Credit Card Fraud Detection-6
Credit Card Fraud Detection-6
1
HARNOOR KAUR NRO0517381
ACKNOWLEDGEMENT
I am pleased to present "Credit Card Fraud Detection"
project and take this opportunity to express my profound
gratitude to all those people who helped me in completion of this
project.
2
HARNOOR KAUR NRO0517381
TABLE OF CONTENTS
ACKNOWLEDGEMENT …………………………………………………………………02
INTRODUCTION……………………………………………………………………………04
PROPOSED SYSTEM……………………………………………………………………08-09
PROJECT DESIGN:
a) E-R DIAGRAM…………………………………………………………………10
b) USE CASE DIAGRAM………………………………………………………10
c) SEQUENCEDIAGRAM……………………………………………………..11
d) ACTIVITY DIAGRAM………………………………………………………12
e) CLASS DIAGRAM……………………………………………………………13
FEASIBILITY REPORT………………………………………………………………………17
a) TECHNICAL FEASIBILITY…………………………………………………18
b) ECONOMIC FEASIBILITY…………………………………………………19
c) OPERATIONAL FEASIBILITY……………………………………………20
TESTING…………………………………………………………………………………….....21
LEVELS OF TESTING…………………………………………………………………………22
ADVANTAGES OF PROJECT………………………………………………………………25
CONCLUSION………………………………………………………………………………..27
BIBLOGRAPHY……………………………………………………………………………….28
3
HARNOOR KAUR NRO0517381
INTRODUCTION
Credit card fraud detection refers to the set of policies, tools,
methodologies, and practices that credit card companies and
financial institutions use to prevent fraudulent purchases, both
online and in-store. It involves using various techniques and
technologies to identify potentially fraudulent transactions in real-
time or post-transaction analysis. The goal is to minimize financial
losses for both cardholders and card issuers by quickly identifying
and stopping unauthorized or suspicious transactions.
For some time, there has been a strong interest in the ethics of
banking (Molyneaux, 2007; George, 1992), as well as the moral
complexity of fraudulent behavior (Clarke, 1994). Fraud means
obtaining services/goods and/or money by unethical means, and is a
growing problem all over the world nowadays. Fraud deals with
cases involving criminal purposes that, mostly, are difficult to
identify.
Credit cards are one of the most famous targets of fraud
but not the only one; fraud can occur with any type of credit
products, such as personal loans, home loans, and retail.
Furthermore, the face of fraud has changed dramatically during the
last few decades as technologies have changed and developed. A
critical task to help businesses, and financial institutions including
banks is to take steps to prevent fraud and to deal with it efficiently
and effectively, when it does happen (Anderson, 2007).
4
HARNOOR KAUR NRO0517381
5
HARNOOR KAUR NRO0517381
B. Account takeover:
After stealing personal information, scammers contact credit card
7
HARNOOR KAUR NRO0517381
Description:
1. Registration:
- Here, user first need to registration themselves with details to
access the system.
2. Login:
- After a successful registration, user then need to login into the
system by inputting their credentials into the system.
3. Payment:
- User can select payment mode to perform transactions by
providing the card details like card no., CVV code, Expiry Date and
Holders name.
4. Verification:
- If the user performs a huge transaction then for security purpose,
the system will automatically redirect to the verification page to
verify the user and to prevent from misuse of card incase lost.
5. Feedback:
- Here, the user may provide feedback to the admin regarding the
working of the system.
6. Logout:
- After a successful transaction, user may logout from the system.
8
HARNOOR KAUR NRO0517381
PROPOSED SYSTEM
• In proposed system, I present a behavior and Location
Analysis (BLA).
• Which does not require fraud signatures and yet is able to
detect frauds by considering a card holder's spending habit.
• Card transaction processing sequence by the stochastic
process of a BLA.
• The details of items purchased in Individual transactions are
usually not known to any Fraud Detection System (FDS) running at
the bank that issues credit cards to the cardholders.
• Hence, I feel that BLA is an ideal choice for addressing this
problem.
• Another important advantage of the BLA - based approach is
a drastic reduction in the number of False Positives transactions
identified as malicious by an FDS although they are actually
genuine.
• An FDS runs at a credit card issuing bank. Each incoming
transaction is submitted to the FDS for verification.
• FDS receives the card details and the value of purchase to
verify, whether the transaction is genuine or not.
• The types of goods that are bought in that transaction are
not known to the FDS.
10
HARNOOR KAUR NRO0517381
PROJECT DESIGN
11
HARNOOR KAUR NRO0517381
SEQUENCE DIAGRAM
12
HARNOOR KAUR NRO0517381
ACTIVITY DIAGRAM
13
HARNOOR KAUR NRO0517381
CLASS DIAGRAM
14
HARNOOR KAUR NRO0517381
15
HARNOOR KAUR NRO0517381
DFD SYMBOLS:
16
HARNOOR KAUR NRO0517381
CONSTRUCTING A DFD:
Several of Rules Thumb are used in drawing DFD's:
1. Process should be named and numbered for an easy reference.
Each name should be representative of the process.
