0% found this document useful (0 votes)
49 views17 pages

UPI (Dinesh)

Uploaded by

21311a6222
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views17 pages

UPI (Dinesh)

Uploaded by

21311a6222
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

UPI FRAUD DETECTION

USING MACHINE LEARNING

Batch Number-10
Kongarapu Vamshi- 21311A6222
G.V.P.K. Dinesh- 21311A6211
Lohith Kumar- 22315A6207

Under the Guidance of


V.Geeta
Overview
 Unified Payments Interface (UPI) has revolutionized the digital payments
landscape, offering a seamless and instant way to transfer money between bank
accounts using mobile devices. However, with the increasing adoption of UPI,
there has been a corresponding rise in fraudulent activities. Detecting and
preventing these frauds is crucial to maintaining the integrity and trust in the UPI
system.

Importance of Fraud Detection

 Fraudulent activities in UPI transactions can range from phishing and


unauthorized access to transaction manipulation. These activities not only lead to
financial losses for users but also undermine the credibility of the payment
system. Effective fraud detection mechanisms are essential to safeguard users'
funds and ensure a secure transaction environment.
Role of Machine Learning

 Machine Learning (ML) offers powerful tools to detect and prevent fraud in UPI
transactions by analyzing large volumes of transaction data to identify patterns
and anomalies indicative of fraudulent behavior. Traditional rule-based systems
often fall short due to the evolving nature of fraud techniques. ML algorithms, on
the other hand, can adapt to new patterns and continuously improve their
detection capabilities
Software and Hardware
Requirements
Software Hardware
Requirements: Requirements:
 Front End – •Hard Disk: Greater
Anaconda IDE than 500 GB
 Backend – SQL •RAM: Greater than 4
 Language – Python GB
3.8 •Processor: I3 and
Above
Existing Problem
 To detect counterfeit transactions, three
machine-learning algorithms were presented and
implemented.
 There are many measures used to evaluate the
performance of classifiers or predictors, such as
the Gradient Boost Classifier, Random Forest,
and Decision Tree.
 These metrics are either prevalence-dependent
or prevalence-independent.
 Furthermore, these techniques are used in UPI
fraud detection mechanisms, and the results of
these algorithms have been compared.
Proposed Solution
 Various modern techniques like artificial neural network can be
employed.
 Different machine learning algorithms are compared, including
K-Means Clustering ,etc.
 This project uses various algorithm, and neural network which
comprises of techniques for finding optimal solution for the
problem and implicitly generating the result of the fraudulent
transaction.
 The main aim is to detect the fraudulent transaction and to
develop a method of generating test data.
 This algorithm is a heuristic approach used to solve high
complexity computational problems.
 The implementation of an efficient fraud detection system is
imperative for all UPI issuing companies and their clients to
minimize their losses.
Abstract
 Increase in UPI usage for online payments.
 Cases of fraud associated with it are also rising.
 Few steps involving UPI transaction process using a Hidden Markov
Model (HMM).
 How it can be used for the detection of frauds.
 An HMM is initially trained for a cardholder.
 If an UPI transaction is not accepted by the trained HMM. It is
considered to be fraudulent.
 People can use UPI’s for online transactions as it provides an efficient
and easy-to-use facility.
 With the increase in usage of UPI’s, the capacity of UPI misuse has
also enhanced.
 UPI frauds cause significant financial losses for both UPI holders and
financial companies.
Design
Implementation
I. Use Case Diagram:-
 An Use Case diagram visually represents the interactions between
users (actors) and a system to accomplish the specific goals.
II. CLASS
DIAGRAM
 A Class diagram illustrates the structure of a system by showing the

classes, attributes, methods, and relationships between them.


III. ACTIVITY
DIAGRAM
 An Activity diagram visually represents the flow of activities within
a system, depicting actions, decisions, and transitions between
them.
Scenario : Customer initiating a transaction
Scenario : Customer being notified about fraudulent
transaction
IV. SEQUENCE DIAGRAM
 A sequence diagram illustrates the interactions between

objects or components in a system over time, showing the


sequence of messages exchanged between them.
Scenario : Customer initiating a transaction
Explanation AND
Approach:
Scenario : Customer completing a transaction

You might also like