Preview

Analysis on Credit Card Fraud Detection Methods

Powerful Essays
Open Document
Open Document
3422 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Analysis on Credit Card Fraud Detection Methods
Analysis on Credit Card Fraud Detection Methods
1 1

S. Benson Edwin Raj, 2A. Annie Portia Assistant Professor (SG), P.G., 2Scholar Department of CSE Karunya University, Coimbatore counter the credit card fraud effectively, it is necessary to understand the technologies involved in detecting credit card frauds and to identify various types of credit card frauds [20] [21] [22] . There are multiple algorithms for credit card fraud detection [21] [29]. They are artificial neural-network models which are based upon artificial intelligence and machine learning approach [5] [7] [9] [10] [16], distributed data mining systems [17] [19], sequence alignment algorithm which is based upon the spending profile of the cardholder [1] [6], intelligent decision engines which is based on artificial intelligence [23], Meta learning Agents and Fuzzy based systems [4]. The other technologies involved in credit card fraud detection are Web Services-Based Collaborative Scheme for Credit Card Fraud Detection in which participant banks can share the knowledge about fraud patterns in a heterogeneous and distributed environment to enhance their fraud detection capability and reduce financial loss [8] [13], Credit Card Fraud Detection with Artificial Immune System [13] [26], CARDWATCH: A Neural Network Based Database Mining System for Credit Card Fraud Detection [18] which is bases upon data mining approach [17] and neural network models, the Bayesian Belief Networks [25] which is based upon artificial intelligence and reasoning under uncertainty will counter frauds in credit cards and also used in intrusion detection [26], case-based reasoning for credit card fraud detection [29], Adaptive Fraud Detection which is based on Data Mining and Knowledge Discovery [27], Real-time credit card fraud using computational intelligence [28], and Credit card fraud detection using self-organizing maps [30]. Most of the credit card fraud detection systems mentioned above are based on artificial



References: 155 International Conference on Computer, Communication and Electrical Technology – ICCCET2011, 18th & 19th March, 2011

You May Also Find These Documents Helpful

  • Good Essays

    Eng 3 Moby Dick

    • 610 Words
    • 3 Pages

    1. In this video, we immediately learn of an obsessed captain who wants revenge. Why does he want revenge and against whom or what? Th2e obsessed captain wants revenge because he lost his leg to the Great Moby Dick,…

    • 610 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Credit Card Fraud

    • 729 Words
    • 3 Pages

    Credit Card Fraud is one of the biggest threats to business establishments today. Originally, credit cards simply carried raised numbers that were transferred to a carbon copy with a card-swiping machine. The merchant simply accepted any card presented. Spending limits and printed lists of lost/stolen cards were ineffective in preventing fraud and other financial losses. Merchants were required to telephone a transaction authorization center to get pre-approval of the transaction. The volume of telephone traffic grew too great, and more automated authorization systems allowed faster, easier, and verified transactions. Magnetic stripes on the backs of these payment cards started to appear and that allowed computers to be used at both ends of the call.…

    • 729 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Athlete's Diet

    • 522 Words
    • 3 Pages

    I think that this topic is many important, not only for the athletes, also for all of us because we are the second country with obesity nowadays. So what I think about the diets in general, is that they are goods because with all of those meals we have to eat we will be healthier and with the right weight according to our organism. Many teenagers specially the girls make diets only for lose weight but they do not go with a nutriologist and of course they don’t know how to make a balance diet, so they think that with only eat vegetables they will lose weight but also it can give them many compications in their organism, they can get anemia. Also I think that is to good for the athletes to make diets because of the type of effort they do, so I am going to talk about many types of diets for the athletes.…

    • 522 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Credit Card Fraud

    • 4212 Words
    • 17 Pages

    Katherine J. Barker, Jackie D'Amato, Paul Sheridon. Journal of Financial Crime. London: 2008. Vol. 15, Iss. 4; pg. 398…

