SlideShare a Scribd company logo
1 of 29
CRIME
DETECTION
PRESENTED BY:
ANKUSH DEEP
11SBSCA009
ABSTRACT
 About: Identity crime is well known, prevalent, and costly and credit application
fraud is a specific case of identity crime. The existing non-data mining detection
systems of business rules and scorecards, and known fraud matching have limitations.
 Solution: To address these limitations and combat identity crime in real-time, this
paper proposes a new multi-layered detection system complemented with additional
layer Communal Detection. CD finds real social relationships to reduce the suspicion
score, and is tamper-resistant to synthetic social relationships. It is the whitelist-
oriented approach on a fixed set of attributes. The CD algorithm matches all links
against the whitelist to find communal relationships and reduce their link score. CD
can detect more types of attacks, better account for changing legal behavior.
Technology Used :
- jdk 1.7(NetBeans IDE 7.3.1)
- Apache Tomcat 7.0(Web Server)
-MySQL as backend.
INTRODUCTION
 At one extreme, synthetic identity fraud refers to the use of plausible but
fictitious identities.
 Real identity theft refers to illegal use of innocent people’s complete identity
details. These can be harder to obtain (although large volumes of some identity
data are widely available) but easier to successfully apply.
 As in identity crime, credit application fraud has reached a critical mass of
fraudsters who are highly experienced, organized, and sophisticated .Their
visible patterns can be different to each other and constantly change.
 To provide confidentiality and security so that fraudsters can be stopped.
 A reliable and compositional attempt of letting not the illegal things happen.
OBJECTIVE
 Synthetic Identity fraud and real identity theft should be stopped .
 The main motto behind this is to stop fraudsters rom using innocent peoples
identity and misusing it for their illegal works.
 existing non-data mining detection systems of business rules and scorecards,
and known fraud matching have limitations. To address these limitations and
combat identity crime in real-time, this paper proposes a new multi-layered
detection system complemented with additional layer Communal Detection.
 CD finds real social relationships to reduce the suspicion score, and is tamper-
resistant to synthetic social relationships. It is the whitelist-oriented approach
on a fixed set of attributes.
EXISTING SYSTEM
 The first existing defense is made up of business rules and scorecards. In
Australia, one business rule is the hundred-point physical identity check test
which requires the applicant to provide sufficient point-weighted identity
documents face-to-face.
 They must add up to at least one hundred points, where a passport is worth
seventy points. Another business rule is to contact (or investigate) the applicant
over the telephone or Internet.
 The above two business rules are highly effective, but human resource
intensive. To rely less on human resources, a common business rule is to match
an application’s identity number, address, or phone number against external
databases.
PROPOSED SYSTEM
 Identity crime has become prominent because there is so much real identity
data available on the Web, and confidential data accessible through unsecured
mailboxes.
 There are two types of duplicates: exact (or identical) duplicates have the all
same values; near (or approximate) duplicates have some same values (or
characters), some similar values with slightly altered spellings, or both.
 Here we use communal detection algorithm. To account for legal behavior and
data errors, Communal Detection (CD) is the whitelist-oriented approach on a
fixed set of attributes.
SYSTEM MODULES
 Credit module: Credit applications are Internet or paper-based forms with
written requests by potential customers for credit cards, mortgage loans, and
personal loans. Users should submit identity details and it must be original. To
reduce identity crime, the most important textual identity attributes such as
personal name, fathers name, date of birth, mobile number, Address, Email id
must be used in credit application.
 Making Whitelist: CD finds real social relationships to reduce the suspicion
score, and is tamper-resistant to synthetic social relationships.
 Verification Module: In this module loan provider verify the user identity
details.
SYSTEM SPECIFICATION
 H/W System Configuration:-

 Processor - Pentium –III

 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Floppy Drive - 1.44 MB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
 S/W System Configuration:-

 Operating System :Windows95/98/2000/XP
 Application Server : Tomcat5.0/6.X
 Front End : HTML, Java, Jsp
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : Mysql
 Database Connectivity : JDBC.
SYSTEM DESIGN
ADMIN DFD
USER DFD
USE CASE DIAGRAM
SAMPLE SCREENS
HOMEPAGE
USER REGISTRATION PAGE
USER LOGIN PAGE
PERSONAL DETAILS FOR LOANS
LOAN APPLICATION FORM
CHECK STATUS
CHANGE PASSWORD PAGE
NEW APPLICATION FOUND
ADMIN VERIFYING USERS
ADMIN VERIFYING USER DETAILS
USER ACCEPTED BY ADMIN
BACKUP
APPLY LOAN
CHECK STATUS
CONCLUSION
 Our detection system describes an important domain that has many problems
relevant to other data mining research. It has documented the development and
evaluation in the data mining layers of defence for a real-time credit application
fraud detection system.
 The implementation of CD algorithms is practical because these algorithms are
designed for actual use to complement the existing detection system.
Nevertheless, there are limitations.
 The overall implementation of crime detection is to make sure that the crime
using innocent peoples documents should be taken care of handled properly.
FUTURE ENHANCEMENT
 Hierarchy modification/additional capabilities are inbuilt in the system.
 Dynamic screens/web page according to requirement can be introduced any
time.
 System is very flexible for future modifications.
 The modifications and changings can be done by adding more features to it for
advanced form of verification.
CRIME DETECTION

