CFFD Documentation
CFFD Documentation
ON
Bachelor of Technology
In
COMPUTER SCIENCE AND ENGINERRING
BY
P.KALYANI (16MG1A0579)
T.K.K.V.PRASAD (17MG5A0506)
2016-2020
SREE VAHINI INSTITUTE OF SCIENCE AND TECHNOLOGY
(Approved by A.I.C.T.E, New Delhi, Affiliated to JNTU, Kakinada)
CERTIFICATE
This is certify that the project report entitled “CODETECT FINANCIAL
FRAUD DETECTION WITH ANOMALY FEATURE DETECTION” submitted by
P.KALYANI (16MG1A0579), T.K.K.V.PRASAD (17MG5A0506), A.GANGA BHAVANI
(16MG1A0553) , CH.BHARGAV REDDY (16MG1A0588) in partial fulfillment of the
requirements for the award of the degree of BACHELOR OF TECHNOLOGY in
COMPUTER SCIENCE AND ENGINEERING from Dept..Of CSE, SREE VAHINI
INSTITUTE OF SCIENCE AND TECHNOLOGY Tiruvuru, A.P.Affiliated to
JNTUK, Kakinada, is a Record of Bonafied work carried out by them under my Guidance
External Examiner
DECLARATION BY THE CANDIDATES
Last but not the least, we would like to express our deep sense of gratitude and
earnest thanks giving to our dear parents for their normal support and heart full co-
operation in doing this project.
LIST OF FIGURES i
LIST OF ABBERIVATIONS ii
1. INTRODUCTION 1-3
3. IMPLEMENTATION 9-10
3.1 Modules
5.2 ODBC
5.3 JDBC
6.4 ER-Diagrams
10. CONCLUSION 66
1 SYSTEM ARCHITECTURE 33
2 USE CASE DIAGRAM 36
3 CLASS DIAGRAM 38
4 SEQUENCE DIAGRAM 40
5 DEPLOYMENT DIAGRAM 41
6 DATA FLOW DIAGRAM 43
i
LIST OF ABBREVIATIONS
ii
CODETECT FINANCIAL FRAUD
DETECTION WITH ANOMALY
FEATURE DETECTION
INTRODUCTION
SVIST INTRODUCTION
1. INTRODUCTION
In recent years, financial fraud activities such as credit card fraud,
money laundering, increase gradually. These activities cause the loss of
personal and/or enterprises' properties. Even worse, they endanger the
security of nation because the port from fraud may go to terrorism [1], [25].
Thus, accurately detecting financial fraud and tracing fraud are necessary
and urgent. However, financial fraud detection is not an easy task due to the
complex trading networks and transactions involved. Taking money
laundering as an example, money laundering is denied as the process of
using trades to move money/goods with the intent of obscuring the true
origin of funds. Usually, the prices, quantity or quality of good son an
invoice of money laundering are fake purposely. The misrepresentation of
prices, quantity or quality of goods on an invoice merely exposes slight
difference from regular basis if we use these numbers as features to generate
detection policy. Under certain circumstances, this kind of detector may
work well with relatively stable trading entities. Unfortunately, the real
world situation is more complicated, especially within Free Trade Zones
(FTZs) where international trade involves complex procedures and exchange
of information between trading entities. The fraud activities, especial money
laundering, are deeper stealth. Money laundering activities may take
different forms [1] such as the concealing transportation of cash using
trading operations; the acquisition and sale of intangibles; and related party
transactions. Not only the trading of goods shows on much more diversity,
but also different type of companies, shell and front companies involve in to
facilitate money laundering. In contrast with other fraud activities, money
limitation of incapacity of identifying what the fraud relations are. What the
fraud relations are. Graph-based mining methods are one of the most
important theories that attempt to identify relations between data points [3],
[7], [13], as Fig. 1(a) shows. Financial activities can be modeled as a
directed graph, and then a sparse adjacent matrix can represent this graph.
With graph-mining method, the sparse matrix can be approximated as
summation of low-rank matrix and outlier matrix. The outlier matrix is a
sign of suspicious fraud activities. Exploiting the graph based mining
provides a new perspective for fraud detection and enables us to do
advanced research on fraud detection. With the fraud activities detected by
graph-based detection technique we are able to draw the conclusion that
several business entities involved in fraud, however, we still don't know how
these fraud activities are operated and why these activities labeled as fraud,
i.e., the detailed features of the fraud activities. The majority of this how-
and-why information is fused in features points, which have essential
meaning for financial fraud detection because of the tracing necessity. For
example, doing business with misrepresentation of the price may transfer
additional value to exporter. The value in this example reveals how the fraud
happened. This simple example requires the detection system to mark value
as fraud property. Another example, fraud activities might go deeper stealth
with multi-entities involved. If the same good or service invoices a number
of different business entities to make the payments, then there are several
properties should be consider as suspicious: business location, name,
direction, good or service etc. With the knowledge of these suspicious
properties, tracing fraud can be much easier for executives.
2. SYSTEM ANALYSIS
identification of fraud patterns from data set and these methods also
suffer from the problem of unbalanced data. Bolton and David perform
fraud detection with clustering methods. This unsupervised manner is
under the assumption that small cluster indicates the anomaly in data.
CoDetect is an unsupervised model which is based on matrices co
factorization. The matrices from graph represent the genuine proprieties
(features and connections) of financial data. The detection results give a
better understanding of fraud patterns and furthermore, help to trace the
originate of fraud groups.
Disadvantages
Advantages
HARDWARE REQUIREMENTS:
Mouse : Logitech.
SOFTWARE REQUIREMENTS:
Database : MYSQL
3. IMPLEMENTATION
3.1 MODULES
BANK ADMIN
USER
TRANSPORT COMPANY
Bank Admin
In this module, the Admin has to login by using valid user name and
password. After login successful he can do some operations such as View
all users and authorize, View all Transport Users and authorize, Register and
Login (With Bank Name), View all users and authorize, View All Transport
company users and authorize, Add bank with its details such as bname,
baddress, blocation, bpin, bmailid, bcno, add building image, View Credit
card request and Process with Ac.No and CRN, credit limit, Card cvv (4
digit) number, Cash Limit. ,View all transport booking fees details for each
company based on cluster ,View all transport booked details for each
company based on cluster, View all type of Financial Fraud based on cluster,
View all users with Financial Fraud and give link to show number of same
user is fraud in chart
User
In this module, there are n numbers of users are present. User should
register with group option before doing some operations. After registration
successful he has to wait for admin to authorize him and after admin
authorized him. He can login by using authorized user name and password.
Login successful he will do some operations like Register and Login, View
your profile, Manage Bank Account ,Request Credit card with * Details and
view the same ,View Card Transactions based on transport booked details
,View your payments and transfer to your cc account (if user doesn’t have
enough amount to transfer then he is a fraud user or abnormal user) ,View all
transport company and select corresponding company and book, give
reviews, increment rank ,enter card cvv number(Find fraud if no balance in
cc, if cvv number is wrong) ,View all Booked transport
Transport Company
4. SYSTEM STUDY
ECONOMICAL FEASIBILITY
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY
4.1.1 ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the
system will have on the organization. The amount of fund that the company can pour into
the research and development of the system is limited. The expenditures must be
justified. Thus the developed system as well within the budget and this was achieved
because most of the technologies used are freely available. Only the customized products
had to be purchased.
The developed system must have a modest requirement, as only minimal or null changes
are required for implementing this system.
The aspect of study is to check the level of acceptance of the system by the
user. This includes the process of training the user to use the system efficiently. The user
must not feel threatened by the system, instead must accept it as a necessity. The level of
acceptance by the users solely depends on the methods that are employed to educate the
user about the system and to make him familiar with it. His level of confidence must be
raised so that he is also able to make some constructive criticism, which is welcomed, as
he is the final user of the system.
You can think of Java byte codes as the machine code instructions for the Java
Virtual Machine (Java VM). Every Java interpreter, whether it’s a development tool or a
Web browser that can run applets, is an implementation of the Java VM. Java byte codes
help make “write once, run anywhere” possible. You can compile your program into byte
codes on any platform that has a Java compiler. The byte codes can then be run on any
implementation of the Java VM. That means that as long as a computer has a Java VM,
the same program written in the Java programming language can run on Windows 2000,
a Solaris workstation, or on an iMac.
The Java API is a large collection of ready-made software components that provide
many useful capabilities, such as graphical user interface (GUI) widgets. The Java API is
grouped into libraries of related classes and interfaces; these libraries are known as
packages. The next section, What Can Java Technology Do? Highlights what
functionality some of the packages in the Java API provide.
