Credit Card Fraud Detection Using Hidden Markov Models
#20
Credit Card Fraud Detection Using Hidden Markov Model
Abstract

Now a day the usage of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In this paper, we model the sequence of operations in credit card transaction processing using a Hidden Markov Model (HMM) and show how it can be used for the detection of frauds. An HMM is initially trained with the normal behavior of a cardholder. If an incoming credit card transaction is not accepted by the trained HMM with sufficiently high probability, it is considered to be fraudulent. At the same time, we try to ensure that genuine transactions are not rejected. We present detailed experimental results to show the effectiveness of our approach and compare it with other techniques available in the literature.
EXISTING SYSTEM:
In case of the existing system each and every system are considered as a trusted computer. And so the attacker finds it easy to attack the system with fake signals. And also in the emerging network where many are used for some good propos. And in those there a lot of chance for the attacker to send unwanted information. In case of the fire alarm, if all the system are considered as trusted they could send false alarm where it lead to a heavy loss. And so we need a system to protect it. Hence we develop a new system.
PROPOSED SYSTEM:
The proposed system we introduce a new technology to protect the network. This is achieved by the following way. Realizing widespread adoption of such applications
Mandates sufficiently trustworthy computers that can be realized at low cost. Apart from facilitating deployment of futuristic applications, the ability to realize trustworthy computers at low cost can also addresses many of the security issues that plague our existing network infrastructure. Although, at first sight, “inexpensive” and “trustworthy”
May seem mutually exclusive, a possible strategy is to reduce the complexity of the components inside the trusted boundary. The often heard statement that “complexity is the enemy of security” is far from dogmatic. For one, lower complexity implies better verifiability of compliance. Furthermore, keeping the complexity inside the trust boundary at low levels can obviate the need for proactive measures for heat dissipation. Strategies constrained to simultaneously facilitate shielding and heat dissipation tend to be expensive. On the other hand, unconstrained shielding strategies can be reliable and inexpensive to facilitate.
HARDWARE CONFIGURATION
The hardware used for the development of the project is:
PROCESSOR : PENTIUM III 766 MHz
RAM : 128 MD SD RAM
MONITOR : 15” COLOR
HARD DISK : 20 GB
FLOPPY DRIVE : 1.44 MB
CDDRIVE : LG 52X
KEYBOARD : STANDARD 102 KEYS
MOUSE : 3 BUTTONS
SOFTWARE CONFIGURATION
The software used for the development of the project is:
OPERATING SYSTEM : Windows 2000 Professional
ENVIRONMENT : Visual Studio .NET 2005
.NET FRAMEWORK : Version 2.0
LANGUAGE : VB.NET
WEB TECHNOLOGY : Active Server Pages.NET
WEB SERVER : Internet Information Server 5.0
BACK END : SQL SERVER 2000
REPORTS : Web Form Data Grid control




Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: credit card fraud detection rdbms project pdf, credit card theft detection using mems, mini projects based on credit card procesing, analysis on credit card fraud detection methods report, fraud detectioninhighvoltageelectricityconsumers, nexsan hidden pages, credit card fraud detection system,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
How I got some great free debt advice.. - by Charlescic - 04-09-2014, 11:31 PM
RE: Credit Card Fraud Detection Using Hidden Markov Models - by seminar class - 02-04-2011, 11:47 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  CREDIT CARD APPROVAL SYSTEM project report helper 6 5,899 15-01-2018, 04:12 PM
Last Post: Guest
  SUSPICIOUS EMAIL DETECTION seminar class 11 7,868 21-04-2016, 11:16 AM
Last Post: dhanabhagya
  DATA LEAKAGE DETECTION project topics 16 13,210 31-07-2015, 02:59 PM
Last Post: seminar report asees
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 2,996 26-05-2015, 03:04 PM
Last Post: seminar report asees
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 4,761 27-01-2015, 12:09 AM
Last Post: Guest
  Citizen card system project topics 12 10,973 14-10-2013, 08:39 PM
Last Post: Guest
  Digital Image Processing Techniques for the Detection and Removal of Cracks in Digiti electronics seminars 4 4,922 22-07-2013, 09:37 PM
Last Post: Guest
  OBSTACLE DETECTION AND AVOIDANCE ROBOT seminar surveyer 5 7,665 24-06-2013, 10:44 AM
Last Post: computer topic
  Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet electronics seminars 6 3,354 26-04-2013, 01:58 PM
Last Post: Guest
  Intelligent system for Gas, Human detection and Temperature Monitor control using GSM seminar surveyer 3 3,516 17-04-2013, 11:37 PM
Last Post: [email protected]

Forum Jump: