SlideShare a Scribd company logo
1 of 18
Presented By:
BIRAJADAR SONALI S.
Roll No:
1
COMPUTER SCIENCE AND INFORMATION TECHNOLOGY
Seminar on
Credit Card Fraud Detection Model Based on Apriori
Algorithm
Guided By:
Dr. B. M. Patil
MBES’s
College of Engineering, Ambajogai
CONTENT
2
• INTRODUCTION
• OBJECTIVE
• LITERATURE SURVEY
•METHODS
• FRAUD MINER
• CONCLUSION
• REFERENCES
3
• Gives an intelligent credit card fraud detection model
• It uses frequent itemset mining for finding legal as well as
fraud transaction patterns for each customer
• Fraudster gets access to credit card information in many ways
• The major problem for e-commerce business - fraudulent
transactions by legitimate ones
• Solved by using data minng technique
INTRODUCTION
4
• Some successful applications of various data mining techniques
Self-organizing maps
Neural network
Bayesian classifier
Fuzzy systems
Genetic algorithm
K-nearest neighbor
5
OBJECTIVE
• Develop a credit card fraud detection model which can effectively detect
frauds from imbalanced dataset
•Fraud detection model considered each attribute equally without giving
preference to any attribute in the dataset
•Proposed fraud detection model creates separate legal transaction
pattern (custumer buying behaviour pattern) and fraud transaction
pattern (fraudster behaviour pattern) for each customer and thus
converted the imbalanced credit card transaction dataset into a balanced
one to solve the problem of imbalance.
6
LITERATURE SURVEY
•CardWatch – First neural network based credit card fraud detection
•Ghosh and Reilly - A multilayer feed forward neural network based fraud
detection model for Mellon Bank.
•Duman and Ozcelik - A combination of genetic algorithm and scatter
search for improving the credit card fraud detection and the experimental
results show a performance improvement of 200%.
•Srivastava et al.- Proposed a credit card fraud detection model using
hidden Markov model
7
Material and Methods
1. Support Vector Machine
• First introduced by Cortes and Vapnik (1995) and they have been found to be very
successful in a variety of classification tasks
• Based on the conception of decision planes which define decision boundaries
• A decision plane is one that separates between a set of different classes
• This algorithms tend to construct a hyper plane as the decision plane which does
separate the samples into the two classes—positive and negative.
• SVMs comes from two main properties:
1) Kernel representation and
2) Margin optimization
• Higher accuracy and efficiency of credit card fraud detection
• Requires large training dataset sizes in order to achieve their maximum prediction
accuracy
8
2. K-Nearest Neighbor
• Stores all available instances then it classifies any new instances based
on a similarity measure
• Each new instance is compared with existing ones by using a distance
metric, and the closest existing instance is used to assign the class to the
new one
• Majority class of the closest K neighbors is assigned to the new instance
• KNN achieves consistently high performance
• Classify any incoming transaction by calculating nearest point to new
incoming transaction
9
3. Naive Bayes
• Supervised machine learning method
• Predict the class of future instances
• Attribute of a class variable is not related to the presence or absence
of any other attributes
• “Naïve” because it naïvely assumes independence of the attributes
• “Bayes” rule to calculate the probability of the correct class
• Have good performance in many complex real world datasets
10
4. Random Forest
• Ensemble of decision trees
• Ensemble methods is that a group of “weak learners” can come
