scholarly journals Fraudulent credit card transaction detection using soft computing techniques

Author(s):  
Aishwarya Priyadarshini ◽  
Sanhita Mishra ◽  
Debani Prasad Mishra ◽  
Surender Reddy Salkuti ◽  
Ramakanta Mohanty

<p>Nowadays, fraudulent or deceitful activities associated with financial transactions, predominantly using credit cards have been increasing at an alarming rate and are one of the most prevalent activities in finance industries, corporate companies, and other government organizations. It is therefore essential to incorporate a fraud detection system that mainly consists of intelligent fraud detection techniques to keep in view the consumer and clients’ welfare alike. Numerous fraud detection procedures, techniques, and systems in literature have been implemented by employing a myriad of intelligent techniques including algorithms and frameworks to detect fraudulent and deceitful transactions. This paper initially analyses the data through exploratory data analysis and then proposes various classification models that are implemented using intelligent soft computing techniques to predictively classify fraudulent credit card transactions. Classification algorithms such as K-Nearest neighbor (K-NN), decision tree, random forest (RF), and logistic regression (LR) have been implemented to critically evaluate their performances. The proposed model is computationally efficient, light-weight and can be used for credit card fraudulent transaction detection with better accuracy.</p>

2021 ◽  
Author(s):  
C Pallavi ◽  
Girija R ◽  
Vedhapriyavadhana R ◽  
Barnali Dey ◽  
Rajiv Vincent

Online financial transactions play a crucial role in today’s economy. It becomes an unavoidable part of the business and global activities. Transaction fraud executes thoughtful intimidations to e-commerce spending. Now-a-days, the online contract or business is fetching additional sound by knowing the types of online transaction frauds associated with, these are raising which disturbs the currency accompanying business. It has the capability to confine and encumber the contract accomplished by the intruder from an honest consumer’s credit card information. In order to avoid such a problem, the proposed system is established transaction limit for the customers. Efficient data is only considered for detecting fraudulent user action and it happens only at the time of registration. Transaction which is happening for any individual is not at all known to any FDS (Fraud Detection System) consecutively at the bank which mainly issues credit cards to customers. To speak out this problem, BLA (Behaviour and Location Analysis) is executed. The FDS tracks at a credit card provided by bank. All the inbound business is directed to the FDS aimed at confirmation, authentication and verification. FDS catches the card particulars and matter to confirm that the operation is fake or genuine. The pick-up merchandises are unknown to Fraud Detection System. If the transaction is assumed to be fraud, then the corresponding bank declines it. In order to verify the individuality, uniqueness or originality, it uses spending patterns and geographical area. In case, if any suspicious pattern is identified or detected, the FDS system needs verification. The information which is already registered by the user, the system identifies infrequent outlines in the disbursement method. After three invalid attempts, the system will hinder the user. In this proposed system, most of the algorithms are checked and investigated for online financial fraud detection techniques.


The world today has made giant leaps in the field of Medicine. There is tremendous amount of researches being carried out in this field leading to new discoveries that is making a heavy impact on the mankind. Data being generated in this field is increasing enormously. A need has arisen to analyze these data in order to find out the meaningful and relevant hidden patterns. These patterns can be used for clinical diagnosis. Data mining is an efficient approach in discovering these patterns. Among the many data mining techniques that exists, this paper aims at analyzing the medical data using various Classification techniques. The classification techniques used in this study include k-Nearest neighbor (kNN), Decision Tree, Naive Bayes which are hard computing algorithms, whereas the soft computing algorithms used in this study include Support Vector Machine (SVM), Artificial Neural Networks (ANN) and Fuzzy k-Means clustering. We have applied these algorithms to three kinds of datasets that are Breast Cancer Wisconsin, Haberman Data and Contraceptive Method Choice dataset. Our results show that soft computing based classification algorithms better classifications than the traditional classification algorithms in terms of various classification performance measures


Author(s):  
Jasmin Parmar ◽  
Achyut C. Patel ◽  
Mayur Savsani

The short improvement withinside the E-Commerce enterprise has caused a dramatic enlargement withinside the usage of credit score playing cards for on-line buys and thusly they had been flooded with the fraud diagnosed with it. As of late, for banks has gotten extraordinarily tough for figuring out the fraud with inside the credit card framework. Machine getting to know assumes an essential component in distinguishing credit card fraud withinside the transactions. For foreseeing those transactions banks make use of specific system getting to know methodologies, beyond data has been accrued and new highlights are being applied for enhancing the prescient force. The exhibition of possible threats identification in credit card instances is highly prompted through the analysing technique at the informational collection, the dedication of factors, and discovery strategies applied. This paper explores the presentation of K-Nearest Neighbor, Decision Trees, Support Vector Machine (SVM), Logistic Regression, Random Forest, and XGBoost for credit card fraud detection. Dataset of credit card transactions is accrued from Kaggle and it includes a sum of 2,84,808 credit card transactions of an EU financial institution dataset. It depicts doubtful transactions as fraud & labels it "high-quality class" and actual ones as the "poor class". The dataset is relatively imbalanced, it has approximately 0.172% of fraud cases and the relaxations are actual transactions. These methods are implemented for the dataset and work is carried out in Python. The presentation of the methods is classed relying on the accuracy and F1 rating and confusion matrix. Results display that every set of rules may be used for credit card fraud detection with excessive precision. The proposed version may be helpful for the invention of numerous anomalies.


Author(s):  
S. Vijaya Rani ◽  
G. N. K. Suresh Babu

The illegal hackers  penetrate the servers and networks of corporate and financial institutions to gain money and extract vital information. The hacking varies from one computing system to many system. They gain access by sending malicious packets in the network through virus, worms, Trojan horses etc. The hackers scan a network through various tools and collect information of network and host. Hence it is very much essential to detect the attacks as they enter into a network. The methods  available for intrusion detection are Naive Bayes, Decision tree, Support Vector Machine, K-Nearest Neighbor, Artificial Neural Networks. A neural network consists of processing units in complex manner and able to store information and make it functional for use. It acts like human brain and takes knowledge from the environment through training and learning process. Many algorithms are available for learning process This work carry out research on analysis of malicious packets and predicting the error rate in detection of injured packets through artificial neural network algorithms.


Author(s):  
M. Ilayaraja ◽  
S. Hemalatha ◽  
P. Manickam ◽  
K. Sathesh Kumar ◽  
K. Shankar

Cloud computing is characterized as the arrangement of assets or administrations accessible through the web to the clients on their request by cloud providers. It communicates everything as administrations over the web in view of the client request, for example operating system, organize equipment, storage, assets, and software. Nowadays, Intrusion Detection System (IDS) plays a powerful system, which deals with the influence of experts to get actions when the system is hacked under some intrusions. Most intrusion detection frameworks are created in light of machine learning strategies. Since the datasets, this utilized as a part of intrusion detection is Knowledge Discovery in Database (KDD). In this paper detect or classify the intruded data utilizing Machine Learning (ML) with the MapReduce model. The primary face considers Hadoop MapReduce model to reduce the extent of database ideal weight decided for reducer model and second stage utilizing Decision Tree (DT) classifier to detect the data. This DT classifier comprises utilizing an appropriate classifier to decide the class labels for the non-homogeneous leaf nodes. The decision tree fragment gives a coarse section profile while the leaf level classifier can give data about the qualities that influence the label inside a portion. From the proposed result accuracy for detection is 96.21% contrasted with existing classifiers, for example, Neural Network (NN), Naive Bayes (NB) and K Nearest Neighbor (KNN).


Author(s):  
Shashank Singh and Meenu Garg

It is essential that Visa organizations can distinguish false Mastercard exchanges so clients are not charged for things that they didn't buy. Such issues can be handled with Data Science and its significance, alongside Machine Learning, couldn't be more important. This undertaking expects to outline the demonstrating of an informational collection utilizing AI with Credit Card Fraud Detection. The Credit Card Fraud Detection Problem incorporates demonstrating past Visa exchanges with the information of the ones that ended up being extortion. This model is then used to perceive if another exchange is fake. Our target here is to identify 100% of the fake exchanges while limiting the off base misrepresentation arrangements. Charge card Fraud Detection is an average example of arrangement. In this cycle, we have zeroed in on examining and pre- preparing informational indexes just as the sending of numerous irregularity discovery calculations, for example, Local Outlier Factor and Isolation Forest calculation on the PCA changed Credit Card Transaction


2018 ◽  
Vol 25 (3) ◽  
pp. 702-720 ◽  
Author(s):  
Vipin Khattri ◽  
Deepak Kumar Singh

Purpose This paper aims to provide information of parameters and techniques used in the automated fraud detection system during online transaction. With the increase in the use of online transactions, the concerns regarding data security have also increased. To tackle the frauds, lot of research has been done and plethora of papers are available on the related topics. The purpose of this paper is to provide the clear pathway for researchers to move in the direction of development of automated fraud detection system to prevent the fraud during online transaction. Design/methodology/approach This literature review analyses and compares the different types of techniques for detecting fraud during online transaction. An in-depth study of the most prominent journals has been done and the core methodology of the papers has been presented. This article also shed some light on different types of parameters used in fraud detection techniques during online transaction. Findings There are vast varieties of various fraud detection techniques, and every technique has completed task in its own way. After studying approximately 41 research papers, 14 books and four reports, in total 30 parameters have been identified and a detailed study of the parameters has been presented. The parameters are also listed with their details that how these parameters are used in the security system for detecting online transaction fraud. Research limitations/implications This paper provides empirical insight about the parameters and their prominence in the development of automated fraud detection security system of online transaction. This paper encourages the researchers to development of improved fraud detection system. Practical implications This paper will pave the way for researchers to do a focused research on the fraud detection methodologies. The analysis will help in zeroing down the most prevalent topic of research in this field. The researchers will be able to understand the internal details of parameters and techniques used in the fraud detection systems. This literature also helps the research to think in a variety of ways that how these parameters will be used in the development of fraud detection system. Originality/value This paper is one of the most comprehensive reviews in its field. It tries and attempts to fill a void created because of lack of compilation of the laid fraud detection parameters.


Sign in / Sign up

Export Citation Format

Share Document