SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 61-64
www.iosrjournals.org
DOI: 10.9790/0661-17216164 www.iosrjournals.org 61 | Page
Analysis of Spending Pattern on Credit Card Fraud Detection
Capt. Dr. S Santhosh Baboo1
, N Preetha 2
1
Associate Professor, 2
Research Scholar
1,2
Department of Computer Science and Applications
1
D.G.Vaishnav College, Arumbakkam, Chennai,
2
PhD Research Scholar SCSVMV University, Enathur, Kancheepuram
Abstract: Credit card is one of the convenient way of payment in online shopping. In this on line
shopping, payment is made by giving information like card no, security code , expiration date of the
Credit card etc . To rectify the risk factors of using the credit card, every card holder’s spending method
is modeled by using HMM. By using this authenticated security check the information of transaction is
fraudulent or genuine. It is highly secured from unauthorized anomalous user using credit card and avoids
fraud usage of card through online transactions.
Keywords: HMM, FDS, TP, FP
I. Introduction
Now a days, credit card frauds have been rampantly increased, while making e-payments made
for the purchased goods or service provided on internet. These frauds are happening in two types of
purchase using the credit cards. 1) Physical card 2) Virtual card. In this first type of physical card
purchase, the purchaser has to provide the card to a merchant and make payment. In this type , the
credit card fraudulent is happened by stealing the credit card. If the card holder is unaware of this, the
credit card company has to face the financial loss and in the second type of virtual card purchase, the
card holder, has to provide the secret details of the card ( like security code, card no, expiration date
etc.) either thru internet or over phone . Without knowing the consequences, the genuine card holder is
providing the information to the fraudsters. The result is that they loss their money also. To detect this type
of criminal activity , the spending patterns of the card holder is analyzed .
To discover & prevent this type fraudulent activities, some intelligent & effective methods has
been provided by the data mining, machine learning & statistics areas. In these data mining, the cyber
credit card fraud has been detected by using artificial intelligence and algorithms techniques, which
analyses the usage of unusual patterns derived from the data given. In this method, it is detected whether
the transaction is legitimate or illegitimate.
II. Related Work
Ghosh and Reilly [1] have proposed credit card fraud detection with a neural network. They have built
detection system, which is trained on a large sample of labeled credit card account transactions. These
transactions contain example fraud cases due to lost cards, stolen cards, application fraud, counterfeit fraud,
mail-order fraud, and non received issue (NRI) fraud. Stolfo et al [2] suggest a credit card fraud detection
system (FDS) using meta-learning techniques to learn models of fraudulent credit card transactions. Meta
learning is a general strategy that provides a means for combining and integrating a number of separately built
classifiers or models. The same group has also worked on a cost-based model for fraud and intrusion detection
[3]. They use Java agents for Meta-learning (JAM), which is a distributed data mining system for credit card
fraud detection. A number of important performance metrics like TP-FP (True Positive – False Positive) spread
and accuracy have been defined by them.
Aleskerov et al. [4] present CARDWATCH, database mining system used for credit card fraud
detection. The system, based on a neural learning module, provides an interface to a variety of commercial
databases. Fan et al. [5] suggest the application of distributed data mining in credit card fraud detection. Braise
et al. Stolfo use an agent-based approach with distributed learning for detecting frauds in credit card
transactions. It is based on artificial intelligence and combines inductive learning algorithms and metal earning
methods for achieving higher accuracy.
Phua et al. [6] suggest the use of met classifier similar to in fraud detection problems. Recognizing this
problem, the switching-service provider decided to provide a capability to the issuing banks to flag in real-time
those transactions that appeared to be suspicious, and possibly fraudulent. In this way, at the bank’s option,
suspicious or fraudulent transactions were identified and rejected much earlier and faster than previously
possible.
Analysis of Spending Pattern on Credit card Fraud Detection
DOI: 10.9790/0661-17216164 www.iosrjournals.org 62 | Page
III. Proposed Work
This work focusing on an application which is used to detect the fraudulent credit card
activities on internet transaction. In this peculiar type, the pattern of current fraudulent usage of the
credit card has been analyzed with the previous transactions, by using the neural networks in algorithm
of data mining.
Figure.1 Proposed Architecture for investigation of credit card.
A. Credit card Fraud Detection using HMM.
To find out the fraudulent transactions, Hidden Markov model is used by detecting and analyzing
the spending profile of the credit card user. generally the profile is being divided into three types a)
lower profile b) middle profile c) higher profile . as every card holder has a different method of
