The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The main incentive for the use of electronic commerce (E-commerce) and spread on a large scale is that most of business activities need payment system. As E-commerce requires an efficient payment system which is stable and secure for supporting electronically commerce. This paper proposed to enforce SET, SSL protocols for encrypting e-payment information. It also presented several methods to take under consideration to avoid fraud and keep our site safe.
Discussing how to deal with frauds occurred in e-banking channels by implementing end-to-end controls (deterrent, preventive, detective, responsive, corrective and recovery), the line of defences as well as deploying numerous anti-fraud strategies.
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
In the era ofinternet, most ofthe people all over the world completed their transaction
on internet. Though the user of electronic transaction or E-money transaction system
increase rapidly but the majority person are concern about the security of this system.
The growth in online transactions has resulted in a greater demand for fast and accurate
user identification and authentication. Conventional method of identification based on
possession of ID cards or exclusive knowledge like a social security number or a
password are not all together reliable. Identification and authentication by individuals'
biometric characteristics is becoming an accepted procedure that is slowly replacing the
most popular identification procedure – passwords. Among all the biometrics, fingerprint
based identification is one of the most mature and proven technique. Along with the
combination of conventional system, biometric security, Global positioning system(GPS)
and mobile messaging we have design an algorithm which increase security ofelectronic
transaction and more reliable to user. A three layer security model to enhancing security
ofelectronic transaction is proposed in this paper.
The main incentive for the use of electronic commerce (E-commerce) and spread on a large scale is that most of business activities need payment system. As E-commerce requires an efficient payment system which is stable and secure for supporting electronically commerce. This paper proposed to enforce SET, SSL protocols for encrypting e-payment information. It also presented several methods to take under consideration to avoid fraud and keep our site safe.
Discussing how to deal with frauds occurred in e-banking channels by implementing end-to-end controls (deterrent, preventive, detective, responsive, corrective and recovery), the line of defences as well as deploying numerous anti-fraud strategies.
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
In the era ofinternet, most ofthe people all over the world completed their transaction
on internet. Though the user of electronic transaction or E-money transaction system
increase rapidly but the majority person are concern about the security of this system.
The growth in online transactions has resulted in a greater demand for fast and accurate
user identification and authentication. Conventional method of identification based on
possession of ID cards or exclusive knowledge like a social security number or a
password are not all together reliable. Identification and authentication by individuals'
biometric characteristics is becoming an accepted procedure that is slowly replacing the
most popular identification procedure – passwords. Among all the biometrics, fingerprint
based identification is one of the most mature and proven technique. Along with the
combination of conventional system, biometric security, Global positioning system(GPS)
and mobile messaging we have design an algorithm which increase security ofelectronic
transaction and more reliable to user. A three layer security model to enhancing security
ofelectronic transaction is proposed in this paper.
An empiric path towards fraud detection and protection for NFC-enabled mobile...TELKOMNIKA JOURNAL
The synthesis of NFC technology accompanying mobile payment is a state-of-the-art resolution
for payment users. In view of rapid development in electronic payment system there is rise in fraudulent
activity in banking transactions associated with credit cards and card-not-present transaction.
M-Commerce aid the consumers and helps to bestow real-time information in payment system. Due to
the familiarization of m-commerce there is cogent increase in the number of fraudulent activities, emerging
in billions of dollar loss every year worldwide. To absolute the security breaches, payment transactions
could be confined by considering various parameters like user and device authentication, consumer
behavior pattern, geolocation and velocity. In this paper we formally assay NFC-enabled mobile payment
fraud detection ecosystem using score-based evaluation method. The fraud detection ecosystem will
provide a solution based on transaction risk-modeling, scoring transaction, business rule-based, and
cross-field referencing. The score-based evaluation method will analyze the transaction and reckon every
transaction for fraud risk and take pertinent decision.
Internet based e-commerce has besides, great advantages, posed many threats because of its being what is popularly called faceless and borderless.Privacy has been and continues to be a significant issue of concern for both current and prospective electronic commerce customers. In addition to privacy concerns, other ethical issues are involved with electronic commerce. The Internet offers unprecedented ease of access to a vast array of goods and services. The rapidly expanding arena of "click and mortar" and the largely unregulated cyberspace medium have however prompted concerns about both privacy and data security.
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Dr. Amarjeet Singh
Information is such a thing which if misused, leaked or breached can lead to undesirable consequences. Financial institutions have a lot of data of their customers. These data’s are regarding customers’ personal information, transactions and many more which are highly sensitive. The entire system by which financial institutions such as – banks run, are required to be secured from cyber breach. As by breaching these systems’ can lead to financial disaster. The rapid growth of IT infrastructure is not only considered a convenient way for customers in many perspectives but also it point out the lack of skilled manpower in our country. In banking sector, ATM, E-money laundering are the domain where crime occurred most of the time. So, this paper focuses on developing a conceptual framework based on secondary sources which included publications, journal, books etc. regarding the problem of cyber-threat happening in Bangladesh. It describes how a financial institute can make safe transaction using biometric based public key infrastructure with the help of digital certificate.
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
This project concentrates on the area of internet fraud called “Identity Theft”. It focuses on the responsibility of the individual cardholder in preventing or reducing fraud. It is based upon a belief that educating and empowering consumers has the ability to decrease internet/e-Commerce fraud by way of reducing identity theft.
