ANALYSIS ON CREDIT CARD FRAUD DETECTION METHODS

Slides:



Advertisements
Similar presentations
E-Gov - Citizenship and Control TCU - Brazilian Court of Audit IT Audit Project Group.
Advertisements

CPSCG: Constructive Platform for Specialized Computing Grid Institute of High Performance Computing Department of Computer Science Tsinghua University.
Information Technology is any combination of information technology and people's activities that support 1.Operations 2. Management 3.Decision Making.
Ensemble Learning – Bagging, Boosting, and Stacking, and other topics
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
An Adaptive System for User Information needs based on the observed meta- Knowledge AKERELE Olubunmi Doctorate student, University of Ibadan, Ibadan, Nigeria;
Ms Joyce Tam, Principal Assistant Secretary for Information Technology and Broadcasting Presentation on “Developing an E-Government” to IIAC Members Thursday.
Teaching an Agent by Playing a Multimodal Memory Game: Challenges for Machine Learners and Human Teachers AAAI 2009 Spring Symposium: Agents that Learn.
Visual Data Mining: Concepts, Frameworks and Algorithm Development Student: Fasheng Qiu Instructor: Dr. Yingshu Li.
Particle Swarm Optimization (PSO)  Kennedy, J., Eberhart, R. C. (1995). Particle swarm optimization. Proc. IEEE International Conference.
Particle Swarm Optimization PSO was first introduced by Jammes Kennedy and Russell C. Eberhart in Fundamental hypothesis: social sharing of information.
Dual-domain Hierarchical Classification of Phonetic Time Series Hossein Hamooni, Abdullah Mueen University of New Mexico Department of Computer Science.
TEMPLATE DESIGN © Self Organized Neural Networks Applied to Animal Communication Abstract Background Objective The main.
Nonlinear rational model identification and control Professor Quan M. Zhu Bristol Institute of Technology University of the West of England Frenchay Campus.
1. Abstract 2 Introduction Related Work Conclusion References.
Achieving Better Privacy Protection in WSNs Using Trusted Computing Yanjiang YANG, Robert DENG, Jianying ZHOU, Ying QIU.
Large Lump Detection by SVM Sharmin Nilufar Nilanjan Ray.
Neural Networks II CMPUT 466/551 Nilanjan Ray. Outline Radial basis function network Bayesian neural network.
Neuro-Fuzzy Algorithmic (NFA) Models and Tools for Estimation Danny Ho, Luiz F. Capretz*, Xishi Huang, Jing Ren NFA Estimation Inc., London, Ontario, Canada.
CS 590M Fall 2001: Security Issues in Data Mining Lecture 3: Classification.
CS 1 – Introduction to Computer Science Introduction to the wonderful world of Dr. T Dr. Daniel Tauritz.
Large Lump Detection by SVM Sharmin Nilufar Nilanjan Ray.
Dr.-Ing. Erwin Sitompul President University Lecture 1 Introduction to Neural Networks and Fuzzy Logic President UniversityErwin SitompulNNFL 1/1
Detecting the Domain Structure of Proteins from Sequence Information Niranjan Nagarajan and Golan Yona Department of Computer Science Cornell University.
Michalis Agathocleous DEPARTMENT OF COMPUTER SCIENCE Department of Computer Science Fraud Prediction Intelligent Systems In Business David Barber.
Shri Sant Gajanan Maharaj College of Engineering, Shegaon IEEE SSGMCE Branch Presents ‘Online IEEE Membership Process’
1 Neural plug-in motor coil thermal modeling Mo-Yuen Chow; Tipsuwan Y Industrial Electronics Society, IECON 26th Annual Conference of the IEEE, Volume:
Introduction to Biometric Systems
1 PSO-based Motion Fuzzy Controller Design for Mobile Robots Master : Juing-Shian Chiou Student : Yu-Chia Hu( 胡育嘉 ) PPT : 100% 製作 International Journal.
The difference between a Credit and Debit Card Debit card: Give you access to your funds immediately Credit card: You use money you don’t have but are.
Temporal Event Map Construction For Event Search Qing Li Department of Computer Science City University of Hong Kong.
Credit Card Fraud Detection
