{"title":"Various Methods for Fraud Transaction Detection in Credit Cards","authors":"Hardik Manek, Nikhil Kataria, Sujai Jain, Chitra Bhole","doi":"10.5383/juspn.12.01.004","DOIUrl":null,"url":null,"abstract":"Cashless payments have become effortless with the advent of new technology and the internet. But, for online transactions, you don't have to be in a certain place where the transaction occurs, making it vulnerable to fraudulent attacks. A cyber-attacker can pretend to be the owner of a credit card and make a fraudulent transaction. There are several techniques to determine the nature of the transaction, for instance, by comparing the current transaction with previous transactions. If the monetary difference between current transaction and previous transaction is too large, then there is a greater probability of current transaction being a fraudulent transaction. This method is not reliable for anomaly detection. In some countries like India and China, banks deploy a two-step verification process which strengthens the security of the transaction. While in other countries, employees in the bank manually segregate the transactions to be fraud or not. These methods are highly dependent on human intervention. Machine Learning can be utilized to automate the process of anomaly detection. Supervised algorithms such as Logistic Regression can be used to build a model that will predict the output in the form of binary classes i.e. 0 for a valid transaction and 1 for a fraudulent transaction. Autoencoder Neural Network is one of the unsupervised algorithms using which better accuracy can be obtained for anomaly detection. In this paper, we explain different machine learning algorithms viz; Hidden Markov Model, Artificial Neural Network, and Convolutional Neural Network. Moreover, Logistic Regression is implemented, and the results obtained are highlighted.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"102 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Ubiquitous Syst. Pervasive Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5383/juspn.12.01.004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cashless payments have become effortless with the advent of new technology and the internet. But, for online transactions, you don't have to be in a certain place where the transaction occurs, making it vulnerable to fraudulent attacks. A cyber-attacker can pretend to be the owner of a credit card and make a fraudulent transaction. There are several techniques to determine the nature of the transaction, for instance, by comparing the current transaction with previous transactions. If the monetary difference between current transaction and previous transaction is too large, then there is a greater probability of current transaction being a fraudulent transaction. This method is not reliable for anomaly detection. In some countries like India and China, banks deploy a two-step verification process which strengthens the security of the transaction. While in other countries, employees in the bank manually segregate the transactions to be fraud or not. These methods are highly dependent on human intervention. Machine Learning can be utilized to automate the process of anomaly detection. Supervised algorithms such as Logistic Regression can be used to build a model that will predict the output in the form of binary classes i.e. 0 for a valid transaction and 1 for a fraudulent transaction. Autoencoder Neural Network is one of the unsupervised algorithms using which better accuracy can be obtained for anomaly detection. In this paper, we explain different machine learning algorithms viz; Hidden Markov Model, Artificial Neural Network, and Convolutional Neural Network. Moreover, Logistic Regression is implemented, and the results obtained are highlighted.