0% found this document useful (0 votes)
25 views17 pages

NC Report

nb

Uploaded by

borsesayali05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views17 pages

NC Report

nb

Uploaded by

borsesayali05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Credit Card Fraud Detection

A Project report submitted in

Partial fulfillment of the requirements

for the Degree of

Bachelor of Engineering
in

Computer Science & Engineering


Submitted by

Students Name

DEPARTMENT OF COMPUTER ENGINEERING

NES’s

GANGAMAI COLLEGE OF ENGINEERING NAGAON

2024 – 2025
NES’s
GANGAMAI COLLEGE OF ENGINEERING NAGAON
DEPARTMENT OF COMPUTER ENGINEERING

CERTIFICATE
This is to certify that the Project entitled “Credit Card Fraud Detection
machine” has been carried out by “Nakshatra Chaudhri” under my
guidance in partial fulfillment of the degree of Bachelor of Engineering
in Computer Engineering of North Maharashtra University, Jalgaon
during the academic year 2024 -2025. To the best of my knowledge and
belief this work has not been submitted elsewhere for the award of any
other degree.

Date: Guide

Place: Nagaon

Examiner Head Principal

Prof. G. M. Poddar Dr. V. M.


Patil
ACKNOWLEDGEMENT

With immense pleasure and satisfaction, I am presenting this project


report as part of the curriculum of B.E. Computer Engineering. I wish to
express my sincere gratitude towards all those who have extended their
support during this work.

I express my profound thanks to my guide Guide Name his


continued support. Prof. G. M. Poddar (HOD, Computer Department)
for their guidance and timely review. I am also thankful to Dr. V. M. Patil
(Principal, GCOE) for providing this opportunity. I would also like to
express my thanks to all those who have directly or indirectly guided and
helped me in preparation of this work.

Nakshatra Chaudhri

Students Name
ABSTRACT

It is vital that credit card companies are able to identify fraudulent credit card transactions so
that customers are not charged for items that they did not purchase. Such problems can be
tackled with Data Science and its importance, along with Machine Learning, cannot be
overstated. This project intends to illustrate the modelling of a data set using machine learning
with Credit Card Fraud Detection. The Credit Card Fraud Detection Problem includes
modelling past credit card transactions with the data of the ones that turned out to be fraud.
This model is then used to recognize whether a new transaction is fraudulent or not. Our
objective here is to detect 100% of the fraudulent transactions while minimizing the incorrect
fraud classifications. Credit Card Fraud Detection is a typical sample of classification. In this
process, we have focused on analyses and pre-processing data sets as well as the deployment
of multiple anomaly detection algorithms such as Local Outlier Factor and Isolation Forest
algorithm on the PCA transformed Credit Card Transaction data.
Table of Contents

Sr. No. Name Page


No.
1 Introduction
2 Literature survey
3 Project Planning and Management
4 Analysis
5 System Design
6 Conclusion and future work
7 Bibliography
CHAPTER -1

1.1 INTRODUCTION & BACKGROUND

Nowadays Credit card usage has been drastically increased across the world, now
people believe in going cashless and are completely dependent on online
transactions. The credit card has made the digital transaction easier and more
accessible. A huge number of dollars of loss are caused every year by the criminal
credit card transactions. Fraud is as old as mankind itself and can take an unlimited
variety of different forms. The PwC global economic crime survey of 2017 suggests
that approximately 48% of organizations experienced economic crime. Therefore,
there’s positively a necessity to unravel the matter of credit card fraud detection.
Moreover, the growth of new technologies provides supplementary ways in which
criminals may commit a scam.

1.2 Problem Definition & Solution

The use of credit cards is predominant in modern day society and credit card fraud
has been kept on increasing in recent years. Huge Financial losses have been
fraudulent effects on not only merchants and banks but also the individual person
who are using the credits. Fraud may also affect the reputation and image of a
merchant causing non-financial losses that. For example, if a cardholder is a victim
of fraud with a certain company, he may no longer trust their business and choose a
competitor. Fraud Detection is the process of monitoring the transaction behavior of
a cardholder to detect whether an incoming transaction is authentic and authorized
or not otherwise it will be detected as illicit. In a planned system, we are applying
the random forest algorithm for classifying the credit card
dataset. Random Forest is an associate in the nursing algorithmic program for
classification and regression. Hence, it is a collection of decision tree classifiers. The
random forest has an advantage over the decision tree as it corrects the habit of over
fitting to their training set. A subset of the training set is sampled randomly so that
to train each individual tree and then a decision tree is built, each node then splits on
a feature designated from a random subset of the complete feature set. Even for large
data sets with many features and data instances, training is extremely fast in the
random forest and because each tree is trained independently of the others. The
Random Forest algorithm has been found to provide a good estimate of the
generalization error and to be resistant to overfitting.
1.5 Objective and scope

We propose a Machine learning model to detect fraudulent credit card activities in


online financial transactions. Analyzing fake transactions manually is impracticable
due to vast amounts of data and its complexity. However, adequately given
informative features, could make it is possible using Machine Learning. This
hypothesis will be explored in the project. To classify fraudulent and legitimate
credit card transaction by supervised learning Algorithm such as Random forest. To
help us to get awareness about the fraudulent and without loss of any financially.
CHAPTER -2

LITERUTRE SURVEY

Fraudulent Detection in Credit Card System Using SVM & Decision Tree
(Nakshatra Chaudhri): With growing advancement in the electronic commerce field,
fraud is spreading all over the world, causing major financial losses. In the current
scenario, Major cause of financial losses is credit card fraud; it not only affects
tradesperson but also individual clients. Decision tree, Genetic algorithm, Meta
learning strategy, neural network, HMM are the presented methods used to detect
credit card frauds. In contemplating system for fraudulent detection, artificial
intelligence concept of Support Vector Machine (SVM) & decision tree is being
used to solve the problem. Thus by the implementation of this hybrid approach,
financial losses can be reduced to greater extent. Machine Learning Based Approach
to Financial Fraud Detection Process in Mobile Payment System (Dahee Choi and
Kyungho Lee): Mobile payment fraud is the unauthorized use of mobile transaction
through identity theft or credit card stealing to fraudulently obtain money. Mobile
payment fraud is a fast growing issue through the emergence of smartphone and
online transition services. In the real world, a highly accurate process in mobile
payment fraud detection is needed since financial fraud causes financial loss.
Therefore, our approach proposed the overall process of detecting mobile payment
fraud based on machine learning, supervised and unsupervised method to detect
fraud and process large amounts of financial data. Moreover, our approach
performed sampling process and feature selection process for fast processing with
large volumes of transaction data and to achieve high accuracy in mobile payment
detection. F-measure and ROC curve are used to validate our proposed model. 5.
PURPOSE OF THE PROJECT We propose a Machine learning model to detect
fraudulent credit card activities in online financial transactions. Analyzing fake
transactions manually is impracticable due to vast amounts of data and its
complexity. However, adequately given informative features, could make it is
possible using Machine Learning. This hypothesis will be explored in the project.
To classify fraudulent and legitimate credit card transaction by supervised learning
Algorithm such as Random forest. To help us to get awareness about the fraudulent
and without loss of any financially. There have also been efforts to progress from a
completely new aspect. Attempts have been made to improve the alert- feedback
interaction in case of fraudulent transaction. In case of fraudulent transaction, the
authorised system would be alerted and a feedback would be sent to deny the
ongoing transaction. Artificial Genetic Algorithm, one of the approaches that shed
new light in this domain, countered fraud from a different direction.
CHAPTER -3

PROJECT PLANNING AND MANAGEMENT

The feasibility of the project is analyzed in this phase and business proposal is put
forth with a very general plan for the project and some cost estimates. During system
analysis the feasibility study of the proposed system is to be carried out. This is to
ensure that the proposed system is not a burden to the company. For feasibility
analysis, some understanding of the major requirements for the system is essential.
Three key considerations involved in the feasibility analysis are

Economical Feasibility: This study is carried out to check the economic impact
hat the system will have on the organization. The amount of fund that the company
can pour into the research and development of the system is limited. The
expenditures must be justified. Thus the developed system as well within achieved
because most of the technologies used are freely available. Only the customized
products had to be purchased achieved because most of the technologies used are
freely available. Only the customized products had to be purchased.

Technical feasibility: This study is carried out to check the technical feasibility, that
is, the technical requirements of the system. Any system developed must not have a
high demand on the available technical resources. This will lead to high demands on
the available technical resources. This will lead to high demands being placed
on the client. The developed system must have a modest requirement, as only
minimal or null changes are required for implementing this system.

Operational Feasibility: Operational feasibility evaluated whether the proposed


system aligns with user needs, practices, and organizational processes. It involved
consultation with end-users and relevant stakeholders to ensure that the system
would be seamlessly integrated into daily operations.
RISK ANALYSIS: The detection of the credit card fraudulent transactions will be
performed with multiple ML techniques then a comparison will be made between
the outcomes and results of each technique to find the best and most suited model in
the detection of the credit card transaction that are fraudulent, graphs and numbers
will be provided as well. In addition, exploring previous literatures and different
techniques used to distinguish the fraud within a dataset.

Project Scheduling: The dataset was retrieved from an open-source website,


Kaggle.com. it contains data of transactions that were made in 2013 by credit card
users in Europe, in two days only. The dataset consists of 31 attributes, 284,808
rows. 28 attributes are numeric variables that due to confidentiality and privacy of
the customers have been transformed using PCA transformation, the three remaining
attributes are “Time” which contains the elapsed seconds between the first and other
transactions of each attribute, “Amount” is the amount of each transaction, and the
final attribute “Class” which contains binary variables where “1” is a case of
fraudulent transaction, and “0” is not as case of fraudulent transaction.

Effort Allocation:
1. Lack of Adaptability: Conventional methods had difficulties in effectively
adjusting to the dynamic nature of evolving fraud practice. Once those engaging in
fraudulent activities were familiar with the established regulations and limitations,
they could readily adapt their strategies in order to circumvent them.

2. High False Positives: Threshold-based systems often generate a substantial


quantity of false positives, resulting in operational inefficiencies due to the
need of manually reviewing several genuine transactions.

3. Resource-Intensive: Heuristic-based methodologies heavily depended on


human knowledge and incurred significant costs for maintenance, necessitating
regular revisions to ensure continued efficacy.

4. Inability to Detect Complex Patterns: Conventional approaches demonstrated


efficacy in detecting uncomplicated instances of fraud, although encountered
challenges in recognize intricate and dynamic patterns.
Cost Estimation: Cost Based Models for Credit Card Fraud Detection Mostly,
machine learning literature focuses on Model Accuracy (either training/supervised
error or generalization error on hold out test data, True Positive/False Positive Rates
(TRP/FPR(s)), or ROC analysis). Cost Model domain provides a different metric to
evaluate performance of learned models. In the context of financial transactions, cost
is measured in dollars. Because of the different dollar amounts of each credit card
transaction along with other factors, the cost of failing to detect a fraud varies with
each transaction. Therefore, the cost model for this domain is based on the sum and
average of loss caused by fraud.

1. Damage Costs
The damage cost in cost model characterizes the amount of damage by an attack
when anomaly detection is unavailable. The defined cost function per attack should
be used to measure the cost of damage. This means, that rather than simply
measuring False Negative FN, as a rate of missed anomalies, rather we measure
total loss based upon DCost(s,a), which varies with the service(s) and the particular
type of attack(a).

2. Challenge Costs
The challenge cost is the cost to act upon an alarm when there is indication of a
potential intrusion. For Intrusion Detection System (IDS), one may consider
suspending a suspicious connection and attempting to stop, by analysing the service
request (SR), if any system resources have been blocked from other legitimate users.
As a first cut, these costs can be estimated by the amount of CPU and disk resources
needed to challenge a suspicious connection. In simple, instead of estimating the
challenge cost for each intrusive connection, we can determine “average” the
challenge costs to a single challenge cost per potential intrusive connection, i.e.,
Overhead.

