SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2343
Unsupervised Learning for Credit Card fraud detection
Professor. Vikrant Agaskar1 , Megha Babariya2, Shruthi Chandran3 , Namrata Giri4
1Professor, Department Of Computer Engineering, VCET, Mumbai University, India
2Student, Department Of Computer Engineering, VCET, Mumbai University, India
3Student, Department Of Computer Engineering, VCET, Mumbai University, India
4Student, Department Of Computer Engineering, VCET, Mumbai University, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -Today, Internet banking has led to an increaseof
frauds, resulting in substantialfinanciallosses. Bankingfrauds
increased 93% in 2009-2010, and 30% in 2012-2013. Internet
banking frauds are difficult to analyze and detect because the
fraudulent behavior is dynamic, spread across different
customer’s profiles, and dispersed in large and highly
imbalanced data sets. Customers do not check their banking
history daily to analyze any kind of fraud. We propose in this
paper a technique of synthetic model of the data structure for
efficient storage of data, and a measure of dissimilarity
between these representations for the detection of change in
the stream structure , in order to detect different types of
fraud during a period of time.
Key Words: Clustering , fraud detection , Transaction ,
Unsupervised Learning , data mining algorithms.
1. INTRODUCTION
In this digital age, it is the time of online banking, one of
the well-organized and easiermodesoftransaction.Withthe
evolution of internet in the banking sectors, people have
changed the way they used to bank. But this digital
transformation is providing new ways for fraudsterstohack
people’s private accounts. Banking sector frauds have been
in existence for centuries, with the earliest known frauds
pertaining to insider trading, stock manipulation,accounting
irregularity/ inflated assets etc. Fraud is a superior form of
white collar crime that persist to extract a significanttoll not
only on the organizations, but also on investors, financial
institutions, and the economy in general.
Most IT entities today in use are transactional.Thismeans
that the data transactions are processed in the system and
the data of transaction is stored in the system’s database.
The relationships and patterns in these reserved
transactional data is analyzed by the data mining softwares.
One of the major issues during this is the fraud which may
occur during transactions..
Databases constantly keep on changing and the size of
data keeps on increasing . This makes the transformation
and mass of data so vital that it is impossible tostorethem in
a database. Here the ‘data stream analysis’ is done. The
upcoming of new data is endless. Thus, effective algorithms
must be able to work with a constant memory footprint,
regardless of the evolution of the stream, as the whole
database cannot be kept in memory.
There are many issues that make effective fraud
management a challenging task. These include: large and
ever-expanding mass of data, the growing complicatedness
of systems, changes in business processes and activities and
continuous transformation of new fraud schemes to avoid
the existing detection techniques. To detect the fraudulent
financial statements is a difficult job when using normal
audit procedures due to limitation in understanding the
characteristics of financial statements, lack of experience
and dynamically changing strategies of fraudsters.
Supervised methods, using samples from the
fraudulent/non-fraudulent classes as the basis to construct
classification rules to detect future cases of fraud, toprolong
from the problem of unbalancedclassamount:thelegitimate
transactions are more in number then the fraudulent ones.
In this paper, we propose an unsupervised method for
detecting fraudulent transactions using records of the
amount and location details of previous transactionscarried
out by the customers.
2. RELATED WORK
Construction of a synthetic model at daily intervals over a
data repository which vacants itself as new data is stored.
This synthetic representation is being derived from the
learning of a weighted SOM (Self-Organizing Map) and
admits automatic data clustering. During the learning
procedure, each pattern is extended with novel information
uprooted from the data.
First, there is a shortage of information concerning the
characteristics of management scam. Secondly, with the
irregularity it has, most of the auditors need the necessary
experience to detect it. Finally, managers intentionallytryto
mislead the auditors. These limitations demonstrate that
there is a need for supplementary analytical procedures
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2344
which can effectively detect and manage fraud. Fraud
classification model using neural networks has been
developed. Neural, operation based, real-time fraud
detection systems are not only technically feasible, but
highly interesting from a purely economic point of view.
Neural network with statistical methods have been used to
detect fraud. Statistical regression analysis and statistical
method of logistic regression have also been tried to detect
fraud in banks.
3. VARIOUS METHODS TO DETECT CREDIT CARD
FRAUD.
There are various emerging technologies that are
capable of detecting the credit card fraud. Some of
technologies that will work on some parameters and able to
detect fraud earlier as well are listed below:
Learning: Learning is generally done with or without the
help of teacher.Generally division of learning take place as
shown in Figure 1.
Figure 1: Types of learning.
Supervised Learning : The learning that takes place under
the guidance of a teacher is said to be as supervised
learning. But in which there is no guidance of teacher is
termed as Unsupervised learning. These Learning are
explored as:
Decision Tree Induction:
Dipti Thakur & Bhatia defined this as a type of supervised
learning in which we make a decision tree to reach at a
appropriate solution. As shown in figure-2 they explained
that in decision tree we have some interior nodes and each
node symbolize a test on a particular attribute and each
branch in decision tree represent an outcome of test and
each leaf node will represent class label means output.
Decision trees are being used in the situation where the
classification in which a new transaction is given with the
class label as unknown, which means that it is not known
whether the transaction is fraudulent or legitimate and the
transaction value obtainedis testedagainstthedecisiontree.
A path is traced from root node to output label for that
transaction.
Figure 2: Decision Tree Induction.
Unsupervised Learning:
Peer Group Analysis Approach :
In 2008, Watson and Whitrow et.al worked on Peer Group
Analysis in Plastic Card Fraud Detection. They defined it as
an unsupervised method that analyzes the behavior over
time by monitoring it. This approach can be used to identify
credit card fraud detection by analyzing the fraudulent
transactions. In this those transactions deviate from their
peer group termed as anomalous/fraudulent transactions.
They defined that there are generally two type of approach
to detect fraud. One is, in which form of the fraud is known,
this can be detected by pattern matching. And whenthetype
of fraud is not known then we approach anomaly detection
techniques. Peer group analysis is an anomaly detection
technique. Suppose we have (a1,a2……………………an-1, an)
time series representing the weekly amount spent on a
credit card from a particular account and ‘an’ is the target
amount. We wish to determine whether the recently spent
transaction ‘an’ is fraudulent or not at time t=n. In this, in
order to detect outlier transaction we can use the
Mahalanobis distance of ‘an’ from the centroid of its peer
group. As it is shown in figure 3 that by the help of the Peer
group technique anomaly input are separated.
Figure 3 : Peer group Analysis
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2345
Unsupervised Learning in Neural Network:
Self Organinsing Map In resaerch of Kuah & Sriganesh Self
organizing Map configureitsneuronaccordingtotopological
structure of input data as shown in Figure 4. This process is
called Self Organization because of iterativetuningweight of
neurons. The result is clustering of input data.In Self
Organizing map Zaslavsky and Strizhak[8] defined that we
need no external teacher in this mode of learning. So,
verification of resultant matrix will be done on behalf of the
presented past learning.As our approachisalsobasedon the
Unsupervised learning.There are mainly four step of
processing take place in Self organizing Map that we applied
on our inputs.
Figure 4: Self organizing Map
1) Initialization : First of all we have to select small random
value for synaptic weight in interval[0,1] and have to assign
a small positive value of learning parameter ‘a’.
2) Activation and the Similarity matching: Here in this step
we activate the Kohonen network for input vectorXandfind
the Winning neuron.
3) Learning of Adaptive: Weights are trained by
performing various number of steps.
4) 4) Iteration: At that point we performed iterations,till we
did not get a stability in our network.
4. OUR APPROACH
A variety of techniques can be applied to answer the
presented problem. The most simplest method used in the
earliest transaction monitoring systems was control of
transaction parameters. Once we have obtained the clusters
by using SOM technique we revalidate our clusters by using
association rules on each cluster. To apply association rules
we need to provide categorical data as input, so we convert
numeric data into categorical data basedonfew criteriaasin
our case:
Figure 5: Parameters used in design
Mathematically,
|Lg-Ug| will be associated parameter to the range over
expected transaction.
To compute these we will relate each tuple in the
Database to a certain amount thus initializingorupdatingits
threshold.
Vector_distanceij = 


