SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 61-64
www.iosrjournals.org
DOI: 10.9790/0661-17216164 www.iosrjournals.org 61 | Page
Analysis of Spending Pattern on Credit Card Fraud Detection
Capt. Dr. S Santhosh Baboo1
, N Preetha 2
1
Associate Professor, 2
Research Scholar
1,2
Department of Computer Science and Applications
1
D.G.Vaishnav College, Arumbakkam, Chennai,
2
PhD Research Scholar SCSVMV University, Enathur, Kancheepuram
Abstract: Credit card is one of the convenient way of payment in online shopping. In this on line
shopping, payment is made by giving information like card no, security code , expiration date of the
Credit card etc . To rectify the risk factors of using the credit card, every card holder’s spending method
is modeled by using HMM. By using this authenticated security check the information of transaction is
fraudulent or genuine. It is highly secured from unauthorized anomalous user using credit card and avoids
fraud usage of card through online transactions.
Keywords: HMM, FDS, TP, FP
I. Introduction
Now a days, credit card frauds have been rampantly increased, while making e-payments made
for the purchased goods or service provided on internet. These frauds are happening in two types of
purchase using the credit cards. 1) Physical card 2) Virtual card. In this first type of physical card
purchase, the purchaser has to provide the card to a merchant and make payment. In this type , the
credit card fraudulent is happened by stealing the credit card. If the card holder is unaware of this, the
credit card company has to face the financial loss and in the second type of virtual card purchase, the
card holder, has to provide the secret details of the card ( like security code, card no, expiration date
etc.) either thru internet or over phone . Without knowing the consequences, the genuine card holder is
providing the information to the fraudsters. The result is that they loss their money also. To detect this type
of criminal activity , the spending patterns of the card holder is analyzed .
To discover & prevent this type fraudulent activities, some intelligent & effective methods has
been provided by the data mining, machine learning & statistics areas. In these data mining, the cyber
credit card fraud has been detected by using artificial intelligence and algorithms techniques, which
analyses the usage of unusual patterns derived from the data given. In this method, it is detected whether
the transaction is legitimate or illegitimate.
II. Related Work
Ghosh and Reilly [1] have proposed credit card fraud detection with a neural network. They have built
detection system, which is trained on a large sample of labeled credit card account transactions. These
transactions contain example fraud cases due to lost cards, stolen cards, application fraud, counterfeit fraud,
mail-order fraud, and non received issue (NRI) fraud. Stolfo et al [2] suggest a credit card fraud detection
system (FDS) using meta-learning techniques to learn models of fraudulent credit card transactions. Meta
learning is a general strategy that provides a means for combining and integrating a number of separately built
classifiers or models. The same group has also worked on a cost-based model for fraud and intrusion detection
[3]. They use Java agents for Meta-learning (JAM), which is a distributed data mining system for credit card
fraud detection. A number of important performance metrics like TP-FP (True Positive – False Positive) spread
and accuracy have been defined by them.
Aleskerov et al. [4] present CARDWATCH, database mining system used for credit card fraud
detection. The system, based on a neural learning module, provides an interface to a variety of commercial
databases. Fan et al. [5] suggest the application of distributed data mining in credit card fraud detection. Braise
et al. Stolfo use an agent-based approach with distributed learning for detecting frauds in credit card
transactions. It is based on artificial intelligence and combines inductive learning algorithms and metal earning
methods for achieving higher accuracy.
Phua et al. [6] suggest the use of met classifier similar to in fraud detection problems. Recognizing this
problem, the switching-service provider decided to provide a capability to the issuing banks to flag in real-time
those transactions that appeared to be suspicious, and possibly fraudulent. In this way, at the bank’s option,
suspicious or fraudulent transactions were identified and rejected much earlier and faster than previously
possible.
Analysis of Spending Pattern on Credit card Fraud Detection
DOI: 10.9790/0661-17216164 www.iosrjournals.org 62 | Page
III. Proposed Work
This work focusing on an application which is used to detect the fraudulent credit card
activities on internet transaction. In this peculiar type, the pattern of current fraudulent usage of the
credit card has been analyzed with the previous transactions, by using the neural networks in algorithm
of data mining.
Figure.1 Proposed Architecture for investigation of credit card.
