SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1103
A Review of deep learning techniques in detection of anomaly incredit
card transaction.
Kiran Kumar M 1, Junaid Ahmed S.Y 2, Mohammed Faizan Ghani 3, Husama PM 4,
Mahesh Basavaraj 5
1,2,3,4 Students, Department of Computer Science & Engineering, T John Institute of Technology,Bengaluru, India
5Asst. Professor, Department of Computer Science & Engineering, T John Institute of Technology, Bengaluru.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Credit card fraud is a common occurrence that
causes enormous financial losses. Online purchases have
dramatically expanded, and a major portion of those
purchases are made using credit cards. As a result, banks
and other financial organizations fund the development of
software that identify credit card fraud. Fraudulent
transactions can occur in a variety of ways and fall undera
number of distinct categories. Credit card firms need to
identify fraudulent credit card transactions in order to
avoid having their customers’ accounts charged for goods
they did not buy. Machine learning and data science aid in
resolving these problems. The legal transactions are mixedin
with the fraudulent transactions, so it is impossible to
effectively identify the fraudulent transactions using
simple identification approaches that compare both the
fraudulent and legitimate data. With the use of credit card
fraud detection, this research aims to demonstrate the
modelling of a knowledge set using machine learning. Our
objective is to eliminate erroneous fraud classifications
while detecting 100% of fraudulent transactions. A typical
categorization sample would be credit card fraud
detection. On the PCA converted Credit Card Transaction
data, we concentrated on analyzing andpre-processing data
sets, as well as deploying numerous anomaly detection
techniques such as the Local Outlier Factor and Isolation
Forest algorithm, as well as one classSVM (Support Vector
Machine).
Key Words: Credit Card Fraud Detection, Support
Vector Machine, Data Science, Local Outlier Factor, and
Isolation Forest Algorithm
1.INTRODUCTION
Groups like machine learning and data science should pay
attention to this issue because it has the potential to be
automatically resolved. This problem is quite challenging
from a learning perspective because there are far more
legitimate transactions than fraudulent ones. Additionally,
over time, statistical aspects cause the transaction patterns
to change often or regularly. With numerous frauds,
primarily the majority of people in the world are
concerned about credit card scams because they have been
in the news so regularly recently. The credit card database
is seriously affected when a legitimate transaction is
contrasted against a fraudulent one. Banksare switching to
EMV cards, smart cards that store data on integrated
circuits rather than magnetic stripes as technology
progresses, enabling on-card transactions.
1.1 MOTIVATION
Fraudsters have improved their techniques over time in
order to evade discovery, along with the technologies used
to detect fraud. Even though there are many reported
research on the use of data mining methodologies for credit
card fraud detection, predictivemodels for credit card fraud
detection are still actively used in practice.
1.2 OBJECTIVES
Methods for detecting credit card fraud must always be
improved. In an effort to better detect credit card fraud,we
compare the two cutting-edge data mining techniques known
as support vector machines and random forests against the
well-known logistic regression.
1.3 PROBLEM STATEMENT
Financial loss from fraud is rising dramatically, whichhas led
to a significant increase in credit card scams. Farad
LIERTV918070649 causes billions of dollars in losses per
year. There isn’t enough study to examinethe fraud. To find
actual credit card fraud in the wild,many machine learning
techniques are used.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1104
1.4 Machine Learning Using Python
A smart and popular programming language is Python.
Python supports a wide range of libraries, including
pandas, NumPy, SciPy, matplotlib, etc. It supports a variety
of packages, including Xlsx, Writer, and X1Rd. It isused to
conduct complex science very effectively. There are many
useful Python frameworks available. With the use of data,
machine learning, a subfield of artificial intelligence,
enables computer frameworks to learn new abilities and
improve their performance. It is used to conduct research
on the creation of computer-based algorithms for data
prediction. The process of machine learning begins with the
provision of data, after which the computers are taught
using a range of algorithms to produce machine learning
models
1.5 Table Dataset
2 System Architecture
A Basic System Architecture of Credit Card Fraud Detection
Analysis.
2.1 Credit Card Fraud Detection
As you can see, there does appear to be a correlation
between several of our predictors and the class variable.
Despite the large number of factors, there appear to be few
significant relationships.
1. Since a PCA was used to prepare the data, our predictors
are principal components. 2. Due to the extreme class
imbalance, some correlations with respect to our class
variable may not be as significant.
2.2 About dataset
The files include credit card transactions done by European
cardholders in September 2013. We have 492 frauds out of
284,807 transactions in our dataset oftransactions that took
place over the course of two days.
2.3 System Framework
It illustrates the steps taken to create the model. The figure
