance Research,
Ideas and Innovations in Technology 5.2 (2019): 1-5.
8. Ileberi, E., Sun, Y. & Wang, Z. A machine learning based
credit card fraud detection using the GA algorithm for
feature selection. J Big Data 9, 24 (2022).
https://doi.org/10.1186/s40537-022-00573-8.
9. D. Singh, "Protecting Contactless Credit Card Payments
from Fraud through Ambient Authentication and
Machine Learning," 2023 3rd International Conference
on Advances in Computing, Communication, Embedded
and Secure Systems (ACCESS), Kalady, Ernakulam,
India,023,pp.221-225,doi:10.1109/ACCESS57397.2023.
10200022.
International Research Journal Of Engineering And Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
10. F. A. Ghaleb, F. Saeed, M. Al-Sarem, S. N. Qasem and T.
Al-Hadhrami, "Ensemble Synthesized Minority
Oversampling-Based Generative Adversarial Networks
and Random Forest Algorithm for Credit Card Fraud
Detection," in IEEE Access, vol.11,pp.89694-
89710,2023,doi:10.1109/ACCESS.2023.3306
621.
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 392

More Related Content

Similar to FRAUD DETECTION IN CREDIT CARD TRANSACTIONS

Online Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningOnline Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningIRJET Journal
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
A rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detectionA rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detectionIJECEIAES
 
credit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractcredit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractVenkat Projects
 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...IRJET Journal
 
A Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine LearningA Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine Learningijtsrd
 
RSB72-PPT.pptx
RSB72-PPT.pptxRSB72-PPT.pptx
RSB72-PPT.pptxAryanGour1
 
Analysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionAnalysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionIOSR Journals
 
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfShrutiGarg649495
 
IRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET Journal
 
Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyIJMER
 
shyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptx
shyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptxshyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptx
shyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptxShyamaprasadMS
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
 
160987-time-template-4x3.pptx
160987-time-template-4x3.pptx160987-time-template-4x3.pptx
160987-time-template-4x3.pptxAryanGour1
 
Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detectionijtsrd
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesIJSRD
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionIRJET Journal
 

Similar to FRAUD DETECTION IN CREDIT CARD TRANSACTIONS (20)

Online Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningOnline Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine Learning
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detectionA rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detection
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
 
credit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractcredit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstract
 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
 
A Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine LearningA Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine Learning
 
RSB72-PPT.pptx
RSB72-PPT.pptxRSB72-PPT.pptx
RSB72-PPT.pptx
 
J017216164
J017216164J017216164
J017216164
 
Analysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionAnalysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud Detection
 
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
 
IRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine Learning
 
Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A Survey
 
shyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptx
shyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptxshyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptx
shyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptx
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
 
160987-time-template-4x3.pptx
160987-time-template-4x3.pptx160987-time-template-4x3.pptx
160987-time-template-4x3.pptx
 
Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detection
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud Detection
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

