0% found this document useful (0 votes)
12 views4 pages

Fraud Detection Techniques For Credit Card Transactions

The document discusses various fraud detection techniques for credit card transactions, emphasizing the use of machine learning algorithms to identify fraudulent activities. It reviews existing methods and proposes a combination of anomaly detection algorithms, such as the Isolation Forest and Neighborhood Outlier methods, to improve detection accuracy. The study highlights the challenges of achieving 100% accuracy due to the imbalance between legitimate and fraudulent transactions and suggests future enhancements for better performance.

Uploaded by

Vrutik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views4 pages

Fraud Detection Techniques For Credit Card Transactions

The document discusses various fraud detection techniques for credit card transactions, emphasizing the use of machine learning algorithms to identify fraudulent activities. It reviews existing methods and proposes a combination of anomaly detection algorithms, such as the Isolation Forest and Neighborhood Outlier methods, to improve detection accuracy. The study highlights the challenges of achieving 100% accuracy due to the imbalance between legitimate and fraudulent transactions and suggests future enhancements for better performance.

Uploaded by

Vrutik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

2022 3rd International Conference on Intelligent Engineering and Management (ICIEM)

Fraud Detection Techniques for Credit Card


Transactions
2022 3rd International Conference on Intelligent Engineering and Management (ICIEM) | 978-1-6654-6756-8/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICIEM54221.2022.9853183

Yathartha Singh Ms. Kiran Singh Vivek Singh Chauhan


School of Computing Science and Assistant Professor School of Computing Science and
Engineering School of Computer Science and Engineering
Galgotias University Engineering Galgotias University
Greater Noida, India Galgotias University Greater Noida, India
[email protected] Greater Noida, India [email protected]
[email protected]

Abstract— Credit Card Management Organizations are However, it is not the only problem in the implementation of
important to select fraudulent transactions for your credit the actual fraud in the implementation of the system. The
rating so that customers are charged for items that are not actual global example uses a computer tool that determines
currently purchased. These issues can be solved with the help of transactions for authentication to quickly scanned the large
data and technical knowledge of the data with the machine. This
steps of the payment request. The car is accustomed to the
beginner demonstrates the knowledge obtained by the use of the
gadgets, and the identification of the credit card fraud. The algorithm and analyses all legal transactions and hires
problem of detecting a credit score includes modeling of past suspicious reports. This review examines the experts related
transactions for credit cards with the facts of those who have to card holders to ensure that the transaction is faithful or
been revealed to fraud. The version is then used to delay whether fraudulent. Investigators provide feedback on automatic
new transactions are fraudulent or are now not new gadgets. This gadget is used to train and update the
transactions. Our goal here is to detect 100% of fraudulent performance of the fraud, over time.
transactions and minimize fraudulent misclassification. Credit
score card fraud detection is a common class model. In this To keep criminals from modifying their fraudulent practices,
method, we focused on the analysis and preprocessing of several
risk management strategies are constantly improved. These
anomaly detection algorithms and record sets, such as
"neighbor outliers" and "forest zone isolation" algorithms, in con artists are labelled as follows: Online and Offline Credit
PCA-converted credit card transaction statistics. Card Fraud, Theft of a credit card, Bankruptcy proceedings,
intrusion tool etc.
Keywords: Credit card fraud, system mastery applications,
statistics technology, the isolation specific set of rules, the local The following are some of the existing approaches for
outlier element, and automatic fraud detection. detecting such fraud: Neural community synthesized,
Imprecise logic, A collection of genetic rules, Regression
I. INTRODUCTION Logistic etc.

In the credit rating of the transaction, "fraud" does not want an II. LITERATURE REVIEW
account unauthorized and unwanted accounts through people,
not the owner of this account. Essential precautions may be Promising measures because illegal or criminals must have
done to prevent these exploits, and the behaviour of such illegal or personal benefits. This is far from the deliberate
fraudulent actions can be researched in order to prevent behavior concluded in the direction of legal rules or policies
similar fateful incidents and reduce shields. Other terms for to achieve unauthorized beneficial benefits. Several
credit card fraud If someone uses other credit cards for documents related to detecting abnormal or fraud in this
personal reasons, it is not known that corrugated cardboard is region can already be published and accessed to public use.
used as well as the owner of the authorities and map issues. Phua Clifton and his friends knew that the methods used in
Fraud detection traces customer populations to evaluate, this domain were included in the fact that they were extracted,
recognize, or avoid unwanted behaviours consisting of fraud, automatic fraud, and disadvantages [1]. In other documents,
intrusion and defaults. These are absolutely related issues that Sun, Students, GJUS & T provided a unique study to detect
require a group of interests, such as studying and recording credit card fraud and detect methods such as HCE. Although
gadgets that can automate this time. In particular, this problem these methods and algorithms are making rapid strides in
is difficult to characterize due to various factors such as many areas, they cannot provide a consistent and consistent
aesthetic imbalance. The diversity of legitimate transactions is way to detect fraud. Similar studies by Wenfang Yu and Na
many times greater than the number of fraudulent transactions. Wang have changed, mining emissions, mining and mining
Besides, trading models often change statistical houses over emissions should properly predict fraudulent transactions
time. when testing the emulation test of a specific commercial
bank's credit card transaction data set. ... Rays mining is a
data mining field mainly used in economic and clean areas.