More Related Content

What's hot (20)

William Bonger's Economic Theory of causation of Crime
William Bonger's Economic Theory of causation of CrimeWilliam Bonger's Economic Theory of causation of Crime
William Bonger's Economic Theory of causation of Crime
 
Containment theory
Containment theoryContainment theory
Containment theory
 
Criminology powerpoint one
Criminology powerpoint oneCriminology powerpoint one
Criminology powerpoint one
 
THE MODEL POLICE ACT, 2006
THE MODEL POLICE ACT, 2006THE MODEL POLICE ACT, 2006
THE MODEL POLICE ACT, 2006
 
White collar crime
White collar crimeWhite collar crime
White collar crime
 
Reforms in indian police system
Reforms in indian police systemReforms in indian police system
Reforms in indian police system
 
white collar crime definition extent forms in india
white collar crime definition extent forms in indiawhite collar crime definition extent forms in india
white collar crime definition extent forms in india
 
Organized Crime
Organized CrimeOrganized Crime
Organized Crime
 
Organisation of prosecutors
Organisation of prosecutorsOrganisation of prosecutors
Organisation of prosecutors
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
SocioEconomic Offenses
SocioEconomic OffensesSocioEconomic Offenses
SocioEconomic Offenses
 
Prison Reform
Prison ReformPrison Reform
Prison Reform
 
Police Reform :SSB 57
Police Reform :SSB 57Police Reform :SSB 57
Police Reform :SSB 57
 
A short introduction to multimedia forensics the science discovering the hist...
A short introduction to multimedia forensics the science discovering the hist...A short introduction to multimedia forensics the science discovering the hist...
A short introduction to multimedia forensics the science discovering the hist...
 
White collar crimes
White collar crimesWhite collar crimes
White collar crimes
 
CCTNS
CCTNS CCTNS
CCTNS
 
Smuggling
SmugglingSmuggling
Smuggling
 
Crime Detection
Crime DetectionCrime Detection
Crime Detection
 
Central bureau of investigation
Central bureau of investigationCentral bureau of investigation
Central bureau of investigation
 
Police (FIR)
Police (FIR)Police (FIR)
Police (FIR)
 

Viewers also liked

Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSkybox Security
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Jacqueline Fick
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCIPAF KIET
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crimeELDO RAJU
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Ip camera better than cctv camera presentation
Ip camera better than cctv camera   presentationIp camera better than cctv camera   presentation
Ip camera better than cctv camera presentationHans_knox
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 

Viewers also liked (12)

Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual Intelligence
 
Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...Integrating the prevention of cyber crime into the overall anti-crime strateg...
Integrating the prevention of cyber crime into the overall anti-crime strateg...
 
Crime Detection And Prevention Method By Using HCI
Crime Detection And  Prevention Method By Using HCICrime Detection And  Prevention Method By Using HCI
Crime Detection And Prevention Method By Using HCI
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Ip camera better than cctv camera presentation
Ip camera better than cctv camera   presentationIp camera better than cctv camera   presentation
Ip camera better than cctv camera presentation
 
Data mining
Data miningData mining
Data mining
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Similar to CRIME DETECTION

SCAM Detection in Credit Card Application
SCAM Detection in Credit Card ApplicationSCAM Detection in Credit Card Application
SCAM Detection in Credit Card Applicationijcnes
 
Game Theory Approach for Identity Crime Detection
Game Theory Approach for Identity Crime DetectionGame Theory Approach for Identity Crime Detection
Game Theory Approach for Identity Crime DetectionIOSR Journals
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
IRJET- Credit Card Fraud Detection using Random Forest
IRJET-  	  Credit Card Fraud Detection using Random ForestIRJET-  	  Credit Card Fraud Detection using Random Forest
IRJET- Credit Card Fraud Detection using Random ForestIRJET Journal
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...IRJET Journal
 
Online Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningOnline Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningIRJET Journal
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionIRJET Journal
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSIRJET Journal
 
Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...Francesca Lazzeri, PhD
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...IRJET Journal
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data securityUlf Mattsson
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by RegulaRegula
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsJason Dover
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
 
IBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementIBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementVirginia Fernandez
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)ecommerce
 

Similar to CRIME DETECTION (20)

SCAM Detection in Credit Card Application
SCAM Detection in Credit Card ApplicationSCAM Detection in Credit Card Application
SCAM Detection in Credit Card Application
 
Game Theory Approach for Identity Crime Detection
Game Theory Approach for Identity Crime DetectionGame Theory Approach for Identity Crime Detection
Game Theory Approach for Identity Crime Detection
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
IRJET- Credit Card Fraud Detection using Random Forest
IRJET-  	  Credit Card Fraud Detection using Random ForestIRJET-  	  Credit Card Fraud Detection using Random Forest
IRJET- Credit Card Fraud Detection using Random Forest
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
 
IBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insuranceIBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insurance
 
Online Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningOnline Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine Learning
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud Detection
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
 
Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...Operationalize deep learning models for fraud detection with Azure Machine Le...
Operationalize deep learning models for fraud detection with Azure Machine Le...
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant Environments
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
 
IBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementIBM Counter Financial Crimes Management
IBM Counter Financial Crimes Management
 
IBM Counter Finalcial Crimes Management
IBM Counter Finalcial Crimes ManagementIBM Counter Finalcial Crimes Management
IBM Counter Finalcial Crimes Management
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)
 

CRIME DETECTION

  • 2. ABSTRACT  About: Identity crime is well known, prevalent, and costly and credit application fraud is a specific case of identity crime. The existing non-data mining detection systems of business rules and scorecards, and known fraud matching have limitations.  Solution: To address these limitations and combat identity crime in real-time, this paper proposes a new multi-layered detection system complemented with additional layer Communal Detection. CD finds real social relationships to reduce the suspicion score, and is tamper-resistant to synthetic social relationships. It is the whitelist- oriented approach on a fixed set of attributes. The CD algorithm matches all links against the whitelist to find communal relationships and reduce their link score. CD can detect more types of attacks, better account for changing legal behavior. Technology Used : - jdk 1.7(NetBeans IDE 7.3.1) - Apache Tomcat 7.0(Web Server) -MySQL as backend.
  • 3. INTRODUCTION  At one extreme, synthetic identity fraud refers to the use of plausible but fictitious identities.  Real identity theft refers to illegal use of innocent people’s complete identity details. These can be harder to obtain (although large volumes of some identity data are widely available) but easier to successfully apply.  As in identity crime, credit application fraud has reached a critical mass of fraudsters who are highly experienced, organized, and sophisticated .Their visible patterns can be different to each other and constantly change.  To provide confidentiality and security so that fraudsters can be stopped.  A reliable and compositional attempt of letting not the illegal things happen.
  • 4. OBJECTIVE  Synthetic Identity fraud and real identity theft should be stopped .  The main motto behind this is to stop fraudsters rom using innocent peoples identity and misusing it for their illegal works.  existing non-data mining detection systems of business rules and scorecards, and known fraud matching have limitations. To address these limitations and combat identity crime in real-time, this paper proposes a new multi-layered detection system complemented with additional layer Communal Detection.  CD finds real social relationships to reduce the suspicion score, and is tamper- resistant to synthetic social relationships. It is the whitelist-oriented approach on a fixed set of attributes.
  • 5. EXISTING SYSTEM  The first existing defense is made up of business rules and scorecards. In Australia, one business rule is the hundred-point physical identity check test which requires the applicant to provide sufficient point-weighted identity documents face-to-face.  They must add up to at least one hundred points, where a passport is worth seventy points. Another business rule is to contact (or investigate) the applicant over the telephone or Internet.  The above two business rules are highly effective, but human resource intensive. To rely less on human resources, a common business rule is to match an application’s identity number, address, or phone number against external databases.
  • 6. PROPOSED SYSTEM  Identity crime has become prominent because there is so much real identity data available on the Web, and confidential data accessible through unsecured mailboxes.  There are two types of duplicates: exact (or identical) duplicates have the all same values; near (or approximate) duplicates have some same values (or characters), some similar values with slightly altered spellings, or both.  Here we use communal detection algorithm. To account for legal behavior and data errors, Communal Detection (CD) is the whitelist-oriented approach on a fixed set of attributes.
  • 7. SYSTEM MODULES  Credit module: Credit applications are Internet or paper-based forms with written requests by potential customers for credit cards, mortgage loans, and personal loans. Users should submit identity details and it must be original. To reduce identity crime, the most important textual identity attributes such as personal name, fathers name, date of birth, mobile number, Address, Email id must be used in credit application.  Making Whitelist: CD finds real social relationships to reduce the suspicion score, and is tamper-resistant to synthetic social relationships.  Verification Module: In this module loan provider verify the user identity details.
  • 8. SYSTEM SPECIFICATION  H/W System Configuration:-   Processor - Pentium –III   Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Floppy Drive - 1.44 MB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 9.  S/W System Configuration:-   Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql  Database Connectivity : JDBC.
  • 27. CONCLUSION  Our detection system describes an important domain that has many problems relevant to other data mining research. It has documented the development and evaluation in the data mining layers of defence for a real-time credit application fraud detection system.  The implementation of CD algorithms is practical because these algorithms are designed for actual use to complement the existing detection system. Nevertheless, there are limitations.  The overall implementation of crime detection is to make sure that the crime using innocent peoples documents should be taken care of handled properly.
  • 28. FUTURE ENHANCEMENT  Hierarchy modification/additional capabilities are inbuilt in the system.  Dynamic screens/web page according to requirement can be introduced any time.  System is very flexible for future modifications.  The modifications and changings can be done by adding more features to it for advanced form of verification.