spending profile, This can easily find out fraudulent one by keeping the in consistent record of the
usage of the card. Even though this cannot find out the number of purchased items & its categories,
This identifies the fraudulent transaction easily by analyzing the spending patterns of the card user. in
this the last twenty transactions of card holder can be easily studied & can identify which one is a
fraudulent one (i.e.) the amount, the time of transaction etc. It can be easily noted via the shadow based
replication engine.
The ultimate goal of this analysis is to give a note about the fraudulent transaction, to the
issuing bank and also to the merchant and to take appropriate action by the issuing bank. A critical
problem faced by the issuing banks is that of fraudulent transactions. This problem has, of course, exploded with
the high speed nature of electronic submission of credit and debit transactions. An ATM or POS transaction may
be fraudulent, for instance, if the credit card is stolen. Online purchases may be fraudulent if the credit card
number, expiration date, and CID number are copied from the card. This copying can easily be done, for
example, by a waiter taking a customer’s credit card to pay for a meal or when a phone order is placed and paid
for with a credit card. Identifying fraudulent transactions typically takes hours or days, and many such
transactions may slip through before a hold can be put on the card. Worse, because the information can be
quickly shared with thieves in multiple countries, they can rapidly attack via multiple avenues by submitting
many different types of transactions simultaneously, anticipating that the lesser (slower, etc) infrastructure that
some of them may take will allow at least some of them to get through successfully.
The fraud detection system flags a suspicious transaction with a severity flag and writes this
information to another log. Periodically, the log is sent to the bank’s authorization system, which takes
appropriate action on the card. A credit hold might be placed on the card so that all further transactions will be
rejected until the issue is researched or until the problem is resolved. Alternatively, upon the next attempted
transaction, the merchant might be informed to ask the customer to call the bank in order to authorize the
transaction.
This method is still generally the primary fraud detection procedure in use today. The problem with this
method is that it typically takes hours or even days to flag a card that is perhaps being used fraudulently. During
this time, the bank can experience significant losses as additional fraudulent transactions are made. In general,
the bank is responsible for such transactions and purchases made by the customers based on the price ranges that
can be determined dynamically by applying a clustering algorithm on the values of each cardholder’s
transactions, as shown in Table 1
Login
Information
Security
Check Information
Verification
Done (via SMS)
Card Entry
Transaction
Processed
Complete
Analysis of Spending Pattern on Credit card Fraud Detection
DOI: 10.9790/0661-17216164 www.iosrjournals.org 63 | Page
B. Investigation made on Customer Transaction.
Cust_ID Frequency of Card Usage Average Amount
R0T 8K7 5 3000
W7X 2P8 3 45000
Y9T 8Q6 1 2000
Q6V 6Z2 5 1000
O1M 8P3 4 250
Y1A 4K1 2 6500
Table 1. Customer Monthly Transaction
Consider three price ranges namely, low (l), medium (m), and high (h)]. Our set of observation
symbols for example, let l= (0, 10000), m = (10000, 50000), and h= (50000 to credit card limit). If a cardholder
performs a transaction of 15000, then the corresponding observation symbol is m.
A credit cardholder makes different kinds of purchases of different amounts over a period of time. One
possibility is to consider the sequence of transaction amounts and look for deviations in them. However, the
sequence of types of purchase is more stable compared to the sequence of transaction amounts. The reason is
that, a cardholder makes purchases depending on his need for procuring different types of items over a period of
time. This, in turn, generates a sequence of transaction amounts. Each individual transaction amount usually
depends on the corresponding type of purchase. Hence, consider the transition in the type of purchase as state
transition in our model. The type of each purchase is linked to the line of business of the corresponding
merchant. This information about the merchant’s line of business is not known to the issuing bank running the
FDS. The authentication code will be send to the registered mobile number of the user, every time the user tries
to purchase. Thus, the type of purchase of the cardholder is hidden from the FDS. The set of all possible types
of purchase and, equivalently, the set of all possible lines of business of merchants forms the set of hidden states
of the HMM. A card transaction is captured by such devices as a point-of-sale (POS) terminal in a store, a
customer’s browser communicating with a website, or an ATM. The information concerning the request must be
rapidly gathered from the servicing network to which the devices are connected, sent to the issuing bank for
authorization/approval, and the response rapidly returned in order for the system to complete the transaction.
Highly Secured from unauthorized anomalous user using credit card and avoids fraud usage of card through
online transactions.