    • 4212 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    There is no more darkness. A gigantic sun floated above “Rubare’s” dry and yellow atmosphere, Vendetta’s fifth stage, drastically burning the skin off it’s victims. The only way to survive was by owning an item of clothing. In this stage, huge scorpions constantly stole their clothes making them live in an environment of insecurity. As soon as I saw the blazing sphere floating on top of a scorpions head, I didn’t hesitate. I just ran.…

    • 361 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Financial Statement Fraud

    • 16492 Words
    • 66 Pages

    Phua, C., D. Alahakoon, and V. Lee. 2004. Minority report in fraud detection: Classification of skewed data. SIGKDD Explorations 6 (1): 50–59. Platt, J. 1999. Fast training of support vector machines using sequential minimal optimization. In Advances in Kernel Methods: Support Vector Learning, edited by Scholkopf, B., C. J. C. Burges, and A. J. Smola, 185–208. Cambridge, MA: MIT. Prodromidis, A., P. Chan, and S. Stolfo. 2000. Meta-learning in distributed data mining systems: Issues and approaches. In Advances in Distributed and Parallel Knowledge Discovery, edited by Kargupta, H., and P. Chan, 81–114. Menlo Park, CA: AAAI/MIT. Provost, F., and T. Fawcett. 1997. Analysis and visualization of classifier performance: comparison under imprecise class and cost distributions. In Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, Menlo Park, CA. Provost, F., T. Fawcett, and R. Kohavi. 1998. The case against accuracy estimation for comparing induction algorithms. In The Proceedings of the Fifteenth International Conference on Machine Learning, Madison, WI. Quinlan, J. R. 1993. C4.5: Programs for Machine Learning. San Francisco, CA: Morgan Kaufmann Publishers. Shin, K. S., T. Lee, and H. J. Kim. 2005. An application of support vector machines in bankruptcy prediction model. Expert Systems with Application 28: 127–135. Summers, S. L., and J. T. Sweeney. 1998. Fraudulently misstated financial statements and insider trading: An empirical analysis. The Accounting Review 73 (1): 131–146. Uzun, H., S. H. Szewczyk, and R. Varma. 2004. Board composition and corporate fraud. Financial Analysts Journal 60 (3): 33–43. Weiss, G. M. 2004. Mining with rarity: A unifying framework. ACM SIGKDD Explorations Newsletter 6 (1): 7–19. West, D., S. Dellana, and J. Qian. 2005. Neural network ensemble strategies for decision applications. Computer and Operations Research 32 (10): 2543–2559. Witten, I. H., and E. Frank. 2005. Data Mining: Practical Machine Learning Tools and Techniques. San Francisco, CA: Morgan Kaufmann Publishers. Wolpert, D. 1992. Stacked generalization. Neural Networks 5 (2): 241–259.…

    • 16492 Words
    • 66 Pages
    Powerful Essays
  • Powerful Essays

    Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, Hong Kong, 19-22 August 2007…

    • 2793 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Analysis of Data Mining

    • 842 Words
    • 4 Pages

    The article Data Mining by Christopher Clifton analyzed how different types of data mining techniques have been applied in crime detection and different outcomes. Moreover, the analysis proposed how the different data mining techniques can be used in detection of different form of frauds. The analysis gave the advantages and disadvantages of using data mining in different operation. The major advantage was that data mining enables analysis of large quantities of data. This is important since such data cannot be analyzed manually since the data is often complex for humans to understand. However, data mining techniques have been used for deceitful purposes such as inappropriate disclosure of private information. The article analyzed different data mining techniques. Predictive modeling is one such technique used in estimation of particular target attribute. Descriptive modeling was another technique, which entails dividing data into groups. The other techniques described include pattern mining used in identification of rules relating to different data pattern and anomaly detection, which entails determining the unusual instances that, may arise when using the different data-mining model.…