FRAUD DETECTION IN CREDIT CARD TRANSACTIONS

  • 1. FRAUD DETECTION IN CREDIT CARD TRANSACTIONS K. RAJA RAJESH REDDY CSE-IOT CHANDIGARH UNIVERSITY MOHALI,PUNJAB 21BCS4795@cuchd.in R.SESHENDRA KRISHNA CSE-IOT CHANDIGARH UNIVERSITY MOHALI,PUNJAB 21BCS4555@cuchd.in Y.ARAVIND KUMAR CSE-IOT CHANDIGARH UNIVERSITY MOHALI,PUNJAB 19BCS4655@cuchd.in PRIYA ANAND CSE-IOT CHANDIGARH UNIVERSITY MOHALI,PUNJAB 21BCS9502@cuchd.in Abstract - The rapid progress, in electronic commerce technology has led to an increase in credit card usage as the method of payment. However this surge in credit card usage has also resulted in a rise in activities associated with these cards. To effectively combat fraud cases we urgently need a fraud detection system that can accurately identify and prevent fraudulent transactions. In this paper we explore the complexities of credit card fraud. Investigate various machine learning algorithms applied to a dataset. These algorithms include regression, naive Bayes, random forest well as ensemble classifiers using boosting techniques. Our research involves an examination of both existing and proposed models for detecting credit card fraud. We conducted a analysis of these techniques to determine their effectiveness in addressing this critical issue. To evaluate the performance of classification models we utilize metrics such as accuracy, precision, recall, F1 score, support and confusion matrix. Through our study our goal is to identify the classifier by employing supervised learning techniques for training and testing purposes. Ultimately we aim to provide a solution, to combat credit card fraud. Keyword - Accuracy, f1 score, precision, recall, support, fraud detection, supervised techniques, credit card I. INTRODUCTION Credit card fraud has inflicted substantial financial losses and reputational damage within the financial sector. Detecting fraud in this context is challenging due to fraudsters' diverse tactics, including using stolen or counterfeit credit card information. Traditional rule-based systems and conventional methods fall short of identifying complex fraud patterns. Machine learning, known for handling vast datasets and uncovering intricate patterns, offers a promising solution for credit card fraud detection. By utilizing extensive credit card transaction data, machine learning algorithms swiftly learn to spot fraudulent trends, enabling real-time prevention. This research expands the use of machine learning in detecting credit card fraud. It explores machine learning methods, including supervised, deep learning techniques to assess how effectively they can identify fraudulent transactions. The study emphasizes the importance of creating features, interpreting models and ensuring data quality to build fraud detection systems. Additionally it addresses the challenges of implementing these systems, such, as model bias, interpretability concerns and safeguarding data privacy. Ultimately this research aims to support institutions card issuers and retailers in implementing fraud detection systems based on machine learning. This will improve accuracy. Speed up the identification of activities to protect customers and the financial sector. II. LITERATURE REVIEW Various techniques have been applied to forecast fraudulent transactions, encompassing outlier detection, unsupervised outlier detection, peer group analysis, and breakpoint analysis. Outlier detection focuses on identifying transactions that exhibit substantial deviations in scale, range, or transaction type compared to a user's historical transactions. However, this method carries the risk of generating false alarms, as some of these transactions may indeed be legitimate customer activities. In contrast, unsupervised outlier detection is centered on comprehending customer transaction behavior without making explicit predictions. Its primary goal is to scrutinize transaction patterns rather than directly forecast fraud. Peer group analysis, meanwhile, relies on the comparison of entities sharing similar characteristics. International Research Journal Of Engineering And Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 386
  • 2. International Research Journal Of Engineering And Technology (IRJET) e-ISSN: 2395-0056 This technique leverages common attributes to pinpoint potentially fraudulent activities. Additionally, the examination of breakpoints, which signify structural shifts or anomalies in data, can offer valuable insights. Breakpoint analysis endeavors to enhance our understanding of the presence and occurrence of these anomalies. While supervised learning methods are widely utilized in fraud detection, they are not foolproof and may encounter limitations in specific scenarios. III. PROBLEM STATEMENT The task of credit card fraud detection is crucial for preventing financial losses for both card issuers and customers. It revolves around the real-time identification of fraudulent credit card transactions. Several significant challenges hinder effective credit card fraud detection:  Transaction Volume: Credit card transactions occur frequently and in large numbers, making it a daunting task to differentiate between legitimate and fraudulent transactions.  Evolving Fraud Tactics: Fraudulent activities are in a constant state of evolution, with fraudsters continuously devising new strategies to evade detection mechanisms.  