IV. Results And Discussion
The transaction-switching service provider realized that there was an opportunity to provide a unique
and important service to the issuing banks. If it could detect suspicious or fraudulent activity in real-time, it
could stop fraudulent transactions at the retail counter or at the ATM much sooner, or in some cases, even
before they were authorized. This service would be a value-added service that would distinguish it from other
ATM/POS switching networks. To implement this system, the switching provider installed multiple high-
performance servers that could quickly analyze transactions on-the-fly to determine if they were suspicious. The
selected servers were large Sun Solaris servers running Oracle databases. Each server comprised eight quad-core
CPUs. Each data centre is provided with its own fraud detection complex; comprising multiple Sun
Solaris/Oracle servers (the cards/accounts are assigned to particular Sun Solaris/Oracle servers at a site in order
to partition the work load). The fraud detection complex is easily scalable to handle additional load by adding
additional servers and reassigning the accounts/cards accordingly. Fraud detection will be checked on last 20
transactions and also calculate percentage of each spending profile (low, medium and high) based on total
number of transactions. In Table 2, list of all transactions are shown.
Cust_ID No. of Transaction Transaction Amount
R0T 8K7 5 15x103
W7X 2P8 3 135x103
Y9T 8Q6 1 2x103
Q6V 6Z2 5 5x103
O1M 8P3 4 1x103
Y1A 4K1 2 13x103
Table2. List of transactions.
The most recent transaction is placed at the first position. The pattern of spending profile of the card
holder is shown in (Figure 2) based on all transactions done. In this new approach, when a transaction is
received by a switch node, it is sent not only to the issuing bank for authorization, but it is also replicated in
real-time to a fraud detection server via a Shadow base replication engine. Shadow base engine routes the
transaction to the particular fraud detection server that is monitoring that card or account. Transaction
distribution by card number or account is accomplished via routing rules configured into the Shadow base
replication engine.
Analysis of Spending Pattern on Credit card Fraud Detection
DOI: 10.9790/0661-17216164 www.iosrjournals.org 64 | Page
Figure 2: Spending pattern for customer transactions.
The action taken by the switch node for a suspicious transaction can be configured to correspond to the
desires of the issuing bank and the merchant. In still other situations, the issuing bank may want to allow the
transaction but leave a voice or e-mail message or sms for the customer notifying him of a potentially suspicious
transaction. It secures the transaction using OTP via sms and Detect the anomalous transaction when cardholder
lost the card. The percentage calculation of each spending pattern (low, medium and high) of the card holder
based on price distribution range as mentioned earlier is shown in Figure 3
Figure 3: Percentage of Spending Profile 1
It has been noticed that low spending profile has maximum percentage of 50, followed by medium
profile 33% and then 17% of high spending profile as per details of transactions in Table 2.
V. Conclusion And Future Work
The proposed solution for credit card fraud detection using HMM has different steps in credit card
transaction processing are represented as the under-lying a statistical process involving a number of random
variables depending on a variable parameter of an HMM and it secure the transaction using OTP via sms. It
Detect the anomalous transaction when cardholder lost the card. The ranges of transaction amount has been
used as the observation symbols, whereas the types of item have been considered to be states of the HMM. It
has also been explained how the HMM can detect whether an incoming transaction is fraudulent or not.
Experimental results show the performance and effectiveness of the spending profile of the cardholders. The
system is also scalable for handling large volumes of transactions. In Future thumb impression or face
recognition can also be implemented while using credit card in purchases.
References
[1]. Ghosh, S., and Reilly, D.L., 1994. Credit Card Fraud Detection with a Neural-Network, 27th Hawaii International l Conference on
Information Systems, vol. 3 (2003), pp. 621- 630.
[2]. Stolfo, S. J., Fan, D. W., Lee, W., Prodromidis, A., and Chan, P. K., 2000.Cost-Based Modeling for Fraud and Intrusion Detection:
Results from the JAM Project, Proceedings of DARPA Information Survivability Conference and Exposition, vol. 2 (2000), pp.
130-144
[3]. R. Brause, T. Langsdorf, and M. Hepp, “Neural Data Mining for CreditCard Fraud Detection,” roc. IEEE Int’l Conf. Tools with
ArtificialIntelligence, pp. 103-106, 1999.
[4]. Aleskerov, E., Freisleben, B., and Rao, B., 1997. CARDWATCH: ANeural Network Based Database Mining System for Credit
Card FraudDetection, Proceedings of IEEE/IAFE: Computational Intelligence forFinancial Eng. (1997), pp. 220-226.
[5]. W. Fan, A.L. Prodromidis, and S.J. Stolfo, “Distributed Data Mining inCredit Card Fraud Detection,” IEEE Intelligent Systems,
vol. 14, no. 6,pp. 67-74, 1999.
[6]. C. Phua, D. Alahakoon, and V. Lee, “Minority Report in FraudDetection: Classification of Skewed Data,” ACM SIGKDD
ExplorationsNewsletter, vol. 6, no. 1, pp. 50-59, 2004.

