ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Fraud Detection in Credit Card System Using Web Mining

Hetvi Modi1, Shivangi Lakhani2, Nimesh Patel3, Vaishali Patel4
  1. Student, Information Technology, Shri S?ad Vidhya Mandal Institute of Technology, Bharuch, India1,2,3
  2. Lecturer, Information Technology, Shri S?ad Vidhya Mandal Institute of Technology, Bharuch, India4
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

Now a day the usage of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. Various techniques like classification, clustering and apriori of web mining will be integrated to represent the sequence of operations in credit card transaction processing and show how it can be used for the detection of frauds. Initially, web mining techniques trained with the normal behaviour of a cardholder. If an incoming credit card transaction is not accepted by the web mining model with sufficiently high probability, it is considered to be fraudulent. At the same time, the system will try to ensure that genuine transactions will not be rejected. Using data from a credit card issuer, a web mining model based fraud detection system will be trained on a large sample of labelled credit card account transactions and tested on a holdout data set that consisted of all account activity. Web mining techniques can be trained on examples of fraud due to lost cards, stolen cards, application fraud, counterfeit fraud, and mail-order fraud. The proposed system will be able to detect frauds by considering a cardholder‟s spending habit without its significance. Usually, the details of items purchased in individual transactions are not known to any Fraud Detection System. The proposed system will be an ideal choice for addressing this problem of current fraud detection system. Another important advantage of proposed system will be a drastic reduction in the number of False Positives transactions. FDS module of proposed system will receive the card details and the value of purchase to verify, whether the transaction is genuine or not. If the Fraud Detection System module will confirm the transaction to be of fraud, it will raise an alarm, and the transaction will be declined.

Keywords

Transaction, Technique, Fraud Detection, Verify

INTRODUCTION

Web mining is the use of data mining techniques to automatically discover and extract information from web documents and services. Web mining is the application of data mining techniques to discover patterns from the Web. Web mining can be divided into three different types, which are Web usage mining, Web content mining and Web structure mining.
Fraud is an intentional deception made for personal gain or to damage another user/individual is fraudulent. Legal definition varies by legal jurisdiction for fraud. Fraud is a civil law violation and also a crime. Defrauding people or entities of money is a common purpose of fraud.
Credit card is a medium of selling goods or services without having cash in hand. A credit card is a simple way of offering credit to a consumer automatically. Credit card carries an identifying number that helps in shopping transactions rapidity.
Credit card is a medium of selling goods or services without having cash in hand. A credit card is a simple way of offering credit to a consumer automatically [2].Credit card carries an identifying number that helps in shopping transactions rapidity. Credit card fraud detection is the process of identifying those transactions that are fraudulent into two classes of legitimate and fraudulent transactions. The credit card fraud detection system developed used four clusters of low, high, risky and high risk. Once the transaction is legitimate, it was processed but if any transaction falls into any of these clusters it was labelled as suspicious/fraudulent. The alert goes off and the reason is given. The fraudulent transaction will not be processed but will be committed to the database. Fraud is an intentional deception made for personal gain or to damage another user/individual is fraudulent. Legal definition varies by legal jurisdiction for fraud [1] [2]. Fraud is a civil law violation and also a crime. Defrauding people or entities of money is a common purpose of fraud.

II. RELATED WORK

Various techniques like classification, clustering and association of web mining will be integrated to represent the sequence of operations in credit card transaction processing and show how it can be used for the detection of frauds. Initially, web mining techniques trained with the normal behaviour of a cardholder. If an incoming credit card transaction is not accepted by the web mining model with sufficiently high probability, it is considered to be fraudulent. At the same time, the system will try to ensure that genuine transactions will not be rejected. Web mining techniques can be trained on examples of fraud due to lost cards, stolen cards, application fraud, counterfeit fraud, and mail-order fraud [6].
Using data from a credit card issuer, a neural network based fraud detection system was trained on a large sample of labelled credit card account transactions and tested on a holdout data set that consisted of all account activity over a subsequent two-month period of time. The neural network was trained on examples of fraud due to lost cards, stolen cards, application fraud, counterfeit fraud, mail-order fraud and NRI (Non-Received Issue) fraud. The network detected significantly more fraud accounts with significantly fewer false positives over rule-based fraud detection procedures. There are several fraud detection technology exist based on Data mining, Knowledge Discovery and Expert System [6][7]. All these are not capable enough to detect the fraud at the time because there are many fraudulent transactions are in progress due to very less chance of a transaction being fraudulent.