revised CmpE 583 Fall 2006Discussion: OWL- 1 CmpE 583- Web Semantics: Theory and Practice DISCUSSION: OWL Atilla ELÇİ Computer Engineering.
Soft Computing Lecture 20 Review of HIS Combined Numerical and Linguistic Knowledge Representation and Its Application to Medical Diagnosis.
Krishnaprasad Thirunarayan, Pramod Anantharam, Cory A. Henson, and Amit P. Sheth Kno.e.sis Center, Ohio Center of Excellence on Knowledge-enabled Computing,
Easwari Engineering College Department of Computer Science and Engineering IDENTIFICATION AND ISOLATION OF MOBILE REPLICA NODES IN WSN USING ORT METHOD.
Unit Seven Database 1.Passage One. Foundation of Database.
The next generation of payments is here. Is your business ready?
Visual Analysis of Hierarchical Management Data Zhao Geng 1, Gaurav Gathania 2, Robert S.Laramee 1 and ZhenMin Peng 1 1 Visual Computing Group, Computer.
ACTIVE LEARNING USING CONFORMAL PREDICTORS: APPLICATION TO IMAGE CLASSIFICATION HypHyp Introduction HypHyp Conceptual overview HypHyp Experiments and results.
Back Next 1 1 SUPERVISOR B. JEYAPRAGASH Assistant Professor, Department of Library and Information Science, Bharathidasan.
Cross strait Quad-reginal radio science and wireless technology conference, Vol. 2, p.p ,2011 Application of fuzzy LS-SVM in dynamic compensation.
Well Log Data Inversion Using Radial Basis Function Network Kou-Yuan Huang, Li-Sheng Weng Department of Computer Science National Chiao Tung University.
Electronic Money. What is Electronic Money? Scrip or money that is exchanged only through electronically is referred to as electronic money. Electronic.
Exploit of Online Social Networks with Community-Based Graph Semi-Supervised Learning Mingzhen Mo and Irwin King Department of Computer Science and Engineering.
Immune-inspired Network Intrusion Detection System (i-NIDS) 1 Next Generation Intelligent Networks Research Center National University of Computer & Emerging.
Artificial Intelligence, Expert Systems, and Neural Networks Group 10 Cameron Kinard Leaundre Zeno Heath Carley Megan Wiedmaier.
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
Distributed Pattern Recognition System, Web-based by Nadeem Ahmed.
Dynamic Neural Network Control (DNNC): A Non-Conventional Neural Network Model Masoud Nikravesh EECS Department, CS Division BISC Program University of.
Automatic Screening of Sonar Imagery Using Artificial Intelligence Techniques John Tran.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
TUMOR BURDEN ANALYSIS ON CT BY AUTOMATED LIVER AND TUMOR SEGMENTATION RAMSHEEJA.RR Roll : No 19 Guide SREERAJ.R ( Head Of Department, CSE)
Introduction to Machine Learning August, 2014 Vũ Việt Vũ Computer Engineering Division, Electronics Faculty Thai Nguyen University of Technology.
Personalizing the Web Todd Lanning Project 1 - Presentation CSE 8331 Dr. M. Dunham.
TYLER GROUP
Under Guidance of Mr. A. S. Jalal Associate Professor Dept. of Computer Engineering and Applications GLA University, Mathura Presented by Dev Drume Agrawal.
Project GuideBenazir N( ) Mr. Nandhi Kesavan RBhuvaneshwari R( ) Batch no: 32 Department of Computer Science Engineering.
Prepared by Fayes Salma.  Introduction: Financial Tasks  Data Mining process  Methods in Financial Data mining o Neural Network o Decision Tree  Trading.
CS 9633 Machine Learning Support Vector Machines
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Immune-inspired Network Intrusion Detection System (i-NIDS)
Data Mining Classification: Alternative Techniques
Electronic Commerce Technology (IT60104) Spring
PROJECTS SUMMARY PRESNETED BY HARISH KUMAR JANUARY 10,2018.
Remah Alshinina and Khaled Elleithy DISCRIMINATOR NETWORK
Natural Language to SQL(nl2sql)
Masoud Nikravesh EECS Department, CS Division BISC Program
Published in: IEEE Transactions on Industrial Informatics
Mingzhen Mo and Irwin King
Presentation transcript:

ANALYSIS ON CREDIT CARD FRAUD DETECTION METHODS Under the guidance of Ms. Sharmila Chidaravalli Assistant Professor, Department of CSE, AIeMS Presentation By ASHWINI G T 1AR08CS004 AIeMS

Contents Introduction Fraud Detection Techniques Dempster–Shafer Theory BLAST-SSAHA Hybridization Hidden Markov Model Evolutionary-fuzzy System Using Bayesian and Neural Networks Conclusion References

Introduction The Credit Card is a small plastic card issued to users as a System of Payment. Credit Card Security relies on the Physical Security of the plastic card as well as the privacy of the Credit Card Number. Globalization and increased use of the Internet for Online Shopping has resulted in a considerable proliferation of Credit Card Transactions throughout the world. Credit Card Fraud is a wide-ranging term for theft and fraud committed using a Credit Card as a fraudulent source of funds.

Fraud Detection Techniques Dempster–Shafer Theory and Bayesian learning BLAST-SSAHA Hybridization Hidden Markov Model Fuzzy Darwinian Detection Bayesian and Neural Networks

Dempster–Shafer Theory

BLAST-SSAHA Hybridization

Hidden Markov Model

Evolutionary-fuzzy System

Bayesian and Neural Networks It consists of tree layers namely input hidden and output layers. Bayesian networks also called as Belief networks.

Comparison of Various Fraud Detection Systems Parameters Used For Comparison Accuracy Method True Positive (TP) False Positive(FP) Training Data

Conclusion Efficient credit card fraud detection system is an utmost requirement for any card issuing bank. The Fuzzy Darwinian fraud detection systems improve the system accuracy. The Neural Network based CARDWATCH shows good accuracy in fraud detection and processing Speed. The fraud detection rate of Hidden Markov model is very low compare to other methods. The processing speed of BLAST-SSAHA is fast enough to enable on-line detection of credit card fraud. BLAH-FDS can be effectively used to counter frauds in other domains such as telecommunication and banking fraud detection.

References [1]Amlan Kundu, Suvasini Panigrahi, Shamik Sural and Arun K. Majumdar, “BLAST-SSAHA Hybridization for Credit Card Fraud Detection,” IEEE Transactions On Dependable And Secure Computing, vol. 6, Issue no. 4, pp.309-315, October-December 2009. [2] Amlan Kundu, Suvasini Panigrahi, Shamik Sural and Arun K. Majumdar, “Credit card fraud detection: A fusion approach using Dempster–Shafer theory and Bayesian learning,” Special Issue on Information Fusion in Computer Security, Vol. 10, Issue no 4, pp.354- 363, October 2009. [3] Abhinav Srivastava, Amlan Kundu, Shamik Sural, Arun K.Majumdar, “Credit Card Fraud Detection using Hidden Markov Model,”IEEE Transactions On Dependable And Secure Computing, vol. 5, Issue no. 1, pp.37-48, January-March 2008. [4] Peter J. Bentley, Jungwon Kim, Gil-Ho Jung and Jong-Uk Choi, “Fuzzy Darwinian Detection of Credit Card Fraud,” In the 14th Annual Fall Symposium of the Korean Information Processing Society, 14th October 2000. [5] Sam Maes, Karl Tuyls, Bram Vanschoenwinkel, Bernard Manderick, “Credit card fraud detection using Bayesian and neural networks,” Interactive image-guided neurosurgery, pp.261-270, 1993. [6] Amlan Kundu, S. Sural, A.K. Majumdar, “Two-Stage Credit Card Fraud Detection Using Sequence Alignment,” Lecture Notes in Computer Science, Springer Verlag, Proceedings of the International Conference on Information Systems Security, Vol. 4332/2006, pp.260- 275, 2006. [7] Simon Haykin, “Neural Networks: A Comprehensive Foundation,”2nd Edition, pp.842, 1999.

QUERIES??

THANK YOU