The following figure depicts a program that’s running on the Java platform. As the
figure shows, the Java API and the virtual machine insulate the program from the
hardware.
Native code is code that after you compile it, the compiled code runs on
a specific hardware platform. As a platform-independent environment, the Java platform
can be a bit slower than native code. However, smart compilers, well-tuned interpreters,
However, the Java programming language is not just for writing cute, entertaining
applets for the Web. The general-purpose, high-level Java programming language is also a
powerful software platform. Using the generous API, you can write many types of
programs.
An application is a standalone program that runs directly on the Java platform. A
special kind of application known as a server serves and supports clients on a network.
Examples of servers are Web servers, proxy servers, mail servers, and print servers.
Another specialized program is a servlet. A servlet can almost be thought of as an applet
that runs on the server side. Java Servlets are a popular choice for building interactive web
applications, replacing the use of CGI scripts. Servlets are similar to applets in that they
are runtime extensions of applications. Instead of working in browsers, though, servlets
run within Java Web servers, configuring or tailoring the server.
How does the API support all these kinds of programs? It does so with packages of
software components that provides a wide range of functionality. Every full
implementation of the Java platform gives you the following features:
The essentials: Objects, strings, threads, numbers, input and output, data
structures, system properties, date and time, and so on.
Applets: The set of conventions used by applets.
Networking: URLs, TCP (Transmission Control Protocol), UDP (User Data gram
Protocol) sockets, and IP (Internet Protocol) addresses.
Internationalization: Help for writing programs that can be localized for users
worldwide. Programs can automatically adapt to specific locales and be
displayed in the appropriate language.
Security: Both low level and high level, including electronic signatures, public
and private key management, access control, and certificates.
Software components: Known as JavaBeansTM, can plug into existing
component architectures.
Object serialization: Allows lightweight persistence and communication via
Remote Method Invocation (RMI).
Java Database Connectivity (JDBCTM): Provides uniform access to a wide
range of relational databases.
The Java platform also has APIs for 2D and 3D graphics, accessibility, servers,
collaboration, telephony, speech, animation, and more. The following figure
depicts what is included in the Java 2 SDK.
The advantages of this scheme are so numerous that you are probably thinking
there must be some catch. The only disadvantage of ODBC is that it isn’t as efficient as
talking directly to the native database interface. ODBC has had many detractors make
the charge that it is too slow. Microsoft has always claimed that the critical factor in
performance is the quality of the driver software that is used. In our humble opinion, this
is true. The availability of good ODBC drivers has improved a great deal recently. And
1. SQL Conformance
SQL syntax varies as you move from database vendor to database vendor. In an effort
to support a wide variety of vendors, JDBC will allow any query statement to be passed
through it to the underlying database driver. This allows the connectivity module to
handle non-standard functionality in a manner that is suitable for its users.
4. Keep it simple
This goal probably appears in all software design goal listings. JDBC is no exception.
Sun felt that the design of JDBC should be very simple, allowing for only one method of
completing a task per mechanism. Allowing duplicate functionality only serves to
confuse the users of the API.
And for dynamically updating the cache table we go for MS Access database.
Java ha two things: a programming language and a platform.
Simple Architecture-neutral
Object-oriented Portable
Distributed High-performance
Interpreted multithreaded
Robust Dynamic
Secure
Java is also unusual in that each Java program is both compiled and interpreted.
With a compile you translate a Java program into an intermediate language called Java
byte codes the platform-independent code instruction is passed and run on the computer.
Compilation happens just once; interpretation occurs each time the program is executed.
The figure illustrates how this works
Compilers My Program
You can think of Java byte codes as the machine code instructions for the
Java Virtual Machine (Java VM). Every Java interpreter, whether it’s a Java development
tool or a Web browser that can run Java applets, is an implementation of the Java VM.
The Java VM can also be implemented in hardware.
Java byte codes help make “write once, run anywhere” possible. You can
compile your Java program into byte codes on my platform that has a Java compiler. The
byte codes can then be run any implementation of the Java VM. For example, the same
Java program can run Windows NT, Solaris, and Macintosh.
5.4 NETWORKING
TCP/IP stack
The TCP/IP stack is shorter than the OSI one:
IP datagram’s
UDP:
UDP is also connectionless and unreliable. What it adds to IP is a checksum for the
contents of the datagram and port numbers. These are used to give a client/server model
- see later.