together to form a “strong learner.”
• Random forests grow many decision trees
• Here each individual decision tree is a “weak learner,” while all the
decision trees taken together are a “strong learner.”
• Fast and they can efficiently handle unbalanced and large databases
with thousands of features.
11
FRAUD MINER
12
Training phase - legal transaction pattern and fraud transaction pattern
of each customer are created from their legal transactions and fraud
transactions, respectively, by using frequent itemset mining.
Testing phase - the matching algorithm detects to which pattern the
incoming transaction matches more
13
 If the incoming transaction is matching more with legal pattern of the
particular customer, then the algorithm returns “0” (i.e., legal
transaction)
 If the incoming transaction is matching more with fraud pattern of
that customer, then the algorithm returns “1” (i.e., fraudulent
transaction).
14
The training (pattern recognition) algorithm is given below.
Step 1. Separate each customer’s transactions from the whole transaction
database D.
Step 2. From each customer’s transactions separate his/her legal and fraud
transactions.
Step 3. Apply Apriori algorithm to the set of legal transactions of each
customer. The Apriori algorithm returns a set of frequent itemsets.
Take the largest frequent itemset as the legal pattern corresponding to
that customer. Store these legal patterns in legal pattern database.
Step 4. Apply Apriori algorithm to the set of fraud transactions of each
customer. The Apriori algorithm returns a set of frequent itemsets.
Take the largest frequent itemset as the fraud pattern corresponding to
that customer. Store these fraud patterns in fraud pattern database.
15
The matching (testing) algorithm is explained below.
Step 1. Count number of attributes in the incoming transaction matching
with that of the legal pattern of the corresponding customer. Let it be lc .
Step 2. Count the number of attributes in the incoming transaction matching
with that of the fraud pattern of the corresponding customer. Let it be fc .
Step 3. If fc=0 and lc is more than the user defined matching percentage, then
the incoming transaction is legal.
Step 4. If lc=0 and fc is more than the user defined matching percentage, then
the incoming transaction is fraud.
Step 5. If both fc and lc are greater than zero and fc > lc , then the incoming
transaction is fraud or else it is legal.
16
CONCLUSION
Proposed model works well with this kind of data since it is independent
of attribute values.
The second feature of the proposed model is its ability to handle class
imbalance.
The fraud detection model should be adaptive to these behavioral changes.
These behavioral changes can be incorporated into the proposed model by
updating the fraud and legal pattern databases
Moreover the proposed fraud detection method takes very less time, which
is also an important parameter of this real time application, because the
fraud detection is done by traversing the smaller pattern databases rather
than the large transaction database.
17
1. http://www.google.com/
2. Research Article Fraud Miner: A Novel Credit Card Fraud Detection Model Based
on Frequent Itemset Mining by K. R. Seeja and Masoumeh Zareapoor
3. M. Zareapoor, K. R. Seeja, and A. M. Alam, “Analyzing credit card: fraud detection
techniques based on certain design criteria,” International Journal of Computer
Application, vol. 52, no. 3, pp. 35–42, 2012.
4. D. Sánchez, M. A. Vila, L. Cerda, and J. M. Serrano, “Association rules applied to
credit card fraud detection,” Expert Systems with Applications, vol. 36, no. 2, pp.
3630–3640, 2009.
REFERENCES
18