3.Operational Costs
The major issue in operational costs for IDS (Intrusion Detection System) is the
amount of resources for extracting and test features from raw traffic data. Some of
the features are costlier than others to gather and at the times, costlier features are
more informative for detecting intrusions overhead, therefore clearly ignoring these
attacks saves cost. Hence, for a true positive (TP), if overhead > DCost(s; a), the
intrusion is not challenged and the loss is DCost(s; a). But if overhead < DCost(s;
a), the intrusion is challenged and the loss is limited to overhead. FP cost. When IDS
falsely allegate an event of being attack and the attack type is regarded as high cost,
a challenge will ensue. Naturally, when evaluating IDS we should concern with
measuring this loss. For this, we define the loss is just overhead for False Positive
(FP), True Negative (TN) cost. IDS correctly decide that a connection is normal and
truly not an attack. Therefore, as far we have only considers costs that depend on the
outcome of IDS, we now put together the operational cost, Op-Cost. In this point of
Op-Cost which measures the cost of computing values of characteristics in the IDS.

4. Shipping Cost Mostly, it is relevant in a Card-Not-Present (CNP) scenario. Since


the shipping cost is usually grouped in the value of the order, then the merchant will
also need to absorb the cost of shipping for goods sold in a various fraudulent
transaction. Further, fraudsters typically request high-priority shipping for their
requested orders to enable rapid completion of the fraud, resulting in high shipping
costs.

5. Card Association Fees Visa and MasterCard have taken fairly strict programs that
penalize merchants generating excessive charge backs. Generally, if a merchant
exceeds established chargeback rates for any three month period, the merchant could
be penalized with a fee for every chargeback.

6. Merchant Bank Fees In addition to the penalties charged by card associations, the
merchant has to pay an additional processing fee to the acquiring bank for every
chargeback claimed.

7. Administrative Cost Every transaction which generates a chargeback requires


important administrative costs for the merchant. On average process, each
chargeback requires one to two hours to process.
CHAPTER- 4 ANALYSE

REQUIREMENT COLLECT AND IDENTIFICATION

We propose a Machine learning model to detect fraudulent credit card activities in


online financial transactions. Analysing fake transactions manually is impracticable
due to vast amounts of data and its complexity. However, adequately given
informative features, could make it is possible using Machine Learning. This
hypothesis will be explored in the project. To classify fraudulent and legitimate
credit card transaction by supervised learning Algorithm such as Random forest. To
help us to get awareness about the fraudulent and without loss of any financially.

HARDWARE AND SOFTWARE REQUIREMENT

--Hardware
OS – Windows 7, 8 and 10 (32 and 64 bit)
RAM – 4GB

--Software
Python
Anaconda

FUNCTIONAL AND NON - FUNCTIONAL REQUIREMENTS

Functional Requirement: Functional requirements are the characteristics of the


product. All the features expected from any development are mentions as functional
requirements.

Non-Functional Requirement: Non-Functional requirements list out the client


expectations from product design, security, accessibility, and reliability or
performance viewpoint.

Performance Requirements
Performance requirements tells about the software capability to respond on users’
action such as:
• Upon running the application, it shouldn’t take more than 3 seconds.
• Data validation shouldn’t take above 5 seconds.
• Result generation should be achieved within 5 seconds
SOFTWARE REQUIREMENT SPECIFIFCATION:
Operating system : Windows 8/10.
IDE Tool : PyCharm
Coding Language : Python 3.6
APIs : Numpy, Pandas, Py-Spark, Matplotlib
CHAPTER -5 SYSTEM DESIGN

SYSTEM ARCHITECTURE

Above fig shows the process of CCFDS. This system model accepts real time
customer credit card transaction database.it is more important to find fraud rate of
credit card.

Data collection: collect input dataset based on transaction details.

Data balancing: after collecting large set of database it is necessary to understand


and separate the balanced data and unbalanced data in two types of class .clas-0
indicates non-fraud and class-1 indicates fraud.
Feature extraction and selection: class-1 indicates total fraud transactions are 492
samples. In this project v1, v2 …v28 features.

Outlier detection: It measures the distance between each similar data to the clustering
technique. The values which are not follows the trained data consider as outlier.

Classification: As the dataset is imbalanced, many classifiers show bias for majority
classes. PySpark library is applied as a SQL-like analysis to a large amount of
structured or semi-structured data. GBT Classifier does the classification of data
coming through the stream.

DATA FLOW DIAGRAM: The DFD used as communication tool between system
and user.it is a simple representation of the complete project process. Transaction
detection activity follows three phases.1.Data exploration 2.Data prepressing 3.data
classifications.
UML DIAGRAM

You might also like