CFP last date
20 January 2025
Reseach Article

A Data Mining with Hybrid Approach Based Transaction Risk Score Generation Model (TRSGM) for Fraud Detection of Online Financial Transaction

by Dr. Jyotindra N. Dharwa, Dr. Ashok R. Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 16 - Number 1
Year of Publication: 2011
Authors: Dr. Jyotindra N. Dharwa, Dr. Ashok R. Patel
10.5120/1977-2651

Dr. Jyotindra N. Dharwa, Dr. Ashok R. Patel . A Data Mining with Hybrid Approach Based Transaction Risk Score Generation Model (TRSGM) for Fraud Detection of Online Financial Transaction. International Journal of Computer Applications. 16, 1 ( February 2011), 18-25. DOI=10.5120/1977-2651

@article{ 10.5120/1977-2651,
author = { Dr. Jyotindra N. Dharwa, Dr. Ashok R. Patel },
title = { A Data Mining with Hybrid Approach Based Transaction Risk Score Generation Model (TRSGM) for Fraud Detection of Online Financial Transaction },
journal = { International Journal of Computer Applications },
issue_date = { February 2011 },
volume = { 16 },
number = { 1 },
month = { February },
year = { 2011 },
issn = { 0975-8887 },
pages = { 18-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume16/number1/1977-2651/ },
doi = { 10.5120/1977-2651 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:03:44.740659+05:30
%A Dr. Jyotindra N. Dharwa
%A Dr. Ashok R. Patel
%T A Data Mining with Hybrid Approach Based Transaction Risk Score Generation Model (TRSGM) for Fraud Detection of Online Financial Transaction
%J International Journal of Computer Applications
%@ 0975-8887
%V 16
%N 1
%P 18-25
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

We propose a unique and hybrid approach containing data mining techniques, artificial intelligence and statistics in a single platform for fraud detection of online financial transaction, which combines evidences from current as well as past behavior. The proposed transaction risk generation model (TRSGM) consists of five major components, namely, DBSCAN algorithm, Linear equation, Rules, Data Warehouse and Bayes theorem. DBSCAN algorithm is used to form the clusters of past transaction amounts of the customer, find out the deviation of new incoming transaction amount and finds cluster coverage. The patterns generated by Transaction Pattern Generation Tool (TPGT) are used in Linear equation along with its weightage to generate a risk score for new incoming transaction. The guidelines shown in various web sites, print and electronic media as indication of online fraudulent transaction for Credit Card Company is implemented as rules in TRSGM. In the first four components, we determine the suspicion level of each incoming transaction based on the extent of its deviation from good pattern. The transaction is classified as genuine, fraudulent or suspicious depending on this initial belief. Once a transaction is found to be suspicious, belief is further strengthened or weakened according to its similarity with fraudulent or normal transaction history using Bayes theorem.

References
  1. 2008 Internet Crime Report, Federal Bureau of Investigation (FBI), National White Collar Crime Center (NW3C) and Bureau of Justice Assistance (BJA) http://www.ic3.gov/media/annualreport/2008_IC3Report.pdf
  2. Online fraud is twelve times higher than offline fraud, 20,June,2007 http://sellitontheweb.com/ezine/news0434.shtml
  3. 11th Annual Online Fraud Report , Online Payment Fraud Trends, Merchant Practices and Benchmarks, www.cybersource.com/fraudreport2010/
  4. S.Ghosh, D.L.Reilly, “Credit card fraud detection with a neural–network”, in: Proceedings of the Twenty-seventh Hawaii International Conference on system Sciences, 1994, pp. 621-630,
  5. E. Aleskerov, B. Freisleben, B.Rao, “CARDWATCH: a neural network based database mining system for credit card fraud detection”, in: Proceedings of the Computational Intelligence for Financial Enginnering, 1997, pp.220-226
  6. J. R.Dorronsoro, F. Ginel, C.Sanchez and C.S. Cruz, “Neural fraud detection in credit card operations”, IEEE Transactions on Neural Network , Vol. 8, No. 4, July 1997, pp. 827-834
  7. M. Syeda, Y.Q.Zhang, Y. Pan, “Parallel granular neural networks for fast credit card fraud detection”, in: Proceedings of the IEEE International Conference on Fuzzy Systems, 2002, pp. 572-577
  8. P.K. Chan, W. Fan, A.L. Prodromidis, S.J. Stolfo, “Distributed data mining in credit card fraud detection”, in: Proceedings of the IEEE Intelligent Systems, 1999, pp. 67-74
  9. V.Hanagandi, A. Dhar, K.Buescher, “Density based clustering and radial basis function modeling o generate credit card fraud score”, in: Proceedings of the IEEE International Conference, February 1996, pp.247-251
  10. A.Shen, R.Tong, Y.Deng, “Application of classification models on credit card fraud detection”, in: Proceedings of the IEEE Service Systems and Service Management, International Conference, 9-11 June 2007, pp:1-4
  11. H.Shao, H. Zhao, G.Chang, “Applying Data mining to detect fraud behavior in customs declaration”, in: Proceedings of the First International Conference on Machine Learning and Cybernetics, Beijing, November 2002, pp.1241-1244
  12. A.Srivastava, A.Kundu, S.Sural, A.K.Majumdar, “Credit card fraud detection using hidden markov model”, in: IEEE transactions on dependable and secure computing,Vol. 5, No. 1, January-March 2008.
  13. J.Quah, M.Sriganesh, “Real time credit card fraud detection using computational intelligence”, in: Proceedings of the International Joint Conference on Neural Networks, Florida, U.S.A, August 2007
  14. Suvasini Panigrahi, Amlan Kundu, Shamik Sural, A.K.Majumdar, “Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning”, www.scincedirect.com
  15. S.J.Stoflo, W.Lee, A.Prodromidis, P.K.Chan, “Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project”, http:// www..citeseer.ist.psu.edu/244959.html
  16. C. Phua, V.Lee, K.Smith, R.Gayler, “A comprehensive survey of data mining-based fraud detection research”, March 2007 http://www.clifton.phua.googlepages.com/fraud-detection-survey.pdf
  17. Y.Kou, C.T.Lu, S.Sirwongwattana, Y.Huang, “Survey of fraud detection techniques”, in: Proceedings of the IEEE International Conference on Networking, Sensing and Control, vol. 1, 2004, pp.749-754.
  18. R.J.Bolton and D.J.Hand, “Statistical fraud detection”: a review, Journal of Statistical Science(2002), pp.235-255.
  19. D.W.Abbott, I.P.Matkovsky, J.F. Elder IV, “An Evaluation of High-end Data Mining Tools for Fraud Detection”, 1998, IEEE Xplore
  20. D.Yue, X.Wu, Y.Wang, Y.Li,C-H Chu, “A Review of Data Mining-based Financial Fraud Detection Research”, http://www.ieeexplore.ieee.org/iel5/4339774/4339775/04341127.pdf
  21. Margaret H. Dunham, S. Sridhar- DATA MINING Introductory and Advanced Topics, Pearson Education, ISBN 81-7758-785-4
  22. Richard J. Roiger, Michael W. Geatz – Data Mining A Tutorial-based Primer, Pearson Education, ISBN:81-297-1089-7
Index Terms

Computer Science
Information Sciences

Keywords

Data Mining FDS Cyber Crime Credit Card Bayes Theorem