More Related Content

What's hot

Software for Payment Cards: Choosing Wisely
Software for Payment Cards: Choosing WiselySoftware for Payment Cards: Choosing Wisely
Software for Payment Cards: Choosing Wisely
Cognizant
 
Account kit and internet banking
Account kit and internet bankingAccount kit and internet banking
Account kit and internet banking
pragya garg
 
Seamless payment integration with shopify (1)
Seamless payment integration with shopify (1)Seamless payment integration with shopify (1)
Seamless payment integration with shopify (1)
ThinkTanker Technosoft PVT LTD
 
Account Kit and Internet Banking
Account Kit and Internet BankingAccount Kit and Internet Banking
Account Kit and Internet Banking
Aman Singh (असर)
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET Journal
 
Online Payment Transactions
Online Payment TransactionsOnline Payment Transactions
Online Payment Transactions
pcomo2009
 
Payment
PaymentPayment
Payment
Aman Lalpuria
 
E Payment System Introduction Of Large Value Payment System
E Payment System Introduction Of Large Value Payment SystemE Payment System Introduction Of Large Value Payment System
E Payment System Introduction Of Large Value Payment System
Hai Vu
 
Atm fraud case study of commercial bank in pakistan
Atm fraud  case study of commercial bank in pakistanAtm fraud  case study of commercial bank in pakistan
Atm fraud case study of commercial bank in pakistan
Syed Muhammad Bilal Zaidi
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM services
IRJET Journal
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
Nyros Technologies
 
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
inventionjournals
 
Secure E-payment Protocol
Secure E-payment ProtocolSecure E-payment Protocol
Secure E-payment Protocol
CSCJournals
 
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 3 Electronic Payme...
Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 3 Electronic Payme...Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 3 Electronic Payme...
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 3 Electronic Payme...
Nuzhat Memon
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsChristopher Uriarte
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Christopher Uriarte
 
Online Payment Gateway System
Online Payment Gateway SystemOnline Payment Gateway System
Online Payment Gateway System
Mannu Khani
 

What's hot (19)

Software for Payment Cards: Choosing Wisely
Software for Payment Cards: Choosing WiselySoftware for Payment Cards: Choosing Wisely
Software for Payment Cards: Choosing Wisely
 
Account kit and internet banking
Account kit and internet bankingAccount kit and internet banking
Account kit and internet banking
 
Seamless payment integration with shopify (1)
Seamless payment integration with shopify (1)Seamless payment integration with shopify (1)
Seamless payment integration with shopify (1)
 
Account Kit and Internet Banking
Account Kit and Internet BankingAccount Kit and Internet Banking
Account Kit and Internet Banking
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
Online Payment Transactions
Online Payment TransactionsOnline Payment Transactions
Online Payment Transactions
 
E Payment
E PaymentE Payment
E Payment
 
Payment
PaymentPayment
Payment
 
E Payment System Introduction Of Large Value Payment System
E Payment System Introduction Of Large Value Payment SystemE Payment System Introduction Of Large Value Payment System
E Payment System Introduction Of Large Value Payment System
 
Atm fraud case study of commercial bank in pakistan
Atm fraud  case study of commercial bank in pakistanAtm fraud  case study of commercial bank in pakistan
Atm fraud case study of commercial bank in pakistan
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM services
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
 
Secure E-payment Protocol
Secure E-payment ProtocolSecure E-payment Protocol
Secure E-payment Protocol
 
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 3 Electronic Payme...
Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 3 Electronic Payme...Std 12 Computer Chapter 5  Introduction to Mcommerce (Part 3 Electronic Payme...
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 3 Electronic Payme...
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift Cards
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
 
Web payment system
Web payment system Web payment system
Web payment system
 
Online Payment Gateway System
Online Payment Gateway SystemOnline Payment Gateway System
Online Payment Gateway System
 

Viewers also liked

Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
IOSR Journals
 
A1803040103
A1803040103A1803040103
A1803040103
IOSR Journals
 
B0310711
B0310711B0310711
B0310711
IOSR Journals
 
Virtual Network Computing Based Droid desktop
Virtual Network Computing Based Droid desktopVirtual Network Computing Based Droid desktop
Virtual Network Computing Based Droid desktop
IOSR Journals
 
A012630105
A012630105A012630105
A012630105
IOSR Journals
 
O1302027889
O1302027889O1302027889
O1302027889
IOSR Journals
 
B013141316
B013141316B013141316
B013141316
IOSR Journals
 
G012244145
G012244145G012244145
G012244145
IOSR Journals
 
C017531925
C017531925C017531925
C017531925
IOSR Journals
 
E010322531
E010322531E010322531
E010322531
IOSR Journals
 
Use of Polyvinylindene Fluoride (PVDF) and Lead Zirconate Titanate (PZT) In S...
Use of Polyvinylindene Fluoride (PVDF) and Lead Zirconate Titanate (PZT) In S...Use of Polyvinylindene Fluoride (PVDF) and Lead Zirconate Titanate (PZT) In S...
Use of Polyvinylindene Fluoride (PVDF) and Lead Zirconate Titanate (PZT) In S...
IOSR Journals
 