10
1
][_
ij
ij
jvaluentransactio
Temp=max({parameteric_constant
transactioni},Vector_distanceij)
Transaction_control_Flag=val(θ,temp)
Where,
θ is threshold value
val(p1,p2) returns binary value after comparing and temp
parametric_constant is mean of transaction attribute for all
tuples of the projected customer
Association rules are the if-then statements that support in
determining the relationships among attributesinunrelated
data of a database. Relationships between objects which
frequently occur together are identified byassociationrules.
Support and confidence are two primary criteria used by
association rules. They help in identifying the relationships
in the data by analyzing on frequently used if/then patterns.
Association rules to satisfy minimum support and minimum
confidence is provided by user simultaneously. Support
gives an idea of the frequency with which the items appear
in the data, and confidence describes the proportion in
which the if/then statements have been found to be true.
5. CLUSTERING ANALYSIS
Let universe of discourse X={x1, x2,…. xn }be the object to
detect. Every object has m indexes, namely xi ={ xi1, xi2,
….xim} , i= (1,2, … n) .The following data matrix shows it in
the following way:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2346
Now we are required to figure out the outlier sets of n
objects. To judge the diffusion degree of every object in X,
We comprises the dij which denotes the distance between
any two objects and composes distance matrix R, described
as follows,
It is very important to select any distance function. This
paper selects the Euclidean distance.
DIS(U, f)= 