illustrates the crucial stages that went into creating the
suggested model. Following a series of actions like data
processing, data cleansing, and feature extraction,
classification is finally carried out.
The dataset is very skewed,
with frauds making up 0.172% of all transactions in the
positive class. It only has numeric input variables that have
undergone PCA transformation. Unfortunately, we are
unable to offer the original characteristics and additional
context for the data due to confidentiality concerns. The
principal components obtained with PCA are features V1,
V2,..., V28. The only features that have not been changed
with PCA are Time and Amount. The seconds that passed
between each transaction and the datasets first transaction
are listed in the feature Time.
2.4 Results And Discussion
Without a doubt, the Random Forest model outperforms
Decision Trees. However, if we look at our dataset,wecansee
that there is a significant class imbalance. The number of
legitimate (fraud-free) deals exceeds 99, while the number
of fraudulent deals is 0.17. If we train our model using a
comparable distribution without considering theimbalance
problems, it predicts the label with higher significance
assigned to actual deals (since there is moreevidence about
them) and so acquires additional fragility. There are a
variety of viable methods for resolving the class imbalance
issue. One of them is overslicing. After oversampling, the
accuracy scores and the confusionmatrix are calculated.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1105
The Random Forest model performs significantly better
than Decision Trees. But our dataset reveals a large class
imbalance, as can be seen. There are more than 99 valid
(fraud-free) transactions compared to just 0.17 fraudulent
transactions. Our model predicts the label with higher
importance attributed to actual deals (because there is
more data about them) and hence develops additional
fragility if we train it using a comparable distribution
without taking the imbalance problems into account.There
are many effective ways to address the class imbalance
problem. One of them is cutting too thin. The accuracy
ratings and the confusion matrix are computed following
oversampling.
2.5 Future enhancements
The accuracy score for our machine model that detects
credit card transaction fraud should be 100%, with 100%as
the aim. But when we achieve a score of 100% accuracy, we
can deduce that our model is being over- fitted with data,
giving us the results for which it has already been trained.
Therefore, we can say that the precision and confusion
matrix values can be enhanced with a wide range for future
improvements. The transaction dataset for European credit
card holders canalso be updated with new algorithms, and
the results of these algorithms precision and confusion
matrices can be combined to get more accurate numbers.
The data collection can also be made better by normalising
the extremely skewed numbers and matrices .
3 CONCLUSION
The detection of credit card fraud has long been a goal of
testing for academics, and it will continue to be an
intriguing aspect of testing in the future. By using three
different algorithms and training our machine using the
transaction information we have, we are launching a fraud
detection solution for credit cards. With the aid of the model
we developed, the authorities are better able toidentify credit
card fraud, investigate it further, and determine if it was a
fraudulent or valid transaction. These algorithms tell us
whether a given transaction has a tendency to be fraud or
not; they were chosen using the feature importance,
discussion, and experimentation methods as described in
the methodology.
We consider ourselves quite fortunate to have received this
support over the course of our project because the success
and outcome of this project required a great dealof direction
and assistance from many people. We wont forget to thank
them for their guidance and support, which are the sole
reasons we were able to do what we did. Mr. Puneet
Goswami, Head of the Department, Department of Computer
Science and Engineering, and Dr. Paramjit S. Jaswal, Vice-
Chancellor, SRM University, for giving all the necessary
resources for the completion of my seminar. Mrs.Ishwari
Singh, who served as our guide, forher insightful advice and
help with the study report. Finally, we would want to
express our gratitude to everyone.
[1] Yvan Lucas, Pierre-Edouard Portier, Lea Laporte ,
Sylvie Calabretto, Liyun He-Guelon, Frederic Oble and
Michael Granitzer , IEEE Explore2019.
[2] Chunzhi, WangYichao, WangZhiwei, YeLingyu ,
Yuecheng Cai ,The 13th International Conference on
Computer Science & Education.
[3] Addisson Salazar, Gonzalo Safont, Luis Vergara,
International Conference on Computational Scienceand
Computational Intelligence (CSCI), 2019
[4] Anu Maria Babu , Dr. Anju Pratap , IEEE EXPLORE
,2020
[5] Vinod Jain, Mayank Agarwal , Anuj Kumar ,
International Conference on Reliability, Infocom
Technologies and Optimization (Trends and Future
Directions) (ICRITO) , 2020.
4 ACKNOWLEDGEMENT
5 REFERENCES
[6] Fahimeh Ghobadi , Mohsen Rohani , ICSPIS ,2016.
[7] SP Maniraj , Aditya Saini, Swarna Deep Sarkar Shadab
Ahmed , International Journal of Engineering Research
& Technology (IJERT) , 2019..
[8] Adwait A. Rajmane, Piyush S. Mahajan, Akshay D.Kolhe,
Sandhya S. Khot , International Journal of Engineering
Research & Technology (IJERT) , 2021.
[9] SIMI MJ , International Journal of EngineeringResearch
& Technology (IJERT), 2019.
[10] Arya Chandorkar , JOURNAL-International Journal of
Engineering Research & Technology (IJERT), 2022.