A. Credit card Fraud Detection using HMM.
To find out the fraudulent transactions, Hidden Markov model is used by detecting and analyzing
the spending profile of the credit card user. generally the profile is being divided into three types a)
lower profile b) middle profile c) higher profile . as every card holder has a different method of
spending profile, This can easily find out fraudulent one by keeping the in consistent record of the
usage of the card. Even though this cannot find out the number of purchased items & its categories,
This identifies the fraudulent transaction easily by analyzing the spending patterns of the card user. in
this the last twenty transactions of card holder can be easily studied & can identify which one is a
fraudulent one (i.e.) the amount, the time of transaction etc. It can be easily noted via the shadow based
replication engine.
The ultimate goal of this analysis is to give a note about the fraudulent transaction, to the
issuing bank and also to the merchant and to take appropriate action by the issuing bank. A critical
problem faced by the issuing banks is that of fraudulent transactions. This problem has, of course, exploded with
the high speed nature of electronic submission of credit and debit transactions. An ATM or POS transaction may
be fraudulent, for instance, if the credit card is stolen. Online purchases may be fraudulent if the credit card
number, expiration date, and CID number are copied from the card. This copying can easily be done, for
example, by a waiter taking a customer’s credit card to pay for a meal or when a phone order is placed and paid
for with a credit card. Identifying fraudulent transactions typically takes hours or days, and many such
transactions may slip through before a hold can be put on the card. Worse, because the information can be
quickly shared with thieves in multiple countries, they can rapidly attack via multiple avenues by submitting
many different types of transactions simultaneously, anticipating that the lesser (slower, etc) infrastructure that
some of them may take will allow at least some of them to get through successfully.
The fraud detection system flags a suspicious transaction with a severity flag and writes this
information to another log. Periodically, the log is sent to the bank’s authorization system, which takes
appropriate action on the card. A credit hold might be placed on the card so that all further transactions will be
rejected until the issue is researched or until the problem is resolved. Alternatively, upon the next attempted
transaction, the merchant might be informed to ask the customer to call the bank in order to authorize the
transaction.
This method is still generally the primary fraud detection procedure in use today. The problem with this
method is that it typically takes hours or even days to flag a card that is perhaps being used fraudulently. During
this time, the bank can experience significant losses as additional fraudulent transactions are made. In general,
the bank is responsible for such transactions and purchases made by the customers based on the price ranges that
can be determined dynamically by applying a clustering algorithm on the values of each cardholder’s
transactions, as shown in Table 1
Login
Information
Security
Check Information
Verification
Done (via SMS)
Card Entry
Transaction
Processed
Complete
Analysis of Spending Pattern on Credit card Fraud Detection
DOI: 10.9790/0661-17216164 www.iosrjournals.org 63 | Page
B. Investigation made on Customer Transaction.
Cust_ID Frequency of Card Usage Average Amount
R0T 8K7 5 3000
W7X 2P8 3 45000
Y9T 8Q6 1 2000
Q6V 6Z2 5 1000
O1M 8P3 4 250
Y1A 4K1 2 6500
Table 1. Customer Monthly Transaction
Consider three price ranges namely, low (l), medium (m), and high (h)]. Our set of observation
symbols for example, let l= (0, 10000), m = (10000, 50000), and h= (50000 to credit card limit). If a cardholder
performs a transaction of 15000, then the corresponding observation symbol is m.
A credit cardholder makes different kinds of purchases of different amounts over a period of time. One
possibility is to consider the sequence of transaction amounts and look for deviations in them. However, the
sequence of types of purchase is more stable compared to the sequence of transaction amounts. The reason is
that, a cardholder makes purchases depending on his need for procuring different types of items over a period of
time. This, in turn, generates a sequence of transaction amounts. Each individual transaction amount usually
depends on the corresponding type of purchase. Hence, consider the transition in the type of purchase as state
transition in our model. The type of each purchase is linked to the line of business of the corresponding
merchant. This information about the merchant’s line of business is not known to the issuing bank running the
FDS. The authentication code will be send to the registered mobile number of the user, every time the user tries
to purchase. Thus, the type of purchase of the cardholder is hidden from the FDS. The set of all possible types
of purchase and, equivalently, the set of all possible lines of business of merchants forms the set of hidden states
of the HMM. A card transaction is captured by such devices as a point-of-sale (POS) terminal in a store, a
customer’s browser communicating with a website, or an ATM. The information concerning the request must be
rapidly gathered from the servicing network to which the devices are connected, sent to the issuing bank for
authorization/approval, and the response rapidly returned in order for the system to complete the transaction.
Highly Secured from unauthorized anomalous user using credit card and avoids fraud usage of card through
online transactions.