D010221620
D010221620D010221620
D010221620
IOSR Journals
 
D1303062327
D1303062327D1303062327
D1303062327
IOSR Journals
 
C010321630
C010321630C010321630
C010321630
IOSR Journals
 
H010424954
H010424954H010424954
H010424954
IOSR Journals
 
P01821104110
P01821104110P01821104110
P01821104110
IOSR Journals
 
Design, Construction and Operation of a 4-Bit Counting Circuit
Design, Construction and Operation of a 4-Bit Counting CircuitDesign, Construction and Operation of a 4-Bit Counting Circuit
Design, Construction and Operation of a 4-Bit Counting Circuit
IOSR Journals
 
L017158389
L017158389L017158389
L017158389
IOSR Journals
 
D1103012736
D1103012736D1103012736
D1103012736
IOSR Journals
 
E012132934
E012132934E012132934
E012132934
IOSR Journals
 

Viewers also liked (20)

Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
 
A1803040103
A1803040103A1803040103
A1803040103
 
B0310711
B0310711B0310711
B0310711
 
Virtual Network Computing Based Droid desktop
Virtual Network Computing Based Droid desktopVirtual Network Computing Based Droid desktop
Virtual Network Computing Based Droid desktop
 
A012630105
A012630105A012630105
A012630105
 
O1302027889
O1302027889O1302027889
O1302027889
 
B013141316
B013141316B013141316
B013141316
 
G012244145
G012244145G012244145
G012244145
 
C017531925
C017531925C017531925
C017531925
 
E010322531
E010322531E010322531
E010322531
 
Use of Polyvinylindene Fluoride (PVDF) and Lead Zirconate Titanate (PZT) In S...
Use of Polyvinylindene Fluoride (PVDF) and Lead Zirconate Titanate (PZT) In S...Use of Polyvinylindene Fluoride (PVDF) and Lead Zirconate Titanate (PZT) In S...
Use of Polyvinylindene Fluoride (PVDF) and Lead Zirconate Titanate (PZT) In S...
 
D010221620
D010221620D010221620
D010221620
 
D1303062327
D1303062327D1303062327
D1303062327
 
C010321630
C010321630C010321630
C010321630
 
H010424954
H010424954H010424954
H010424954
 
P01821104110
P01821104110P01821104110
P01821104110
 
Design, Construction and Operation of a 4-Bit Counting Circuit
Design, Construction and Operation of a 4-Bit Counting CircuitDesign, Construction and Operation of a 4-Bit Counting Circuit
Design, Construction and Operation of a 4-Bit Counting Circuit
 
L017158389
L017158389L017158389
L017158389
 
D1103012736
D1103012736D1103012736
D1103012736
 
E012132934
E012132934E012132934
E012132934
 

Similar to J017216164

Application of Data Mining and Machine Learning techniques for Fraud Detectio...
Application of Data Mining and Machine Learning techniques for Fraud Detectio...Application of Data Mining and Machine Learning techniques for Fraud Detectio...
Application of Data Mining and Machine Learning techniques for Fraud Detectio...Christian Adom
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
IRJET Journal
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
IRJET Journal
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET Journal
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
IRJET Journal
 
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmCredit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning Algorithm
IRJET Journal
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
IRJET Journal
 
credit card fruad detection from the fake users.pptx
credit card fruad detection from the fake users.pptxcredit card fruad detection from the fake users.pptx
credit card fruad detection from the fake users.pptx
227r1a0519
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
Shakas Technologies
 
Problem Reduction in Online Payment System Using Hybrid Model
Problem Reduction in Online Payment System Using Hybrid ModelProblem Reduction in Online Payment System Using Hybrid Model
Problem Reduction in Online Payment System Using Hybrid Model
IJMIT JOURNAL
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
Khawar Nehal khawar.nehal@atrc.net.pk
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
Khawar Nehal khawar.nehal@atrc.net.pk
 
credit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractcredit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstract
Venkat Projects
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
CSCJournals
 
IRJET- Credit Card Fraud Detection using Random Forest
IRJET-  	  Credit Card Fraud Detection using Random ForestIRJET-  	  Credit Card Fraud Detection using Random Forest
IRJET- Credit Card Fraud Detection using Random Forest
IRJET Journal
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
IOSR Journals
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Cognizant
 
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
ShrutiGarg649495
 

Similar to J017216164 (20)

Application of Data Mining and Machine Learning techniques for Fraud Detectio...
Application of Data Mining and Machine Learning techniques for Fraud Detectio...Application of Data Mining and Machine Learning techniques for Fraud Detectio...
Application of Data Mining and Machine Learning techniques for Fraud Detectio...
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
 
