Professional Documents
Culture Documents
Credit Card Fraud Detection S2
Credit Card Fraud Detection S2
BY
(MCA/40038/20)
Department of CSE
(MO 2022)
DECLARATION CERTIFICATE
This is to certify that the work presented in the project entitled “CREDIT CARD
best of my knowledge, the content of this project does not form a basis for the
Academic Coordinator
Department of Comp. Sc. & Engg. Director/ In-charge
Birla Institute of Technology, Lalpur Birla Institute of Technology, Lalpur
Ranchi – 834001 Ranchi – 834001
CERTIFICATE OF APPROVAL
(Director/In-charge)
BITOC, Lalpur, Ranchi
Acknowledgement
Introduction
For some time, there has been a strong interest in the ethics of banking
(Molyneaux, 2007; George, 1992), as well as the moral complexity of
fraudulent behavior (Clarke, 1994). Fraud means obtaining services/goods
and/or money by unethical means, and is a growing problem all over the world
nowadays. Fraud deals with cases involving criminal purposes that, mostly, are
difficult to identify.
Credit cards are one of the most famous targets of fraud but not the
only one; fraud can occur with any type of credit products, such as personal
loans, home loans, and retail. Furthermore, the face of fraud has changed
dramatically during the last few decades as technologies have changed and
developed. A critical task to help businesses, and financial institutions including
banks is to take steps to prevent fraud and to deal with it efficiently and
effectively, when it does happen (Anderson, 2007).
Anderson (2007) has identified and explained the different types of
fraud, which are as many and varied as the financial institution’s products and
technologies, as shown in below figure.
The main aims are, firstly, to identify the different types of credit card
fraud, and, secondly, to review alternative techniques that have been used in
fraud detection. The focus here is in Europe, and so ethical issues arising from
other cultures are not taken into account; but for a discussion of these the
reader is referred to Chepaitis (1997) and Gichure (2000).
Indeed, transaction products, including credit cards, are the most
vulnerable to fraud. On the other hand, other products such as personal loans
and retail are also at risk, and have serious ethical
Modules and their Description
1. Registration
2. Login
3. Payment
4. Verification
5. Feedback
6. Logout
Description:
1. Registration:
- Here, user first need to registration themselves with details to access
the system.
2. Login:
- After a successful registration, user then need to login into the
system by inputting their credentials into the system.
3. Payment
- User can select payment mode to perform transactions by providing
the card details like card no., CVV code, Expiry Date and Holders
name.
4. Verification:
- If the user performs a huge transaction then for security purpose, the
system will automatically redirect to the verification page to verify
the user and to prevent from misuse of card incase lost.
5. Feedback:
- Here, the user may provide feedback to the admin regarding the
working of the system.
6. Logout:
- After a successful transaction, user may logout from the system.
Existing System & Proposed System
Admin_id
Admin
Name Password
Password
provides
User_id
Name Payment
Gender
New User
Registration
Address
Update
Details
Verification
Mobile No.
Email id
User id Password
Use Case Diagram
Sequence Diagram
Activity Diagram
Class Diagram
ADMIN
- Admin_id : String
- Password : String
+ Login()
+ btn_Click ()
+ Logout ()
Data Flow Diagram
The idea behind the explosion of a process into more process is that
understanding at one level of detail is exploded into greater detail at the next
level. This is done until further explosion is necessary and an adequate
amount of detail is described for analyst to understand the process.
Larry Constantine first developed the DFD as a way of expressing system
requirements in a graphical from, this lead to the modular design.
DFD SYMBOLS:
Data flow
Data Store
CONSTRUCTING A DFD:
1. Process should be named and numbered for an easy reference. Each name
should be representative of the process.
2. The direction of flow is from top to bottom and from left to right. Data
traditionally flow from source to the destination although they may flow
back to the source. One way to indicate this is to draw long flow line back
to a source. An alternative way is to repeat the source symbol as a
destination. Since it is used more than once in the DFD it is marked with a
short diagonal.
3. When a process is exploded into lower level details, they are numbered.
4. The names of data stores and destinations are written in capital letters.
Process and dataflow names have the first letter of each work capitalized
A DFD typically shows the minimum contents of data store. Each data store
should contain all the data elements that flow in and out.
Questionnaires should contain all the data elements that flow in and out.
Missing interfaces redundancies and like is then accounted for often through
interviews.
1. The DFD shows flow of data, not of control loops and decision are
controlled considerations do not appear on a DFD.
2. The DFD does not indicate the time factor involved in any process
whether the data flows take place daily, weekly, monthly or yearly.