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
Card payment are mostly preferred by many for transactions instead of cash. Due to its convenience, it is the most accepted payment method for offline as well as online purchases, irrespective of region or country the purchase is made. Currently, cards are used for everyday activities, such as online shopping, bill pays, subscriptions, etc. Consequently, there are more chances of fraudulent transactions. Online transactions are the prime target as it does not require real card, only card details are enough and can be stored digitally. The current system detects the fraud transaction after the transaction is completed. Proposed system in this paper, uses Hidden Markov Model (HMM), which is one of the statistical stochastic models used to model randomly changing systems. Using Hidden Markov Model, a fraud transaction can be detected during the time of transaction itself and after 3 attempts of verification card can blocked at the same time. Behavior Analysis (BA) helps to understand the spending habits of cardholder. Hidden Markov Model helps to acquire high-level fraud analysis with a low false alarm ratio.
e-banking and security are important for any business. Hover what are the challenges faced and what is the gap between customer and security expectations.
Internet threats and its effect on E-commerceVipin Subhash
This is a highlight how internet threats are impacting the digital economy and how a new industry came to light and provided jobs to millions of people.
Survey on Credit Card Fraud Detection Using Different Data Mining Techniquesijsrd.com
In today's world of e-commerce, credit card payment is the most popular and most important mean of payment due to fast technology. As the usage of credit card has increased the number of fraud transaction is also increasing. Credit card fraud is very serious and growing problem throughout the world. This paper represents the survey of various fraud detection techniques through which fraud can be detected. Although there are serious fraud detection technology exits based on data mining, knowledge discovery but they are not capable to detect the fraud at a time when fraudulent transaction are in progress so two techniques Neural Network and Hidden Markov Model(HMM) are capable to detect the fraudulent transaction is in progress. HMM categorizes card holder profile as low, medium, and high spending on their spending behavior. A set of probability is assigned to each cardholder for amount of transaction. The amount of incoming transaction is matched with cardholder previous transaction, if it is justified a predefined threshold value then a transaction is considered as a legitimate else it is considered as a fraud.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
An empiric path towards fraud detection and protection for NFC-enabled mobile...TELKOMNIKA JOURNAL
The synthesis of NFC technology accompanying mobile payment is a state-of-the-art resolution
for payment users. In view of rapid development in electronic payment system there is rise in fraudulent
activity in banking transactions associated with credit cards and card-not-present transaction.
M-Commerce aid the consumers and helps to bestow real-time information in payment system. Due to
the familiarization of m-commerce there is cogent increase in the number of fraudulent activities, emerging
in billions of dollar loss every year worldwide. To absolute the security breaches, payment transactions
could be confined by considering various parameters like user and device authentication, consumer
behavior pattern, geolocation and velocity. In this paper we formally assay NFC-enabled mobile payment
fraud detection ecosystem using score-based evaluation method. The fraud detection ecosystem will
provide a solution based on transaction risk-modeling, scoring transaction, business rule-based, and
cross-field referencing. The score-based evaluation method will analyze the transaction and reckon every
transaction for fraud risk and take pertinent decision.
Internet based e-commerce has besides, great advantages, posed many threats because of its being what is popularly called faceless and borderless.Privacy has been and continues to be a significant issue of concern for both current and prospective electronic commerce customers. In addition to privacy concerns, other ethical issues are involved with electronic commerce. The Internet offers unprecedented ease of access to a vast array of goods and services. The rapidly expanding arena of "click and mortar" and the largely unregulated cyberspace medium have however prompted concerns about both privacy and data security.
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Dr. Amarjeet Singh
Information is such a thing which if misused, leaked or breached can lead to undesirable consequences. Financial institutions have a lot of data of their customers. These data’s are regarding customers’ personal information, transactions and many more which are highly sensitive. The entire system by which financial institutions such as – banks run, are required to be secured from cyber breach. As by breaching these systems’ can lead to financial disaster. The rapid growth of IT infrastructure is not only considered a convenient way for customers in many perspectives but also it point out the lack of skilled manpower in our country. In banking sector, ATM, E-money laundering are the domain where crime occurred most of the time. So, this paper focuses on developing a conceptual framework based on secondary sources which included publications, journal, books etc. regarding the problem of cyber-threat happening in Bangladesh. It describes how a financial institute can make safe transaction using biometric based public key infrastructure with the help of digital certificate.
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
This project concentrates on the area of internet fraud called “Identity Theft”. It focuses on the responsibility of the individual cardholder in preventing or reducing fraud. It is based upon a belief that educating and empowering consumers has the ability to decrease internet/e-Commerce fraud by way of reducing identity theft.
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
Card payment are mostly preferred by many for transactions instead of cash. Due to its convenience, it is the most accepted payment method for offline as well as online purchases, irrespective of region or country the purchase is made. Currently, cards are used for everyday activities, such as online shopping, bill pays, subscriptions, etc. Consequently, there are more chances of fraudulent transactions. Online transactions are the prime target as it does not require real card, only card details are enough and can be stored digitally. The current system detects the fraud transaction after the transaction is completed. Proposed system in this paper, uses Hidden Markov Model (HMM), which is one of the statistical stochastic models used to model randomly changing systems. Using Hidden Markov Model, a fraud transaction can be detected during the time of transaction itself and after 3 attempts of verification card can blocked at the same time. Behavior Analysis (BA) helps to understand the spending habits of cardholder. Hidden Markov Model helps to acquire high-level fraud analysis with a low false alarm ratio.
e-banking and security are important for any business. Hover what are the challenges faced and what is the gap between customer and security expectations.
