CREDIT CARD FRAUD IDENTIFICATION USING MACHINE LEARNING ALGORITHM
Keywords:
Accuracy, Credit Card, Fraud Identification, Transaction, Prediction .hyperplane.Abstract
Credit card extortion occasions happen often time and then bring about gigantic monetary misfortunes. Culprits can take advantage of some advancement, for example, phishing or Trojan to take another individual's credit card data. Furthermore, strong fraud identification technique is important to recognize the fraud in time when criminals use stolen cards. One strategy is to utilize historical transaction data to obtain normal and fraudulent transactions under the behavioural features of machine learning strategies, and the use of this feature is to verify whether the transaction is valid transaction or invalid transaction. This paper considers four different machine learning algorithms that are Support Vector Machine (SVM), Naïve Bayes, K-Nearest Neighbor (KNN), and Random Forest to discipline the behavior of ordinary transactions and fraud features. Confusion matrix is utilized for estimating the performance analysis of the algorithms. Results obtained from the processing of datasets provide an accuracy of about 99-100%.
Downloads
References
M. Suresh Kumar, V. Soundarya, S. Kavitha, E. S. Keerthika, and E. Aswini. “Credit Card Fraud Detection Using Random Forest Algorithm”, IEEE International Conference on Communication Systems and Network Technologies IEEExplore, (2019), pp.149-153.
ShiyangXuan, Guanjun Liu, Zhenchuan Li, LutaoZheng, Shuo Wang, and Changjun Jiang. "Random Forest For Credit Card Fraud Detection", International Conference on Networking, Sensing, and Control IEEE, (2018).
Devi Meenakshi B, Jeanne B, Gayathri S, Indira N. “Credit Card Fraud Detection Using Random Forest”, International Research Journal of Engineering and Technology, (2019), pp.6662-6666.
AdityaSaini, Swarna Deep Sarkar, and Shadab Ahmed. “Credit Card Fraud Detection Using Machine Learning And Data Science”, International Journal of Engineering Research & Technology (IJERT), (2019), pp.110-115.
K. R. Seeja and Masoumeh Zareapoor. “Fraud Miner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining.” , The Scientific World Journal, (2014)..
Shalini Gupta and Rahul Johari. “A New Framework for Credit Card Transactions involving Mutual Authentication between Cardholder and Merchant”, International Conference on Communication Systems and Network Technologies, (2011), pp.22-26.
Jon T.S. Quah and M. Sriganesh. “Real-time Credit card Fraud Detection using Computational Intelligence” , Expert Systems with Applications, Science Digest, (2008), pp.1721–1732.
EkremDuman and M. HamdiOzcelik. “Detecting credit card fraud by genetic algorithm and scatter search.” Expert Systems with Applications 38 (2011), pp.13057–13063
Andrea Dal Pozzolo, GiacomoBoracchi, Olivier Caelen, CesareAlippi, and GianlucaBontempi. “Credit Card Fraud Detection: A Realistic Modeling and a Novel Learning Strategy.” International Conference On Neural Networks and Learning Systems IEEE, (2018).
SahilDhankhad, Emad Mohammed, and BehrouzFar.”Supervised Machine Learning Algorithms for Credit Card Fraudulent Transaction Detection: A Comparative Study.” International Conference on Information Reuse and Integration(IRI) IEEE, (2018).
Downloads
Published
How to Cite
Issue
Section
License
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.