n
i ii fo1
2
)( (3)
Let Pi=  
n
j ijd1
(4)
Where Pi is the sum of ith row in matrix R. The bigger Pi is,
the longer the distance between i object and other object is.
Then Pi is said to be the candidate item of outlier set.
%100
min
min



p
ppi
i (5)
Where, λ denotes threshold and the objects with λi ≥ λ are
taken to be the outlier set.
6. FUTURE SCOPE
With increasing number of bank fraudlency and cyber
crime cases need of a secure testing system is on rise. And
this is a direct solution to this problem. It can be extended to
a duplex verification of not only a customer(debit-ant) but
also of the seller(credit-ant). It can be taken and used on a
regular basis just like OTP. It can be used to even assess past
transaction in database to find whether certain transactions
were fraudulent or not and also would be able to produce
evidence in such cases.
7. CONCLUSION
This article has proposed a new approach to transaction
monitoring and credit card fraud detection using
unsupervised learning . It enables automated creation of
transaction monitoring rules in a learning process and
makes possible their continuous improvement in an
environment of dynamically changing information in an
automated system.
REFERENCES
[1] G. Cabanes and Y.Bennani, “A local density-based
simultaneous two-level algorithm for the topographic
clustering, ” in Proceedings of the International Joint
Conference on Neural Networks (IJCNN), 2008, pp.
1176–1182.
[2] G. Cabanes, Y. Bennani, and D. Fresneau, “Enriched
topological learning for the cluster detection and the
visualization”,neural-networks,no.0,2012.
[3] G. Cabanes and Y. Bennani, “Unsupervised topographic
learning for the spatio-temporal data-mining,”Advances
in Artificial Intelligence, vol. 2010, ArticleID832542,12
pages, 2010.
[4] David J.Wetson,David J.Hand,M Adams,Whitrow and
Piotr Jusczak “Plastic Card Fraud Detection using the
Peer Group Analysis” Springer, Issue 2008.
[5] John T.S Quah, M Sriganesh “Real timeCreditCardFraud
Detection using the Computational Intelligence”
ELSEVIER Science Direct,35 (2008) 1721-1732.
[6] Linda Delamaire ,Hussein Abdou and John Pointon,
“Credit Card Fraud and Detection technique”, Bank and
Bank System,Volume 4, 2009.
[7] D. Sivanandanam, Principles of the Soft Computing
[8] Linda Delamaire ,Hussein Abdou and John Pointon,
“Credit Card Fraud and Detection technique”, Bank and
Bank System,Volume 4, 2009
[9] Philip K Chan,Wei Fan,Andias Prodromidis,J.Stolfo,
“Distributed Datan Mining For Credit Card Fraud
Detection”, IEEE Intelligent System,Special Issue On
Data Mining, 1999
[10] Raghavendra Patidar,Lokesh Sharma “CreditCardFraud
Detection using Neural Network” International journal
of Soft Computing(IJCSE),Volume 32,38,Issue 2011.
[11] Vladdimir Zasalavsky and Anna Strizhak, “Credit Card
Fraud Detection using Self OrganisingMap”,Information
and Security An International Journal,Vol 18,2006.

Weitere ähnliche Inhalte

Was ist angesagt?

Detecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataDetecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency Data
ITIIIndustries
 
Development of Decision Support System for Ordering Goods using Fuzzy Tsukamoto
Development of Decision Support System for Ordering Goods using Fuzzy Tsukamoto Development of Decision Support System for Ordering Goods using Fuzzy Tsukamoto
Development of Decision Support System for Ordering Goods using Fuzzy Tsukamoto
IJECEIAES
 

Was ist angesagt? (18)

IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET -  	  Sentiment Analysis of Posts and Comments of OSNIRJET -  	  Sentiment Analysis of Posts and Comments of OSN
IRJET - Sentiment Analysis of Posts and Comments of OSN
 
IRJET- Credit Card Fraud Detection : A Comparison using Random Forest, SVM an...
IRJET- Credit Card Fraud Detection : A Comparison using Random Forest, SVM an...IRJET- Credit Card Fraud Detection : A Comparison using Random Forest, SVM an...
IRJET- Credit Card Fraud Detection : A Comparison using Random Forest, SVM an...
 
IRJET-Fake Product Review Monitoring
IRJET-Fake Product Review MonitoringIRJET-Fake Product Review Monitoring
IRJET-Fake Product Review Monitoring
 
B05840510
B05840510B05840510
B05840510
 
Detecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataDetecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency Data
 
IRJET- Fault Detection and Prediction of Failure using Vibration Analysis
IRJET-	 Fault Detection and Prediction of Failure using Vibration AnalysisIRJET-	 Fault Detection and Prediction of Failure using Vibration Analysis
IRJET- Fault Detection and Prediction of Failure using Vibration Analysis
 
Development of Decision Support System for Ordering Goods using Fuzzy Tsukamoto
Development of Decision Support System for Ordering Goods using Fuzzy Tsukamoto Development of Decision Support System for Ordering Goods using Fuzzy Tsukamoto
Development of Decision Support System for Ordering Goods using Fuzzy Tsukamoto
 
IRJET- Personality Prediction System using AI
IRJET- Personality Prediction System using AIIRJET- Personality Prediction System using AI
IRJET- Personality Prediction System using AI
 
IRJET- Analysis on Credit Card Fraud Detection using Capsule Network
IRJET- Analysis on Credit Card Fraud Detection using Capsule NetworkIRJET- Analysis on Credit Card Fraud Detection using Capsule Network
IRJET- Analysis on Credit Card Fraud Detection using Capsule Network
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Credit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning AlgorithmsCredit card fraud detection using machine learning Algorithms
Credit card fraud detection using machine learning Algorithms
 
AUTOMATED PHARMACY
AUTOMATED PHARMACYAUTOMATED PHARMACY
AUTOMATED PHARMACY
 
IRJET - Data Mining and Machine Learning for Cyber Security
IRJET - Data Mining and Machine Learning for Cyber SecurityIRJET - Data Mining and Machine Learning for Cyber Security
IRJET - Data Mining and Machine Learning for Cyber Security
 
Statistical Analysis of Small & Micro Entrepreneurs (category :Vegetable Vend...
Statistical Analysis of Small & Micro Entrepreneurs (category :Vegetable Vend...Statistical Analysis of Small & Micro Entrepreneurs (category :Vegetable Vend...
Statistical Analysis of Small & Micro Entrepreneurs (category :Vegetable Vend...
 
ACC 564 NERD Inspiring Innovation--acc564nerd.com
ACC 564 NERD Inspiring Innovation--acc564nerd.comACC 564 NERD Inspiring Innovation--acc564nerd.com
ACC 564 NERD Inspiring Innovation--acc564nerd.com
 
ACC 564 NERD Redefined Education--acc564nerd.com
ACC 564 NERD Redefined Education--acc564nerd.comACC 564 NERD Redefined Education--acc564nerd.com
ACC 564 NERD Redefined Education--acc564nerd.com
 
Prediction of Corporate Bankruptcy using Machine Learning Techniques
Prediction of Corporate Bankruptcy using Machine Learning Techniques Prediction of Corporate Bankruptcy using Machine Learning Techniques
Prediction of Corporate Bankruptcy using Machine Learning Techniques
 
Acc 564 Exceptional Education / snaptutorial.com
Acc 564  Exceptional Education / snaptutorial.comAcc 564  Exceptional Education / snaptutorial.com
Acc 564 Exceptional Education / snaptutorial.com
 

Ähnlich wie Unsupervised Learning for Credit Card Fraud Detection

Ähnlich wie Unsupervised Learning for Credit Card Fraud Detection (20)

An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
 
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud DetectionA Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud Detection
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
 
IRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud DetectionIRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud Detection
 
Detecting Suspicious Accounts in Money Laundering
Detecting Suspicious Accounts in Money LaunderingDetecting Suspicious Accounts in Money Laundering
Detecting Suspicious Accounts in Money Laundering
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
 
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdfTanvi_Sharma_Shruti_Garg_pre.pdf.pdf
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
 
Tax Prediction Using Machine Learning
Tax Prediction Using Machine LearningTax Prediction Using Machine Learning
Tax Prediction Using Machine Learning
 
IRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine Learning
 
Meta Classification Technique for Improving Credit Card Fraud Detection
Meta Classification Technique for Improving Credit Card Fraud Detection Meta Classification Technique for Improving Credit Card Fraud Detection
Meta Classification Technique for Improving Credit Card Fraud Detection
 
Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detection
 
Online Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningOnline Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine Learning
 
IRJET- Financial Fraud Detection along with Outliers Pattern
IRJET-  	  Financial Fraud Detection along with Outliers PatternIRJET-  	  Financial Fraud Detection along with Outliers Pattern
IRJET- Financial Fraud Detection along with Outliers Pattern
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation Forest
 
A rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detectionA rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detection
 
A Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine LearningA Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine Learning
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Kürzlich hochgeladen (20)

Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 

Unsupervised Learning for Credit Card Fraud Detection

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2343 Unsupervised Learning for Credit Card fraud detection Professor. Vikrant Agaskar1 , Megha Babariya2, Shruthi Chandran3 , Namrata Giri4 1Professor, Department Of Computer Engineering, VCET, Mumbai University, India 2Student, Department Of Computer Engineering, VCET, Mumbai University, India 3Student, Department Of Computer Engineering, VCET, Mumbai University, India 4Student, Department Of Computer Engineering, VCET, Mumbai University, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract -Today, Internet banking has led to an increaseof frauds, resulting in substantialfinanciallosses. Bankingfrauds increased 93% in 2009-2010, and 30% in 2012-2013. Internet banking frauds are difficult to analyze and detect because the fraudulent behavior is dynamic, spread across different customer’s profiles, and dispersed in large and highly imbalanced data sets. Customers do not check their banking history daily to analyze any kind of fraud. We propose in this paper a technique of synthetic model of the data structure for efficient storage of data, and a measure of dissimilarity between these representations for the detection of change in the stream structure , in order to detect different types of fraud during a period of time. Key Words: Clustering , fraud detection , Transaction , Unsupervised Learning , data mining algorithms. 1. INTRODUCTION In this digital age, it is the time of online banking, one of the well-organized and easiermodesoftransaction.Withthe evolution of internet in the banking sectors, people have changed the way they used to bank. But this digital transformation is providing new ways for fraudsterstohack people’s private accounts. Banking sector frauds have been in existence for centuries, with the earliest known frauds pertaining to insider trading, stock manipulation,accounting irregularity/ inflated assets etc. Fraud is a superior form of white collar crime that persist to extract a significanttoll not only on the organizations, but also on investors, financial institutions, and the economy in general. Most IT entities today in use are transactional.Thismeans that the data transactions are processed in the system and the data of transaction is stored in the system’s database. The relationships and patterns in these reserved transactional data is analyzed by the data mining softwares. One of the major issues during this is the fraud which may occur during transactions.. Databases constantly keep on changing and the size of data keeps on increasing . This makes the transformation and mass of data so vital that it is impossible tostorethem in a database. Here the ‘data stream analysis’ is done. The upcoming of new data is endless. Thus, effective algorithms must be able to work with a constant memory footprint, regardless of the evolution of the stream, as the whole database cannot be kept in memory. There are many issues that make effective fraud management a challenging task. These include: large and ever-expanding mass of data, the growing complicatedness of systems, changes in business processes and activities and continuous transformation of new fraud schemes to avoid the existing detection techniques. To detect the fraudulent financial statements is a difficult job when using normal audit procedures due to limitation in understanding the characteristics of financial statements, lack of experience and dynamically changing strategies of fraudsters. Supervised methods, using samples from the fraudulent/non-fraudulent classes as the basis to construct classification rules to detect future cases of fraud, toprolong from the problem of unbalancedclassamount:thelegitimate transactions are more in number then the fraudulent ones. In this paper, we propose an unsupervised method for detecting fraudulent transactions using records of the amount and location details of previous transactionscarried out by the customers. 