Internet threats and its effect on E-commerceVipin Subhash
This is a highlight how internet threats are impacting the digital economy and how a new industry came to light and provided jobs to millions of people.
Survey on Credit Card Fraud Detection Using Different Data Mining Techniquesijsrd.com
In today's world of e-commerce, credit card payment is the most popular and most important mean of payment due to fast technology. As the usage of credit card has increased the number of fraud transaction is also increasing. Credit card fraud is very serious and growing problem throughout the world. This paper represents the survey of various fraud detection techniques through which fraud can be detected. Although there are serious fraud detection technology exits based on data mining, knowledge discovery but they are not capable to detect the fraud at a time when fraudulent transaction are in progress so two techniques Neural Network and Hidden Markov Model(HMM) are capable to detect the fraudulent transaction is in progress. HMM categorizes card holder profile as low, medium, and high spending on their spending behavior. A set of probability is assigned to each cardholder for amount of transaction. The amount of incoming transaction is matched with cardholder previous transaction, if it is justified a predefined threshold value then a transaction is considered as a legitimate else it is considered as a fraud.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...ijtsrd
Credit and Debit cards have become the choice mode of payment online as a result of the proliferation of electronic transactions and advancement in Information and Communication Technology ICT . Because of the increased use of credit cards for payment online, the number of fraud cases associated with it has also increased scammers and fraudsters are stealing credit card information of victims online and thereby stealing their monies. There is the need therefore to stop or abate these frauds using very powerful fraud detection system that detects patterns of credit card frauds in order to prevent it from occurring. In this paper we x rayed the concept of credit card frauds and how they are carried out by fraudsters. Python 3.7.6 programming language, Jupyter Notebook 6.0.3 and Anaconda Navigator 1.9.12 were used as experimental test bed. Also, we implemented two different supervised machine learning algorithms on an imbalanced dataset such as Decision Tree and Random forest techniques. A comparative analysis of the credit card detection capabilities of these machine learning algorithms were carried out to ascertain the best detection algorithm using different performance evaluation metrics such as accuracy, precision, recall, f1 score, confusion matrix. Experimental results showed that Random Forest outperformed Decision Tree algorithm slightly in performance metrics used for performance evaluation. Obodoeze Fidelis C. | Oliver Ifeoma Catherine | Onyemachi George Olisamaka | Udeh Ifeanyi Frank Gideon | Obiokafor, Ifeyinwa Nkemdilim "Credit Cards Frauds and Cybersecurity Threats: Machine Learning Detection Algorithms as Countermeasures" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-7 , December 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52440.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/52440/credit-cards-frauds-and-cybersecurity-threats-machine-learning-detection-algorithms-as-countermeasures/obodoeze-fidelis-c
The credit card has become the most popular mode of payment for both online as well as
regular purchase, in cases of fraud associated with it are also rising. Credit card frauds are increasing
day by day regardless of the various techniques developed for its detection. Fraudsters are so expert that
they generate new ways for committing fraudulent transactions each day which demands constant
innovation for its detection techniques. Most of the techniques based on Artificial Intelligence, Fuzzy
logic, neural network, logistic regression, naïve Bayesian, Machine learning, Sequence Alignment,
decision tree, Bayesian network, meta learning, Genetic Programming etc., these are evolved in
detecting various credit card fraudulent transactions. This paper presents a survey of various techniques
used in credit card fraud detection mechanisms.
The main incentive for the use of electronic commerce (E-commerce) and spread on a large scale is that
most of business activities need payment system. As E-commerce requires an efficient payment system
which is stable and secure for supporting electronically commerce. This paper proposed to enforce SET,
SSL protocols for encrypting e-payment information. It also presented several methods to take under
consideration to avoid fraud and keep our site safe.
The main incentive for the use of electronic commerce (E-commerce) and spread on a large scale is that most of business activities need payment system. As E-commerce requires an efficient payment system which is stable and secure for supporting electronically commerce. This paper proposed to enforce SET, SSL protocols for encrypting e-payment information. It also presented several methods to take under consideration to avoid fraud and keep our site safe.
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
The steady growth in electronic transactions has promoted the Automated Teller Machine (ATM) thereby making it the main transaction channel for carrying out financial transactions. However, this has also increased the amount of fraudulent activities carried out on Automated Teller Machines (ATMs) thereby calling for efficient security mechanisms and increasing the demand for fast and accurate user identification and
authentication in ATMs. This research analyses, designs and proposes a biometric authentication prototype for integrating fingerprint security with ATMs as an added layer of security. A fingerprint biometric technique was fused with personal identification numbers (PIN's) for authentication to ameliorate the security level. The prototype was simulated using a fingerprint scanner and Java Platform Enterprise Edition was used to develop an ATM application which was used to synchronize with a fingerprint scanner thereby providing a biometric authentication scheme for carrying out transactions on an ATM.
An Adaptive and Real-Time Fraud Detection Algorithm in Online Transactions....................................1
Yiming WU, Siyong CAI
Agronomic Disaster Management using Artificial Intelligence - A Case Study.....................................13
M Sudha
Household Power Optimisation and Monitoring System ...................................................................23
John Batani, Silence Dzambo, Israel Magodi
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersCognizant
Our latest research reveals that merchants and card issuers should take a layered approach to mitigating risk, by working with consumers to improve fraud detection and prevention.
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
As online transactions become an integral part of our daily lives, the importance of robust online payment security methods cannot be overstated, especially when you want to start your own payment gateway business. Visit us at: https://itio.in/
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Similar to The International Journal of Engineering and Science (The IJES) (20)
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4
The International Journal of Engineering and Science (The IJES)
1. The International Journal Of Engineering And Science (IJES)
||Volume|| 2 ||Issue|| 10 ||Pages|| 43-50 ||2013||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
Synthetic Software Method: Panacea for Combating Internet
Fraud in Nigeria
A.P. BINITIE
Department of Computer Science Education, Federal College of Education (Technical) Asaba, Delta State
N.V. BLAMAH
Department of Computer Science, University of Jos, Jos, Nigeria
U. S. OGAH
MIS Department Federal Polytechnic Mubi, Adamawa State
--------------------------------------------------------ABSTRACT-------------------------------------------------Internet fraud is a growing problem in many countries of the world today including Nigeria.
There are many criminals who will try to rob you off your hard earned money by using the internet to
access your financial information. E-payment using Credit card remains prevalent among other Epayment systems. It affects the cardholder, issuing bank and merchant. Credit card fraud is something
that can never be completely eliminated, but rather something that must be managed. Nigeria with its
vision 202020 will likely grow with credit card fraud, hence the need to be prepared to fight them
today and when it will become the order of the day. Many developed countries like UK, US and many
others have lost a lot at this. This paper proposes an authentication mechanism that will help in
reducing internet fraud especially via credit cards (Master card and Visa card) to barest minimum.
This paper also discusses the effect of credit card fraud on cardholder, issuing bank and merchants.
Keywords - Acquiring bank, Authentication mechanism, Cardholder, Issuing bank, Merchant.
---------------------------------------------------------------------------------------------------------------------------------- ----Date of Submission: 03th, October, 2013
Date of Acceptance: 30th, October, 2013
---------------------------------------------------------------------------------------------------------------I.
INTRODUCTION
There are several issues associated with online credit card use. Chief among them is fraud, which is perpetrated by
both individuals and merchants. Another problem is the lack of security that can lead to the compromise of credit card
numbers stored in online databases [1]. Authentication is a fundamental aspect of system security [2]. Merchants must
develop a delicate balance between using safeguards to prevent fraud and not creating too many hoops for customers to jump
through. Protecting transaction data and cardholder information has been the main driver for the launch of smart cards based
on the EMV standard around the world [3]. Transactions using plastic cards have become more popular with the introduction
of internet- based shopping and banking. According to statistics from the International Telecommunications Union (ITU),
Nigeria has 45 million internet users, the highest online population in Africa. Internet Service Providers (ISP’s) in the
country are now demanding identity verification information from their customers, following the rising trend of online fraud
in the global cyberspace, including Nigeria, and the need to comply with regulations, as well as deepen customer relationship
[4].
As a result of fraudulent activities using individuals credit card information, many consumers are now scared of
online transactions. More secure and convenient payment options would drive additional digital purchases for a majority of
consumers [5]. New survey of security in Indian banks has revealed that many of them do not follow even basic measures to
ensure card security or protect your personal information [6]. Payment card Industry (PCI), data security standard (DSS) and
the data security requirements defined in the standard are necessary to address the ongoing security issues, especially those
pertaining to payment card data handling [7]. While strong internal controls and audit procedures play a role in preventing
and detecting fraud, it is unrealistic to assume that they are completely effective. For many, there remains a strong likelihood
that a significant number of frauds are simply never detected. Even when frauds do come to light, many detection methods,
such as audit procedures, only occur sometime after the fraud has taken place. Some of the manual checks used in preventing
frauds are far from being perfect. The longer frauds go undetected, the larger the financial loss is likely to be and the smaller
the chance of recovering the funds or assets from the perpetrator. Fraudsters seek out organizational “soft spots” where there
is little regular cross-system data validation .They provide a golden opportunity for frauds to continue undetected.
www.theijes.com
The IJES
Page 43
2. Synthetic Software Method: Panacea for Combating Internet Fraud in Nigeria
Credit card is most popular method of payments. Every day, there are new online shoppers, new online retailers
and more ecommerce. Online fraud increases partly because there is a lot more online commerce and partly because new
online consumers and retailers are still working out how to stay safe online [8].
As Nigeria is gradually going cashless, credit card usage is increasing rapidly. This is because of its
easiness in online payments and the feature “buy now pay later” [9].
1.2
Problem
Fraudsters develop various means of robbing people off their hard earned money. Hence the need to develop an
authentication mechanism that can beat them.
1.3
Purpose of the Paper
The purpose of this paper is to study,
Impact of credit card fraud on card holders, merchants, issuers,
The existing fraud detection and authentication systems,
Propose an authentication mechanism to counter credit card fraud.
II.
SECURITY CODE
Credit card security code is one the information needed to authenticate online transactions. It is
important to secure our security code since it is a safety feature, just like PIN number. You can only provide it
during online transaction when the connection is secure. Never provide it through E-mail, since it is unsecure
connection [10]. As long as someone has your card number, security code and card expiration, it will appear to
the merchant that he is the right owner. The location of the security code on a card depends on the type of card.