TCP
Internet addresses
In order to use a service, you must be able to find it. The Internet uses an
address scheme for machines so that they can be located. The address is a 32 bit integer
which gives the IP address. This encodes a network ID and more addressing. The
network ID falls into various classes according to the size of the network address.
Class A uses 8 bits for the network address with 24 bits left over for other
addressing. Class B uses 16 bit network addressing. Class C uses 24 bit network
addressing and class D uses all 32.
Subnet address
Internally, the UNIX network is divided into sub networks. Building 11 is currently
on one sub network and uses 10
10-bit
bit addressing, allowing 1024 different hosts.
Host address
8 bits are finally used for host addresses within our subnet. This places a limit of 256
machines that can be on the subnet.
Total address
Port addresses
A service exists on a host, and is identified by its port. This is a 16 bit number. To
send a message to a server, you send it to the port for that service of the host that it is
running on. This is not location transparency! Certain of these ports are "well known".
#include <sys/types.h>
#include <sys/socket.h>
JFree Chart
JFreeChart is a free 100% Java chart library that makes it easy for developers to
display professional quality charts in their applications. JFreeChart's extensive feature set
includes:
A flexible design that is easy to extend, and targets both server-side and
client-side applications;
Support for many output types, including Swing components, image files
(including PNG and JPEG), and vector graphics file formats (including PDF, EPS and
SVG);
1. Map Visualizations
Charts showing values that relate to geographical areas. Some examples include:
(a) population density in each state of the United States, (b) income per capita for each
country in Europe, (c) life expectancy in each country of the world. The tasks in this
project include:
Sourcing freely redistributable vector outlines for the countries of the world,
states/provinces in particular countries (USA in particular, but also other areas);
3. Dashboards
There is currently a lot of interest in dashboard displays. Create a flexible
dashboard mechanism that supports a subset of JFreeChart chart types (dials, pies,
thermometers, bars, and lines/time series) that can be delivered easily via both Java Web
Start and an applet.
The property editor mechanism in JFreeChart only handles a small subset of the
properties that can be set for charts. Extend (or reimplement) this mechanism to provide
greater end-user control over the appearance of the charts.
Introduction In this section, we will go over some considerations you need to keep
in mind when developing applications for smaller devices. We'll take a look at the way
the compiler is invoked when using J2SE to compile J2ME applications. Finally, we'll
explore packaging and deployment and the role pre verification plays in this process.
Developing applications for small devices requires you to keep certain strategies
in mind during the design phase. It is best to strategically design an application for a
small device before you begin coding. Correcting the code because you failed to
consider all of the "gotchas" before developing the application can be a painful process.
Here are some design strategies to consider:
* Minimize run-time memory use. To minimize the amount of memory used at run time,
use scalar types in place of object types. Also, do not depend on the garbage collector.
You should manage the memory efficiently yourself by setting object references to null
when you are finished with them. Another way to reduce run-time memory is to use lazy
instantiation, only allocating objects on an as-needed basis. Other ways of reducing
overall and peak memory use on small devices are to release resources quickly, reuse
objects, and avoid exceptions.
4.Configurations overview
The configuration defines the basic run-time environment as a set of core classes
and a specific JVM that run on specific types of devices. Currently, two configurations
exist for J2ME, though others may be defined in the future:
is used specifically with the KVM for 16-bit or 32-bit devices with
limited amounts of memory. This is the configuration (and the virtual
machine) used for developing small J2ME applications. Its size limitations
make CLDC more interesting and challenging (from a development point of
view) than CDC. CLDC is also the configuration that we will use for
developing our drawing tool application. An example of a small wireless
device running small applications is a Palm hand-held computer.
is used with the C virtual machine (CVM) and is used for 32-bit architectures
requiring more than 2 MB of memory. An example of such a device is a Net TV box.
5.J2ME profiles
A skeleton profile upon which you can create your own profile, the Foundation
Profile, is available for CDC.
Profile 1: KJava
KJava is Sun's proprietary profile and contains the KJava API. The KJava profile
is built on top of the CLDC configuration. The KJava virtual machine, KVM, accepts the
same byte codes and class file format as the classic J2SE virtual machine. KJava contains
a Sun-specific API that runs on the Palm OS. The KJava API has a great deal in common
with the J2SE Abstract Windowing Toolkit (AWT). However, because it is not a standard
J2ME package, its main package is com.sun.kjava. We'll learn more about the KJava API
later in this tutorial when we develop some sample applications.