IV. Results And Discussion
The transaction-switching service provider realized that there was an opportunity to provide a unique
and important service to the issuing banks. If it could detect suspicious or fraudulent activity in real-time, it
could stop fraudulent transactions at the retail counter or at the ATM much sooner, or in some cases, even
before they were authorized. This service would be a value-added service that would distinguish it from other
ATM/POS switching networks. To implement this system, the switching provider installed multiple high-
performance servers that could quickly analyze transactions on-the-fly to determine if they were suspicious. The
selected servers were large Sun Solaris servers running Oracle databases. Each server comprised eight quad-core
CPUs. Each data centre is provided with its own fraud detection complex; comprising multiple Sun
Solaris/Oracle servers (the cards/accounts are assigned to particular Sun Solaris/Oracle servers at a site in order
to partition the work load). The fraud detection complex is easily scalable to handle additional load by adding
additional servers and reassigning the accounts/cards accordingly. Fraud detection will be checked on last 20
transactions and also calculate percentage of each spending profile (low, medium and high) based on total
number of transactions. In Table 2, list of all transactions are shown.
Cust_ID No. of Transaction Transaction Amount
R0T 8K7 5 15x103
W7X 2P8 3 135x103
Y9T 8Q6 1 2x103
Q6V 6Z2 5 5x103
O1M 8P3 4 1x103
Y1A 4K1 2 13x103
Table2. List of transactions.
The most recent transaction is placed at the first position. The pattern of spending profile of the card
holder is shown in (Figure 2) based on all transactions done. In this new approach, when a transaction is
received by a switch node, it is sent not only to the issuing bank for authorization, but it is also replicated in
real-time to a fraud detection server via a Shadow base replication engine. Shadow base engine routes the
transaction to the particular fraud detection server that is monitoring that card or account. Transaction
distribution by card number or account is accomplished via routing rules configured into the Shadow base
replication engine.
Analysis of Spending Pattern on Credit card Fraud Detection
DOI: 10.9790/0661-17216164 www.iosrjournals.org 64 | Page
Figure 2: Spending pattern for customer transactions.
The action taken by the switch node for a suspicious transaction can be configured to correspond to the
desires of the issuing bank and the merchant. In still other situations, the issuing bank may want to allow the
transaction but leave a voice or e-mail message or sms for the customer notifying him of a potentially suspicious
transaction. It secures the transaction using OTP via sms and Detect the anomalous transaction when cardholder
lost the card. The percentage calculation of each spending pattern (low, medium and high) of the card holder
based on price distribution range as mentioned earlier is shown in Figure 3
Figure 3: Percentage of Spending Profile 1
It has been noticed that low spending profile has maximum percentage of 50, followed by medium
profile 33% and then 17% of high spending profile as per details of transactions in Table 2.
V. Conclusion And Future Work
The proposed solution for credit card fraud detection using HMM has different steps in credit card
transaction processing are represented as the under-lying a statistical process involving a number of random
variables depending on a variable parameter of an HMM and it secure the transaction using OTP via sms. It
Detect the anomalous transaction when cardholder lost the card. The ranges of transaction amount has been
used as the observation symbols, whereas the types of item have been considered to be states of the HMM. It
has also been explained how the HMM can detect whether an incoming transaction is fraudulent or not.
Experimental results show the performance and effectiveness of the spending profile of the cardholders. The
system is also scalable for handling large volumes of transactions. In Future thumb impression or face
recognition can also be implemented while using credit card in purchases.
References
[1]. Ghosh, S., and Reilly, D.L., 1994. Credit Card Fraud Detection with a Neural-Network, 27th Hawaii International l Conference on
Information Systems, vol. 3 (2003), pp. 621- 630.
[2]. Stolfo, S. J., Fan, D. W., Lee, W., Prodromidis, A., and Chan, P. K., 2000.Cost-Based Modeling for Fraud and Intrusion Detection:
Results from the JAM Project, Proceedings of DARPA Information Survivability Conference and Exposition, vol. 2 (2000), pp.
130-144
[3]. R. Brause, T. Langsdorf, and M. Hepp, “Neural Data Mining for CreditCard Fraud Detection,” roc. IEEE Int’l Conf. Tools with
ArtificialIntelligence, pp. 103-106, 1999.
[4]. Aleskerov, E., Freisleben, B., and Rao, B., 1997. CARDWATCH: ANeural Network Based Database Mining System for Credit
Card FraudDetection, Proceedings of IEEE/IAFE: Computational Intelligence forFinancial Eng. (1997), pp. 220-226.
