Fam Report Final Last Doc 2
Fam Report Final Last Doc 2
This Micro Project Report Entitled “Credit Card Fraud Detection Using Machine
Learning” By Mr. Yash Patil, Mr. Sameer Jadhav, Mr. Aditya Kesari, Mr.
Masir Momin Is Approved for the Diploma of AIML Engineering (Diploma)
(Third Year) For Academic Year 2023 - 2024.
Examiners
1.
2.
Supervisor
1.
Date:
Place:
ACKNOWLEDGEMENT
2 Introduction 6
3 Aim of Project 7
7 Implementation 14
8 Result 15
9 Conclusion 16
10 References 17
ABSTRACT
It is a systematic literature review to reflect the previous studies that dealt with
credit card fraud detection and highlight the different machine learning techniques to
deal with this problem. Credit cards are now widely utilized daily. The globe has just
begun to shift toward financial inclusion, with marginalized people being introduced
to the financial sector. As a result of the high volume of e-commerce, there has been
a significant increase in credit card fraud. One of the most important parts of today's
banking sector is fraud detection. Fraud is one of the most serious concerns in terms
of monetary losses, not just for financial institutions but also for individuals. as
technology and usage patterns evolve, making credit card fraud detection a
particularly difficult task. Traditional statistical approaches for identifying credit card
fraud take much more time, and the result accuracy cannot be guaranteed. Machine
learning algorithms have been widely employed in the detection of credit card fraud.
The main goal of this review intends to present the previous research studies
accomplished on Credit Card Fraud Detection (CCFD), and how they dealt with this
problem by using different machine learning technique
INTRODUCTION
The payment industry is increasingly offering digital payment methods for a variety
of reasons, including time savings, the ability to pay for purchases over time, the
expansion of the market, ease of use, convenience, credit card rewards, price
protection, purchase protection, and travel benefits, However, it is susceptible to
internet fraud and may increase business expenditures. unfortunately, With the
current trend of financial inclusion, increasingly offering digital payment methods,
and marginalized people being introduced to the financial sector, the number of card
users increases, so does the revenue, making them more vulnerable to fraud
AIM OF MICRO-PROJECT
The aim of this project is to develop an effective and efficient credit card fraud
detection system utilizing machine learning techniques. By harnessing the power of
advanced data analytics and predictive modeling, this project seeks to mitigate
financial losses for both credit card users and financial institutions, enhance security
in the digital payment ecosystem, and contribute to the ongoing battle against
fraudulent activities. The primary objective is to build a robust and accurate fraud
detection model capable of identifying suspicious transactions in real-time, thereby
safeguarding the financial interests and data privacy of consumers while minimizing
false positives, and ultimately providing a secure and seamless experience for
legitimate
TYPES OF CREDIT CARD FRAUD
1.Behavioural Fraud: The first type of credit card fraud is a Behavioural Fraud that
has four types introduced:
1.1 Stolen/Lost Card: Criminals steal a credit card to get access to a lost card
1.2 Mail Theft: Before reaching the real user, fraudsters receive credit cards in the
mail.
1.3 Counterfeit: Fraudsters take card information from one source and use it on
websites that do not require a physical card.
1.4 Merchant Collusion and Triangulation: Criminals pose as an intermediary site,
collecting customer credit card information and redirecting orders using stolen credit
card information.
2.Application Frauds: The second type of credit card fraud is application fraud which
has six types introduced:
2.1 Account Theft and Suspicious Transactions: Criminals can utilize personal
information such as a Social Security number, a secret question answer, or a date of
birth taken from an individual to conduct financial transactions. Because identity theft
is linked to a large number of fraud transactions, financial fraud detection systems
should focus on establishing an analysis of a user's behavior.
2.2 Clone transactions: Among the various kinds of credit card frauds, clone
transactions are common. It simply refers to replicating or making transactions that
are similar to the original. When an organization tries to collect payment from a
partner many times by sending the same invoice to different departments, this can
happen.
2.3 Credit Card Skimming (electronic or manual): Making an illegitimate clone of a
credit or bank card with a device that reads and copies information from the original
card is known as credit card skimming or credit card forging. Scammers extract card
numbers and other credit card information with equipment known as "skimmers,"
save it and resale it to criminals.
2.4 CNP (Card Not Present) Fraud: This could happen if criminals discover the card's
expiration date and account number. These two factors are critical when making an
internet purchase. More retailers are requiring the verification code these days, but it
is not difficult to obtain if you know your account number and expiration date.
Criminals can simply try to enter the verification code at a low frequency and
eventually figure it out. Anomaly detection tools, such as Machine Learning, may be
useful in detecting suspicious trends in a client's activity in order to combat this form
of fraud.
2.5 Phishing: it is a very common type of data theft method. The victim receives a
legitimate looking email posing as a representative of a well-known organization. It
could be a request to update account information or transmit additional personal data
in response to "changes" in the organization's policy or for any other cause. The
victim transmits their personal information without paying enough
CREDIT CARD FRAUD DETECTION TECHNIQUES
ADVANTAGES :
Adaptability: Machine learning models can adapt and evolve over time to
stay ahead of changing fraud tactics and patterns, making them more resilient
to new threats.
Overfitting: Machine learning models can overfit to the training data, which
may result in high accuracy on the training set but poor generalization to new,
unseen data.
This idea is difficult to implement in real life because it requires the cooperation from
banks, which aren’t willing to share information due to their market competition,
and also due to legal reasons and protection of data of their users. Therefore, we
looked up some reference papers which followed similar approaches and gathered
results. As stated in one of these reference papers: “This technique was applied to a
full application data set supplied by a German bank in 2006. For banking
confidentiality reasons, only a summary of the results obtained is presented below.
After applying this technique, the level 1 list encompasses a few cases but with a high
probability of being fraudsters. All individuals mentioned in this list had their cards
closed to avoid any risk due to their high-risk profile. The condition is more complex
for the other list. The level 2 list is still restricted adequately to be checked on a case
by case basis. Credit and collection officers considered that half of the cases in this
list could be considered as suspicious fraudulent behaviour. For the last list and the
largest, the work is equitably heavy. Less than a third of them are suspicious. In order
to maximize the time efficiency and the overhead charges, a possibility is to include
a new element in the query; this element can be the five first digits of the phone
numbers, the email address, and the password, for instance, those new queries can be
applied to the level 2 list and level 3 list”.
RESULT
The code prints out the number of false positives it detected and compares it with the
actual values. This is used to calculate the accuracy score and precision of the
algorithms. The fraction of data we used for faster testing is 10% of the entire dataset.
The complete dataset is also used at the end and both the results are printed. These
results along with the classification report for each algorithm is given in the output as
follows, where class 0 means the transaction was determined to be valid and 1 means
it was determined as a fraud transaction. This result matched against the class values
to check for false positives. Results with the complete dataset is used:
CONCLUSION
[2] C. Reviews, ―a Comparative Study : Credit Card Fraud,‖ vol. 7, no. 19, pp.
998–1011, 2020
[3] A. Agarwal, ―Survey of Various Techniques used for Credit Card Fraud
Detection,‖ Int. J. Res. Appl. Sci. Eng. Technol., vol. 8, no. 7, pp. 1642–1646,
2020, doi:10.22214/ijraset.2020.30614.