2. RELATED WORK Construction of a synthetic model at daily intervals over a data repository which vacants itself as new data is stored. This synthetic representation is being derived from the learning of a weighted SOM (Self-Organizing Map) and admits automatic data clustering. During the learning procedure, each pattern is extended with novel information uprooted from the data. First, there is a shortage of information concerning the characteristics of management scam. Secondly, with the irregularity it has, most of the auditors need the necessary experience to detect it. Finally, managers intentionallytryto mislead the auditors. These limitations demonstrate that there is a need for supplementary analytical procedures
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2344 which can effectively detect and manage fraud. Fraud classification model using neural networks has been developed. Neural, operation based, real-time fraud detection systems are not only technically feasible, but highly interesting from a purely economic point of view. Neural network with statistical methods have been used to detect fraud. Statistical regression analysis and statistical method of logistic regression have also been tried to detect fraud in banks. 3. VARIOUS METHODS TO DETECT CREDIT CARD FRAUD. There are various emerging technologies that are capable of detecting the credit card fraud. Some of technologies that will work on some parameters and able to detect fraud earlier as well are listed below: Learning: Learning is generally done with or without the help of teacher.Generally division of learning take place as shown in Figure 1. Figure 1: Types of learning. Supervised Learning : The learning that takes place under the guidance of a teacher is said to be as supervised learning. But in which there is no guidance of teacher is termed as Unsupervised learning. These Learning are explored as: Decision Tree Induction: Dipti Thakur & Bhatia defined this as a type of supervised learning in which we make a decision tree to reach at a appropriate solution. As shown in figure-2 they explained that in decision tree we have some interior nodes and each node symbolize a test on a particular attribute and each branch in decision tree represent an outcome of test and each leaf node will represent class label means output. Decision trees are being used in the situation where the classification in which a new transaction is given with the class label as unknown, which means that it is not known whether the transaction is fraudulent or legitimate and the transaction value obtainedis testedagainstthedecisiontree. A path is traced from root node to output label for that transaction. Figure 2: Decision Tree Induction. Unsupervised Learning: Peer Group Analysis Approach : In 2008, Watson and Whitrow et.al worked on Peer Group Analysis in Plastic Card Fraud Detection. They defined it as an unsupervised method that analyzes the behavior over time by monitoring it. This approach can be used to identify credit card fraud detection by analyzing the fraudulent transactions. In this those transactions deviate from their peer group termed as anomalous/fraudulent transactions. They defined that there are generally two type of approach to detect fraud. One is, in which form of the fraud is known, this can be detected by pattern matching. And whenthetype of fraud is not known then we approach anomaly detection techniques. Peer group analysis is an anomaly detection technique. Suppose we have (a1,a2……………………an-1, an) time series representing the weekly amount spent on a credit card from a particular account and ‘an’ is the target amount. We wish to determine whether the recently spent transaction ‘an’ is fraudulent or not at time t=n. In this, in order to detect outlier transaction we can use the Mahalanobis distance of ‘an’ from the centroid of its peer group. As it is shown in figure 3 that by the help of the Peer group technique anomaly input are separated. Figure 3 : Peer group Analysis
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2345 Unsupervised Learning in Neural Network: Self Organinsing Map In resaerch of Kuah & Sriganesh Self organizing Map configureitsneuronaccordingtotopological structure of input data as shown in Figure 4. This process is called Self Organization because of iterativetuningweight of neurons. The result is clustering of input data.In Self Organizing map Zaslavsky and Strizhak[8] defined that we need no external teacher in this mode of learning. So, verification of resultant matrix will be done on behalf of the presented past learning.As our approachisalsobasedon the Unsupervised learning.There are mainly four step of processing take place in Self organizing Map that we applied on our inputs. Figure 4: Self organizing Map 1) Initialization : First of all we have to select small random value for synaptic weight in interval[0,1] and have to assign a small positive value of learning parameter ‘a’. 2) Activation and the Similarity matching: Here in this step we activate the Kohonen network for input vectorXandfind the Winning neuron. 3) Learning of Adaptive: Weights are trained by performing various number of steps. 