ATM2.pdf.pdf
ATM2.pdf.pdfATM2.pdf.pdf
ATM2.pdf.pdf
 
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmCredit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning Algorithm
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
credit card fruad detection from the fake users.pptx
credit card fruad detection from the fake users.pptxcredit card fruad detection from the fake users.pptx
credit card fruad detection from the fake users.pptx
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
Problem Reduction in Online Payment System Using Hybrid Model
Problem Reduction in Online Payment System Using Hybrid ModelProblem Reduction in Online Payment System Using Hybrid Model
Problem Reduction in Online Payment System Using Hybrid Model
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
 
credit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractcredit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstract
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
 
IRJET- Credit Card Fraud Detection using Random Forest
IRJET-  	  Credit Card Fraud Detection using Random ForestIRJET-  	  Credit Card Fraud Detection using Random Forest
IRJET- Credit Card Fraud Detection using Random Forest
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
 
H029044050
H029044050H029044050
H029044050
 
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

J017216164

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 61-64 www.iosrjournals.org DOI: 10.9790/0661-17216164 www.iosrjournals.org 61 | Page Analysis of Spending Pattern on Credit Card Fraud Detection Capt. Dr. S Santhosh Baboo1 , N Preetha 2 1 Associate Professor, 2 Research Scholar 1,2 Department of Computer Science and Applications 1 D.G.Vaishnav College, Arumbakkam, Chennai, 2 PhD Research Scholar SCSVMV University, Enathur, Kancheepuram Abstract: Credit card is one of the convenient way of payment in online shopping. In this on line shopping, payment is made by giving information like card no, security code , expiration date of the Credit card etc . To rectify the risk factors of using the credit card, every card holder’s spending method is modeled by using HMM. By using this authenticated security check the information of transaction is fraudulent or genuine. It is highly secured from unauthorized anomalous user using credit card and avoids fraud usage of card through online transactions. Keywords: HMM, FDS, TP, FP I. Introduction Now a days, credit card frauds have been rampantly increased, while making e-payments made for the purchased goods or service provided on internet. These frauds are happening in two types of purchase using the credit cards. 1) Physical card 2) Virtual card. In this first type of physical card purchase, the purchaser has to provide the card to a merchant and make payment. In this type , the credit card fraudulent is happened by stealing the credit card. If the card holder is unaware of this, the credit card company has to face the financial loss and in the second type of virtual card purchase, the card holder, has to provide the secret details of the card ( like security code, card no, expiration date etc.) either thru internet or over phone . Without knowing the consequences, the genuine card holder is providing the information to the fraudsters. The result is that they loss their money also. To detect this type of criminal activity , the spending patterns of the card holder is analyzed . To discover & prevent this type fraudulent activities, some intelligent & effective methods has been provided by the data mining, machine learning & statistics areas. In these data mining, the cyber credit card fraud has been detected by using artificial intelligence and algorithms techniques, which analyses the usage of unusual patterns derived from the data given. In this method, it is detected whether the transaction is legitimate or illegitimate. II. Related Work Ghosh and Reilly [1] have proposed credit card fraud detection with a neural network. They have built detection system, which is trained on a large sample of labeled credit card account transactions. These transactions contain example fraud cases due to lost cards, stolen cards, application fraud, counterfeit fraud, mail-order fraud, and non received issue (NRI) fraud. Stolfo et al [2] suggest a credit card fraud detection system (FDS) using meta-learning techniques to learn models of fraudulent credit card transactions. Meta learning is a general strategy that provides a means for combining and integrating a number of separately built classifiers or models. The same group has also worked on a cost-based model for fraud and intrusion detection [3]. They use Java agents for Meta-learning (JAM), which is a distributed data mining system for credit card fraud detection. A number of important performance metrics like TP-FP (True Positive – False Positive) spread and accuracy have been defined by them. Aleskerov et al. [4] present CARDWATCH, database mining system used for credit card fraud detection. The system, based on a neural learning module, provides an interface to a variety of commercial databases. Fan et al. [5] suggest the application of distributed data mining in credit card fraud detection. Braise et al. Stolfo use an agent-based approach with distributed learning for detecting frauds in credit card transactions. It is based on artificial intelligence and combines inductive learning algorithms and metal earning methods for achieving higher accuracy. Phua et al. [6] suggest the use of met classifier similar to in fraud detection problems. Recognizing this problem, the switching-service provider decided to provide a capability to the issuing banks to flag in real-time those transactions that appeared to be suspicious, and possibly fraudulent. In this way, at the bank’s option, suspicious or fraudulent transactions were identified and rejected much earlier and faster than previously possible.