Real-time Necessity: Real-time detection is imperative to thwart further fraud and minimize financial losses. Identifying fraudulent transactions promptly is essential. To address these challenges, the proposed solution combines rule-based systems, machine learning algorithms, behavioral analytics, and biometric authentication. This multifaceted approach aims to enhance the accuracy and efficiency of credit card fraud detection. The system's goal is to swiftly and accurately flag fraudulent transactions using these advanced technologies, all while minimizing false positives and improving customer satisfaction. Moreover, the system must remain adaptable to changing fraud patterns, fostering continuous learning and refinement. IV. EXISTING SYSTEM The current approach to credit card fraud detection relies on a combination of rule-based systems, machine learning algorithms, and human expertise. Financial institutions employ various methods to detect and prevent credit card fraud, including:  Rule-Based Systems: These systems analyze historical data to identify potentially fraudulent transactions based on predefined rules. These rules may encompass transaction thresholds related to amounts, frequency, and location. However, rule-based systems have limitations in recognizing well-established fraud patterns and may struggle with detecting undiscovered fraud patterns.  Machine Learning Algorithms: Real-time machine learning algorithms are used to identify both known and unknown fraud behaviors. These algorithms leverage historical transaction data to detect trends and anomalies in new transactions. The effectiveness of machine learning algorithms is heavily influenced by the accuracy and volume of the training data they receive.  Human Experts: Banks and financial organizations also involve human experts who assess potentially fraudulent transactions and validate transaction legitimacy. Human experts rely on their expertise and judgment to identify emerging fraud trends and provide insights to improve system performance. However, the current system has several drawbacks, including a high false-positive rate that can lead to legitimate transactions being declined. Moreover, the system may struggle to identify newly emerging fraud patterns and novel types of fraud not covered by existing rules or training data. Additionally, the system may face challenges in handling the complexity of evolving fraud patterns and the increasing volume of transactions. V. PROPOSED SYSTEM The accuracy and effectiveness of the current system can be increased by using more sophisticated techniques, such as behavioral analytics and biometric authentication. Biometric authentication can prove the identity of the cardholder and stop unauthorized use of the card, while © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 387 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
  • 3. International Research Journal Of Engineering And Technology (IRJET) e-ISSN: 2395-0056 behavioral analytics can spot patterns in user behavior that may be signs of fraud. Banks and other financial organizations can increase the efficiency of credit card fraud detection and prevention by integrating these techniques with the current system. To analyze a lot of transaction data and find fraudulent trends, machine learning is widely employed in credit card fraud detection. The following are the primary processes for utilizing machine learning to detect credit card fraud: The first step is to gather transaction data and preprocess it to weed out any unnecessary or redundant information. The machine-learning models are then trained using this data. Engineering features The process of feature engineering involves choosing and modifying the pertinent traits or variables that can be used to spot fraudulent credit card transactions. Variables like transaction value, time, place, kind of merchant, and user behavior may be included in this. Model training: Utilizing the pre-processed and engineered data, the machine learning models will then be trained. The models are taught to recognize data patterns that point to unauthorized credit card transactions. Model evaluation: Following training, the models are assessed on a different dataset to ascertain their precision and efficiency in identifying fraudulent credit card transactions. Last but not least, the trained machine learning models are put into use in a real-world setting to continuously track credit card transactions and spot fraudulent activity. Among the machine learning algorithms used to detect credit card fraud are: By utilizing input features in conjunction with statistical technique logistic regression analysis can be employed to determine whether a given transaction is fraudulent or not. To enhance prediction accuracy multiple decision trees are combined using a technique called forest learning. Gradient boosting is a machine learning technique that develops a strong learner by assembling a set of weak learner models, which can be used to spot fraudulent transactions. Deep learning is a neural network-based method that may be used to discover intricate relationships and patterns between the input features and the target variable. It is especially useful when working with enormous volumes of data. The algorithms that we have used to perform credit card fraud detection are logistic regression, support vector machine (SVM), and random forest. Logistic Regression: Logistic regression is a statistical technique commonly used in credit card fraud detection. It operates by examining various features or attributes associated with credit card transactions to determine whether a transaction is fraudulent or legitimate. In essence, it's like a detective looking for clues. For instance, it might consider factors such as transaction amount, location, time, and previous user behavior. Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 388
