Skip to main content


Machine Learning Based Solution for an Effective Credit Card Fraud Detection

Issue Abstract

Abstract
Credit card utilization has been growing with the emergence of e-trade and different programs that permit bills to be made on-line. However, whilst credit score card is stolen or any fraudulent interest takes place, it effects in monetary issues to the cardboard holders. It additionally reasons problems to the provider of playing cards. Therefore, it's far crucial to have a mechanism to stumble on fraudulent on-line transactions. In this regard, there exists many answers as located withinside the literature. One such technique is to have ancient transactions divided into fraudulent and non-fraudulent transactions. This ought to assist educate classifiers to stumble on or suspect fraud transactions. These answers focused spending conduct of clients so that you can stumble on opportunity of fraud. In the present device, statistics mining method is accompanied with random forests to version the conduct of ordinary and fraudulent transactions for credit score card fraud detection. The trouble with the version is that it really works best with dataset this is best tuned. If dataset isn't always good, its overall performance is deteriorated. To conquer this trouble, on this project, a characteristic choice set of rules is proposed to beautify the overall performance of classifier. The proposed device additionally could have comparative have a look at with more than one classifiers like Random Forests and SVM to assess the characteristic choice technique.
Keywords: Charge card pressure obvious proof, Random Forest, SVM, incorporate affirmation


Author Information
Mr. V. Naveen Kumar
Issue No
9
Volume No
4
Issue Publish Date
05 Sep 2022
Issue Pages
44-50

Issue References

Reference 
1. Y. Gmbh and K. G. Co, “Global online payment methods: Full year 2016,” Tech. Rep., 3 2016.
2. Mota, G., Fernandes, J., and Belo, O. (2014). Usage signatures analysis an alternative method for preventing fraud in E-Commerce applications. International Conference on Data Science and Advanced Analytics (pp.203-208). IEEE.
3. Behdad, M., Barone, L., Bennamoun, M., and French, T. (2012). Nature inspired techniques in the context of fraud detection. IEEE Transactions on Systems Man and Cybernetics Part C, 42(6), 1273-1290.
4. Vlasselaer, V. V., Bravo, C., Caelen, O., Eliassi-Rad, T., Akoglu, L., and Snoeck, M., et al. (2015). Apate: a novel approach for automated credit card transaction fraud detection using network-based extensions. Decision Support Systems, 75, 38-48.
5. Sahin, Y., and Duman, E. (2011). Detecting credit card fraud by decision trees and support vector machines. Lecture Notes in Engineering and Computer Science, 2188(1).
6. Bhattacharyya, S., Jha, S., Tharakunnel, K., and Westland, J. C. (2011). Data mining for credit card fraud: a comparative study. Decision Support Systems, 50(3), 602-613.
7. Duman, E., and Ozcelik, M. H. (2011). Detecting credit card fraud by genetic algorithm and scatter search. Expert Systems with Applications, 38(10), 13057-13063.
8. Gupta, Shalini, and R. Johari. ” A New Framework for Credit Card Transactions Involving Mutual Authentication between Cardholder and Merchant.” International Conference on Communication Systems and Network Technologies IEEE, 2011:22-26.
9. Seyedhossein, Leila, and M. R. Hashem. ” Mining information from credit card time series for timelier fraud detection.” International Symposium on Telecommunications IEEE, 2011:619-624.
10. Shi, E., Niu, Y., Jakobsson, M., and Chow, R. (2010). Implicit Authentication through Learning User Behavior. International Conference on Information Security (Vol.6531, pp.99-113). Springer-Verlag. 11. Xuan, S., Liu, G., Li, Z., Zheng, L., Wang, S., & Jiang, C. (2018). Random forest for credit card fraud detection. 2018 IEEE 15th International Conference on Networking, Sensing and Control (ICNSC). P1-6. 12. Devi Meenakshi, Janani, Gayathri. S and Mrs. Indira. (2019). CREDIT CARD FRAUD DETECTION USING RANDOM FOREST. International Research Journal of Engineering and Technology (IRJET). 6 (3), p1-5.
13. Lakshmi S V S S and Selvani Deepthi Kavila. (2018). Machine Learning for Credit Card Fraud Detection System. International Journal of Applied Engineering Research. 13 (24), p16819-16824.
14. Navanshu Khare and Saad Yunus Sait. (2018). Credit Card Fraud Detection Using Machine Learning Models and Collating Machine Learning Models. International Journal of Pure and Applied Mathematics. 118 (20), p825-838.
15. S. Monika, K. Venkataramanamma, P. Pritto Paul and M. Usha. (2019). Credit Card Fraud Detection using Random Forest Algorithm. International Journal of Research in Engineering, Science and Management. 2 (3), p1-3.
16. Vaishnave Jonnalagadda. (2019). Credit card fraud detection using Random Forest Algorithm. International Journal of Advance Research, Ideas and Innovations in Technology. 5 (2), p1-5.
17. F. Fadaei Noghani and M.- H. Moattar. (2017). Ensemble Classification and Extended Feature Selection for Credit Card Fraud Detection. Journal of AI and Data Mining. 5 (2), p235-243.
18. R.Malika. (2017). Fraud Detection using Supervised Learning Algorithms. International Journal of Advanced Research in Computer and Communication Engineering. 6 (6), p1-5.
19. Kuldeep Randhawa and Chu Kiong Loo. (2018). Credit card fraud detection using AdaBoost and majority voting. IEEE, p1-8.
20. Yashvi Jain, NamrataTiwari, ShripriyaDubey and Sarika Jain. (2019). A Comparative Analysis of Various Credit Card Fraud Detection Techniques. International Journal of Recent Technology and Engineering. 7 (2), p1-6.
21. Jaganathan, M., Sabari, A. An heuristic cloud based segmentation technique using edge and texture based two dimensional entropy. Cluster Computing Vol 22, PP 12767–12776 (2019). https://doi.org/10.1007/s10586-018-1757-3
22. Senthil kumar, V., Prasanth, K. Weighted Rendezvous Planning on Q-Learning Based Adaptive Zone Partition with PSO Based Optimal Path Selection. Wireless Personal Communications 110, 153–167 (2020). https://doi-org.libproxy.viko.lt /10.1007/s11277-019-06717-z
23. Vignesh Janarthanan, A.Viswanathan, M. Umamaheswari, “Neural Network and Cuckoo Optimization Algorithm for Remote Sensing Image Classification ", International Journal of Recent Technology and Engineering., vol. 8, no. 4, pp. 1630-1634, Jun. 2019.