More Related Content

What's hot

Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud DetectionBinayakreddy
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionkalpesh1908
 
Adaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud DetectionAdaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud DetectionAndrea Dal Pozzolo
 
Credit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
Credit Card Fraud Detection Using Unsupervised Machine Learning AlgorithmsCredit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
Credit Card Fraud Detection Using Unsupervised Machine Learning AlgorithmsHariteja Bodepudi
 
How to identify credit card fraud
How to identify credit card fraudHow to identify credit card fraud
How to identify credit card fraudHenley Walls
 
Credit card fraud detection through machine learning
Credit card fraud detection through machine learningCredit card fraud detection through machine learning
Credit card fraud detection through machine learningdataalcott
 
Credit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksCredit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksDatabricks
 
A Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine LearningA Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine Learningijtsrd
 
Credit card payment_fraud_detection
Credit card payment_fraud_detectionCredit card payment_fraud_detection
Credit card payment_fraud_detectionPEIPEI HAN
 
Detecting fraud with Python and machine learning
Detecting fraud with Python and machine learningDetecting fraud with Python and machine learning
Detecting fraud with Python and machine learningwgyn
 
Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)ajmal anbu
 
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionExample-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionAlejandro Correa Bahnsen, PhD
 
credit card fraud detection
credit card fraud detectioncredit card fraud detection
credit card fraud detectionjagan477830
 
Fraud detection ML
Fraud detection MLFraud detection ML
Fraud detection MLMaatougSelim
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionJustluk Luk
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)k.surya kumar
 
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...Melissa Moody
 
Short-Story-Writing 255.pptx
Short-Story-Writing 255.pptxShort-Story-Writing 255.pptx
Short-Story-Writing 255.pptxSravaniRaparla
 

What's hot (20)

Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detection
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Adaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud DetectionAdaptive Machine Learning for Credit Card Fraud Detection
Adaptive Machine Learning for Credit Card Fraud Detection
 
Credit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
Credit Card Fraud Detection Using Unsupervised Machine Learning AlgorithmsCredit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
Credit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
 
How to identify credit card fraud
How to identify credit card fraudHow to identify credit card fraud
How to identify credit card fraud
 
Credit card fraud detection through machine learning
Credit card fraud detection through machine learningCredit card fraud detection through machine learning
Credit card fraud detection through machine learning
 
Credit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksCredit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In Databricks
 
A Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine LearningA Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine Learning
 
Credit card payment_fraud_detection
Credit card payment_fraud_detectionCredit card payment_fraud_detection
Credit card payment_fraud_detection
 
Detecting fraud with Python and machine learning
Detecting fraud with Python and machine learningDetecting fraud with Python and machine learning
Detecting fraud with Python and machine learning
 
Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)
 
CREDIT_CARD.ppt
CREDIT_CARD.pptCREDIT_CARD.ppt
CREDIT_CARD.ppt
 
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionExample-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
 
credit card fraud detection
credit card fraud detectioncredit card fraud detection
credit card fraud detection
 
Fraud detection ML
Fraud detection MLFraud detection ML
Fraud detection ML
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)
 
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
Improving Credit Card Fraud Detection: Using Machine Learning to Profile and ...
 
House price prediction
House price predictionHouse price prediction
House price prediction
 
Short-Story-Writing 255.pptx
Short-Story-Writing 255.pptxShort-Story-Writing 255.pptx
Short-Story-Writing 255.pptx
 

Similar to Credit card fraud dection

Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfShrutiGarg649495
 
A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...
A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...
A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...Shakas Technologies
 
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxShare Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxyatintaneja6
 
Nasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningNasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningRatnakar Pandey
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...IRJET Journal
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesIJSRD
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...IRJET Journal
 
Brighterion bai july 2016 fraud white paper
Brighterion bai july 2016 fraud white paperBrighterion bai july 2016 fraud white paper
Brighterion bai july 2016 fraud white paperAndrew Morrison
 
IRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET Journal
 
Mobile fraud detection using neural networks
Mobile fraud detection using neural networksMobile fraud detection using neural networks
Mobile fraud detection using neural networksVidhya Moorthy
 
Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyIJMER
 
Meta Classification Technique for Improving Credit Card Fraud Detection
Meta Classification Technique for Improving Credit Card Fraud Detection Meta Classification Technique for Improving Credit Card Fraud Detection
Meta Classification Technique for Improving Credit Card Fraud Detection IJSTA
 
IRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection AnalysisIRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection AnalysisIRJET Journal
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Predictive analytics in financial service
Predictive analytics in financial servicePredictive analytics in financial service
Predictive analytics in financial servicePrasad Narasimhan
 

Similar to Credit card fraud dection (20)

Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
 
Project PPT sem 2.pptx
Project PPT sem 2.pptxProject PPT sem 2.pptx
Project PPT sem 2.pptx
 
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptxCredit Card Fraud Detection_ Mansi_Choudhary.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
 
A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...
A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...
A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...
 
credit card.pptx
credit card.pptxcredit card.pptx
credit card.pptx
 
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxShare Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
 
Nasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningNasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learning
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
 