III. PROPOSED TECHNOLOGY

There are many ways in which fraudsters execute a credit card fraud. As technology changes, so does the technology of fraudsters, and thus the way in which they go about carrying out fraudulent activities. Frauds can be broadly classified into three categories traditional card related frauds, merchant related frauds and Internet frauds.
There are many different kinds of neural networks and neural network algorithms. The most popular neural network algorithm is back propagation. In back propagation, Multilayer feed Forward Algorithm used to detect fraud in credit card system. The field of neural networks was originally kindled by psychologists and neurobiologists who sought to develop and test computational analogues of neurons. Back propagation is a common method of training artificial neural networks so as to minimize the objective function.

IV. IMPLEMENTATION

The proposed work has been implemented in Net beans IDE 7.1.2. Some Patterns is given as the input. Once the errors are found reduction would be done based on Sigmoid. Used single layer feed forward algorithm using random patterns. Here, Inserted Random pattern for train network. For example inserted pattern are given in below table.
Our system perform single layer feed forward neural network algorithm and predict the error. Assume & Consider any rth output neuron and for the training example we have calculated the output „O? for which the target output „T? Hence, the error norm in output for the rth output neuron is given by Er 1 = 1/2 er 2 = 1/2 (T-O) 2 The Euclidean norm of error E1 for the first training pattern is given by E1 = 1/2 Σ (Tor – Oor) 2. If we use the same technique for all the training patterns, we get E (V, W) = ΣEj (V, W, I) Where E is the error function depending on the m (1+n) weights of [W] and [V].

Effect of Learning Rate ‘η’

Learning rate coefficient determines the size of the weight adjustments made at each iteration and hence influences the rate of convergence. Poor choice of the coefficient can result in a failure in convergence. We should keep the coefficient constant through all the iterations for best results. If the learning rate coefficient is too large, the search path will oscillate and converges more slowly than a direct descent.

V. CONCLUSION AND FUTURE WORK

The detection of credit card fraud mechanism and examine the result based on the principles of this algorithm. Neural network?s single layer feed forward neural network algorithm that are being used to execute credit card fraud how credit card fraud impact on financial institution as well as merchant and customer, fraud detection. Further work, to study in more detail about the neural network and their role in fraud detection and combine this approach with feature back propagation algorithms to smoothly handle data of different feature types and detect the errors in large amount of transaction of credit card system. If this algorithm is applied into bank credit card fraud detection system, the probability of fraud transactions can be predicted soon after credit card transactions by the banks. The advantages neural networks offer over other techniques is that these models are able to learn from the past and thus, improve results as time passes. They can also extract rules and predict future activity based on the current situation. By employing neural networks effectively, banks can detect fraudulent use of a card, faster and more efficiently. Fraud detected and fraud transactions are generated with the sample data set or patterns.

ACKNOWLEDGEMENT

Before penning a single word for the Paper, we take this opportunity to thank Mrs. Vaishali Patel bottom of our heart who guided us as much as possible and for giving us valuable information regarding the paper. This was our first professional step toward the high careers in IT field. It was a great experience of exposing as well as learning lot of new things in Information Technology. We are indebted to all those who provided reviews our tasks and we apologize to anyone if we may have failed to mention.
 

Tables at a glance

Table icon Table icon Table icon
Table 1 Table 2 Table 3
 

Figures at a glance

Figure 1 Figure 2 Figure 3
Figure 1 Figure 2 Figure 3
 

References