For cards like Visa, Master or Discover, it is the last three digits of the series of digits on the signature box,
located at the back of the card. From the Visa card displayed below, the circled number, 123 is the security
code.
Figure 1, security on a Visa Card
III.
RELATED WORK
The technology for detecting credit card frauds is advancing at a rapid pace. This has attracted much
researchers attention recently due to increase in credit card fraud. Some of the popular techniques employed by
Issuing and Acquiring banks these days are; rule based systems, neural networks, data mining, grid based hidden
Markov Model, etc.
Protecting transaction data and cardholder information has been the main driver in introducing smart
cards worldwide and for the adoption of the EMV standard. Data authentication in EMV checks whether the
card is genuine using the Card Authentication Methods (CAM) supported by the chip, all of which rely on
public key cryptography. EMV has dramatically reduced fraud where it has been deployed, but counterfeiting is
still a risk. [11]
Sequence of operations in credit card transaction processing was modeled by [12] using a Hidden
Markov Model (HMM) and show how it can be used for the detection of frauds. It is able to detect frauds by
considering a cardholder’s spending habit. They model a credit card transaction processing sequence by the
stochastic process of an HMM. An HMM is initially trained with the normal behavior of a cardholder. If an
incoming credit card transaction is not accepted by the trained HMM with sufficiently high probability, it is
considered to be fraudulent. Various authentication mechanisms were considered by [13], bringing out the pros
and cons of each. Two factor authentications can also be implemented using mobile phones.
www.theijes.com
The IJES
Page 44
3. Synthetic Software Method: Panacea for Combating Internet Fraud in Nigeria
An approach involves using a mobile phone as a onetime password generation with an SMS-based
mechanism which serves as a backup mechanism for retrieving the password and as a possible means of
synchronization [14]. Snap2Pass and snap2Pay are two consumer friendly techniques that leverage a mobile
phone to improve the security of web logins and web payments on a PC [15]
Recently [9] proposed an authentication mechanism using Grid codes. In this approach each credit card
is associated with a Grid Card. Without the Grid Card, no one can do the online payments. An approach that
involves advanced data mining techniques and neural network algorithms to obtain high fraud coverage has
been developed by [16]. Parallel granular neural networks (PGNNs) was used by [17] for improving the speed
of data mining and knowledge discovery process in credit card fraud detection. A complete system has been
implemented for this purpose.
Credit card fraud detection with a neural network proposed by [18] was trained on a large sample of
labeled credit card account transactions. These transactions contain samples of fraud cases due to lost cards,
stolen cards, application fraud, counterfeit fraud, mail-order fraud, and non received issue (NRI) fraud.
CARDWATCH as presented by [19] is a database mining system used for credit card fraud detection. The
system, based on a neural learning module, provides an interface to a variety of commercial databases.
A game-theoretic approach to credit card fraud detection was proposed by [20]. They model the
interaction between an attacker and fraud detection system as a multi stage game between two players, each
trying to maximize his payoff.
Web services and data mining techniques were proposed by [21] to establish a collaborative scheme for
fraud detection in the banking industry. With this scheme, participating banks share knowledge about the fraud
patterns in a heterogeneous and distributed environment. To establish a smooth channel of data exchange, Web
services techniques such as XML, SOAP, and WSDL are used. Meta-learning techniques could be used to learn
models of fraudulent credit card transactions. Meta-learning is a general strategy that provides a means for
combining and integrating a number of separately built classifiers or models. A meta-classifier is thus trained on
the correlation of the predictions of the base classifiers [22]
Most of them are post methods which help to detect and then take the measures on the fraud that is
occurred. Most approaches above require labeled data for both genuine, as well as fraudulent transactions, to
train the classifiers. Getting real-world fraud data is one of the biggest problems associated with credit card
fraud detection. Also, these approaches cannot detect new kinds of frauds for which labeled data is not
available. These methods work based on the unusual patterns in payments. For Grid based system, which
requires that every credit card have Grid card Inconveniences the user. Also if both the credit card and Grid card
are lost then there is a chance for the credit card frauds. The proposed system will be more convenient for the
user and above all will be able to detect and prevent fraud.
IV.
IMPACT OF CREDIT CARD FRAUDS ON MERCHANT
Credit cards are the most frequently used payment method, online transactions [1]. Occurrences of
credit card frauds have only shown an upward trend so far in Nigeria. The fraudulent activity on a card affects
everybody, that is, the cardholder, the merchant (Website, retail store etc), the acquirer as well as the issuer. It is
interesting to note that cardholders are the least impacted party due to fraud in credit card transactions. This is
true for both card-present as well as card not-present scenarios. Merchants are the most affected party in a credit
card fraud, particularly more in the card-not-present transactions, as they have to accept full liability for losses
due to fraud, when you decide to accept electronic payment, business owners must also consider the potential
cost of fraud.
Whenever a legitimate cardholder disputes a credit card charge, the card-issuing bank will send a
chargeback to the merchant (through the acquirer), reversing the credit for the transaction. In case, the merchant
does not have any physical evidence (e.g. delivery signature) available to challenge the cardholder’s dispute, it
is almost impossible to reverse the chargeback. Therefore, the merchant will have to completely absorb the cost
of the fraudulent transaction. In fact, this cost consists of several components, which could add up to a
significant amount. The cost of a fraudulent transaction on merchant consists of [23]:
1. Cost of goods sold: Since it is unlikely that the merchandise will be recovered in a case of fraud, the
merchant will have to write off the value of goods involved in a fraudulent transaction. The impact of this loss
will be highest for low-margin merchants.
