Вы находитесь на странице: 1из 13

Survey on Various Detection Methods for Credit Card Fraud

Rajeswari. K Durga. M Sakthivel Punniakodi Venkatesh@Saravanan.R Anandan.K

rajeswari2009.it@gmail.com durgamoovarasu@gmail.com Sakthivel-live@live.com rsarvanvenkat@gmail.com barath1115@gmail.com

Abstract— as the rapid growth of electronic commerce technologies, the use of credit cards gets increased. As the
Credit Cards become the popular mode to pay the payment for regular purchase and online purchase, cases of Credit
Card fraud also get increased. Financial fraud gets increasing similarly with the development of the modern
technologies and the global superhighway of the communication, which results in the loss of money/economy. The
financial fraud (fraudulent transactions) is scattered with the genuine transactions and with simple pattern matching
techniques which are not often sufficient to find the frauds accurately. The fraud detection systems are implemented
for all credit cards providing banks to minimize their losses. Many techniques such as artificial intelligence, neural
networks, k-nearest neighbour algorithm, artificial immune system, data mining, fuzzy logic, decision tree, marching,
learning, support vector machine, genetic algorithms etc., are evolved in detecting the various fraudulent transactions
with credit cards. Our paper presents a survey of various types of techniques which are used in the credit card fraud

Keywords— Credit card Fraud Detection method, Credit card fraud, Electronic Commerce.

Data Mining has grown as a field of basic and employed research in computer science in general and e-
commerce in detail. In today’s electronic society, e-commerce has become a necessity sales carry for global business.
Due to the rapid progress of e-commerce and use of credit cards for the purchases has dramatically enhanced.
Unfortunately, the fraudulent use of the credit cards has also become an attractive source of the revenue for the criminals.
Occurrence of the credit card fraud is the increasing dramatically because of vulnerability of security weaknesses in the
traditional credit card process systems, leading to the loss of billions of dollars every year. [1]
Fraud detection is known as illegal activities in commercial and industrial establishments such as banks,
insurance companies, and cell phone companies and so on (Chandola et al., 2009). Fraud is a dangerous ethical trouble
with credit card companies in banking systems. The main purposes of credit card fraud detection are to detect credit card
fraud transactions and cut down the losses on account of such illegal activities. [3]
Credit card fraud is a variable term for theft and fraud committed using a credit card as a fraudulent source of
the funds in a transaction. The aim may be receiving goods without giving, or to obtain the unauthorized funds from an
account. The Credit Card Fraud, one of the largest menaces of business establishments today. However, fighting the
fraud in effect, it is crucial to first realize the mechanisms of executing a fraud. Credit card fraudsters hire a prominent
count of modus operandi to devote fraud. In simple terms, Credit Card Fraud is defined as:
When an individual users uses another individual. The credit card for personal reasons, while the owner of the
card and the card issuer are not aware of the fact that the card constitutes Used. Further, then someone using the card has
no connection with the cardholder or issuer, and has no purpose of either reaching the owner of the card or making
repayments for the purchases made.
Credit card frauds are devoted in the next ways:
 An act of criminal deception (mislead with intent) by use of unauthorized account
 And/or personal information
 Illegal or unauthorized usage of account for personal benefit
 Misrepresentation of account information to obtain goods and/or services. [7]
There are lots ways to devote credit card fraud. Fraudsters are very inventive, quick going people. Primarily
there are two common classes of credit card fraud:
1) Traditional Techniques
2) Modern Techniques
© 2014, IJARCSSE All Rights Reserved Page | 849
The first type of the credit card fraud to be named by this report is Application Fraud, where the individual will
spoof an application to develop a credit card. Application fraud can divide into assumed identity, where an individual
guesses to be someone else; and financial fraud, where someone feeds false information about his or her financial
position to get credit. This probe then becomes on to look at Intercept Fraud, where a card is enforced for legitimately,
but is stolen from the mail service before it arrives at its final destination. There is also the illegal habit of Lost and
Stolen Cards, which causes up a substantial area of credit card fraud. On that point are more sophisticated credit card
fraudsters, beginning with those who develop Fake and Doctored Cards, there are as well those who apply Skimming to
devote fraud. This is where the data applied on either the magnetic strip on the back of the credit card, or the information
stored on the smart chip is imitated from one card to some other. Site Cloning and False Merchant Sites on the Internet
are getting a popular method of fraud for lots any criminals with a skilled ability for hacking. Such sites are planned to
acquire people to hand over their credit card items without making they have been scammed. Triangulation is also a new
Triangulation is when a merchant bids a product at a very cheap cost of a website. When a customer looks
forward to buy the product the merchant tells customer to give via email once the item is delivered. The merchant applies
a fraudulent card number to buy the product from a Web site and ships the product to the consumer, who then ship the
merchant his or her credit card items via email. The merchant becomes on running in this way utilizing the credit card
numbers that have been sent from the consumers to buy products, expecting for a abruptly time to be a legitimate
merchant ahead he or she closes the Web site and starts a new one. Their fields substantially the more advanced
fraudsters, who use Credit Card Generators; computer emulation software that creates valid credit card numbers and
expiry dates. These authors are extremely reliable at arriving at valid credit card details and are available for free
download off the internet. Making them available to lots someone who run fraudulent operations. [5]
Credit-card purchases can be classified into 2 types:
1) Virtual card and,
2) Physical card.
The physical-card based purchase; the cardholder gives his card physically to a merchant for arriving at a
payment. To convey out fraudulent deals in this form of purchase, an attacker has to stealthy credit card. If the cardholder
does not make the loss of the card, it can lead to a significant financial loss for Credit Card Company. In the second form
of purchase, only some crucial information around a card (card number, expiration date, security code) is called in to
build the payment. These purchases are commonly caused on the Internet. To denote the fraud in various types of
purchases, a fraudster merely needs to know the card items. Most of the time, genuine cardholder where not aware that
somebody else has considered or stolen his card data. The only path to notice this form of fraud is to examine the
expenditure patterns on all cards and to figure out the, any inconsistency with the respect to “usual” expenditure patterns.
Fraud-detection is based on an analysis of the existing purchase date of the cardholder is promising way to
decrease the rate of the successful credit card frauds. Since humans incline to show particular behaviouristic profiles, all
cardholder can be constituted by a set of patterns holding information about the distinctive purchase category, the time
ago the final purchase, the amount of money spent. [9]
The Credit card fraud, divided into 2 types: The offline fraud and the online fraud. Offline fraud is devotedly
using a stolen physical card at call canter or storefront. In almost, the institution publishing the card, cans locket earlier, it
is used in a fraudulent mode. Online fraud is the committed via web, and phone shopping (or) the cardholder not
introduce. Only the card‘s details are wanted, and a manual signature and card imprint were not expected at the time of
purchase. [5]