    • 842 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The types of fraud that will impact the companies differ a lot. In the Report to the Nations on Occupational Fraud and Abuse issued by Association of Certified Fraud Examiners (ACFE) (2014), it identified a particular one: occupational fraud that is defined as: “The use of one’s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization’s resources or assets.” ACFE (2014) concluded that “Put more simply, occupational frauds are those schemes in which a person defrauds his or her employing organization. By its very nature, this form of fraud is a threat to all organizations that employ individuals to perform their business functions.”…

    • 2376 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    In day to day life credit cards are used for purchasing goods and services by the help of virtual card for online transaction or physical card for offline transaction. In physical transaction, Credit cards will insert into payment machine at merchant shop to purchase goods. Tracing fraudulent transactions in this mode may not be possible because the attacker already steal the credit card. The credit card company may go in financial loss if loss of credit card is not realized by credit card holder. In online payment mode, attackers need only little information for doing fraudulent transaction (secure code, card number, expiration date etc.). In this purchase method, mainly transactions will be done through the Internet or telephone. Small transactions are generally undergo less verification, and are less likely to be checked by either the card issuer or the merchant. Card issuers must take more precaution against fraud detection and financial losses. Credit card fraud cases are increasing every year. In 2008, number of fraudulent through credit card had increased by 30 percent because of various ambiguities in issuing and managing credit cards. Credit card fraudulent is approximately 1.2% of the total transaction amount, although it is not small amount as compare to total transaction amount which is in trillions of dollars in 2007[ 2-4] . Hidden Markov Model will be helpful to find out the fraudulent transaction by using spending profiles of user. It works on the user spending profiles which can be divided into major three types such as 1) Lower profile; 2) Middle profile; and 3) Higher profile. For every credit card, the spending profile is different, so it can figure out an inconsistency of user profile and try to find fraudulent transaction. It keeps record of spending profile of the card holder by both way, either offline or online. Thus analysis of purchased commodities of cardholder will be a useful tool in fraud detection system…

    • 12677 Words
    • 51 Pages
    Better Essays
  • Good Essays

    cyber fraud

    • 341 Words
    • 2 Pages

    Introduction : We have seen a spate of cyber frauds in the recent past. The frequency and scale of the incidents has created a lot of concerns for the banks, regulators and customers. What do banks in India have to learn from these? Are they doing enough to ensure that we don’t end up as sitting ducks? What preventive measures to take to face this new menace? Before we consider these and other related questions, we need to understand the anatomy of cyber frauds. Cyber Fraud is a generic term used to represent transfer of funds by a fraudster (usually a well connected gang opening across borders) using the login credentials of a victim. The login credentials are obtained through phishing attacks or by using social engineering techniques.…

    • 341 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The Asian Fraud Detection Systems report defines and segments the concerned market in Asia with analysis and forecast of revenue. The fraud detection systems market in Asia is estimated to grow to around $268.0 million by 2018, at a CAGR of 5.5% from 2013 to 2018.…

    • 409 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Invite Friends and Get Coins

    • 26606 Words
    • 107 Pages

    Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere without the permission of the Author.…

    • 26606 Words
    • 107 Pages
    Good Essays
  • Powerful Essays

    This paper concentrates on identification methods and business preventive measures. Why do people fail to notice that credit fraud is a growing problem and what could continue if business and consumers stop believing the seriousness of credit card fraud? The Business community needs increased research and preventive controls that prevent credit and identity fraud. Unless changes are instituted fraud will continue to be a persistent problem. More than half of all adults have experienced some type of cybercrime, and more than one in 10 blames them self, according to a new survey commissioned by Symantec and conducted by independent market research firm Strategy One. Gentry, C.. (2008, June). Risk-less Business. The problem genuinely is a lack of education and training, by both the consumer and the business owner.…

    • 1831 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Proceedings of the World Congress on Engineering and Computer Science 2012 Vol I WCECS 2012, October 24-26, 2012, San Francisco, USA…

    • 3255 Words
    • 14 Pages
    Powerful Essays