Preview

Credit Card Fraud Detection System Using Hidde Markov Model

Better Essays
Open Document
Open Document
12677 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Credit Card Fraud Detection System Using Hidde Markov Model
CHAPTER ONE 1.0 INTRODUCTION

In day to day life credit cards are used for purchasing goods and services by the help of virtual card for online transaction or physical card for offline transaction. In physical transaction, Credit cards will insert into payment machine at merchant shop to purchase goods. Tracing fraudulent transactions in this mode may not be possible because the attacker already steal the credit card. The credit card company may go in financial loss if loss of credit card is not realized by credit card holder. In online payment mode, attackers need only little information for doing fraudulent transaction (secure code, card number, expiration date etc.). In this purchase method, mainly transactions will be done through the Internet or telephone. Small transactions are generally undergo less verification, and are less likely to be checked by either the card issuer or the merchant. Card issuers must take more precaution against fraud detection and financial losses. Credit card fraud cases are increasing every year. In 2008, number of fraudulent through credit card had increased by 30 percent because of various ambiguities in issuing and managing credit cards. Credit card fraudulent is approximately 1.2% of the total transaction amount, although it is not small amount as compare to total transaction amount which is in trillions of dollars in 2007[ 2-4] . Hidden Markov Model will be helpful to find out the fraudulent transaction by using spending profiles of user. It works on the user spending profiles which can be divided into major three types such as 1) Lower profile; 2) Middle profile; and 3) Higher profile. For every credit card, the spending profile is different, so it can figure out an inconsistency of user profile and try to find fraudulent transaction. It keeps record of spending profile of the card holder by both way, either offline or online. Thus analysis of purchased commodities of cardholder will be a useful tool in fraud detection system



References: http://en.wikipedia.org/wiki/Adobe_Dreamweaver[Nov. 22, 2010] [22] Jay Greenspan and Brad Bulger

You May Also Find These Documents Helpful

  • Good Essays

    Unit 12 P6

    • 916 Words
    • 3 Pages

    Customers can be very concerned about payment security with transactions on the internet. Some of these concerns are from stories about hackers, identity theft and even fake…

    • 916 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Markov Analysis

    • 461 Words
    • 2 Pages

    1. Describe the internal labor market of the company in terms of job stability (staying in same job), promotion paths and rates, transfer paths and rates, demotion paths and rates, and turnover (exit) rates.…

    • 461 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 593 Words
    • 3 Pages

    There are many different types of payment systems, but the four major ones are Online Credit Card Payment System, Online Electronic Cash System, Electronic Check System and Smart Cards based Electronic Payment System. The key advantages to these systems vary from privacy, integrity, compatibility, good transaction efficiency, acceptability, convenience, mobility, low financial risk and anonymity, compared to the traditional method of payment systems. There are some feared concerns with the credit card system such as lack of authentication, repudiation of charges and credit card frauds, and also having to reveal credit information at…

    • 593 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In this document I am going to explain the security issues that every e-commerce possible faces and how to overcome them.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Rough Draft

    • 567 Words
    • 3 Pages

    Imagine if someone is pretending to be you, using your credit card to indulge themselves in items that they would never be able to afford. Credit card fraud is far too common today, losing a wallet can mean losing your identity. A credit card can be a positive or negative thing, depending whose hands it’s in. Credit card fraud is a problem, that I believe, I have found the solution to.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In order to detect till theft it is necessary to reconcile both cash balances, and track individual…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    HIPAA Research Paper

    • 564 Words
    • 3 Pages

    In the health care industry, many patients make card payments. It is very important that they protect and secure the cardholder data. Hackers will try to enter the organization through vulnerabilities in an application, network or a system. It is important that they are secured. The main objectives are:…

    • 564 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Pointing to “backward U.S. technology,” Ziobro and Sidel reveal a long-standing issue between the financial industry and retailers that has slowed progression on chip cards. Because these cards are widely used in Europe and Canada, the U.S. has become the preferred target for criminal hackers, according to the authors. As a result, “the breaches keep coming,” and a computer-based attack experienced by Neiman Marcus over the holidays as well is used as further evidence of the widespread problem at hand.…

    • 439 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    A college degree is not something you should choose to have; it is something you should want to have to expand your education. Some people find it hard to determine the value of a college education. Getting a college degree can give you more opportunities in life and it will help you fulfill your goals.…

    • 553 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fraud analysis: Predictive analysis leverages the identification of fraudulent transactions. It also helps in analyzing fraud claim requests. It also helps in paying valid transactions with more certainty. Expensive recovery actions also get reduced.…

    • 428 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    “…there is a significant need to widely implement measures for tracking and tracing identity thieves and fraudsters once a breach has occurred. There are various means of doing so, whether electronic or physical (Gregory, A. 2008).…

    • 7416 Words
    • 30 Pages
    Better Essays
  • Powerful Essays

    The critical situation that retailers play in the payment card system came into sharp relief the past years with a series of large retailer breaches to fraud of credit cards being used by black hat hackers to transact online. Criminal organizations target not only big co-operations but also smaller business and this month it has been reported that there is underground purchase of point of sale malware at two thousand dollars. As the profitability of cyber criminals has become apparent, hackers have increasingly engineered and executed many devastating data breaches in the global net. Many of the cyber criminals are transnational criminals organizations that hack online, Avoiding being traced due to the obstacles law enforcement may encounter when tracking perpetrators in foreign countries.…

    • 931 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Credit Bureau Essay

    • 1356 Words
    • 6 Pages

    The essential of credit data are represented by the consumers representation based on his or hers borrowing behaviors of repayment over time. Today, the regulation has led to a high automated worldwide firm that collect detailed oriented, complete information and conform with a range of polices that’s in the best interest of the consumer.…

    • 1356 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Credit Card Fraud

    • 1919 Words
    • 8 Pages

    The fraud begins mostly in two ways, either by the theft of the corporeal card or by the negotiation of data related with the account including all the information. The compromise can occur by many common routes and one of the ways which’s typically used is warning the card holder, until the account is ultimately used for fraud. Here’s an example where a store clerk is copying sales receipts so he can use them later. Using credit card on internet…

    • 1919 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    National Open University of Nigeria Headquaters 14/16 Ahmadu Bello Way Victoria Island Lagos Abuja Office No 5 Dar es Salam Street Off Aminu Kano Crescent Wuse II, Abuja Nigeria. e-mail: centralinfo@nou.edu.ng URL: www.nou.edu.ng…

    • 654 Words
    • 3 Pages
    Satisfactory Essays

Related Topics