Various Methods for Fraud Transaction Detection in Credit Cards

Hardik Manek, Nikhil Kataria, Sujai Jain, Chitra Bhole
{"title":"Various Methods for Fraud Transaction Detection in Credit Cards","authors":"Hardik Manek, Nikhil Kataria, Sujai Jain, Chitra Bhole","doi":"10.5383/juspn.12.01.004","DOIUrl":null,"url":null,"abstract":"Cashless payments have become effortless with the advent of new technology and the internet. But, for online transactions, you don't have to be in a certain place where the transaction occurs, making it vulnerable to fraudulent attacks. A cyber-attacker can pretend to be the owner of a credit card and make a fraudulent transaction. There are several techniques to determine the nature of the transaction, for instance, by comparing the current transaction with previous transactions. If the monetary difference between current transaction and previous transaction is too large, then there is a greater probability of current transaction being a fraudulent transaction. This method is not reliable for anomaly detection. In some countries like India and China, banks deploy a two-step verification process which strengthens the security of the transaction. While in other countries, employees in the bank manually segregate the transactions to be fraud or not. These methods are highly dependent on human intervention. Machine Learning can be utilized to automate the process of anomaly detection. Supervised algorithms such as Logistic Regression can be used to build a model that will predict the output in the form of binary classes i.e. 0 for a valid transaction and 1 for a fraudulent transaction. Autoencoder Neural Network is one of the unsupervised algorithms using which better accuracy can be obtained for anomaly detection. In this paper, we explain different machine learning algorithms viz; Hidden Markov Model, Artificial Neural Network, and Convolutional Neural Network. Moreover, Logistic Regression is implemented, and the results obtained are highlighted.","PeriodicalId":376249,"journal":{"name":"J. Ubiquitous Syst. Pervasive Networks","volume":"102 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Ubiquitous Syst. Pervasive Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5383/juspn.12.01.004","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cashless payments have become effortless with the advent of new technology and the internet. But, for online transactions, you don't have to be in a certain place where the transaction occurs, making it vulnerable to fraudulent attacks. A cyber-attacker can pretend to be the owner of a credit card and make a fraudulent transaction. There are several techniques to determine the nature of the transaction, for instance, by comparing the current transaction with previous transactions. If the monetary difference between current transaction and previous transaction is too large, then there is a greater probability of current transaction being a fraudulent transaction. This method is not reliable for anomaly detection. In some countries like India and China, banks deploy a two-step verification process which strengthens the security of the transaction. While in other countries, employees in the bank manually segregate the transactions to be fraud or not. These methods are highly dependent on human intervention. Machine Learning can be utilized to automate the process of anomaly detection. Supervised algorithms such as Logistic Regression can be used to build a model that will predict the output in the form of binary classes i.e. 0 for a valid transaction and 1 for a fraudulent transaction. Autoencoder Neural Network is one of the unsupervised algorithms using which better accuracy can be obtained for anomaly detection. In this paper, we explain different machine learning algorithms viz; Hidden Markov Model, Artificial Neural Network, and Convolutional Neural Network. Moreover, Logistic Regression is implemented, and the results obtained are highlighted.
信用卡欺诈交易检测的各种方法
随着新技术和互联网的出现,无现金支付变得毫不费力。但是,对于在线交易,您不必在交易发生的特定位置,从而使其容易受到欺诈性攻击。网络攻击者可以假装是信用卡的所有者并进行欺诈性交易。有几种技术可以确定事务的性质,例如,通过将当前事务与以前的事务进行比较。如果当前交易与先前交易之间的货币差异太大,那么当前交易成为欺诈性交易的可能性就更大。这种方法对异常检测不可靠。在印度和中国等一些国家,银行部署了两步验证流程,以加强交易的安全性。而在其他国家,银行的员工则手动区分交易是否欺诈。这些方法高度依赖于人为干预。机器学习可以用来自动化异常检测过程。监督算法(如Logistic Regression)可以用来构建一个模型,该模型将以二进制类的形式预测输出,即有效交易为0,欺诈交易为1。自编码器神经网络是一种用于异常检测的无监督算法,其精度较高。在本文中,我们解释了不同的机器学习算法:隐马尔可夫模型,人工神经网络,卷积神经网络。此外,还进行了逻辑回归,并突出显示了得到的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信