© 2014, IJARCSSE All Rights Reserved Page | 850


Figure 1: Fraud statistics Report for 2012

 High Yield Investment Fraud.

These schemes typically offer guaranteed returns on low-or-no-risk investments in securities
instruments. Perpetrators take advantage of the investors’ trust and claim high returns to operate their funds. The
most prevalent high yield investments appear in the form of: Pyramid Scheme, Prime Bank Scheme, Advance
Fee Fraud, Commodities Fraud (foreign currency exchange and precious metals fraud) and promissory notes.
 Broker Embezzlement.
These schemes include broker unauthorized and illegal actions to gain profit from the client’s
investment. This may involve unauthorized trading or falsifying documents.
 Late-Day Trading.
These schemes involve trading a security after market is closed.
 Market Manipulation.
These schemes involve individuals, or a group of people attempting to interfere with a fair and orderly
market to gain profit.
The Challenges involved in developing data mining applications for fraud detection:
 Massive datasets.
 Accuracy.
 Privacy.
 Performance measures.
 Complexity.
The main aim is to identify, different types of the credit card fraud, and also to review the alternative techniques that
have been used in fraud.


The credit card data used in this study are taken from a national bank’s credit card data warehouse with the
expected license. The past data in the credit card data warehouses are used to form a data mart representing the card
usage profiles of the customers. Though some of the customers may have more than one credit card, each card is
accepted as a singular profile since customers with more than one card generally use each card for a different purpose.
Every card profile comprises of varying each of which exposes a behavioural characteristic of the card usage. These
variables may show the spending habits of the customers with respect to geographical locations, days of the month, hours
of the day or Merchant Category Codes (MCC) which show the type of the merchant where the transaction takes place.
Later on, these variables are used to build a model to be used in the fraud detection systems to distinguish fraudulent
activities which show significant deviations from the card usage profile stored in the data mart.