  • 2. Analysis of Spending Pattern on Credit card Fraud Detection DOI: 10.9790/0661-17216164 www.iosrjournals.org 62 | Page III. Proposed Work This work focusing on an application which is used to detect the fraudulent credit card activities on internet transaction. In this peculiar type, the pattern of current fraudulent usage of the credit card has been analyzed with the previous transactions, by using the neural networks in algorithm of data mining. Figure.1 Proposed Architecture for investigation of credit card. A. Credit card Fraud Detection using HMM. To find out the fraudulent transactions, Hidden Markov model is used by detecting and analyzing the spending profile of the credit card user. generally the profile is being divided into three types a) lower profile b) middle profile c) higher profile . as every card holder has a different method of spending profile, This can easily find out fraudulent one by keeping the in consistent record of the usage of the card. Even though this cannot find out the number of purchased items & its categories, This identifies the fraudulent transaction easily by analyzing the spending patterns of the card user. in this the last twenty transactions of card holder can be easily studied & can identify which one is a fraudulent one (i.e.) the amount, the time of transaction etc. It can be easily noted via the shadow based replication engine. The ultimate goal of this analysis is to give a note about the fraudulent transaction, to the issuing bank and also to the merchant and to take appropriate action by the issuing bank. A critical problem faced by the issuing banks is that of fraudulent transactions. This problem has, of course, exploded with the high speed nature of electronic submission of credit and debit transactions. An ATM or POS transaction may be fraudulent, for instance, if the credit card is stolen. Online purchases may be fraudulent if the credit card number, expiration date, and CID number are copied from the card. This copying can easily be done, for example, by a waiter taking a customer’s credit card to pay for a meal or when a phone order is placed and paid for with a credit card. Identifying fraudulent transactions typically takes hours or days, and many such transactions may slip through before a hold can be put on the card. Worse, because the information can be quickly shared with thieves in multiple countries, they can rapidly attack via multiple avenues by submitting many different types of transactions simultaneously, anticipating that the lesser (slower, etc) infrastructure that some of them may take will allow at least some of them to get through successfully. The fraud detection system flags a suspicious transaction with a severity flag and writes this information to another log. Periodically, the log is sent to the bank’s authorization system, which takes appropriate action on the card. A credit hold might be placed on the card so that all further transactions will be rejected until the issue is researched or until the problem is resolved. Alternatively, upon the next attempted transaction, the merchant might be informed to ask the customer to call the bank in order to authorize the transaction. This method is still generally the primary fraud detection procedure in use today. The problem with this method is that it typically takes hours or even days to flag a card that is perhaps being used fraudulently. During this time, the bank can experience significant losses as additional fraudulent transactions are made. In general, the bank is responsible for such transactions and purchases made by the customers based on the price ranges that can be determined dynamically by applying a clustering algorithm on the values of each cardholder’s transactions, as shown in Table 1 Login Information Security Check Information Verification Done (via SMS) Card Entry Transaction Processed Complete
  • 3. Analysis of Spending Pattern on Credit card Fraud Detection DOI: 10.9790/0661-17216164 www.iosrjournals.org 63 | Page B. Investigation made on Customer Transaction. Cust_ID Frequency of Card Usage Average Amount R0T 8K7 5 3000 W7X 2P8 3 45000 Y9T 8Q6 1 2000 Q6V 6Z2 5 1000 O1M 8P3 4 250 Y1A 4K1 2 6500 Table 1. Customer Monthly Transaction Consider three price ranges namely, low (l), medium (m), and high (h)]. Our set of observation symbols for example, let l= (0, 10000), m = (10000, 50000), and h= (50000 to credit card limit). If a cardholder performs a transaction of 15000, then the corresponding observation symbol is m. A credit cardholder makes different kinds of purchases of different amounts over a period of time. One possibility is to consider the sequence of transaction amounts and look for deviations in them. However, the sequence of types of purchase is more stable compared to the sequence of transaction amounts. The reason is that, a cardholder makes purchases depending on his need for procuring different types of items over a period of time. This, in turn, generates a sequence of transaction amounts. Each individual transaction amount usually depends on the corresponding type of purchase. Hence, consider the transition in the type of purchase as state transition in our model. The type of each purchase is linked to the line of business of the corresponding merchant. This information about the merchant’s line of business is not known to the issuing bank running the FDS. The authentication code will be send to the registered mobile number of the user, every time the user tries to purchase. Thus, the type of purchase of the cardholder is hidden from the FDS. The set of all possible types of purchase and, equivalently, the set of all possible lines of business of merchants forms the set of hidden states of the HMM. A card transaction is captured by such devices as a point-of-sale (POS) terminal in a store, a customer’s browser communicating with a website, or an ATM. The information concerning the request must be rapidly gathered from the servicing network to which the devices are connected, sent to the issuing bank for authorization/approval, and the response rapidly returned in order for the system to complete the transaction. Highly Secured from unauthorized anomalous user using credit card and avoids fraud usage of card through online transactions. IV. Results And Discussion The transaction-switching service provider realized that there was an opportunity to provide a unique and important service to the issuing banks. If it could detect suspicious or fraudulent activity in real-time, it could stop fraudulent transactions at the retail counter or at the ATM much sooner, or in some cases, even before they were authorized. This service would be a value-added service that would distinguish it from other ATM/POS switching networks. To implement this system, the switching provider installed multiple high- performance servers that could quickly analyze transactions on-the-fly to determine if they were suspicious. The selected servers were large Sun Solaris servers running Oracle databases. Each server comprised eight quad-core CPUs. Each data centre is provided with its own fraud detection complex; comprising multiple Sun Solaris/Oracle servers (the cards/accounts are assigned to particular Sun Solaris/Oracle servers at a site in order to partition the work load). The fraud detection complex is easily scalable to handle additional load by adding additional servers and reassigning the accounts/cards accordingly. Fraud detection will be checked on last 20 transactions and also calculate percentage of each spending profile (low, medium and high) based on total number of transactions. In Table 2, list of all transactions are shown. Cust_ID No. of Transaction Transaction Amount R0T 8K7 5 15x103 W7X 2P8 3 135x103 Y9T 8Q6 1 2x103 Q6V 6Z2 5 5x103 O1M 8P3 4 1x103 Y1A 4K1 2 13x103 Table2. List of transactions. The most recent transaction is placed at the first position. The pattern of spending profile of the card holder is shown in (Figure 2) based on all transactions done. In this new approach, when a transaction is received by a switch node, it is sent not only to the issuing bank for authorization, but it is also replicated in real-time to a fraud detection server via a Shadow base replication engine. Shadow base engine routes the transaction to the particular fraud detection server that is monitoring that card or account. Transaction distribution by card number or account is accomplished via routing rules configured into the Shadow base replication engine.
  • 4. Analysis of Spending Pattern on Credit card Fraud Detection DOI: 10.9790/0661-17216164 www.iosrjournals.org 64 | Page Figure 2: Spending pattern for customer transactions. The action taken by the switch node for a suspicious transaction can be configured to correspond to the desires of the issuing bank and the merchant. In still other situations, the issuing bank may want to allow the transaction but leave a voice or e-mail message or sms for the customer notifying him of a potentially suspicious transaction. It secures the transaction using OTP via sms and Detect the anomalous transaction when cardholder lost the card. The percentage calculation of each spending pattern (low, medium and high) of the card holder based on price distribution range as mentioned earlier is shown in Figure 3 Figure 3: Percentage of Spending Profile 1 It has been noticed that low spending profile has maximum percentage of 50, followed by medium profile 33% and then 17% of high spending profile as per details of transactions in Table 2. V. Conclusion And Future Work The proposed solution for credit card fraud detection using HMM has different steps in credit card transaction processing are represented as the under-lying a statistical process involving a number of random variables depending on a variable parameter of an HMM and it secure the transaction using OTP via sms. It Detect the anomalous transaction when cardholder lost the card. The ranges of transaction amount has been used as the observation symbols, whereas the types of item have been considered to be states of the HMM. It has also been explained how the HMM can detect whether an incoming transaction is fraudulent or not. Experimental results show the performance and effectiveness of the spending profile of the cardholders. The system is also scalable for handling large volumes of transactions. In Future thumb impression or face recognition can also be implemented while using credit card in purchases. References [1]. Ghosh, S., and Reilly, D.L., 1994. Credit Card Fraud Detection with a Neural-Network, 27th Hawaii International l Conference on Information Systems, vol. 3 (2003), pp. 621- 630. [2]. Stolfo, S. J., Fan, D. W., Lee, W., Prodromidis, A., and Chan, P. K., 2000.Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project, Proceedings of DARPA Information Survivability Conference and Exposition, vol. 2 (2000), pp. 130-144 [3]. R. Brause, T. Langsdorf, and M. Hepp, “Neural Data Mining for CreditCard Fraud Detection,” roc. IEEE Int’l Conf. Tools with ArtificialIntelligence, pp. 103-106, 1999. [4]. Aleskerov, E., Freisleben, B., and Rao, B., 1997. CARDWATCH: ANeural Network Based Database Mining System for Credit Card FraudDetection, Proceedings of IEEE/IAFE: Computational Intelligence forFinancial Eng. (1997), pp. 220-226. [5]. W. Fan, A.L. Prodromidis, and S.J. Stolfo, “Distributed Data Mining inCredit Card Fraud Detection,” IEEE Intelligent Systems, vol. 14, no. 6,pp. 67-74, 1999. [6]. C. Phua, D. Alahakoon, and V. Lee, “Minority Report in FraudDetection: Classification of Skewed Data,” ACM SIGKDD ExplorationsNewsletter, vol. 6, no. 1, pp. 50-59, 2004.