Profile 2: MIDP
MIDP is geared toward mobile devices such as cellular phones and pagers. The
MIDP, like KJava, is built upon CLDC and provides a standard run-time environment
that allows new applications and services to be deployed dynamically on end user
devices. MIDP is a common, industry-standard profile for mobile devices that is not
dependent on a specific vendor. It is a complete and supported foundation for mobile
application
* java.lang
* java.io
* java.util
* javax.microedition.io
* javax.microedition.lcdui
* javax.microedition.midlet
* javax.microedition.rms
6. SYSTEM DESIGN
Bank Admin
1. Register and Login(With Bank
Name)
Upload
2. View all users and authorize
3. View All Transport company
Transport Company users and authorize
4. Add bank with its details such as
bname, baddress,
Database
Register and blocation,bpin,bmailid,bcno,add
login the User building image
5. View Credit card request and
1.Register with Company name and Login
Process with Ac.No and
2.Add Transport Details(See below)
CRN,credit limit,Card cvv(4
3. View all Transport Details
digit) number,Cash Limit.
4.View all Booked Transport Details with total
6. View all transport booking fees
bill
details for each company based
5. Find financial fraud -- View all normal and
on cluster
Fraud users
7. View all transport booked details
6. View Type of Financial frauds(Give link for each company based on
below to show numbers of same frauds in chart ) cluster
8. View all type of Financial Fraud
based on cluster
Remote User
USECASE DIAGRAM
Add bank details
Manage Bank
Account
View Card
Transactions based on
User transport booked
Request Credit
card Details
Transport Company
View all transport
booking fees details
Add Transport
View all transport booked Details
details and View all type of
Financial Frauds
View all Transport Details
and View all Booked
Transport Details with
total bill
CLASS DIAGRAM:
End User
Register and Login, View your profile,
Manage Bank Account, ,Request Credit Register, Reset
card Details ,View Card Transactions
Methods based on transport booked details, View Name, Password, DOB,
your payments and transfer to your cc
Gender, Address, City,
account ,View all transport company,
View all Booked transport. Country, Email, Mobile, Pin
code
Members
bname,baddress,blocation,bpin,bmailid,b
cno,add building image, Transporter
name, desc, address, cno, email id,
E-Commerce Website
location, add image, from and to place,
price.
SEQUENCE DIAGRAM:
View all transport booking View Card Transactions based on transport booked details
fees details
Find financial
ial fraud -- View all normal and Fraud users, View Type of Financial
frauds
6.2.4 DEPLOYMENT:
DEPLOYMENT DAIGRAM:
SERVER
Users ADMIN.
SVM.
DFD-DIAGRAM:
Add bank
Bank Admin details, Register
and Login
System
Register
,View all users and
with the
authorize,View All
Transport company system
users and
authorize,View Credit
card request and
End User
View their
Own
Register with Company Details
name and Login ,Add
Manage Bank Transport Details ,View
Account, Request all Transport
Credit card Details, Details,View all Booked
View Card Transport Details with
Transactions based on
transport booked
Transport Company
Start
User Register
Yes No
Login
Log Out
View Card Transactions based on
transport booked details
Start
Admin Login
Yes No
Login
Start
Login
Yes No
Login
Log Out
Response
View all Booked Transport
Details with total bill
7. SAMPLE CODE
HOME PAGE
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Home Page</title>
<link href="style.css" rel="stylesheet" type="text/css" media="screen" />
<style type="text/css">
<!--
.style1 {
font-size: 18px;
color: #FF0000;
font-weight: bold;
}
.style2 {color: #0000FF}
-->
</style>
</head>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li class="current_page_item"><span><a
href="index.html">Home</a></span></li>
<li><a href="AdminLogin.jsp">Bank Admin</a></li>
<li><a href="CompanyLogin.jsp">Transport Company</a></li>
<li><a href="UserLogin.jsp">User</a></li>
<li><a href="#"></a></li>
<li><a href="#"></a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
<div id="logo">
<h1 style="color: RED"><a href="#" class="style1">CODETECT:FINANCIAL FRAUD
DETECTION WITH ANOMALY FEATURE DETECTION</a></h1>
</div>
<div id="search">
<form method="get" action="">
<fieldset>