© 2014, IJARCSSE All Rights Reserved Page | 851

The number of transactions for each card differs from one to another; however, each transaction record is of the
same fixed length and includes the same fields. Hand and Blunt gave a detailed description of the characteristics of credit
card data. These fields range from the date and hour of the transaction to the amount, transaction type, MCC code, the
address of the merchant where the transaction is done and etc. The date and hour of the transaction record shows when
the transaction is made. Transaction type shows whether this transaction is a purchase or a cash-advance transaction.
The MCC code shows the type of the merchant store where the transaction takes place. These are fixed codes given by
the members of the VISA International Service Association. However; however, many of these codes, forms natural
groups. So, instead of working with hundreds of codes, we grouped them into 25 groups according to their nature and the
risk of availability to commit a fraud. The goods or services bought from merchant stores in some MCC codes can be
easily converted to cash. As a result, transactions belonging to these MCC codes are more open to fraud and more risky
from the transactions belonging to others. The grouping of the MCC codes is done according to both the number of the
fraudulent transactions made belonging to each MCC code and the interviews done with the personnel of the data
supplier bank with domain expertise about the subject.
The distribution of the data with respect to being normal or fraudulent is highly imbalanced with a ratio of about
20000 normal deleterious one fraudulent transaction record. So, to change the models to learn both types of profiles,
some under sampling or oversampling techniques should be used. Instead of oversampling the fraudulent records by
making multiple copies or etc., we use stratified sampling to under sample the legitimate records for meaningful number.


A payment card transaction in general comprises of two steps: transaction flow and clearing and settlement.
A. Transaction Flow
The process of a transaction begins when a cardholder swipes a card on a payment end or gets into the details of
a card onto an E-commerce website [13]. The merchant that controls the terminal and the website enters the type of card,
account number, expiry date and other codes. It then forwards the card data and the transaction amount to a merchant-
acquirer. A merchant-acquirer is a financial institution which is responsible for its merchant customers’ transactions on
payment card networks. There are two different models. Payment networks such as Visa and MasterCard do not directly
issue cards to customers.
Instead, cards are issued through their member financial institutions. Other payment networks such as Discover
and American Express can emerge a card immediately. In otherwise, Discover and American Express play two roles are
merchant-acquirer and payment network. After that, acquire forwards the transaction data to the card issuer via a secure
payment card network. The issuer checks the account status in the database and replies to the acquirer. The acquirer then
forwards the authorization code to the terminal device [13]. In certain cases, the acquirer might authorize, directly
without sending the transaction data to the issuer. This complete process might differ in some countries.
Notice that the transaction flow, not result in actual collection of the funds at that time, even though the sales
process proceeds at the merchant location [13]. Instead, it is simply a confirmation that the issuer authorizes the
transaction and agrees to settle this transaction with the career and its merchant customer. In general, small merchants
send the details of the daily transaction to acquirer at the end of day, and large merchants send the details on a real-time
basis. The process of the collecting funds from a issuing bank and the reimbursing merchant can only start after the
transaction details are sent to the acquirer. The process is referred to as the “clearing and settlement” process or the
“settlement” process [13].

B. Clearing and Settlement

In the clearing and settlement process [13], later the acquirer gets the transaction details, the acquirer sends the
data to the set aside payment network (such as Visa, MasterCard, etc.), by which the transaction data are led to the
various card issuers. The issuer then charges respective card holders for the transaction amount and remits funds less the
issuers ‘fee through the network to the acquirer. The acquirer then subtracts the fees for the issuer, the network, and itself,

© 2014, IJARCSSE All Rights Reserved Page | 852

and then deposits the rest of the fund to the merchant’ account with the acquirer. Typically, the customer is charged and
the merchant is funded within 24-72 hours.


One of the largest troubles linked with fraud detection is the deficiency of both literatures allowing for
experimental results and of real world data for academic researchers to perform experiments on. This is because fraud
detection is often associated with sensitive financial data that is kept confidential for reasons of customer privacy.
We directly count some of the places a fraud detection system should have in order to perform good results. The system
must able to handle the skewed distribution, since only a very small % of all the credit card transactions are fraudulent.
To solve this problem, often the training sets are divided into pieces where the distribution is less skewed [Chan98]. This
is simply the presence of errors in the data, for instance incorrect dates. Noise in actual data limits the accuracy of
generalization that can be achieved, no matter how extensive the training set is One way to deal with this problem is by
cleaning the data [Faw97]. Overlapping data is another problem in this field. Many transactions may resemble fraudulent
transactions, when actually they are legitimate.
The opposite also happens, when a fraudulent transaction that appears to be normal. System should be able to
the adapt themselves to the new kinds of fraud. Since after a while, successful fraud techniques describe inefficiency, due
to the fact that they become well known. Then a “good” fraud tries to find new and inventive ways of doing this job.
There is a need for better metrics to evaluate the classifier system. As an example, the overall accuracy is not the suited
for the evaluation on a skewed distribution, and since even with of very high accuracy, where almost all fraudulent
transactions can be misclassified. The systems must take into account of the cost of fraudulent behaviour that detected
and the cost associated by stopping it. For example, there was no profit is made by stopping a fraudulent transaction of
only a few Euros. This means that there should be a decision layer on top of the fraud detection system. The decision
layer decides what action to take when fraudulent behaviour is detected via the fraud detection system, taking into
account factors like the amount of the transaction and the quality of the customer doing the transaction.