[5]. W. Fan, A.L. Prodromidis, and S.J. Stolfo, “Distributed Data Mining inCredit Card Fraud Detection,” IEEE Intelligent Systems,
vol. 14, no. 6,pp. 67-74, 1999.
[6]. C. Phua, D. Alahakoon, and V. Lee, “Minority Report in FraudDetection: Classification of Skewed Data,” ACM SIGKDD
ExplorationsNewsletter, vol. 6, no. 1, pp. 50-59, 2004.

More Related Content

PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Credit Card Fraud Detection System: A Survey
PDF
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
PDF
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
PDF
An ATM Multi-Protocol Emulation Network
PDF
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
PDF
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
PDF
21 ijcse-01230
International Journal of Computational Engineering Research(IJCER)
Credit Card Fraud Detection System: A Survey
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
IRJET- Finalize Attributes and using Specific Way to Find Fraudulent Transaction
An ATM Multi-Protocol Emulation Network
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
21 ijcse-01230

What's hot (19)

PDF
Software for Payment Cards: Choosing Wisely
PPTX
Account kit and internet banking
PDF
Seamless payment integration with shopify (1)
PPTX
Account Kit and Internet Banking
PDF
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
PPT
Online Payment Transactions
PPT
E Payment
PPTX
Payment
PPT
E Payment System Introduction Of Large Value Payment System
PDF
Atm fraud case study of commercial bank in pakistan
PDF
A Survey: Fusion of Fingerprint and Iris for ATM services
PPT
Payment Gateway
PDF
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
PDF
Secure E-payment Protocol
PPTX
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 3 Electronic Payme...
PPT
CNP Payment Fraud and its Affect on Gift Cards
PPT
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
PPT
Web payment system
PPTX
Online Payment Gateway System
Software for Payment Cards: Choosing Wisely
Account kit and internet banking
Seamless payment integration with shopify (1)
Account Kit and Internet Banking
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
Online Payment Transactions
E Payment
Payment
E Payment System Introduction Of Large Value Payment System
Atm fraud case study of commercial bank in pakistan
A Survey: Fusion of Fingerprint and Iris for ATM services
Payment Gateway
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
Secure E-payment Protocol
Std 12 Computer Chapter 5 Introduction to Mcommerce (Part 3 Electronic Payme...
CNP Payment Fraud and its Affect on Gift Cards
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Web payment system
Online Payment Gateway System
Ad

Viewers also liked (20)

PDF
Design and Analysis of Image as A Street Light
PDF
Bulk Demand (S, s) Inventory System with Varying Environment
PDF
Smartphone Based Sensing Driver Behavior Modeling
PDF
Cutting Parameter Optimization for Surface Finish and Hole Accuracy in Drilli...
PDF
Design and Implementation of an Improved Wind Speed Meter (Anemometer)
PDF
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
PDF
Short-term Load Forecasting using traditional demand forecasting
PDF
Mathematical Relationships between the Compressive Strength and Some Other St...
PDF
Algorithm for the Comparison of Different Types of First Order Edge Detection...
PDF
Implementation of an Improved Microcontroller Based Moving Message Display Sy...
PDF
The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...
PDF
Microcontroller-Based Metal Detection System with GSM Technology
PDF
Preventing Malicious Node and Provide Secure Routing In Manet
PDF
Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...
PDF
Literature Survey on Detection of Brain Tumor from MRI Images
PDF
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...
PDF
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
PDF
Numerical Simulation of 퐒퐢ퟏ−퐱퐆퐞퐱 Thin Film Solar Cell Using AMPS - 1D
PDF
Best Power Surge Using Fuzzy Controlled Genetic Technique
PDF
Power Flow Control in Grid-Connected Wind Energy Conversion System Using PMSG...
Design and Analysis of Image as A Street Light
Bulk Demand (S, s) Inventory System with Varying Environment
Smartphone Based Sensing Driver Behavior Modeling
Cutting Parameter Optimization for Surface Finish and Hole Accuracy in Drilli...
Design and Implementation of an Improved Wind Speed Meter (Anemometer)
Closed-Form Expressions for Moments of Two-Way Slabs under Concentrated Loads
Short-term Load Forecasting using traditional demand forecasting
Mathematical Relationships between the Compressive Strength and Some Other St...
Algorithm for the Comparison of Different Types of First Order Edge Detection...
Implementation of an Improved Microcontroller Based Moving Message Display Sy...
The Use of Non Wood Forest Product as Income Generation in Semi Arid Zone Cas...