24. Dr. V. Senthil kumar, Mr. P. Jeevanantham, Dr. A. Viswanathan, Dr. Vignesh Janarthanan, Dr. M. Umamaheswari, Dr. S. Sivaprakash Emperor Journal of Applied Scientific Research “Improve Design and Analysis of Friend-to-Friend Content Dissemination System ”Volume - 3 Issue - 3 2021
25. V.Senthilkumar , K. Prashanth” A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks International Journal of communication and computer Technologies, Vol 4 Issue No 1 (2016)
26. Viswanathan, A., Arunachalam, V. P., & Karthik, S. (2012). Geographical division traceback for distributed denial of service. Journal of Computer Science, 8(2), 216.
27. Anurekha, R., K. Duraiswamy, A. Viswanathan, V.P. Arunachalam and K.G. Kumar et al., 2012. Dynamic approach to defend against distributed denial of service attacks using an adaptive spin lock rate control mechanism. J. Comput. Sci., 8: 632-636.
28. Umamaheswari, M., & Rengarajan, N. (2020). Intelligent exhaustion rate and stability control on underwater wsn with fuzzy based clustering for efficient cost management strategies. Information Systems and e-Business Management, 18(3), 283-294.
29. Babu, G., & Maheswari, M. U. (2014). Bandwidth Scheduling for Content Delivery in VANET. International Journal of Innovative Research in Computer and Communication Engineering IJIRCCE, 2(1), 1000-1007.
30. Viswanathan, A., Kannan, A. R., & Kumar, K. G. (2010). A Dynamic Approach to defend against anonymous DDoS flooding Attacks. International Journal of Computer Science & Information Security.
31. Kalaivani, R., & Viswanathan, A. HYBRID CLOUD SERVICE COMPOSITION MECHANISM WITH SECURITY AND PRIVACY FOR BIG DATA PROCESS., International Journal of Advanced Research in Biology Engineering Science and Technology, Vol. 2,Special Issue 10, ISSN 2395-695X.
32. Ardra, S., & Viswanathan, A. (2012). A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks. IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC), 2(6).
33. Sowmitha, V., and Mr V. Senthilkumar. "A Cluster Based Weighted Rendezvous Planning for Efficient Mobile-Sink Path Selection in WSN." International Journal for Scientific Research & Development Vol 2 Issue 11 2015