Weitere ähnliche Inhalte

Ähnlich wie A Review of deep learning techniques in detection of anomaly incredit card transaction

Ähnlich wie A Review of deep learning techniques in detection of anomaly incredit card transaction (20)

An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud Detection
 
IRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud DetectionIRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud Detection
 
IRJET- Survey on Credit Card Security System for Bank Transaction using N...
IRJET-  	  Survey on Credit Card Security System for Bank Transaction using N...IRJET-  	  Survey on Credit Card Security System for Bank Transaction using N...
IRJET- Survey on Credit Card Security System for Bank Transaction using N...
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
 
IRJET- Fraud Detection Algorithms for a Credit Card
IRJET- Fraud Detection Algorithms for a Credit CardIRJET- Fraud Detection Algorithms for a Credit Card
IRJET- Fraud Detection Algorithms for a Credit Card
 
Online Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningOnline Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine Learning
 
ATM fraud detection system using machine learning algorithms
ATM fraud detection system using machine learning algorithmsATM fraud detection system using machine learning algorithms
ATM fraud detection system using machine learning algorithms
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
MACHINE LEARNING ALGORITHMS FOR CREDIT CARD FRAUD DETECTION
MACHINE LEARNING ALGORITHMS FOR CREDIT CARD FRAUD DETECTIONMACHINE LEARNING ALGORITHMS FOR CREDIT CARD FRAUD DETECTION
MACHINE LEARNING ALGORITHMS FOR CREDIT CARD FRAUD DETECTION
 
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxShare Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation Forest
 
Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...
Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...
Unfolding the Credit Card Fraud Detection Technique by Implementing SVM Algor...
 
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNINGCREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
 
Credit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
Credit Card Fraud Detection Using Unsupervised Machine Learning AlgorithmsCredit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
Credit Card Fraud Detection Using Unsupervised Machine Learning Algorithms
 
Tax Prediction Using Machine Learning
Tax Prediction Using Machine LearningTax Prediction Using Machine Learning
Tax Prediction Using Machine Learning
 
CREDIT CARD FRAUD DETECTION USING PREDICTIVE MODELLING
CREDIT CARD FRAUD DETECTION USING PREDICTIVE MODELLINGCREDIT CARD FRAUD DETECTION USING PREDICTIVE MODELLING
CREDIT CARD FRAUD DETECTION USING PREDICTIVE MODELLING
 
Loan Analysis Predicting Defaulters
Loan Analysis Predicting DefaultersLoan Analysis Predicting Defaulters
Loan Analysis Predicting Defaulters
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Kürzlich hochgeladen (20)

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

A Review of deep learning techniques in detection of anomaly incredit card transaction

