Main Project
Main Project
Jnanasangama, Belagavi-590018
Submitted By
Chabikant Sarnakar (1VJ16CS016)
Chaithra Kishan (1VJ16CS017)
DEPT OF CSE, VVIT Harsha Saw (1VJ16CS024)1
Contents
• Introduction
• Literature Survey
• Problem Statement
Existing System
Drawbacks of Existing System
Proposed System
Objective
• System Requirements
• Architecture Diagram
• Algorithms
• Methodology
• Result Analysis
• Conclusion
• Future Enhancement
• References
• Fraud detection concerns a large number of financial institutions and banks as this crime costs
them around $67 billion per year.
• There are different type of fraud: insurance fraud, credit card fraud, statement fraud, securities
fraud etc.
• Of all of them, credit card fraud is the most common type.
• It is defined as an unauthorized use of a credit card account. It occurs when the cardholder and
the card issuer are not aware that the card is being used by a third party.
• Fraud detection and prevention are costly, time-consuming, and labor-intensive tasks. A number
of significant research works have been dedicated to developing innovative solutions to detect
different types of fraud. According to a survey, 33,305 cases of credit card identity fraud were
reported between January and June in 2018.
• In this paper, we focus on counterfeit fraud as it is far more challenging to detect, and the damage of
DEPT OF CSE, VVIT 4
this fraud is irrevocable.
Literature Survey
Authors Algorithm Advantages Disadvantages
S.Ghosh and Credit card fraud 1)Ability to learn from the past 1)Difficulty to confirm the structure
D. L. Reilly detection with a 2)no need to be reprogrammed 2)high processing time for large neural
neural-network 3) Ability to extract rules and predict networks and excessive training
future activities based on the current 3)high expense
situation 4)non numerical data need to be
4) High accuracy, portability, high converted and normalized
speed in detection, the easiness to be 5)Sensitivity to data format.
built and operated
5)Effectiveness in dealing with noisy
data, in predicting patterns, in solving
complex problems, and in processing
new instances
6)Adaptability, Maintainability.
Y. Sahin and E. Duman Detecting credit 1)It is being used for 1)Poor in process large
card fraud by many applications, dataset
decision trees and such as hand writing 2)has low speed of
support vector analysis, face analysis detection
machines and especially for 3)more computation time
pattern based
applications
2)SVM can be robust .
Y. Sahin, S. Bulkan, and A cost-sensitive decision 1)Impressive in versatility, 1)Need to choose the
E. Duman tree approach for fraud parallelizable, great with number of trees manually
detection high dimensionality 2)cant be interpreted
2)quick prediction, training 3)consumes more
speed, handles unbalanced memory.
data.
• The objectives of credit card fraud detection are to reduce losses due to payment fraud for
both merchants and issuing banks an increase revenue opportunities for merchants.
• The aim is to drop in the false alarm and thus also to lead an increase in accuracy.
• Our goal is to detect the issues that must be solved to product a highly efficient solution for
the class imbalance problem.
• Our aim here is to detect 100% of the fraudulent transactions while minimizing the incorrect
fraud classifications.
• The performance evaluation by developing the confusion matrix,measure, precision,
accuracy, intervention and recall are used to compare these algorithms. Python and SKlearn
based implementation is carried out.
Data Cleaning
• In the next step, after analyzing the dataset then we have to clean the data.
• In this cleaning process all the duplicate values and null values that are present in the dataset will be removed and a new
dataset will be obtained.
Preprocessing of dataset
• In this module the cleaned dataset will be preprocessed where the dataset will be divided based on amount and
transaction time.
• In this module first the dataset will be divided into two partitions as trained dataset and
testing dataset.
• After the data partitions the Random Forest Algorithm is applied.
• After applying Random Forest Algorithm finally a confusion matrix is obtained.
Evaluation
• Now the resultant data obtained in the form of confusion matrix can be evaluated by using graphical
representation which gives better accuracy.
[1] P. Richhariya and P. K. Singh, ‘‘Evaluating and emerging payment card fraud
challenges and resolution,’’ Int. J. Comput. Appl., vol. 107, no. 14, pp. 5–10, Jan. 2014.
[2] S. Bhattacharyya, S. Jha, K. Tharakunnel, and J. C. Westland, ‘‘Data mining for
credit card fraud: A comparative study,’’ Decis. Support Syst., vol. 50, no. 3, pp. 602–
613, 2011.
[13] A. Dal Pozzolo, O. Caelen, Y.-A. L. Borgne, S. Waterschoot, and G. Bontempi,
‘‘Learned lessons in credit card fraud detection from a practitioner perspective,’’ Expert
Syst. Appl., vol. 41, no. 10, pp. 4915–4928, 2014.
[25] S. Ghosh and D. L. Reilly, ‘‘Credit card fraud detection with a neural-network,’’ in
Proc. 27th Hawaii Int. Conf. Syst. Sci., Jan. 1994, pp. 621–630.
[35] H. Hormozi, M. K. Akbari, E. Hormozi, and M. S. Javan, ‘‘Credit cards fraud
detection by negative selection algorithm on Hadoop (To reduce the training time),’’ in
Proc. 5th Conf. Inf. Knowl. Technol., May 2013, pp. 40–43.