Brighterion bai july 2016 fraud white paper
Brighterion bai july 2016 fraud white paperBrighterion bai july 2016 fraud white paper
Brighterion bai july 2016 fraud white paper
 
IRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine Learning
 
Mobile fraud detection using neural networks
Mobile fraud detection using neural networksMobile fraud detection using neural networks
Mobile fraud detection using neural networks
 
Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A Survey
 
Meta Classification Technique for Improving Credit Card Fraud Detection
Meta Classification Technique for Improving Credit Card Fraud Detection Meta Classification Technique for Improving Credit Card Fraud Detection
Meta Classification Technique for Improving Credit Card Fraud Detection
 
IRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection AnalysisIRJET- Credit Card Fraud Detection Analysis
IRJET- Credit Card Fraud Detection Analysis
 
Clickstream ppt copy
Clickstream ppt   copyClickstream ppt   copy
Clickstream ppt copy
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Predictive analytics in financial service
Predictive analytics in financial servicePredictive analytics in financial service
Predictive analytics in financial service
 

Recently uploaded

Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITmanoharjgpsolutions
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldRoberto Pérez Alcolea
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencessuser9e7c64
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdfAndrey Devyatkin
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 

Recently uploaded (20)

Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh IT
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
Keeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository worldKeeping your build tool updated in a multi repository world
Keeping your build tool updated in a multi repository world
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conference
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
2024-04-09 - From Complexity to Clarity - AWS Summit AMS.pdf
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 