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1103 A Review of deep learning techniques in detection of anomaly incredit card transaction. Kiran Kumar M 1, Junaid Ahmed S.Y 2, Mohammed Faizan Ghani 3, Husama PM 4, Mahesh Basavaraj 5 1,2,3,4 Students, Department of Computer Science & Engineering, T John Institute of Technology,Bengaluru, India 5Asst. Professor, Department of Computer Science & Engineering, T John Institute of Technology, Bengaluru. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Credit card fraud is a common occurrence that causes enormous financial losses. Online purchases have dramatically expanded, and a major portion of those purchases are made using credit cards. As a result, banks and other financial organizations fund the development of software that identify credit card fraud. Fraudulent transactions can occur in a variety of ways and fall undera number of distinct categories. Credit card firms need to identify fraudulent credit card transactions in order to avoid having their customers’ accounts charged for goods they did not buy. Machine learning and data science aid in resolving these problems. The legal transactions are mixedin with the fraudulent transactions, so it is impossible to effectively identify the fraudulent transactions using simple identification approaches that compare both the fraudulent and legitimate data. With the use of credit card fraud detection, this research aims to demonstrate the modelling of a knowledge set using machine learning. Our objective is to eliminate erroneous fraud classifications while detecting 100% of fraudulent transactions. A typical categorization sample would be credit card fraud detection. On the PCA converted Credit Card Transaction data, we concentrated on analyzing andpre-processing data sets, as well as deploying numerous anomaly detection techniques such as the Local Outlier Factor and Isolation Forest algorithm, as well as one classSVM (Support Vector Machine). Key Words: Credit Card Fraud Detection, Support Vector Machine, Data Science, Local Outlier Factor, and Isolation Forest Algorithm 1.INTRODUCTION Groups like machine learning and data science should pay attention to this issue because it has the potential to be automatically resolved. This problem is quite challenging from a learning perspective because there are far more legitimate transactions than fraudulent ones. Additionally, over time, statistical aspects cause the transaction patterns to change often or regularly. With numerous frauds, primarily the majority of people in the world are concerned about credit card scams because they have been in the news so regularly recently. The credit card database is seriously affected when a legitimate transaction is contrasted against a fraudulent one. Banksare switching to EMV cards, smart cards that store data on integrated circuits rather than magnetic stripes as technology progresses, enabling on-card transactions. 1.1 MOTIVATION Fraudsters have improved their techniques over time in order to evade discovery, along with the technologies used to detect fraud. Even though there are many reported research on the use of data mining methodologies for credit card fraud detection, predictivemodels for credit card fraud detection are still actively used in practice. 1.2 OBJECTIVES Methods for detecting credit card fraud must always be improved. In an effort to better detect credit card fraud,we compare the two cutting-edge data mining techniques known as support vector machines and random forests against the well-known logistic regression. 1.3 PROBLEM STATEMENT Financial loss from fraud is rising dramatically, whichhas led to a significant increase in credit card scams. Farad LIERTV918070649 causes billions of dollars in losses per year. There isn’t enough study to examinethe fraud. To find actual credit card fraud in the wild,many machine learning techniques are used.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1104 1.4 Machine Learning Using Python A smart and popular programming language is Python. Python supports a wide range of libraries, including pandas, NumPy, SciPy, matplotlib, etc. It supports a variety of packages, including Xlsx, Writer, and X1Rd. It isused to conduct complex science very effectively. There are many useful Python frameworks available. With the use of data, machine learning, a subfield of artificial intelligence, enables computer frameworks to learn new abilities and improve their performance. It is used to conduct research on the creation of computer-based algorithms for data prediction. The process of machine learning begins with the provision of data, after which the computers are taught using a range of algorithms to produce machine learning models 1.5 Table Dataset 2 System Architecture A Basic System Architecture of Credit Card Fraud Detection Analysis. 2.1 Credit Card Fraud Detection As you can see, there does appear to be a correlation between several of our predictors and the class variable. Despite the large number of factors, there appear to be few significant relationships. 1. Since a PCA was used to prepare the data, our predictors are principal components. 2. Due to the extreme class imbalance, some correlations with respect to our class variable may not be as significant. 