2. Shipping cost: Since the shipping cost is usually bundled in the value of the order, the merchant will
also need to absorb the cost of shipping for goods sold in a fraudulent transaction. Furthermore, fraudsters
typically request high-priority shipping for their orders to enable rapid completion of the fraud, resulting in high
shipping costs.
www.theijes.com
The IJES
Page 45
4. Synthetic Software Method: Panacea for Combating Internet Fraud in Nigeria
3. Card association fees: Visa and MasterCard have put in place fairly strict programs that penalize
merchants generating excessive chargeback’s. Typically, if a merchant exceeds established chargeback rates for
any three-month period the merchant could be penalized with a fee for every chargeback. In extreme cases, the
merchant’s contract to accept cards could be terminated.
4. Merchant bank fees: In addition to the penalties charged by card associations, the merchant has to
pay an additional processing fee to the acquiring bank for every chargeback.
5. Administrative cost: Every transaction that generates a chargeback requires significant
administrative costs for the merchant. On average, each chargeback requires one to two hours to process. This
is because processing a chargeback requires the merchant to receive and research the claim, contact the
consumer, and respond to the acquiring bank or issuer with adequate documentation.
6. Loss of Reputation: Maintaining reputation and goodwill is very important for merchants as
excessive chargeback and fraud monitoring could both drive cardholders away from transacting business with a
merchant. Based on the scheme rules defined by both MasterCard and Visa, it is sometimes possible that the
Issuer/Acquirer bears the costs of fraud. Even in cases when the Issuer/Acquirer is not bearing the direct cost of
the fraud, there are some indirect costs that will finally be borne by them. Like in the case of chargeback issued
to the merchant, there are administrative and manpower costs that the bank has to incur. The issuers and
acquirers also have to make huge investments in preventing frauds by deploying sophisticated IT systems for
detection of fraudulent transactions.
V.
IMPACT OF FRAUD ON ISSUING BANKS/ ACQUIRERS
The issuers and acquirers also have to make huge investments in preventing frauds by deploying
sophisticated IT systems for detection of fraudulent transactions. With all the negative impacts of fraudulent
credit card activities, financial and product losses, fines, loss of reputation, etc, and technological advancements
in perpetrating fraud, it is easy for merchants to feel victimized and helpless. According to once a transaction is
proven to be indeed fraudulent, the bank will refund the original value to the card holder.
However, technological advancements in preventing fraud have started showing some promise to
combat fraud. Merchants, Acquirers & Issuers are creating innovative solutions to bring down on fraudulent
transactions and lower merchant chargeback rates. One of the main challenges with fraud prevention is the long
time lag between the time a fraudulent transaction occurs and the time when it gets detected, that is, the
cardholder initiates a chargeback [23]. Analysis shows that the average lag between the transaction date and the
chargeback notification could be as high as 72 days. This means that, if no fraud prevention is in place, one or
more fraudsters could easily generate significant damage to a business before the affected stakeholders even
realize the problem [24].
VI.
IMPACT OF CREDIT-CARD FRAUD ON CARDHOLDER
Credit card fraud is often an afterthought to consumers since their liability is limited, depending on
their institution policy [23].This is true for both card-present as well as card not- present scenarios. EMV
secures credit and debit card transactions by authenticating both the card and the customer presenting it through
a combination of cryptographic authentication codes, digital signatures, and the entry of a PIN. Despite these,
criminals can still use a genuine card to make a payment without knowing the card’s PIN, and to remain
undetected even when the merchant has an online connection to the banking network. The fraudster performs a
man-in-the-middle attack to trick the terminal into believing the PIN verified correctly, while telling the card
that no PIN was entered at all. Frequently, banks deny such fraud victims a refund, asserting that a card cannot
be used without the correct PIN, and concluding that the customer must be grossly negligent or lying [25].
Many banks even have their own standards that limit the consumer's liability to a greater extent. They also have
a cardholder protection policy in place that covers for most losses of the cardholder. The cardholder has to just
report suspicious charges to the issuing bank, which in turn investigates the issue with the acquirer and
merchant, and processes chargeback for the disputed amount. Customers should properly log off from their
online browsing session.
VII.
TRADITIONAL CREDIT CARD PROCESSING
Apart from technological advances, another trend which has emerged during the recent years is that
fraud prevention is moving from back-office transaction processing systems to front-office authorization
systems to prevent committing of potentially fraudulent transactions [26].
www.theijes.com
The IJES
Page 46
5. Synthetic Software Method: Panacea for Combating Internet Fraud in Nigeria
Below are traditional steps for credit card authentication
Step 1: The merchant submits a credit card transaction to authorize.net payment gateway on behalf of a
customer via secure website connection, retail store, Moto center or wireless device.
Step 2: Authorize.net receives the secure transaction information and passes it via secure connection to the
merchant banks processor.
Step 3: The merchant banks processor submits the transaction to the credit card Network (a system of financial
entities that communicate to manage the processing, clearing, and settlement of credit card
transactions).
Step 4: The credit card Network routes the transaction to the customer’s credit card issuing bank.
Step 5: The customers issuing Banks approves or declines the transaction based on the customer’s
authentication credentials and available funds and passes the transaction results back to the credit card
network.
Step 6: The credit card Network relays the transaction results to the merchant banks processor.
Step 7: The merchant banks processor relays the transaction results to Authorize.Net.
Step 8: Authorize.net stores the transaction results and sends them to the customers and/or merchant. This step
completes the authorization process- all in few seconds.
Step 9: The customer’s credit card issuing bank sends the appropriate funds for the transaction to the credit
card Network, which passes the funds to the merchants Bank. The bank then deposits the funds into the
merchant’s bank account. This step is known as the settlement process and typically the transaction
funds are deposited into your primary bank account within two to four business days.
Figure 2, Traditional credit card processing [27].
7.1
Step 1:
Step 2:
Step 3:
Step 4:
Step 5:
Step 6:
Step 7:
Step 8:
Step 9:
Step 10:
Step 11:
Proposed Credit Card Authentication Mehanism
The merchant submits a credit card transaction to authorize.net payment gateway on behalf of a customer via
secure website connection, retail store, Moto center or wireless device.
Authorize.net receives the secure transaction information and passes it via secure connection to the merchant
banks processor.
The merchant banks processor submits the transaction to the credit card Network (a system of financial entities
that communicate to manage the processing, clearing, and settlement of credit card transactions).
The credit card Network routes the transaction to the customer’s credit card issuing bank.
The customers issuing Banks sends an alert to the customer whose phone number matches the information
provided. The customer will be prompted to key in 1 to accept or 0 to decline from his/her mobile phone.
The customer’s response is sent back to the customers’ credit card issuing bank.
If the customer accepts the transaction, the customer’s credit card issuing bank approves the payment otherwise it
declines and passes the transaction result back to the credit card Network.
The credit card network relays the transaction results to the Merchant Banks Processor.
The merchant Bank processor relays the transaction results to Authorize.net. (Payment gateway (a network node
that allows you to gain entrance into a network and vice versa) to accept all online payment)
Authorize.net stores the transaction results and sends them to the customer and/or the merchant. This step
completes the authorization process- in just few seconds
Once the customer is authenticated, the customer’s credit card issuing bank sends the appropriate funds for the
transaction to the merchant’s bank. The bank then deposits the funds into the merchant’s bank account. This step
is also known as the settlement process and funds deposited into your primary bank account within two to four
business day
www.theijes.com
The IJES
Page 47
6. Synthetic Software Method: Panacea for Combating Internet Fraud in Nigeria
Figure
3, proposed authentication mechanism
To maximize its effectiveness as a fraud detection and Authentication system, the transactional analysis
needs to work with a comprehensive set of indicators of potential fraud, taking into account the most common
fraud schemes. Analyze all transactions within a given area and test them against the parameters that highlight
indicators of fraud. Perform the analyses and tests as close to the time of the transaction as possible. Ideally,
even before the transaction has been finalized, and preferably on a continuous monitoring basis, allow easy
comparisons of data and transactions from separate business or operational systems, this last point is of
particular relevance. Many suspicious transactions or patterns only come to light when transactional data from
one system is compared to that of another.
VIII.
LIMITATIONS
This system proposed, enhanced and revised the existing traditional credit card authentication
mechanism. If the customer’s mobile phone battery is not charged, then a genuine transaction will be
cancelled. The process is slow, but if implemented will tackle credit card fraud.
IX.
CONCLUSION
This paper presents an authentication mechanism which will help to reduce online credit card fraud.
The system ensures that the user, the issuer/acquirer, the merchant are all involved. Though it might take a
longer time depending on how fast the user responds to the SMS alert, it will go a long way in frustrating the
efforts of internet fraudsters. The system proposed will detect and also prevent online credit card fraud. As
Nigeria economy is gradually going cashless we need to get ourselves armed against internet fraudsters. Here
comes the relief to the menace unleashed to many countries economy by these internet hoodlums.
www.theijes.com
The IJES
Page 48
7. Synthetic Software Method: Panacea for Combating Internet Fraud in Nigeria
X.
RECOMMENDATION
Finding the optimally balanced measures outlined in this article useful will assist merchants, acquiring
and issuing banks in combating frauds more efficiently. It is quite important to stress here that for the fight
against credit card fraudsters to be successful, issuing banks need to work alongside merchants and customers.
A well-designed and implemented software method, based on transactional analysis of operational systems, can
significantly reduce the chances of frauds occurring and then remaining undetected. The sooner indicators of
fraud are available, the greater potential to recover losses and address any control weaknesses. The timely
detection of fraud directly impacts the bottom line, reducing losses for individuals and organization. Effective
detection techniques serve as a deterrent to potential fraudsters.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
U. Shankar, M. Walker, A Survey of Security in Online Credit Card Payments, UC Berkeley Class Notes, 2001.
P. Jadhao, L. Dole, Implementation of Secure Authentication Scheme for Mobile Device, International Journal of Emerging
Science and Engineering, 1(8), 2013, 2319–6378.
B. Dodson, D. Sengupta, D. Boneh, M. S. Lam, Secure Consumer-Friendly Web Authentication and Payments with a Phone,
Proc. MobiCASE, 2010, 17-38.