  • 4. International Research Journal Of Engineering And Technology (IRJET) e-ISSN: 2395-0056 The core idea behind logistic regression is to create a mathematical model that can predict the probability of a transaction being fraudulent. If the probability surpasses a predefined threshold, the transaction is flagged as potentially fraudulent. This method is particularly useful when dealing with binary classification problems like fraud detection (fraudulent or not). Support Vector Machine (SVM): Support Vector Machine, or SVM, is another valuable tool in credit card fraud detection. It's aims to drawing a line in a scatterplot that best separates fraudulent transactions from legitimate ones. This line, known as the hyperplane, maximizes the margin between the two classes, making it a robust method for distinguishing between the two. In the context of credit card fraud detection, SVM can be applied by considering various transaction features. It works well when there's a clear boundary or distinction between legitimate and fraudulent transactions in the data. SVM strives to find this optimal boundary while minimizing the risk of misclassifying transactions. It's a versatile method and can handle complex datasets effectively. Random Forest:Random Forest is a technique commonly used in credit card fraud detection that involves a group of decision trees working together collectively to make decisions. It leverages the wisdom of decision trees to improve accuracy while also being robust against overfitting. A situation where a model becomes too specific, to training data and performs poorly on new data. Each decision tree examines various features of a transaction and casts a vote on whether it's fraudulent or not. When it comes to detecting credit card fraud many people prefer using Random Forest because it can effectively handle intricate datasets while accurately determining if a transaction is authentic or not. VI. METHODOLOGY The methods for detecting credit card fraud include the following steps: Data Collection: Gathering transaction data from several sources, such as credit card issuers, payment processors, and merchants, is the initial stage. Information on transaction amount, location, timing, merchant type, and user behaviour should all be included in the data gathered. Data Preprocessing: To make the data ready for future examination, it should be preprocessed to remove any unnecessary or duplicated information. This could involve cleansing, normalizing, and transforming the data. Feature Extraction: The process of feature engineering is choosing and modifying the pertinent traits or variables that can be used to spot fraudulent credit card transactions. Variables like transaction amount, location, time, merchant type, and user behaviour may be included in this. Model Selection and training: The following step is to choose the best machine learning models based on the type of data and the issue at hand. The chosen models should be trained using the proper training methods on the preprocessed and engineered data. Model Evaluation: Upon training, the models should be assessed on a different dataset to ascertain their precision and efficiency in identifying fraudulent credit card transactions. The effectiveness of the models should be assessed using evaluation criteria including precision, recall, and F1 score. Model Deployment: In order to continuously monitor credit card transactions and identify fraudulent behaviour in real time, trained machine learning models need to be deployed in a production environment. Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 389
  • 5. International Research Journal Of Engineering And Technology (IRJET) e-ISSN: 2395-0056 The technique should also outl ine how to evaluate the system's performance on an ongoing basis and alter it as needed to increase accuracy and productivity. It should be possible for the system to adjust to shifting fraud tendencies as well as continuously learn and get better over time. The approach should also guarantee adherence to legal specifications for credit card fraud detection, such as the Payment Card Industry Data Security Standards (PCI DSS). VII. FUTURE SCOPE The future potential, for detecting fraud in credit card transactions is extensive. Progressing rapidly. One of the areas involves utilizing artificial intelligence (AI) and machine learning (ML) to create more sophisticated and accurate models for detecting fraudulent activity. By analyzing sets of transactions these AI and ML models can learn patterns and anomalies that may indicate fraudulent behavior. This advanced approach enables the detection of both unknown types of fraud in time. Another important area of future development is the integration of fraud detection systems with other technologies, such as behavioral analytics and device fingerprinting. This can help to create a more holistic view of customer activity and identify suspicious behavior more effectively. For example, a fraud detection system could use behavioral analytics to identify customers who are suddenly making large purchases or who are accessing their account from unusual locations. Finally, there is a growing need for fraud detection systems to be able to work across multiple channels. This is because fraudsters are increasingly targeting customers across multiple channels, such as online, offline, and mobile. Fraud detection systems need to be able to share data and insights across channels in order to effectively detect fraud. VIII. RESULT & OUTPUTS The results of algorithms that we have used to perform the credit card fraud detection are: Logistic Regression: Visualize the Confusion matrix for Logistic regression algorithm The evaluation metrics of the Logistic Regression model will be as follows Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 390
