CFP last date
20 June 2024
Reseach Article

Fraud Detection by Monitoring Customer Behavior and Activities

by Parvinder Singh, Mandeep Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 11
Year of Publication: 2015
Authors: Parvinder Singh, Mandeep Singh
10.5120/19584-1340

Parvinder Singh, Mandeep Singh . Fraud Detection by Monitoring Customer Behavior and Activities. International Journal of Computer Applications. 111, 11 ( February 2015), 23-32. DOI=10.5120/19584-1340

@article{ 10.5120/19584-1340,
author = { Parvinder Singh, Mandeep Singh },
title = { Fraud Detection by Monitoring Customer Behavior and Activities },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 11 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 23-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number11/19584-1340/ },
doi = { 10.5120/19584-1340 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:47:37.871808+05:30
%A Parvinder Singh
%A Mandeep Singh
%T Fraud Detection by Monitoring Customer Behavior and Activities
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 11
%P 23-32
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the enhancement in technology e-banking like credit Card, Debit Card, Mobile Banking and Internet Banking is the popular medium to transfer the money from one account to another. E-Banking is gaining popularity day by day, which increases the online transaction with the increase in online shopping, online bill payment like electricity, Insurance Premium and other charges, online recharges and online reservation of railways, bus etc. , so the fraud cases related to this are also increasing and it puts a great burden on the economy, affecting both customers and financial bodies. It not only costs money, but also a great amount of time to restore the harm done. The purpose is to prevent the customer from online transaction by using specific technique i. e. based on Data Mining and Artificial Intelligence technique. The risk score is calculated by Bayesian Learning Approach to analyze whether the transaction is genuine or fraudulent based on the two parameters: Customer Spending Behaviour and Geographical Locations. The customer than spending behaviour that can be identified by KMEAN clustering algorithm and in geographical location the current geographical location is compared with the previous location. If risk score is greater 0. 5 then transaction is considered to be fraudulent transactions and then the security mechanism authenticates the user by entering the 4 digit random number that appears on the screen and the genuine user enters the code in a correct manner.

