Prediction of a Fraud Transaction
Table of Contents
Abstract
Theft is any malicious program that is intended to cause economic loss to some other governing coalition. The use of digital currency or transfer systems is particularly those in developing nations, so does the theft connected with that as well. Identity fraud costs customers and financial institutions millions and millions of dollars worldwide. However, after various measures to deter fraud, scammers are continually seeking out new forms and methods to commit criminal acts. Consequently, to prevent such scams, we should have a critical credit card fraud that not only senses fraud and locates this before it occurs even in an honest way. We also need to make our programs learn from past theft and help them to adjust to possible new techniques of robbery. In this paper, we presented the idea of credit card theft and its different forms (Saraswathi, 2020). We described the various advanced methods for the fraud prevention method like Support Vector Machine ( SVM), Artificial Neural Networks ( ANN), neural networks, K-Nearest Neighbor (KNN), Markov chain Model, Fuzzy Logical Based Method, and linear regression. Extensive analysis of current and potential fraud detection models has been carried out. A comparative study of these strategies has been performed based on statistical metrics such as accuracy, identification rate, and false alarm. Our research shows the shortcomings of conventional designs and gives a better approach to solving them.
Introduction
The use of credit cards has now become a common situation also in developed countries. Users use it to store, bill payments, and make online payments. However, with the rise in the number of credit card users, the number of fraud cases involving the credit card has also risen. Credit Card frauds are causing a loss of millions and millions of dollars worldwide. Fraud may be categorized as any action intended to be misleading to obtain monetary gain by any means without any understanding of the cardholder and the creditor bank. Financial fraud can be achieved in a variety of ways. By losing or stealing cards, by making fraudulent or counterfeit cards, by copying the new source, by deleting or altering the card reader current on the card containing the information about the user, by identity theft, skimming, or steal information from the trader’s side (Kaur, 2020). Fraud prevention is about detecting a fraud operation among many human bones, which, in reality, poses a problem. With the technology working on dishonest strategies, it is essential to design better models to fight these scams in their early stages only before they’re completed. However, the fundamental difficulty in creating like a model is that the amount of fraudulent transactions within the total volume of sales is quite low and that the task of identifying a fraudulent activity effectively and accurately is very troubling.
Credit card frauds can be of following types:
- Application thefts: whenever the scammer takes control of the system application by manipulating confidential user details such as password and username and opening a fake profile. This occurs in addition to identity fraud. If the scammer applies for a credit or debit card or a new bank card in the title of the card issuer. To assist or explain their fraudulent claim, the scammer steals the additional documentation.
- Electronic or physical credit or debit card stains: If the scammer skips the data written on the smart card of the payment. This data is susceptible and, by obtaining it, the scammer will use it in the potential for fraudulent purchases.
- CNP (Card Not introduce): If the scammer knows the expiration date and bank details of the card, it will be used without any of the real physical presence of the cheque.
- Fraudulent Card scam: It is usually tried through the scanning process (Eweoya, 2019). A counterfeit magnetic swipe token is made and contains all the information of the original item. The fake cards are entirely operating, which can be used to make purchases in the future.
Data
Methods
We recognize that all likely to be fraudulent follow the same pattern and that when using any information processing method, like Support Vector Machine (SVM), convolutional neural networks, K-Nearest Neighbor (KNN) or Myrtaceae, we can identify payments as fraud, the function of which is described below. This uses neurons as decision-making sites and the edges between neurons to measure the role within each neuron in the preceding stage in the decision-making phase and the effect of the present neuron. It is focused on the identification of patterns (Dharwa, 2019).
Help Vector Machines A controlled training algorithm is used to divide datasets into various groups using a decision boundary. The purpose of the SVM is to find this decision boundary. There might be a lot of hyperplanes, but we’re eager to find a separating algorithm. Points nearest to the hyperplane in the various classes are classified as known values, and this weight vector is being used to estimate groups of new data sets. K-Nearest Neighbor It is among the most widely used algorithms both for classification or regression sections (Cao, 2019). Its productivity based on three things: the length metric, the length rule, and the valuation of K. Distance metrics shall include a measure to locate the nearest neighbor of any outgoing data set. The length process helped us categorize the set of points in a school by comparing its characteristics with those of the data sets in its neighborhood.
Results and discussion
EDA
Conclusion
Communication networks and data gathering models access more qualities than we can ever have anticipated in the first dynamic array, most notably with identical characteristics: these also target at gathering knowledge from (relatively complex) devices to create new compressed measurable interpretations inevitably. At the same time, they address this specific problem from two main perspectives: the latter by collecting and experimentally analyzing the internal mechanism; while the last by constructing statistical models based on statistics. Throughout this article, we examined the theory that knowledge of the concept could be used as a means of improving data mining algorithms, in the context of the problem of fraud detection in credit card purchases, provide a specific example of how knowledge of the concept and data analysis can be incorporated as complementary tools in an additional way to improve the categorization rates of traditional data mining techniques.
References
Cao, S., Yang, X., Chen, C., Zhou, J., Li, X., & Qi, Y. (2019). TitAnt: online real-time transaction fraud detection in Ant Financial. Proceedings of the VLDB Endowment, 12(12), 2082-2093.
Dharwa, J. N., & Patel, A. R. (2019). A Transaction Pattern Generation Tool (TPGT) for Prediction of Online Financial Transactions. Journal of Computer Technology & Applications, 3(3), 1-12.
Eweoya, I. O., Adebiyi, A. A., Azeta, A. A., Chidozie, F., Agono, F. O., & Guembe, B. (2019, August). A Naive Bayes approach to fraud prediction in loan default. In Journal of Physics: Conference Series (Vol. 1299, No. 1, p. 012038). IOP Publishing.
Kaur, D. (2020). Machine Learning Approach for Credit Card Fraud Detection (KNN & Naïve Bayes). Machine Learning Approach for Credit Card Fraud Detection (KNN & Naïve Bayes)(March 30, 2020).
Saraswathi, E., Kulkarni, P., Khalil, M. N., & Nigam, S. C. (2019, March). Credit Card Fraud Prediction And Detection using Artificial Neural Network And Self-Organizing Maps. In 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) (pp. 1124-1128). IEEE.
Van Belle, R., Mitrovic, S., & De Weerdt, J. (2019). Graph Representation Learning for Fraud Prediction: A Nearest Neighbour Approach. https://grlearning. github. io/papers/.
Appendices