Credit Card Fraud Detection Using Anomaly Techniques

V. Ceronmani Sharmila, Kiran Kumar R, Sundaram R, Samyuktha D, H. R
{"title":"Credit Card Fraud Detection Using Anomaly Techniques","authors":"V. Ceronmani Sharmila, Kiran Kumar R, Sundaram R, Samyuktha D, H. R","doi":"10.1109/ICIICT1.2019.8741421","DOIUrl":null,"url":null,"abstract":"Credit card fraud transaction detection system is a method used for determining the fraudulent transactions that take place every once in a while. The project uses a test data set of around 27,000 credit card transactions which have been taken from Caltech (Kaggle). The project comprises of primarily 2 major algorithms and uses anomaly detection as a method to classify the fraudulent transactions. The Local Outlier Factor (LoF) defines the various parameters that have to be used in determining the criteria for fraudulent transactions. It then checks upon the different transactions for the various parameters present in the given LoF. This factor then gives each transaction a score based on the various transactions that have or will have taken place. These scores can range from 0 - 1. Each transaction is thus given a score which is based on the various parameters given in the LoF. The second part of the project is isolation forest algorithms which is an algorithm that isolates the transaction which have a high rate of anomaly detected in them. Thus, these transactions are isolated and then checked with various parameters to be labelled as either fraudulent or real transactions. The algorithm also uses charts to check for spikes in the average transaction. We also uses technique like data visualization in order to show the output in more understandable ways which may include histograms, graphs and matrix .Through these two algorithms and with help of data visualization technique we can detect the fraudulent transactions from correct transaction and obtain results in quick time, Since these algorithms are much more time efficient than other machine learning algorithms in this type of tasks.","PeriodicalId":118897,"journal":{"name":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIICT1.2019.8741421","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18

Abstract

Credit card fraud transaction detection system is a method used for determining the fraudulent transactions that take place every once in a while. The project uses a test data set of around 27,000 credit card transactions which have been taken from Caltech (Kaggle). The project comprises of primarily 2 major algorithms and uses anomaly detection as a method to classify the fraudulent transactions. The Local Outlier Factor (LoF) defines the various parameters that have to be used in determining the criteria for fraudulent transactions. It then checks upon the different transactions for the various parameters present in the given LoF. This factor then gives each transaction a score based on the various transactions that have or will have taken place. These scores can range from 0 - 1. Each transaction is thus given a score which is based on the various parameters given in the LoF. The second part of the project is isolation forest algorithms which is an algorithm that isolates the transaction which have a high rate of anomaly detected in them. Thus, these transactions are isolated and then checked with various parameters to be labelled as either fraudulent or real transactions. The algorithm also uses charts to check for spikes in the average transaction. We also uses technique like data visualization in order to show the output in more understandable ways which may include histograms, graphs and matrix .Through these two algorithms and with help of data visualization technique we can detect the fraudulent transactions from correct transaction and obtain results in quick time, Since these algorithms are much more time efficient than other machine learning algorithms in this type of tasks.
使用异常技术的信用卡欺诈检测
信用卡欺诈交易检测系统是一种用于确定每隔一段时间发生的欺诈交易的方法。该项目使用了从加州理工学院(Kaggle)获取的约27,000笔信用卡交易的测试数据集。该项目主要包括两种主要算法,并使用异常检测作为对欺诈交易进行分类的方法。局部离群因子(Local Outlier Factor, LoF)定义了在确定欺诈交易标准时必须使用的各种参数。然后,它检查给定LoF中存在的各种参数的不同事务。然后,这个因素根据已经发生或将要发生的各种交易给每个交易一个分数。这些分数的范围从0到1。因此,根据LoF中给出的各种参数,每个事务都被赋予一个分数。项目的第二部分是隔离森林算法,它是一种隔离在其中检测到高异常率的事务的算法。因此,这些交易被隔离,然后用各种参数进行检查,以标记为欺诈交易或真实交易。该算法还使用图表来检查平均交易中的峰值。我们还使用数据可视化等技术,以便以更容易理解的方式显示输出,包括直方图,图形和矩阵。通过这两种算法,并借助于数据可视化技术,我们可以从正确的交易中检测出欺诈交易,并在短时间内获得结果,因为这些算法比其他机器学习算法在这类任务中更省时。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信