O.O. Loveday, Nigeria Internet Fraud- Internet users now required to submit personal details to ISPs, Sunnewsonline.net/news,
March 26, 2013.
R. Dan (2011): Survey: 80% of consumers want alternative payment methods to credit cards online. Readwrite.com.
L. Jing, S. Yang, Yang, C. Yang, S. Ozdemir, (2010): a survey of payment card industry data security standard, IEEE
Communication survey &Tutorials, 112(3).
H. Michelle, Social media Surge fuelling Credit Card scam: Report, Financialnewsfocus.com/news, June 23, 2011.
S. Nayani, An approach for grid based authentication mechanism to counter cyber fraud with reference to credit car, Global
Journal of computer Science and technology, 11 (1) 1.0, 2011.
T. Bitler, How to Find your Credit Card Security Code, CreditCards.com, 2013
D. C. Sharma, Banks not taking credit card data security seriously: Survey, India, News - India Today, February 8, 2011,
updated 11:02 IST.
S. Abhinav, K. Amlan, S. shamik, K.M. Arun, Credit Card Detection Using Hidden Markov Model, IEEE Transactions on
Dependable and secure Computing, 5(1), 2008.
C. Maryln, Authentication Mechanisms: which is best? Global Information assurance certification paper, 2002, 594.
F. Aloul, S. Zahidi, W. El-Hajj, Two factor authentication using mobile phones, Proceeding of IEEE/ACS International
Conference on Computer Systems and Applications, ISBN: 978-1-4244-3807-5, 2009
Smart Payment Association, Strengthening Card Authentication –A Migration to DDA, Munich, Germany – The Smart Payment
Association (SPA), 4th February 2010
R. Brause, T. Langsdorf, M. Hepp, Neural Data mining for Credit Card Fraud
Detection, Proc. IEEE Int’l Conf. Tools with Artificial Intelligence, 1999, pp. 103-106.
M. Syeda, Y.Q. Zhang, Y. Pan, Parallel Granular Network for Fast Credit Card Fraud detection, Proc. IEEE Int’l conf. fuzzy
Systems, 2002, pp. 572-577.
S. Ghosh, D.L. Reilly, Credit Card Fraud detection with a Neural-Network. Proc. 27th Hawaii Int’l Conf. system sciences:
Information systems: Decision Support and knowledge- based systems. Vol. 3, 1994, pp. 621-630.
E. Aleskerov, B. Freisleban, B. Rao, Cardwatch: A Neural Network based database mining system for credit Card Fraud
Detection, Proc. IEEE/IAFE: Computational Intelligence for Financial Eng., 1997, pp. 220-226.
V. Vatsa, S. Sural, A.K. Majumdar, A Game- theoretic Approach to Credit Card Fraud Detection, Proc. first Int’l conf.
Information system security, 2005, pp. 263-276.
C. Chiu, C. Tsai, A Web services-Based collaborative scheme for credit card Fraud Detection. Proc. IEEE Int’l conf. eTechnology, e-Commerce and e- service, 2004, pp. 177-181
S.J. Stolfo, D.W. Fan, W. Lee, A.L. Prodromidis, P.K. Chan, Credit Card Fraud Detection using Meta-Learning: Issues and
Initial Results, Proc. AAAI Workshop AI Methods in fraud and Risk Management, 1997, pp. 83-90.
P.B. Tej, P. Vikram, D. Amit, Understanding Credit card fraud, Cards Business review, 2003,
www.popcer.org/problems/creditcardfraud/PDFs/Bhatla.pdf.
C. Khyati, M. Bhawna, Credit card fraud Bang in E-commerce, International Journal of Computational Engineering Research,
(2)3, 2012
J. Murdoch, S. Drimer, R. Anderson, M. Bond, Chip and PIN is Broken, IEEE Symposium on Security and Privacy, 2010, pp433444.
S. Maguire, Identifying Risks during Information System Development: Managing the Process, information-Technology-RiskManagement-Journal, 2002.
Credit card payment processing: A diagrammatic illustration, http://www.authorize.net/resources/how it works/111
www.theijes.com
The IJES
Page 49
8. Synthetic Software Method: Panacea for Combating Internet Fraud in Nigeria
BIOGRAPHY
Binitie Amaka
Patience is a lecturer with Federal College of Education Technical Asaba, Nigeria. She is a
master student in the department of computer science at Adamawa State University, Mubi,
Nigeria. She is a member of Nigeria Computer society. She obtained her Bsc in computer
science in 2005 from Nnamdi Azikiwe University Awka, Nigeria. Her area of research
interest is Social Networks and Artificial Intelligence.
Nachamada Vachaku Blamah
Is a Senior Lecturer with the University of Jos, Nigeria. He obtained his Bachelors of
Technology, Master of Science, and Doctorate degrees in Computer Science. Dr. Blamah is
a member of the IEEE Computational Intelligence Society and the Computer Professionals
(Registration Council of Nigeria), and his research interests are mainly in the areas of
computational intelligence and multi agent systems.
Ugbowu Stephen Ogah
Is a Lecturer with the Federal Polytechnic Mubi, Adamawa State. He obtained a PGD
Computer Science at Adamawa State University and a B.sc (Ed.) Statistics/Computer
Science of the Federal University of Agriculture Makurdi, Nigeria. He is a member Nigeria
computer Society (NCS) and his research interests are in internet security and networking.
www.theijes.com
The IJES
Page 50