2. The direction of flow is from top to bottom and from left to
right. Data traditionally flow from source to the destination
although they may flow back to the source. One way to indicate
this is to draw long flow line back to a source. An alternative way is
to repeat the source symbol as a destination. Since it is used more
than once in the DFD it is marked with a short diagonal.
1. The DFD shows flow of data, not of control loops and decision
are controlled considerations do not appear on a DFD.
2. The DFD does not indicate the time factor involved in any
process whether the data flows take place daily, weekly, monthly
or yearly.
3. The sequence of events is not brought out on the DFD.
17
HARNOOR KAUR NRO0517381
FEASIBILITY REPORT
Feasibility Study is a high level capsule version of the entire
process intended to answer a number of questions like: What is
the problem? Is there any feasible solution to the given problem?
Is the problem even worth solving? Feasibility study is conducted
once the problem clearly understood. Feasibility study is necessary
to determine that the proposed system is Feasible by considering
the technical, Operational, and Economical factors. By having a
detailed feasibility study the management will have a clear-cut
view of the proposed system.
• Technical Feasibility
• Economic Feasibility
• Operational Feasibility
18
HARNOOR KAUR NRO0517381
TECHNICAL FEASIBILITY
In this step, we verify whether the proposed systems are
technically feasible or not. i.e., all the technologies required to
develop the system are available readily or not.
19
HARNOOR KAUR NRO0517381
ECONOMIC FEASIBILITY
Economically, this project is completely feasible because it
requires no extra financial investment and with respect to time, it's
completely possible to complete this project in 6 months.
• The cost of h/w and s/w for the class of application being
considered.
20
HARNOOR KAUR NRO0517381
OPERATIONAL FEASIBILITY
In this step, we verify different operational factors of the proposed
systems like man-power, time etc., whichever solution uses less
operational resources, is the best operationally feasible solution.
The solution should also be operationally possible to implement.
Operational Feasibility determines if the proposed system satisfied
user objectives could be fitted into the current system operation.
• The proposed system will not cause any problem under any
circumstances.
21
HARNOOR KAUR NRO0517381
TESTING
As the project is on bit large scale, we always need testing to
make it successful. If each components work properly in all respect
and gives desired output for all kind of inputs then project is said
to be successful. So the conclusion is-to make the project
successful, it needs to be tested.
The testing done here was System Testing checking whether
the user requirements were satisfied. The code for the new system
has been written completely using ASP.NET with C# as the coding
language, C# as the interface for front-end designing. The new
system has been tested well with the help of the users and all the
applications have been verified from every nook and corner of the
user.
Although some applications were found to be erroneous
these applications have been corrected before being
implemented. The flow of the forms has been found to be very
much in accordance with the actual flow of data.
22
HARNOOR KAUR NRO0517381
LEVELS OF TESTING
In order to uncover the errors present in different phases we
have the concept of levels of testing. The basic levels of testing
are:
23
HARNOOR KAUR NRO0517381
Integration Testing:
System testing:
Validation Testing:
24
HARNOOR KAUR NRO0517381
25
HARNOOR KAUR NRO0517381
ADVANTAGES OF PROJECT
• The system stores previous transaction patterns for each
user.
26
HARNOOR KAUR NRO0517381
27
HARNOOR KAUR NRO0517381
CONCLUSION
Clearly, credit card fraud is an act of criminal dishonesty.
This article has reviewed recent findings in the credit card field.
This paper has identified the different types of fraud, such as
bankruptcy fraud, counterfeit fraud, theft fraud, application fraud
and behavioral fraud, and discussed measures to detect them.
Such measures have included pair-wise matching, decision trees,
clustering techniques, neural networks, and genetic algorithms.
From an ethical perspective, it can be argued that banks and credit
card companies should attempt to detect all fraudulent cases. Yet,
the unprofessional fraudster is unlikely to operate on the scale of
the professional fraudster and so the costs to the bank of their
detection may be uneconomic. The bank would then be faced with
an ethical dilemma. They should they try to detect such fraudulent
cases or should they act in shareholder interests and avoid
uneconomic costs? As the next step in this research program, the
focus will be upon the implementation of a 'suspicious' scorecard
on a real data-set and its evaluation. The main tasks will be to build
scoring models to predict fraudulent behavior, taking into account
the fields of behavior that relate to the different types of credit
card fraud identified in this paper, and to evaluate the associated
ethical implications. The plan is to take one of the European
countries, probably Germany, and then to extend the research to
other EU countries.
28
HARNOOR KAUR NRO0517381
BIBLIOGRAPHY
Websites:
Wikipedia……………….https://en.wikipedia.org.
Synovus………………….https://www.synovus.com/resource-
center/fraud-prevention-and-security-hub/types-of-credit-card-
fraud.
ChatGPT…………………https://chatgpt.com/credit-card-fraud-
detection/design.
ScienceDirect…………https://www.sciencedirect.com/science/articl
e/pii/S1319157822004062#:~:text=Credit%20card%20fraud%20d.
29