4) 4) Iteration: At that point we performed iterations,till we did not get a stability in our network. 4. OUR APPROACH A variety of techniques can be applied to answer the presented problem. The most simplest method used in the earliest transaction monitoring systems was control of transaction parameters. Once we have obtained the clusters by using SOM technique we revalidate our clusters by using association rules on each cluster. To apply association rules we need to provide categorical data as input, so we convert numeric data into categorical data basedonfew criteriaasin our case: Figure 5: Parameters used in design Mathematically, |Lg-Ug| will be associated parameter to the range over expected transaction. To compute these we will relate each tuple in the Database to a certain amount thus initializingorupdatingits threshold. Vector_distanceij =    10 1 ][_ ij ij jvaluentransactio Temp=max({parameteric_constant transactioni},Vector_distanceij) Transaction_control_Flag=val(θ,temp) Where, θ is threshold value val(p1,p2) returns binary value after comparing and temp parametric_constant is mean of transaction attribute for all tuples of the projected customer Association rules are the if-then statements that support in determining the relationships among attributesinunrelated data of a database. Relationships between objects which frequently occur together are identified byassociationrules. Support and confidence are two primary criteria used by association rules. They help in identifying the relationships in the data by analyzing on frequently used if/then patterns. Association rules to satisfy minimum support and minimum confidence is provided by user simultaneously. Support gives an idea of the frequency with which the items appear in the data, and confidence describes the proportion in which the if/then statements have been found to be true. 5. CLUSTERING ANALYSIS Let universe of discourse X={x1, x2,…. xn }be the object to detect. Every object has m indexes, namely xi ={ xi1, xi2, ….xim} , i= (1,2, … n) .The following data matrix shows it in the following way:
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2346 Now we are required to figure out the outlier sets of n objects. To judge the diffusion degree of every object in X, We comprises the dij which denotes the distance between any two objects and composes distance matrix R, described as follows, It is very important to select any distance function. This paper selects the Euclidean distance. DIS(U, f)=   n i ii fo1 2 )( (3) Let Pi=   n j ijd1 (4) Where Pi is the sum of ith row in matrix R. The bigger Pi is, the longer the distance between i object and other object is. Then Pi is said to be the candidate item of outlier set. %100 min min    p ppi i (5) Where, λ denotes threshold and the objects with λi ≥ λ are taken to be the outlier set. 6. FUTURE SCOPE With increasing number of bank fraudlency and cyber crime cases need of a secure testing system is on rise. And this is a direct solution to this problem. It can be extended to a duplex verification of not only a customer(debit-ant) but also of the seller(credit-ant). It can be taken and used on a regular basis just like OTP. It can be used to even assess past transaction in database to find whether certain transactions were fraudulent or not and also would be able to produce evidence in such cases. 7. CONCLUSION This article has proposed a new approach to transaction monitoring and credit card fraud detection using unsupervised learning . It enables automated creation of transaction monitoring rules in a learning process and makes possible their continuous improvement in an environment of dynamically changing information in an automated system. REFERENCES [1] G. Cabanes and Y.Bennani, “A local density-based simultaneous two-level algorithm for the topographic clustering, ” in Proceedings of the International Joint Conference on Neural Networks (IJCNN), 2008, pp. 1176–1182. [2] G. Cabanes, Y. Bennani, and D. Fresneau, “Enriched topological learning for the cluster detection and the visualization”,neural-networks,no.0,2012. [3] G. Cabanes and Y. Bennani, “Unsupervised topographic learning for the spatio-temporal data-mining,”Advances in Artificial Intelligence, vol. 2010, ArticleID832542,12 pages, 2010. [4] David J.Wetson,David J.Hand,M Adams,Whitrow and Piotr Jusczak “Plastic Card Fraud Detection using the Peer Group Analysis” Springer, Issue 2008. [5] John T.S Quah, M Sriganesh “Real timeCreditCardFraud Detection using the Computational Intelligence” ELSEVIER Science Direct,35 (2008) 1721-1732. [6] Linda Delamaire ,Hussein Abdou and John Pointon, “Credit Card Fraud and Detection technique”, Bank and Bank System,Volume 4, 2009. [7] D. Sivanandanam, Principles of the Soft Computing [8] Linda Delamaire ,Hussein Abdou and John Pointon, “Credit Card Fraud and Detection technique”, Bank and Bank System,Volume 4, 2009 [9] Philip K Chan,Wei Fan,Andias Prodromidis,J.Stolfo, “Distributed Datan Mining For Credit Card Fraud Detection”, IEEE Intelligent System,Special Issue On Data Mining, 1999 [10] Raghavendra Patidar,Lokesh Sharma “CreditCardFraud Detection using Neural Network” International journal of Soft Computing(IJCSE),Volume 32,38,Issue 2011. [11] Vladdimir Zasalavsky and Anna Strizhak, “Credit Card Fraud Detection using Self OrganisingMap”,Information and Security An International Journal,Vol 18,2006.