3. The sequence of events is not brought out on the DFD.
TYPES OF DATA FLOW DIAGRAMS
1. Current Physical
2. Current Logical
3. New Logical
4. New Physical
CURRENT PHYSICAL:
CURRENT LOGICAL:
This is exactly like a current logical model if the user were completely
happy with the user were completely happy with the functionality of the
current system but had problems with how it was implemented typically
through the new logical model will differ from current logical model while
having additional functions, absolute function removal and inefficient flows
recognized.
NEW PHYSICAL:
PROCESS
1) No process can have only outputs.
2) No process can have only inputs. If an object has only inputs than it
must be a sink.
3) A process has a verb phrase label.
DATA STORE
1) Data cannot move directly from one data store to another data store,
a process must move data.
2) Data cannot move directly from an outside source to a data store, a
process, which receives, must move data from the source and place
the data into data store
3) A data store has a noun phrase label.
SOURCE OR SINK
The origin and /or destination of data.
DATA FLOW
1) A Data Flow has only one direction of flow between symbols. It may
flow in both directions between a process and a data store to show a
read before an update. The later it usually indicated however by two
separate arrows since these happen at different type.
2) A join in DFD means that exactly the same data comes from any of
two or more different processes data store or sink to a common
location.
3) A data flow cannot go directly back to the same process it leads.
There must be at least one other process that handles the data flow
produce some other data flow returns the original data into the
beginning process.
4) A Data flow to a data store means update (delete or change).
5) A data Flow from a data store means retrieve or use.
Data Flow Diagrams
1.0
Query
User Query Process 0.0 Check for user
Request Requirement
Credit Card Fraud
User Detection System Database
DB
User need
1.1
Feedback For
Relevant Database
User Data
DATABASE DETAIL
LEVEL 1 DFD
LEVEL 2 DFD: PREDICTION
Query 2.0
User Accept
Query
2.2
Snapshots
PROJECT IMPLEMENTATION
The Project is loaded in Visual Studio 2010. We used Visual Studio for
Design and coding of project. Created and maintained all databases into SQL
Server 2008, in that we create tables, write query for store data or record of
project.
Hardware Requirement:-
Software Requirement:
Technical Feasibility
Economic Feasibility
Operational Feasibility
In this phase, we study the feasibility of all proposed systems, and pick the
best feasible solution for the problem. The feasibility is studied based on three
main factors as follows.
Technical Feasibility
The testing done here was System Testing checking whether the user
requirements were satisfied. The code for the new system has been written
completely using ASP .NET with C# as the coding language, C# as the interface
for front-end designing. The new system has been tested well with the help of
the users and all the applications have been verified from every nook and
corner of the user.
A series of testing is done for the proposed system before the system
is ready for the user acceptance testing.
The steps involved in Testing are:
Unit Testing
Integration Testing
Validation Testing
For the hard copy also the output comes as the specified
requirements by the users. Hence output testing does not result any
corrections in the system.
1) Load Balancing:
Since the system will be available only the admin logs in the
amount of load on server will be limited to time period of admin access.
2) Easy Accessibility:
Records can be easily accessed and store and other information
respectively.
3) User Friendly:
The system will be giving a very user friendly approach for all user.
5) Easy maintenance:
Credit Card Fraud Detection System is design as easy way. So
maintenance is also easy.
CONCLUSION
Clearly, credit card fraud is an act of criminal dishonesty. This article has
reviewed recent findings in the credit card field. This paper has identified the
different types of fraud, such as bankruptcy fraud, counterfeit fraud, theft
fraud, application fraud and behavioral fraud, and discussed measures to
detect them. Such measures have included pair-wise matching, decision trees,
clustering techniques, neural networks, and genetic algorithms. From an
ethical perspective, it can be argued that banks and credit card companies
should attempt to detect all fraudulent cases. Yet, the unprofessional fraudster
is unlikely to operate on the scale of the professional fraudster and so the
costs to the bank of their detection may be uneconomic. The bank would then
be faced with an ethical dilemma. Should they try to detect such fraudulent
cases or should they act in shareholder interests and avoid uneconomic costs?
As the next step in this research program, the focus will be upon the
implementation of a ‘suspicious’ scorecard on a real data-set and its
evaluation. The main tasks will be to build scoring models to predict fraudulent
behavior, taking into account the fields of behavior that relate to the different
types of credit card fraud identified in this paper, and to evaluate the
associated ethical implications. The plan is to take one of the European
countries, probably Germany, and then to extend the research to other EU
countries.
BIBLIOGRAPHY
► Websites
en.wikipedia.org