0% found this document useful (0 votes)
5 views

ITR Presentation(FINAL)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

ITR Presentation(FINAL)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

RAJARAMBAPU INSTITUTE OF TECHNOLOGY, RAJARAMNAGAR (Diploma)

ITR (22057) Project Report on

“Credit Card Fraud Detection”

Presented By:
Pratik Pakash Patil
(2117400244)
of Class TY Computer Engineering (Diploma)
Under The Guidance of:
Mr. S. M. Momin

for partial fulfillment of the requirement of ‘ITR (22057) ’ subject under MSBTE

Department of Computer Engineering (Diploma)


1
2023-24
Introduction

Fraud can be defined as criminal deception with intent of acquiring financial gain.

• Credit Card Fraud

 Inner Card Fraud: Done by using false identity


 External Card Fraud: Done by using stolen credit card

• How Frauds are Recognized

 Location: Purchase made from different location


 Items you buy: If you deviate from your regular buying pattern or time
 Frequency: Make a large number of transactions in short period of time
 Amount: Suddenly if the costly items are purchased
Objective of Project

• Based upon the user spending ability and even country, it calculates user’s
characteristics.
• The system stores previous transaction patterns for each user.
• More than 20 -30 %deviation of users transaction(spending history and
operating country) is considered as an invalid attempt and system takes
action.
Abstract

• Credit card fraud detection is presently the most frequently occurring problem in the present
world.
• This is due to the rise in both online transactions and e-commerce platforms.
• Credit card fraud generally happens when the card was stolen for any of the unauthorized
purposes or even when the fraudster uses the credit card information for his use.
• In the present world, we are facing a lot of credit card problems.
Main challenges involved in credit card fraud detection are:

• Enormous Data is processed every day and the model build must be fast enough to respond to the
scam in time.

• Imbalanced Data i.e. most of the transactions (99.8%) are not fraudulent which makes it really hard
for detecting the fraudulent ones.

• Data availability as the data is mostly private.

• Adaptive techniques used against the model by the scammers.


Software Used

1)NumPy 2)Pandas

3)Matplotlib

4)Skitlearn

5)Seaborn
DFD of Credit Card Fraud Detection
Requirements

 Software Requirements:

1. Windows 10
2. WAMP
3. Jypter Notebook
4. WAMP
 Hardware Requirements:

1. 1GB RAM
2. 20 GB SSD
3. Router For Internet Connection
Implementation

Phase 1:

 import the necessary packages or libraries:


 Load the dataset from the csv file::

OUTPUT:

• data = pd.read_csv("F:\Rohan\Credit card fraud detection Project\.ipynb_checkpointscredit.csv")


• Understanding the Data (CSV file in output form)
• OUTPUT: data.head()
Implementation

 Phase 2:
Describing the Data
 OUTPUT:

print(data.shapeprint(data.describr())

Time V1 ... Amount Class


count 284807.000000 2.848070e+05 ... 284807.000000 284807.000000
mean 94813.859575 3.919560e-15 ... 88.349619 0.001727
std 47488.145955 1.958696e+00 ... 250.120109 0.041527
min 0.000000 -5.640751e+01 ... 0.000000 0.000000
25% 54201.500000 -9.203734e-01 ... 5.600000 0.000000
50% 84692.000000 1.810880e-02 ... 22.000000 0.000000
75% 139320.500000 1.315642e+00 ... 77.165000 0.000000
max 172792.000000 2.454930e+00 ... 25691.160000 1.000000
Implementation

Phase 3:

 Imbalance in the data


OUTPUT:

 Plotting the Correlation Matrix:


OUTPUT:
Implementation

 Separating the X and the Y values


 Training and Testing Data Bifurcation
 Building all kinds of evaluating parameters
 Visualizing the Confusion Matrix

OUTPUT:
Conclusion

We investigated the data, checking for data unbalancing, visualizing the features, and
understanding the relationship between different features. Fraudsters don't have the chance to make
multiple transactions on a stolen or counterfeit card before the cardholder is aware of the fraudulent
activity.
Thank You

You might also like