Microcontroller-Based Metal Detection System with GSM Technology
Preventing Malicious Node and Provide Secure Routing In Manet
Car Dynamics using Quarter Model and Passive Suspension, Part VI: Sprung-mass...
Literature Survey on Detection of Brain Tumor from MRI Images
Simulation of Wind Power Dynamic for Electricity Production in Nassiriyah Dis...
A Novel Approach for Workload Optimization and Improving Security in Cloud Co...
Numerical Simulation of 퐒퐢ퟏ−퐱퐆퐞퐱 Thin Film Solar Cell Using AMPS - 1D
Best Power Surge Using Fuzzy Controlled Genetic Technique
Power Flow Control in Grid-Connected Wind Energy Conversion System Using PMSG...
Ad

Similar to Analysis of Spending Pattern on Credit Card Fraud Detection (20)

PDF
Application of Data Mining and Machine Learning techniques for Fraud Detectio...
PDF
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
PDF
IRJET- Survey on Credit Card Fraud Detection
PDF
IRJET- Fraud Detection in Online Credit Card Payment
PDF
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
PPTX
credit card fruad detection from the fake users.pptx
PDF
Credit Card Fraud Detection System Using Machine Learning Algorithm
PDF
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
PDF
A Comparative Study on Credit Card Fraud Detection
PDF
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
PDF
CREDIT CARD FRAUD DETECTION AND AUTHENTICATION SYSTEM USING MACHINE LEARNING
PDF
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
DOCX
A Novel Framework for Credit Card.
PDF
IRJET - Online Credit Card Fraud Detection and Prevention System
PDF
IRJET- Credit Card Fraud Detection using Random Forest
PDF
Review on Fraud Detection in Electronic Payment Gateway
PDF
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
PDF
IRJET- Credit Card Fraud Detection using Machine Learning
PDF
Online Transaction Fraud Detection System Based on Machine Learning
DOCX
credit card fraud analysis using predictive modeling python project abstract
Application of Data Mining and Machine Learning techniques for Fraud Detectio...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
IRJET- Survey on Credit Card Fraud Detection
IRJET- Fraud Detection in Online Credit Card Payment
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
credit card fruad detection from the fake users.pptx
Credit Card Fraud Detection System Using Machine Learning Algorithm
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
A Comparative Study on Credit Card Fraud Detection
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
CREDIT CARD FRAUD DETECTION AND AUTHENTICATION SYSTEM USING MACHINE LEARNING
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
A Novel Framework for Credit Card.
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET- Credit Card Fraud Detection using Random Forest
Review on Fraud Detection in Electronic Payment Gateway
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
IRJET- Credit Card Fraud Detection using Machine Learning
Online Transaction Fraud Detection System Based on Machine Learning
credit card fraud analysis using predictive modeling python project abstract

More from IOSR Journals (20)

PDF
A011140104
PDF
M0111397100
PDF
L011138596
PDF
K011138084
PDF
J011137479
PDF
I011136673
PDF
G011134454
PDF
H011135565
PDF
F011134043
PDF
E011133639
PDF
D011132635
PDF
C011131925
PDF
B011130918
PDF
A011130108
PDF
I011125160
PDF
H011124050
PDF
G011123539
PDF
F011123134
PDF
E011122530
PDF
D011121524
A011140104
M0111397100
L011138596
K011138084
J011137479
I011136673
G011134454
H011135565
F011134043
E011133639
D011132635
C011131925
B011130918
A011130108
I011125160
H011124050
G011123539
F011123134
E011122530
D011121524

Recently uploaded (20)

PPTX
UNIT 4 Total Quality Management .pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPT
Mechanical Engineering MATERIALS Selection
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
Geodesy 1.pptx...............................................
PDF
737-MAX_SRG.pdf student reference guides
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
DOCX
573137875-Attendance-Management-System-original
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
UNIT 4 Total Quality Management .pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Categorization of Factors Affecting Classification Algorithms Selection
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Foundation to blockchain - A guide to Blockchain Tech
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Mechanical Engineering MATERIALS Selection
III.4.1.2_The_Space_Environment.p pdffdf
Geodesy 1.pptx...............................................