Credit card fraud dection

  • 1. Presented By: BIRAJADAR SONALI S. Roll No: 1 COMPUTER SCIENCE AND INFORMATION TECHNOLOGY Seminar on Credit Card Fraud Detection Model Based on Apriori Algorithm Guided By: Dr. B. M. Patil MBES’s College of Engineering, Ambajogai
  • 2. CONTENT 2 • INTRODUCTION • OBJECTIVE • LITERATURE SURVEY •METHODS • FRAUD MINER • CONCLUSION • REFERENCES
  • 3. 3 • Gives an intelligent credit card fraud detection model • It uses frequent itemset mining for finding legal as well as fraud transaction patterns for each customer • Fraudster gets access to credit card information in many ways • The major problem for e-commerce business - fraudulent transactions by legitimate ones • Solved by using data minng technique INTRODUCTION
  • 4. 4 • Some successful applications of various data mining techniques Self-organizing maps Neural network Bayesian classifier Fuzzy systems Genetic algorithm K-nearest neighbor
  • 5. 5 OBJECTIVE • Develop a credit card fraud detection model which can effectively detect frauds from imbalanced dataset •Fraud detection model considered each attribute equally without giving preference to any attribute in the dataset •Proposed fraud detection model creates separate legal transaction pattern (custumer buying behaviour pattern) and fraud transaction pattern (fraudster behaviour pattern) for each customer and thus converted the imbalanced credit card transaction dataset into a balanced one to solve the problem of imbalance.
  • 6. 6 LITERATURE SURVEY •CardWatch – First neural network based credit card fraud detection •Ghosh and Reilly - A multilayer feed forward neural network based fraud detection model for Mellon Bank. •Duman and Ozcelik - A combination of genetic algorithm and scatter search for improving the credit card fraud detection and the experimental results show a performance improvement of 200%. •Srivastava et al.- Proposed a credit card fraud detection model using hidden Markov model
  • 7. 7 Material and Methods 1. Support Vector Machine • First introduced by Cortes and Vapnik (1995) and they have been found to be very successful in a variety of classification tasks • Based on the conception of decision planes which define decision boundaries • A decision plane is one that separates between a set of different classes • This algorithms tend to construct a hyper plane as the decision plane which does separate the samples into the two classes—positive and negative. • SVMs comes from two main properties: 1) Kernel representation and 2) Margin optimization • Higher accuracy and efficiency of credit card fraud detection • Requires large training dataset sizes in order to achieve their maximum prediction accuracy
  • 8. 8 2. K-Nearest Neighbor • Stores all available instances then it classifies any new instances based on a similarity measure • Each new instance is compared with existing ones by using a distance metric, and the closest existing instance is used to assign the class to the new one • Majority class of the closest K neighbors is assigned to the new instance • KNN achieves consistently high performance • Classify any incoming transaction by calculating nearest point to new incoming transaction
  • 9. 9 3. Naive Bayes • Supervised machine learning method • Predict the class of future instances • Attribute of a class variable is not related to the presence or absence of any other attributes • “Naïve” because it naïvely assumes independence of the attributes • “Bayes” rule to calculate the probability of the correct class • Have good performance in many complex real world datasets
  • 10. 10 4. Random Forest • Ensemble of decision trees • Ensemble methods is that a group of “weak learners” can come together to form a “strong learner.” • Random forests grow many decision trees • Here each individual decision tree is a “weak learner,” while all the decision trees taken together are a “strong learner.” • Fast and they can efficiently handle unbalanced and large databases with thousands of features.
  • 12. 12 Training phase - legal transaction pattern and fraud transaction pattern of each customer are created from their legal transactions and fraud transactions, respectively, by using frequent itemset mining. Testing phase - the matching algorithm detects to which pattern the incoming transaction matches more
  • 13. 13  If the incoming transaction is matching more with legal pattern of the particular customer, then the algorithm returns “0” (i.e., legal transaction)  If the incoming transaction is matching more with fraud pattern of that customer, then the algorithm returns “1” (i.e., fraudulent transaction).
  • 14. 14 The training (pattern recognition) algorithm is given below. Step 1. Separate each customer’s transactions from the whole transaction database D. Step 2. From each customer’s transactions separate his/her legal and fraud transactions. Step 3. Apply Apriori algorithm to the set of legal transactions of each customer. The Apriori algorithm returns a set of frequent itemsets. Take the largest frequent itemset as the legal pattern corresponding to that customer. Store these legal patterns in legal pattern database. Step 4. Apply Apriori algorithm to the set of fraud transactions of each customer. The Apriori algorithm returns a set of frequent itemsets. Take the largest frequent itemset as the fraud pattern corresponding to that customer. Store these fraud patterns in fraud pattern database.
  • 15. 15 The matching (testing) algorithm is explained below. Step 1. Count number of attributes in the incoming transaction matching with that of the legal pattern of the corresponding customer. Let it be lc . Step 2. Count the number of attributes in the incoming transaction matching with that of the fraud pattern of the corresponding customer. Let it be fc . Step 3. If fc=0 and lc is more than the user defined matching percentage, then the incoming transaction is legal. Step 4. If lc=0 and fc is more than the user defined matching percentage, then the incoming transaction is fraud. Step 5. If both fc and lc are greater than zero and fc > lc , then the incoming transaction is fraud or else it is legal.
  • 16. 16 CONCLUSION Proposed model works well with this kind of data since it is independent of attribute values. The second feature of the proposed model is its ability to handle class imbalance. The fraud detection model should be adaptive to these behavioral changes. These behavioral changes can be incorporated into the proposed model by updating the fraud and legal pattern databases Moreover the proposed fraud detection method takes very less time, which is also an important parameter of this real time application, because the fraud detection is done by traversing the smaller pattern databases rather than the large transaction database.
  • 17. 17 1. http://www.google.com/ 2. Research Article Fraud Miner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining by K. R. Seeja and Masoumeh Zareapoor 3. M. Zareapoor, K. R. Seeja, and A. M. Alam, “Analyzing credit card: fraud detection techniques based on certain design criteria,” International Journal of Computer Application, vol. 52, no. 3, pp. 35–42, 2012. 4. D. Sánchez, M. A. Vila, L. Cerda, and J. M. Serrano, “Association rules applied to credit card fraud detection,” Expert Systems with Applications, vol. 36, no. 2, pp. 3630–3640, 2009. REFERENCES
  • 18. 18