  • 6. International Research Journal Of Engineering And Technology (IRJET) e-ISSN: 2395-0056 Support Vector Machine: Visualize the Confusion matrix for Support Vector Machine(SVM) algorithm The evaluation metrics of the Support Vector Machine(SVM) model will be as follows Random Forest(RF): Visualize the Confusion matrix for Random Forest algorithm The evaluation metrics of the Random Forest model will be as follows IX. CONCLUSION Credit card fraud is a major problem that costs millions of dollars each year. Machine learning algorithms can now be used to detect fraud in real time. This project proposes a system that uses machine learning models to identify credit card fraud. The project team collected transactional data from various sources, preprocessed it, extracted features, selected machine learning models, trained them, and evaluated their performance. The experimental environment was designed to ensure that the machine learning models could reliably, accurately, and efficiently identify fraudulent credit card transactions. The researchers used a variety of machine learning models, performance metrics, and evaluation methods to assess the system's performance. The results showed that the proposed methodology could identify fraudulent transactions with high precision and recall rates. Implementing the proposed credit card fraud detection system in an environment would allow monitoring of credit card transactions helping to identify any suspicious or fraudulent activities as they occur. Such a system would be instrumental in reducing losses safeguarding customers and enhancing the reputation of institutions. In conclusion, the proposed machine learning model-based credit card fraud detection system has the potential to significantly improve the security of credit card transactions and reduce the risk of fraud. To sum up this project suggests utilizing a machine learning model based system to detect credit card fraud, with precision and recall rates. When implemented in real time monitoring scenarios it has the potential to significantly enhance the security of credit card transactions while minimizing the risk of incidents. © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 391 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072
  • 7. X. REFERENCES 1. F. A. Almarshad, G. A. Gashgari and A. I. A. Alzahrani, "Generative Adversarial Networks-Based Novel Approach for Fraud Detection for the European Cardholders 2013 Dataset," in IEEE Access, vol. 11, pp. 107348-107368,2023,doi: 10.1109/ACCESS.2023.332 0072. 2. V, Viswanatha and A.C, Ramachandra and V, Deeksha and R, Ranjitha, Online Fraud Detection Using Machine Learning Approach (August 7, 2023). International Journal of Engineering and Management Research | Volume-13, Issue-4 (August 2023), Available at SSRN: https://ssrn.com/abstract=4533856. 3. Vaishnavi Nath Dornadula, S Geetha,Credit Card Fraud Detection using Machine Learning Algorithms,Procedia Computer Science,Volume 165,2019,Pages 631- 641,ISSN1877- 0509,https://doi.org/10.1016/j.procs.2020. 01.057. 4. Ryman-Tubb, Nick F., Paul Krause, and Wolfgang Garn. "How Artificial Intelligence and machine learning research impacts payment card fraud detection: A survey and industry benchmark." Engineering Applications of Artificial Intelligence 76 (2018): 130- 157. 5. Tiwari, P., Mehta, S., Sakhuja, N., Kumar, J., & Singh, A. K. (2021). Credit card fraud detection using machine learning: a study. arXiv preprint arXiv:2108.10005. 6. Maniraj, S. P., Saini, A., Ahmed, S., & Sarkar, S. (2019). Credit card fraud detection using machine learning and data science. International Journal of Engineering Research, 8(9), 110-115. 7. Jonnalagadda, Vaishnave, Priya Gupta, and Eesita Sen. "Credit card fraud detection using Random Forest Algorithm." International Journal of Advance Research, Ideas and Innovations in Technology 5.2 (2019): 1-5. 8. Ileberi, E., Sun, Y. & Wang, Z. A machine learning based credit card fraud detection using the GA algorithm for feature selection. J Big Data 9, 24 (2022). https://doi.org/10.1186/s40537-022-00573-8. 9. D. Singh, "Protecting Contactless Credit Card Payments from Fraud through Ambient Authentication and Machine Learning," 2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS), Kalady, Ernakulam, India,023,pp.221-225,doi:10.1109/ACCESS57397.2023. 10200022. International Research Journal Of Engineering And Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 11 | Nov 2023 www.irjet.net p-ISSN: 2395-0072 10. F. A. Ghaleb, F. Saeed, M. Al-Sarem, S. N. Qasem and T. Al-Hadhrami, "Ensemble Synthesized Minority Oversampling-Based Generative Adversarial Networks and Random Forest Algorithm for Credit Card Fraud Detection," in IEEE Access, vol.11,pp.89694- 89710,2023,doi:10.1109/ACCESS.2023.3306 621. © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 392