737-MAX_SRG.pdf student reference guides
Automation-in-Manufacturing-Chapter-Introduction.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Embodied AI: Ushering in the Next Era of Intelligent Systems
573137875-Attendance-Management-System-original
UNIT-1 - COAL BASED THERMAL POWER PLANTS

Analysis of Spending Pattern on Credit Card Fraud Detection

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 61-64 www.iosrjournals.org DOI: 10.9790/0661-17216164 www.iosrjournals.org 61 | Page Analysis of Spending Pattern on Credit Card Fraud Detection Capt. Dr. S Santhosh Baboo1 , N Preetha 2 1 Associate Professor, 2 Research Scholar 1,2 Department of Computer Science and Applications 1 D.G.Vaishnav College, Arumbakkam, Chennai, 2 PhD Research Scholar SCSVMV University, Enathur, Kancheepuram Abstract: Credit card is one of the convenient way of payment in online shopping. In this on line shopping, payment is made by giving information like card no, security code , expiration date of the Credit card etc . To rectify the risk factors of using the credit card, every card holder’s spending method is modeled by using HMM. By using this authenticated security check the information of transaction is fraudulent or genuine. It is highly secured from unauthorized anomalous user using credit card and avoids fraud usage of card through online transactions. Keywords: HMM, FDS, TP, FP I. Introduction Now a days, credit card frauds have been rampantly increased, while making e-payments made for the purchased goods or service provided on internet. These frauds are happening in two types of purchase using the credit cards. 1) Physical card 2) Virtual card. In this first type of physical card purchase, the purchaser has to provide the card to a merchant and make payment. In this type , the credit card fraudulent is happened by stealing the credit card. If the card holder is unaware of this, the credit card company has to face the financial loss and in the second type of virtual card purchase, the card holder, has to provide the secret details of the card ( like security code, card no, expiration date etc.) either thru internet or over phone . Without knowing the consequences, the genuine card holder is providing the information to the fraudsters. The result is that they loss their money also. To detect this type of criminal activity , the spending patterns of the card holder is analyzed . To discover & prevent this type fraudulent activities, some intelligent & effective methods has been provided by the data mining, machine learning & statistics areas. In these data mining, the cyber credit card fraud has been detected by using artificial intelligence and algorithms techniques, which analyses the usage of unusual patterns derived from the data given. In this method, it is detected whether the transaction is legitimate or illegitimate. II. Related Work Ghosh and Reilly [1] have proposed credit card fraud detection with a neural network. They have built detection system, which is trained on a large sample of labeled credit card account transactions. These transactions contain example fraud cases due to lost cards, stolen cards, application fraud, counterfeit fraud, mail-order fraud, and non received issue (NRI) fraud. Stolfo et al [2] suggest a credit card fraud detection system (FDS) using meta-learning techniques to learn models of fraudulent credit card transactions. Meta learning is a general strategy that provides a means for combining and integrating a number of separately built classifiers or models. The same group has also worked on a cost-based model for fraud and intrusion detection [3]. They use Java agents for Meta-learning (JAM), which is a distributed data mining system for credit card fraud detection. A number of important performance metrics like TP-FP (True Positive – False Positive) spread and accuracy have been defined by them. Aleskerov et al. [4] present CARDWATCH, database mining system used for credit card fraud detection. The system, based on a neural learning module, provides an interface to a variety of commercial databases. Fan et al. [5] suggest the application of distributed data mining in credit card fraud detection. Braise et al. Stolfo use an agent-based approach with distributed learning for detecting frauds in credit card transactions. It is based on artificial intelligence and combines inductive learning algorithms and metal earning methods for achieving higher accuracy. Phua et al. [6] suggest the use of met classifier similar to in fraud detection problems. Recognizing this problem, the switching-service provider decided to provide a capability to the issuing banks to flag in real-time those transactions that appeared to be suspicious, and possibly fraudulent. In this way, at the bank’s option, suspicious or fraudulent transactions were identified and rejected much earlier and faster than previously possible.
  • 2. Analysis of Spending Pattern on Credit card Fraud Detection DOI: 10.9790/0661-17216164 www.iosrjournals.org 62 | Page III. Proposed Work This work focusing on an application which is used to detect the fraudulent credit card activities on internet transaction. In this peculiar type, the pattern of current fraudulent usage of the credit card has been analyzed with the previous transactions, by using the neural networks in algorithm of data mining. Figure.1 Proposed Architecture for investigation of credit card. A. Credit card Fraud Detection using HMM. To find out the fraudulent transactions, Hidden Markov model is used by detecting and analyzing the spending profile of the credit card user. generally the profile is being divided into three types a) lower profile b) middle profile c) higher profile . as every card holder has a different method of spending profile, This can easily find out fraudulent one by keeping the in consistent record of the usage of the card. Even though this cannot find out the number of purchased items & its categories, This identifies the fraudulent transaction easily by analyzing the spending patterns of the card user. in this the last twenty transactions of card holder can be easily studied & can identify which one is a fraudulent one (i.e.) the amount, the time of transaction etc. It can be easily noted via the shadow based replication engine. The ultimate goal of this analysis is to give a note about the fraudulent transaction, to the issuing bank and also to the merchant and to take appropriate action by the issuing bank. A critical problem faced by the issuing banks is that of fraudulent transactions. This problem has, of course, exploded with the high speed nature of electronic submission of credit and debit transactions. An ATM or POS transaction may be fraudulent, for instance, if the credit card is stolen. Online purchases may be fraudulent if the credit card number, expiration date, and CID number are copied from the card. This copying can easily be done, for example, by a waiter taking a customer’s credit card to pay for a meal or when a phone order is placed and paid for with a credit card. Identifying fraudulent transactions typically takes hours or days, and many such transactions may slip through before a hold can be put on the card. Worse, because the information can be quickly shared with thieves in multiple countries, they can rapidly attack via multiple avenues by submitting many different types of transactions simultaneously, anticipating that the lesser (slower, etc) infrastructure that some of them may take will allow at least some of them to get through successfully. The fraud detection system flags a suspicious transaction with a severity flag and writes this information to another log. Periodically, the log is sent to the bank’s authorization system, which takes appropriate action on the card. A credit hold might be placed on the card so that all further transactions will be rejected until the issue is researched or until the problem is resolved. Alternatively, upon the next attempted transaction, the merchant might be informed to ask the customer to call the bank in order to authorize the transaction. This method is still generally the primary fraud detection procedure in use today. The problem with this method is that it typically takes hours or even days to flag a card that is perhaps being used fraudulently. During this time, the bank can experience significant losses as additional fraudulent transactions are made. In general, the bank is responsible for such transactions and purchases made by the customers based on the price ranges that can be determined dynamically by applying a clustering algorithm on the values of each cardholder’s transactions, as shown in Table 1 Login Information Security Check Information Verification Done (via SMS) Card Entry Transaction Processed Complete
  • 3. Analysis of Spending Pattern on Credit card Fraud Detection DOI: 10.9790/0661-17216164 www.iosrjournals.org 63 | Page B. Investigation made on Customer Transaction. Cust_ID Frequency of Card Usage Average Amount R0T 8K7 5 3000 W7X 2P8 3 45000 Y9T 8Q6 1 2000 Q6V 6Z2 5 1000 O1M 8P3 4 250 Y1A 4K1 2 6500 Table 1. Customer Monthly Transaction Consider three price ranges namely, low (l), medium (m), and high (h)]. Our set of observation symbols for example, let l= (0, 10000), m = (10000, 50000), and h= (50000 to credit card limit). If a cardholder performs a transaction of 15000, then the corresponding observation symbol is m. A credit cardholder makes different kinds of purchases of different amounts over a period of time. One possibility is to consider the sequence of transaction amounts and look for deviations in them. However, the sequence of types of purchase is more stable compared to the sequence of transaction amounts. The reason is that, a cardholder makes purchases depending on his need for procuring different types of items over a period of time. This, in turn, generates a sequence of transaction amounts. Each individual transaction amount usually depends on the corresponding type of purchase. Hence, consider the transition in the type of purchase as state transition in our model. The type of each purchase is linked to the line of business of the corresponding merchant. This information about the merchant’s line of business is not known to the issuing bank running the FDS. The authentication code will be send to the registered mobile number of the user, every time the user tries to purchase. Thus, the type of purchase of the cardholder is hidden from the FDS. The set of all possible types of purchase and, equivalently, the set of all possible lines of business of merchants forms the set of hidden states of the HMM. A card transaction is captured by such devices as a point-of-sale (POS) terminal in a