821
978-1-6654-6756-8/22/$31.00 ©2022 IEEE

Authorized licensed use limited to: Shah and Anchor Kutchhi Engineering College. Downloaded on July 29,2024 at 09:58:56 UTC from IEEE Xplore. Restrictions apply.
2022 3rd International Conference on Intelligent Engineering and Management (ICIEM)

Provides gadget detection that can be detached from the main sensitive information. Time, amounts, and class are indicated
system. Transactions that do not match reality. They accepted by the opposite columns. The time between one contract and
an attribute value-based customer behavior attribute that the next is represented by time [2]. Amount the amount of
computed the distance between the observed real estate coins that have been sold. Valid transactions are classified as
billboard and a predetermined rate. Traditional methods, such Class 0, while fraudulent transactions are classified as Class
as hybrid data mining/common use of composite sets, first 1. Create anomalies plots and use them to visually inspect the
consider the wrong time in the established facts of real card data set for inconsistencies.
transactions and are essentially based on one extensible set of
community rules. Example of rejection from the link. These
agencies are usually green in the middle trading line. I tried
to honestly promote a whole new component. For fraudulent
transactions, we wanted to improve the interaction of
occlusion. In case of a fraudulent transaction, you can send
an alert to the approved system and reject the current
transaction.

III. METHODOLOGY

The method described in this article employs cutting-edge


machine learning techniques to detect aberrant behavior
known as outliers.. A diagram of a simple rigid architecture
can be represented by the following figure:
Figure 3: Graph showing unauthorized changes

The bulk of unauthorized charges are significantly less than


genuine transactions, as shown in the graph as shown in
Fig.3.

Figure 1: Simple rigid architecture

The total architecture schematic can be expressed as by


considering aspects on a bigger scale as well as real-life
factors:

Figure 4: Graph showing fraudulent transaction less than legitimate


ones

The graph in Fig.4 shows that fraudulent transactions are


significantly less than legitimate ones [3]. This chart shows
when a trade was made within 2 days. It can be seen that there
are the fewest trades at night and the most during the day.

Figure 2: Architecture with real life schematic

To begin, we downloaded the information from Kaggle, a


cognitive computing website that offers datasets. This dataset
has 31 columns, 28 of these are labelled v1v28 to safeguard

822

Authorized licensed use limited to: Shah and Anchor Kutchhi Engineering College. Downloaded on July 29,2024 at 09:58:56 UTC from IEEE Xplore. Restrictions apply.
2022 3rd International Conference on Intelligent Engineering and Management (ICIEM)

are processed using a set of modular algorithms. The


following module diagram shows how these algorithms work
together. These statistics are fitted to the model and the
following outlier detection modules are run on the model. •
Closure as an outlier problem • Forest isolation algorithm
These algorithms are part of sklearnsub. The Sklearn Suite
Module ensemble consists of an ansemblebased strategy and
function for category, regression and emission emissions.
This freedom is also built using the number, scipy, and
MatplotLib modules that this liberation of Python and origin
are available to analyze and inspect the device. There are
various classifications, clustering and regression algorithms
and are for interaction with figures and medical libraries. We
have created a program that shows a program that allows you
Figure 5: Graph showing number of fraudulent transaction less than to create programs that use Python using the Jupyter
legitimate ones
notebook platform to create programs that create programs.
The Google Collab platform, which supports all Python
The graph in Fig.5 shows that many fraudulent transactions
portable files, can be be used to complete this application in
are significantly less than legitimate ones. This graph shows
the cloud. The package with the fake dynamic for the
when a trade was completed within one day. You can see that
automated system and the output network has the following
there are the fewest trades at night and the most during the
specific description:
day. This graph shows the quantity converted into
transactions. Most of the trades are very small and some of
A. Neighbourhood Outlier Element
them approach their maximum volume.
This is a set of rules for detecting fugitive emissions. 'Close-
Check this data set and build each column has its own
Outlier' represents the ambiguity rating for every sample It
histogram. This is done to create a graphical information of
calculates the pattern facts' local deviation. admiration from
the entire set that may be used to ensure that the data set has
neighbors. More precisely, the distance used to estimate local
no missing values. This is done to prevent the requirement to
information is given by the nearest neighbor.
enter attribute data and to make the data set easier to parse for
machine learning algorithms.
According to the research of Maniraj S.P(2019)[5] on
plotting the effects of nearby Outlier aspect set of rules, we
Following this, we create a heat map to visualise the data in
get the subsequent determine(Fig. 7).
colour and examine the relationship between primary
indicator and elegance factors.. This heatmap has been
confirmed (Fig. 6)[4]:

Figure 7: Neighborhood Outlier determine

Via evaluating the nearby values of a pattern to that of its


neighbours, possible find out samples which are drastically
Figure 6: Heat map to visualize data lower than their neighbours. those values are pretty amanous
and they are considered as outliers. because the dataset could
The data set is now formatted and processed. Time and be very huge, we used most effective a fragment of it in out
quantity items have been standardized and class items have assessments to lessen processing instances. The final result
been omitted to provide fairness in the evaluation. Records

823

Authorized licensed use limited to: Shah and Anchor Kutchhi Engineering College. Downloaded on July 29,2024 at 09:58:56 UTC from IEEE Xplore. Restrictions apply.
2022 3rd International Conference on Intelligent Engineering and Management (ICIEM)

with the entire dataset processed is additionally decided and dataset using SMOTE and discovered that the classifiers
is given within the outcomes segment of this paper. performed better than the humans.[8]
B. Algorithm for Isolation
I. FUTURE ENHANCEMENTS
By randomly selecting components and then randomly
selecting distinct values for some of the minimum and We couldn't achieve 100% accuracy in fraud detection, but
maximum values of the detailed features, the forest "isolates" given enough time and information, we stopped developing
observations[6]. A tree can be used to depict a recursive tools that could approach this goal. As with this challenge,
partition, and the number of partitions needed to choose a there may be opportunity for improvement. Due to the nature
sample[7] is equal toward the total distance from the tree of the company, multiple approaches can be used as modules,
structure to the conclusion node. The mean duration of just and the results can be mixed to improve the accuracy of
this path gives us a sense of the solution's character and current results. More algorithms can be added to this version
normalcy.The pseudocode for this set of rules could be to make it better. These algorithms' output, however, will be
written as: in the same format as the others. If this condition is met, the
module is easily implemented in code. This allows the
On plotting the consequences of Isolation forest algorithm, company to achieve a first-class degree in modularity and
we get the following parent (Fig. 8): versatility. Additional room for improvement can be
observed within the data set. As previously confirmed, the
accuracy of the algorithm increases as the size of the data set
increases. As a result, the additional data can improve the
accuracy of fraud detection algorithms and minimize the
prediction error. This, however, necessitates the bank's expert
assistance.

REFERENCES

[1] https://www.researchgate.net/publication/336800562_Credit_
Card_Fraud_Detection_using_Machine_Learning_and_Data_Science
[2] Information Technology, Monash University, Wellington Road,
Clayton, Victoria 3800, Australia IJARCET) Volume 3 Issue 3,
[3] Total as of March 2014 Credit Card Fraud Detection of Distances -
Wenfang Y. and Na Wang", 2009 International Joint Conference on
Artificial Intelligence Published
[4] Published "Credit Card Fraud Detection Using Par Enclitic Network
Figure 8: Isolation forest determine
Analysis" by Massimiliano Zanin, Miguel Romans, Regino Criado and
Santiago Moral Hindawi Complexity Volume 2018, Article ID
Partitioning them randomly produces shorter paths for 5764370, page 929, NO. August 8, 2018
anomalies. Whilst a wooded area of random bushes mutually [5] "Credit Card Fraud Detection by Ishu Trivedi, Monica, Mrigya,
Mridushi", International Journal of Advanced Research in Computer
produces shorter direction lengths for precise samples, they
and Communication Engineering, vol. 5, Issue 1, January 2016
are extremely probable to be anomalies. As soon as the [6] David J. Wetson, David J. Hand, M. Adams, Whitrow and Petr
anomalies are detected, the system can be used to record them Yuszczak “Detecting card fraud using peer group analysis” Springer
to the worried authorities. For checking out functions, we're Issue 2008
[7] https://www.kaggle.com/mlg-ulb/creditcardfraud.
evaluating the outputs of these algorithms to decide their
[8] Vaishnavi Nath Dornadula, S Geetha,Credit Card Fraud Detection
accuracy and precision. using Machine Learning Algorithms,Procedia Computer
Science,Volume 165,2019,Pages 631-641.
IV. CONCLUSION

According to Maniraj S.P.(2019) credit rating fraud is no


doubt and is the act of criminal act. Even if the algorithm
reaches an accuracy of 99.6% or more, the accuracy is as
simple as 28%. This high accuracy is expected due to the
large discrepancy between the actual trading range and the
various permitted trading ranges. [1]

The Matthews Pearson Correlation (MCC) was shown to be


the preferable parameter for dealing with imbalance datasets.
MCC wasn't the only one that did it – Vaishnavi Nath
Dournadula and Geetha S (2019) attempted balancing the

824

Authorized licensed use limited to: Shah and Anchor Kutchhi Engineering College. Downloaded on July 29,2024 at 09:58:56 UTC from IEEE Xplore. Restrictions apply.

You might also like