A Differentiate Analysis for Credit Card Fraud Detection

Md. Akter Hossain, Mohammed Nazim Uddin
{"title":"A Differentiate Analysis for Credit Card Fraud Detection","authors":"Md. Akter Hossain, Mohammed Nazim Uddin","doi":"10.1109/ICISET.2018.8745592","DOIUrl":null,"url":null,"abstract":"With the swift progress of internet and electronic commerce, online money transaction has increased over time. People mostly eager to use online money transference and because of the internet is now available almost everywhere. Therefore, any attackers could be plan attacks from anywhere to forage any victim. There was various way from the previous attacks that victims became hunts by duplicate copy of the website, cards, ID numbers, rearranging provisional codes, fake documentations or signatures and so on. The genuine transaction and fraudulent transactions are almost similar, that's why it's very hard to figure out a real or fake transaction. One way could be effective if we know the behavioral pattern of card's owner. In this manner, we have introduced a Fraud Detection Engine (FDE) along with a Feature Selection Tool (FST). After gets a transaction request, FDE engine have searched for any sorts of intruder based on its key selective features. FST is one of those feature, which have used to match the cluster patterns with the requester behavioral pattern. Cluster pattern are cardholder's behavioral patterns which have trained by using of feedforward neural network. Therefore, examine all of the key features with vector analytical method or simply vector method. Proposed technique has applied from collected and previously driven on many studies datasets.","PeriodicalId":6608,"journal":{"name":"2018 International Conference on Innovations in Science, Engineering and Technology (ICISET)","volume":"69 1","pages":"328-333"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Innovations in Science, Engineering and Technology (ICISET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISET.2018.8745592","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

With the swift progress of internet and electronic commerce, online money transaction has increased over time. People mostly eager to use online money transference and because of the internet is now available almost everywhere. Therefore, any attackers could be plan attacks from anywhere to forage any victim. There was various way from the previous attacks that victims became hunts by duplicate copy of the website, cards, ID numbers, rearranging provisional codes, fake documentations or signatures and so on. The genuine transaction and fraudulent transactions are almost similar, that's why it's very hard to figure out a real or fake transaction. One way could be effective if we know the behavioral pattern of card's owner. In this manner, we have introduced a Fraud Detection Engine (FDE) along with a Feature Selection Tool (FST). After gets a transaction request, FDE engine have searched for any sorts of intruder based on its key selective features. FST is one of those feature, which have used to match the cluster patterns with the requester behavioral pattern. Cluster pattern are cardholder's behavioral patterns which have trained by using of feedforward neural network. Therefore, examine all of the key features with vector analytical method or simply vector method. Proposed technique has applied from collected and previously driven on many studies datasets.
信用卡欺诈检测的差异化分析
随着互联网和电子商务的飞速发展,网上货币交易日益增多。人们大多渴望使用网上转账,因为互联网现在几乎无处不在。因此,任何攻击者都可以从任何地方计划攻击,寻找任何受害者。与之前的攻击相比,受害者通过复制网站、身份证、身份证号码、重新排列临时代码、伪造文件或签名等多种方式成为追捕对象。真实交易和欺诈交易几乎是相似的,这就是为什么很难区分真实交易或虚假交易的原因。如果我们知道持卡人的行为模式,一种方法可能是有效的。通过这种方式,我们引入了欺诈检测引擎(FDE)和特征选择工具(FST)。在收到事务请求后,FDE引擎根据其关键选择特性搜索各种类型的入侵者。FST就是其中一种特性,用于将集群模式与请求者行为模式相匹配。聚类模式是利用前馈神经网络训练出的持卡人的行为模式。因此,用矢量分析方法或简单的矢量方法来检查所有的关键特征。所提出的技术已经应用于收集和先前驱动的许多研究数据集。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信