store, a customer’s browser communicating with a website, or an ATM. The information concerning the request must be rapidly gathered from the servicing network to which the devices are connected, sent to the issuing bank for authorization/approval, and the response rapidly returned in order for the system to complete the transaction. Highly Secured from unauthorized anomalous user using credit card and avoids fraud usage of card through online transactions. IV. Results And Discussion The transaction-switching service provider realized that there was an opportunity to provide a unique and important service to the issuing banks. If it could detect suspicious or fraudulent activity in real-time, it could stop fraudulent transactions at the retail counter or at the ATM much sooner, or in some cases, even before they were authorized. This service would be a value-added service that would distinguish it from other ATM/POS switching networks. To implement this system, the switching provider installed multiple high- performance servers that could quickly analyze transactions on-the-fly to determine if they were suspicious. The selected servers were large Sun Solaris servers running Oracle databases. Each server comprised eight quad-core CPUs. Each data centre is provided with its own fraud detection complex; comprising multiple Sun Solaris/Oracle servers (the cards/accounts are assigned to particular Sun Solaris/Oracle servers at a site in order to partition the work load). The fraud detection complex is easily scalable to handle additional load by adding additional servers and reassigning the accounts/cards accordingly. Fraud detection will be checked on last 20 transactions and also calculate percentage of each spending profile (low, medium and high) based on total number of transactions. In Table 2, list of all transactions are shown. Cust_ID No. of Transaction Transaction Amount R0T 8K7 5 15x103 W7X 2P8 3 135x103 Y9T 8Q6 1 2x103 Q6V 6Z2 5 5x103 O1M 8P3 4 1x103 Y1A 4K1 2 13x103 Table2. List of transactions. The most recent transaction is placed at the first position. The pattern of spending profile of the card holder is shown in (Figure 2) based on all transactions done. In this new approach, when a transaction is received by a switch node, it is sent not only to the issuing bank for authorization, but it is also replicated in real-time to a fraud detection server via a Shadow base replication engine. Shadow base engine routes the transaction to the particular fraud detection server that is monitoring that card or account. Transaction distribution by card number or account is accomplished via routing rules configured into the Shadow base replication engine.
  • 4. Analysis of Spending Pattern on Credit card Fraud Detection DOI: 10.9790/0661-17216164 www.iosrjournals.org 64 | Page Figure 2: Spending pattern for customer transactions. The action taken by the switch node for a suspicious transaction can be configured to correspond to the desires of the issuing bank and the merchant. In still other situations, the issuing bank may want to allow the transaction but leave a voice or e-mail message or sms for the customer notifying him of a potentially suspicious transaction. It secures the transaction using OTP via sms and Detect the anomalous transaction when cardholder lost the card. The percentage calculation of each spending pattern (low, medium and high) of the card holder based on price distribution range as mentioned earlier is shown in Figure 3 Figure 3: Percentage of Spending Profile 1 It has been noticed that low spending profile has maximum percentage of 50, followed by medium profile 33% and then 17% of high spending profile as per details of transactions in Table 2. V. Conclusion And Future Work The proposed solution for credit card fraud detection using HMM has different steps in credit card transaction processing are represented as the under-lying a statistical process involving a number of random variables depending on a variable parameter of an HMM and it secure the transaction using OTP via sms. It Detect the anomalous transaction when cardholder lost the card. The ranges of transaction amount has been used as the observation symbols, whereas the types of item have been considered to be states of the HMM. It has also been explained how the HMM can detect whether an incoming transaction is fraudulent or not. Experimental results show the performance and effectiveness of the spending profile of the cardholders. The system is also scalable for handling large volumes of transactions. In Future thumb impression or face recognition can also be implemented while using credit card in purchases. References [1]. Ghosh, S., and Reilly, D.L., 1994. Credit Card Fraud Detection with a Neural-Network, 27th Hawaii International l Conference on Information Systems, vol. 3 (2003), pp. 621- 630. [2]. Stolfo, S. J., Fan, D. W., Lee, W., Prodromidis, A., and Chan, P. K., 2000.Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project, Proceedings of DARPA Information Survivability Conference and Exposition, vol. 2 (2000), pp. 130-144 [3]. R. Brause, T. Langsdorf, and M. Hepp, “Neural Data Mining for CreditCard Fraud Detection,” roc. IEEE Int’l Conf. Tools with ArtificialIntelligence, pp. 103-106, 1999. [4]. Aleskerov, E., Freisleben, B., and Rao, B., 1997. CARDWATCH: ANeural Network Based Database Mining System for Credit Card FraudDetection, Proceedings of IEEE/IAFE: Computational Intelligence forFinancial Eng. (1997), pp. 220-226. [5]. W. Fan, A.L. Prodromidis, and S.J. Stolfo, “Distributed Data Mining inCredit Card Fraud Detection,” IEEE Intelligent Systems, vol. 14, no. 6,pp. 67-74, 1999. [6]. C. Phua, D. Alahakoon, and V. Lee, “Minority Report in FraudDetection: Classification of Skewed Data,” ACM SIGKDD ExplorationsNewsletter, vol. 6, no. 1, pp. 50-59, 2004.