<input type="text" name="s" id="search-text" size="15"
value="enter keywords here..." />
<input type="submit" id="search-submit" value="GO"
/>
</fieldset>
</form>
</div>
</div>
<div id="splash"> </div>
<!-- end #header -->
<div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h2 class="title"><a
href="#">CoDetect:Financial Fraud Detection With Anomaly Feature Detection</a></h2>
<div class="entry">
<p class="style2">Financial fraud, such
as money laundering, is known to be a serious process of crime that makes illegitimately
obtained funds go to terrorism or other criminal activity. This kind of illegal activities
involve complex networks of trade and nancial transactions, which makes it difcult to
detect the fraud entities and discover the features of fraud. Fortunately,
trading/transaction network and features of entities in the network can be constructed
from the complex networks of the trade and nancial transactions. The trading/transaction
network reveals the interaction between entities, and thus anomaly detection on trading
networks can reveal the entities involved in the fraud activity; while features of entities
are the description of entities, and anomaly detection on features can reect details of the
fraud activities. Thus, network and features provide complementary information for fraud
detection, which has potential to improve fraud detection performance. However, the
majority of existing methods focus on networks or features information separately, which
does not utilize both information. In this paper, we propose a novel fraud detection
framework, CoDetect, which can leverage both network information and feature
CODETECT FINANCIAL FRAUD DETECTION WITH ANOMALY FEATURE DETECTION Page 48
SVIST SAMPLE CODE
information for nancial fraud detection. In addition, the CoDetect can simultaneously
detecting nancial fraud activities and the feature patterns associated with the fraud
activities. Extensive experiments on both synthetic data and real-world data demonstrate
the efciency and the effectiveness of the proposed framework in combating nancial fraud,
especially fo <br />
money laundering.</p>
</div>
</div>
<div style="clear: both;"> </div>
</div>
<!-- end #content -->
<div id="sidebar">
<ul><li><h2>Menu</h2>
<ul>
<li><a href="index.html">Home</a></li>
<li><a href="AdminLogin.jsp">Bank Admin</a></li>
<li><a href="CompanyLogin.jsp">Transport Company</a></li>
<li><a href="UserLogin.jsp">User</a></li>
</ul>
</li>
<li>
<h2>Concepts</h2>
<ul>
<li><a href="#">Anomaly feature detection, </a></li>
<li><a href="#">CoDetect, </a></li>
<li><a href="#">Financial fraud.</a><a
href="#"></a></li>
</ul> </li> <li>
<h2> </h2>
</li> </ul>
</div>
<!-- end #sidebar -->
<div style="clear: both;"> </div>
</div></div></div>
<!-- end #page -->
</div>
</body>
</html>
ADMIN PROFILE
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<%@ include file="connect.jsp" %>
<%@ page import="org.bouncycastle.util.encoders.Base64"%>
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta http-equiv="content-type" content="text/html; charset=utf-8" />
<title>Admin's Profile</title>
<link href="style.css" rel="stylesheet" type="text/css" media="screen" />
<style type="text/css">
<!--
.style1 {
font-size: 18px;
color: #FF0000;
font-weight: bold;
}
.style3 {color: #333333}
.style4 {color: #660000}
.style7 {color:#CC0066}
-->
</style>
</head>
<body>
<div id="wrapper">
<div id="menu">
<ul>
<li class="current_page_item"><span><a
href="index.html">Home</a></span></li>
<li><a href="AdminLogin.jsp">Bank Admin</a></li>
<li><a href="CompanyLogin.jsp">Transport Company</a></li>
<li><a href="UserLogin.jsp">User</a></li>
<li><a href="#"></a></li>
<li><a href="#"></a></li>
</ul>
</div>
<!-- end #menu -->
<div id="header">
<div id="logo">
<h1><a href="#" class="style1">CoDetect: Financial Fraud Detection
With Anomaly Feature Detection</a></h1>
</div>
<div id="search">
<form method="get" action="">
<fieldset>
<input type="text" name="s" id="search-text" size="15"
value="enter keywords here..." />
<input type="submit" id="search-submit" value="GO"
/>
</fieldset>
</form>
</div>
</div>
<div id="splash"> </div>
<!-- end #header -->
<div id="page">
<div id="page-bgtop">
<div id="page-bgbtm">
<div id="content">
<div class="post">
<h2 class="title"><a href="#">Bank Admin