2.2 About dataset The files include credit card transactions done by European cardholders in September 2013. We have 492 frauds out of 284,807 transactions in our dataset oftransactions that took place over the course of two days. 2.3 System Framework It illustrates the steps taken to create the model. The figure illustrates the crucial stages that went into creating the suggested model. Following a series of actions like data processing, data cleansing, and feature extraction, classification is finally carried out. The dataset is very skewed, with frauds making up 0.172% of all transactions in the positive class. It only has numeric input variables that have undergone PCA transformation. Unfortunately, we are unable to offer the original characteristics and additional context for the data due to confidentiality concerns. The principal components obtained with PCA are features V1, V2,..., V28. The only features that have not been changed with PCA are Time and Amount. The seconds that passed between each transaction and the datasets first transaction are listed in the feature Time. 2.4 Results And Discussion Without a doubt, the Random Forest model outperforms Decision Trees. However, if we look at our dataset,wecansee that there is a significant class imbalance. The number of legitimate (fraud-free) deals exceeds 99, while the number of fraudulent deals is 0.17. If we train our model using a comparable distribution without considering theimbalance problems, it predicts the label with higher significance assigned to actual deals (since there is moreevidence about them) and so acquires additional fragility. There are a variety of viable methods for resolving the class imbalance issue. One of them is overslicing. After oversampling, the accuracy scores and the confusionmatrix are calculated.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 01 | Jan 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1105 The Random Forest model performs significantly better than Decision Trees. But our dataset reveals a large class imbalance, as can be seen. There are more than 99 valid (fraud-free) transactions compared to just 0.17 fraudulent transactions. Our model predicts the label with higher importance attributed to actual deals (because there is more data about them) and hence develops additional fragility if we train it using a comparable distribution without taking the imbalance problems into account.There are many effective ways to address the class imbalance problem. One of them is cutting too thin. The accuracy ratings and the confusion matrix are computed following oversampling. 2.5 Future enhancements The accuracy score for our machine model that detects credit card transaction fraud should be 100%, with 100%as the aim. But when we achieve a score of 100% accuracy, we can deduce that our model is being over- fitted with data, giving us the results for which it has already been trained. Therefore, we can say that the precision and confusion matrix values can be enhanced with a wide range for future improvements. The transaction dataset for European credit card holders canalso be updated with new algorithms, and the results of these algorithms precision and confusion matrices can be combined to get more accurate numbers. The data collection can also be made better by normalising the extremely skewed numbers and matrices . 3 CONCLUSION The detection of credit card fraud has long been a goal of testing for academics, and it will continue to be an intriguing aspect of testing in the future. By using three different algorithms and training our machine using the transaction information we have, we are launching a fraud detection solution for credit cards. With the aid of the model we developed, the authorities are better able toidentify credit card fraud, investigate it further, and determine if it was a fraudulent or valid transaction. These algorithms tell us whether a given transaction has a tendency to be fraud or not; they were chosen using the feature importance, discussion, and experimentation methods as described in the methodology. We consider ourselves quite fortunate to have received this support over the course of our project because the success and outcome of this project required a great dealof direction and assistance from many people. We wont forget to thank them for their guidance and support, which are the sole reasons we were able to do what we did. Mr. Puneet Goswami, Head of the Department, Department of Computer Science and Engineering, and Dr. Paramjit S. Jaswal, Vice- Chancellor, SRM University, for giving all the necessary resources for the completion of my seminar. Mrs.Ishwari Singh, who served as our guide, forher insightful advice and help with the study report. Finally, we would want to express our gratitude to everyone. [1] Yvan Lucas, Pierre-Edouard Portier, Lea Laporte , Sylvie Calabretto, Liyun He-Guelon, Frederic Oble and Michael Granitzer , IEEE Explore2019. [2] Chunzhi, WangYichao, WangZhiwei, YeLingyu , Yuecheng Cai ,The 13th International Conference on Computer Science & Education. [3] Addisson Salazar, Gonzalo Safont, Luis Vergara, International Conference on Computational Scienceand Computational Intelligence (CSCI), 2019 [4] Anu Maria Babu , Dr. Anju Pratap , IEEE EXPLORE ,2020 [5] Vinod Jain, Mayank Agarwal , Anuj Kumar , International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) , 2020. 4 ACKNOWLEDGEMENT 5 REFERENCES [6] Fahimeh Ghobadi , Mohsen Rohani , ICSPIS ,2016. [7] SP Maniraj , Aditya Saini, Swarna Deep Sarkar Shadab Ahmed , International Journal of Engineering Research & Technology (IJERT) , 2019.. [8] Adwait A. Rajmane, Piyush S. Mahajan, Akshay D.Kolhe, Sandhya S. Khot , International Journal of Engineering Research & Technology (IJERT) , 2021. [9] SIMI MJ , International Journal of EngineeringResearch & Technology (IJERT), 2019. [10] Arya Chandorkar , JOURNAL-International Journal of Engineering Research & Technology (IJERT), 2022.