References
  1. Bhattacharya. S , Jha. S, Tharakunnel. K and Westland. C. J, "Data mining for credit card fraud", Science Direct, Decision Support System pp 602-613, 2010.
  2. Cao. L, Zhang. H, Zhao. Y, Luo. D and Zhang. C, "Combined Mining: Discovering Informative Knowledge in complex data", IEEE Transactions Vol. 41 No. 3 pp 699-712, 2011.
  3. Chuang. K. T, Lin. K. P and Chen. M. S, "Quality Aware Sampling and its application in Incremental Data Mining", IEEE Transactions on Knowledge and Data Engineering Vol. 19 No. 4, pp 468-484, 2007.
  4. Cao. L, "Social Security and Social Welfare Data Mining: An Overview", IEEE Transactions on Systems, Man and Cybernetics-Part C: Applications & Reviews Vol. 42 No. 6, pp 837-853, 2012.
  5. Chang. W. H and Chang. J. S, "An early fraud detection methods for online auctions", Science Direct Electronic Commerce Research and Applications, pp 346-360, 2012.
  6. Clifton. P, Kate. S. M, Lee. S. C. V and Gaylor. R , " Resilient Identity Crime Detection", IEEE Transactions Volume 24 No. 3, March 2012.
  7. Dharwa. J. N and Patel. A. R, "A Data Mining With Hybrid Approach Based Transaction Risk Score Generation Method for Fraud Detection of Online Transaction", International Journal of Computer Applications Volume 16 No. 1, pp 18-25, 2011.
  8. Drezewski. R, Spielak. J and Filipowski. W, "System Supporting Money Laundering Detection", Science Direct Digital Investigations, pp 8-21, 2012.
  9. Duman. E. and Ozcelik. H. M , "Detecting credit card fraud by genetic algorithm and scatter search", Science Direct, Expert System with Applications 38 , pp 13057-13063,2011.
  10. Edge. E. M and Sampaio. F. P. R, "The design of FFML: A rule-based policy modeling language for proactive fraud management in financial data streams", Science Direct, Expert System with applications 39, pp 9966-9985, 2012.
  11. Farvaresh. H and Sepehri. M. M, "A data mining framework for detecting subscription fraud in telecommunication", Science Direct, Engineering Applications of Artificial Intelligence 24, pp 182-194, 2010.
  12. GodBole. N, "Information System Security" Wiley Publishers, pp 15-100, 2012.
  13. He. Z, Xu. X, Huang. Z. J and Deng. S, "Mining class outliers: Concepts, Algorithms and Applications in CRM", Science Direct, Expert System with applications Volume-27 pp 681-697, 2004.
  14. Han. J and Kamber. M, Data Mining: Concepts and Techniques, Second edition, Morgan Kaufmann Publishers, 2006, pp 285-464.
  15. Huang. R, Tawfik. H and Nagar. A. K, "A Novel Hybrid Artificial Immune Inspired Approach for Online Break-in Fraud Detection", International Conference on Computer Science, Science Direct, pp 2733-2742, 2012.
  16. Hajian. S and Ferrer. J. D, "A methodology for direct and indirect discrimination prevention in data mining", IEEE transactions on Knowledge and Data Engineering Vol. 25 No. 7, pp 1445-1459, 2013.
  17. Jha. S, Guillen. M and Westland. C. J , "Emp-loying Transaction aggregation strategy to detect fraud", Expert System with applications 39 pp 12,650-12,657,2012.
  18. Joris. M, Celin. V and Greet. V. B,"Outlier detection in relational data: A case study in geographical information systems", Science Direct, Expert System with applications 39 pp 4718-4728, 2012.
  19. Kim. K, Choi. Y and Park. J, "Pricing fraud detection in online shopping malls using a finite mixture model" Science Direct Electronic Commerce Research and Applications, pp195-207, 2013.
  20. Kundu. A,Suvasini. P,Sural. S and Majum-dar. A. K,"BLAST-SSAHA Hybridization for Credit Card Fraud Detection" IEEE Transactions On Dependable and Secure Computing, VOL. 6, NO. 4, Dec 2009.
  21. Lee. H. D, Park. H. W and Kim. S, "Fraud and financial crime detection using malware forensics", Springer Multimedia Tools Appl. , pp 479-496, 2013.
  22. Li. J, Wei. W, Yuming. O and Chen. J, "Effective detection of sophisticated online banking fraud on extremely imbalanced data", Springer World Wide Web, pp 449-475, 2012.
  23. Lin. S and Brown. D. E, "An outlier-based data association method for linking criminal incidents", Science Direct, Decision Support System 41, pp 604-615 , Oct, 2004.
  24. Panigrahi. S, Kundun. A, Sural. S and Majum-dar. A. K, "Credit card fraud detection: A fusion approach using Dempster–Shafer theory and Bayesian learning" Science Direct, pp 354-363, 2009.
  25. Pozollo. D. A, Caelen. O, Borgne. Y. A. L, Wa-terschoot. S and Bontempi. G, "Learned lessons in credit card fraud detection from a practitioner perspective", Science Direct Expert System with applications 41, pp 4915-4928, 2014.
  26. Quah. J. T. S and Sriganesh. M, "Real-time credit card fraud detection using Computational Intelligence", Science Direct Expert System with applications 35 pp 1721-1732, 2007.
  27. Sahin. Y, Bulkan. S and Duman. E, "A cost-sensitive decision tree approach for fraud detection", Science Direct, Expert System with Applications 40 pp-5916-5923, 2013.
  28. Sanchez. D, Cerda. L, Serrano. J. M and Vila-. M. A, "Association Rules applied to Credit Card Fraud Detection", Science Direct Expert System with applications 36 pp 3630-3640, 2009.
  29. Srivastava. A, Kundu. A, Sural. S and Maju-mdar. A. K, "Credit Card Fraud Detection Using Hidden Markov Model", IEEE Transactions on Dependable & Secure Computing Vol. 5, March 2008.
  30. Sun. X,Hu. Y, Chen. Y, Ngai. E. W. T and W-ong. Y. H, " The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature" , Science Direct, pp 559-569 ,2010.
  31. Wu. X. D andZhu. X,"Mining With Noise Knowledge: Error-Aware Data Mining" IEEE transactions ON Cybernetics, Vol. 38 No. 4, July, 2008.
  32. Wu. S and Wang. S, "Information-Theoretic Outlier Detection for Large-Scale Categorical Data", IEEE Volume 25 No. 3, March 2013.
  33. Yeh. Y. R, Lee. Y. J and Wang. Y. C. F, "An-omaly Detection via Online Oversampling Principal Component Analysis", IEEE Transactions on Knowledge and Data Engineering Vol. 25 No. 7, pp 1460-1470, 2013.
  34. ZhongL. J and Ghorbani. A,"Improved comp-etitive learning neural networks for network intrusion and fraud detection", Science Direct, pp 135-145 Aug, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Unique Hybrid Logical Data Mining Artificial Intelligence Bayesian Learning Approach K Mean algorithm Authenticate.