<span class="style7"><%=(String)application.getAttribute("adname")%></span>'s
Profile..</a></h2>
<div class="entry">
<p> </p>
<table width="519" border="1.5" align="center" cellpadding="0" cellspacing="0" >
<%
Statement
st=connection.createStatement();
ResultSet rs=st.executeQuery(query);
if ( rs.next() )
{
i=rs.getInt(1);
s1=rs.getString(2);
s2=rs.getString(5);
s3=rs.getString(6);
s4=rs.getString(7);
s5=rs.getString(8);
s6=rs.getString(10);
%>
<tr>
<td width="226" rowspan="6" ><div class="style7 style26" style="margin:10px 13px
10px 13px;" ><strong><a class="#" id="img1" href="#" >
<input name="image" type="image"
src="user_Pic.jsp?picture=<%="bankadmin"%>&id=<%=i%>" style="width:200px; height:200px;"
/>
</a></strong></div></td>
</tr>
<tr>
<td valign="middle" height="60" style="color: #2c83b0;"><div align="left" class="style4"
style="margin-left:20px;"><strong>Bank Name </strong></div></td>
<td valign="middle" height="60" style="color:#000000;"><div align="left" class="style42
style41 style10" style="margin-left:20px;">
<%out.println(s1);%>
</div></td>
</tr>
<tr>
<td width="122" valign="middle" height="60" style="color: #2c83b0;"><div align="left"
class="style4" style="margin-left:20px;"><strong>E-Mail</strong></div></td>
<td width="163" valign="middle" height="60" style="color:#006666"><div align="left"
class="style42 style41 style10" style="margin-left:20px;">
<%out.println(s2);%>
</div></td>
</tr>
<tr>
CODETECT FINANCIAL FRAUD DETECTION WITH ANOMALY FEATURE DETECTION Page 52
SVIST SAMPLE CODE
<% }
connection.close();
}
catch(Exception e)
{
out.println(e.getMessage());
}
%>
</table>
<p align="right"> </p>
<p align="left"><a href="AdminMain.jsp" class="style11">Back</a></p>
</div>
</div>
<div class="post"></div>
<div style="clear: both;"> </div>
CODETECT FINANCIAL FRAUD DETECTION WITH ANOMALY FEATURE DETECTION Page 53
SVIST SAMPLE CODE
</div>
<!-- end #content -->
<div id="sidebar">
<ul><li><h2>Menu</h2>
<ul>
<li><a href="AdminMain.jsp">Home</a></li>
8. SYSTEM TESTING
The purpose of testing is to discover errors. Testing is the process of trying to
discover every conceivable fault or weakness in a work product. It provides a way to
check the functionality of components, sub assemblies, assemblies and/or a finished
product It is the process of exercising software with the intent of ensuring that the
Software system meets its requirements and user expectations and does not fail in
an unacceptable manner. There are various types of test. Each test type addresses a
specific testing requirement.
System Test
System testing ensures that the entire integrated software system meets
requirements. It tests a configuration to ensure known and predictable results. An
example of system testing is the configuration oriented system integration test. System
testing is based on process descriptions and flows, emphasizing pre-driven process links
and integration points.
Unit Testing:
Unit testing is usually conducted as part of a combined code and unit test
phase of the software lifecycle, although it is not uncommon for coding and unit testing
to be conducted as two distinct phases.
Test objectives
Integration Testing
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
Acceptance Testing
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
9. OUTPUT SCREENS
1. HOME PAGE
2. ADMIN LOGIN
3. ADMIN PROFILE
4. USER LOGIN
5. USER PROFILE
CONCLUSION
SVIST CONCLUSION
10. CONCLUSION
We propose a new framework, CoDetect, which can perform fraud detection on graph-
based similarity matrix and feature matrix simultaneously. It introduces a new way to
reveal the nature of financial activities from fraud patterns to suspicious property.
Furthermore, the framework provides a more interpretable way to identify the fraud on
sparse matrix. Experimental results on synthetic and real world data sets show that the
proposed framework (CoDetect) can effectively detect the fraud patterns as well as
suspicious features. With this co detection framework, executives in financial supervision
cannot only detect the fraud patterns but also trace the original of fraud with suspicious
feature.
Financial activities are involving with time. We can represent these activities into
similarity tensor and feature tensor. So we would like to study how to integrate tensor
into codetect framework for fraud detection.
11. BIBLIOGRAPHY