Resilience is the power to put down gracefully when below nearly literal attacks. The basic question called for
by all detection systems is whether they can accomplish resilience. To do so, the detection system deals off a small
degree of efficiency (degrades working speed) for a lot larger degree of effectiveness (improves security by detecting
nearly literal attacks). In fact, whatever class of security calls for tradeoffs. The detection system motives “defense-in-
depth” with multiple, sequential, and independent layers of defense to cover different types of attacks. These layers are
needed to cut false negatives.
In other words, any fortunate attack has to authorize all layers of defense without existence detected. The two
most capital challenges for the data mining-based layers of defense are adaptively and use of character data. These
challenges demand to be covered in order that reduce false positives. Adaptively accounts for the changing fraud
behaviour, as they seek to detect fraud exchanges its behaviour. Simply what is not evident, yet equally essential, is the
need to also account for changing legal (or legitimate) behaviour within a changing surround. In the credit application
domain, changing legal behaviour is displayed by communal relationships (such as rising/falling numbers of siblings)
and can be caused by external events (such as introduction of organizational marketing campaigns).
This means effectual behaviour can be difficult to make out from fraud behaviour, but it will be shown
afterwards in this paper that they are surely distinguishable from apiece other. The detection system demands to exert
caution with applications which reflect communal relationships. It also needs to arrive at allowance for certain external
events. Quality data are extremely suitable for data mining and data quality can be improved done the real time removal
of data errors (or noise). The detection system has to filter duplicates which have been re-entered due to human error or
for other reasons. It also needs to dismiss extra attributes which have many lacking values, and other issues [14].
Three methods of identity crime detection procedures are:

© 2014, IJARCSSE All Rights Reserved Page | 853

1. Known fraud corresponding (Phua et al. 2005) as first-layer defense - it is effective since repetitive frauds and literal
identity theft. Still, there is a long hold up between the time that the identity is stolen and time the identity is really
described stolen. This allows adversaries to apply any stolen identity quickly before being discovered.
2. Communal detection (Phua et al. 2006b) as a second - layer defense - it applies an example based approach (similar
to graph theory and record linkage) by working on a fixed set of attributes. It comes down the significant time holed
up and false alarms by filtering pattern human relationships with white lists to save significant money. In addition, it
is good for new duplicate frauds and synthetic identity fraud. But communal detection is domain-specific, inflexible,
and computationally slow.
3. Spike detection (Phua et al. 2006a) as a third layer defense - it uses an attribute-oriented approach (similar to time
series analysis) by working on a variable-size set of attributes. It reduces significant time comes down by searching
for recent duplicates. In comparison to communal detect without blocking (Baxter et al. 2003), spike detection with
string similarity matching is computationally faster.


Here we conclude that there are various methods for fraud detection to detect credit card fraud.the multiple
approaches like [8][9][20].
1. Fusion Approach Using the Dempster-Shafer Theory & Bayesian Learning.
2. Blast-Ssaha Hybridization
3. Neural Network or Bayesian Network
4. Genetic Algorithm
5. Artificial Immune System
6. Decision Tree
7. Support Vector Machine
8. Hidden Markov Model.
9. K- nearest neighbor algorithm

1. Fusion Approach Using the Dempster-Shafer Theory & Bayesian Learning

The first approach [21] Dempster-Shafer Theory which is basically proposes the Fraud Detection System with
the help of information fusion and the Bayesian learning. The information fusion and the Bayesian learning are carried
by the evidences from current and the past behaviour, which is combined together and depending on the certain type
behaviour in term it establishes an activity profile for every cardholder.[22] [23] [24]
Reduces false alarm, high accuracy, improves detection rate, processing speed, and applicable in E-commerce.
Highly expensive.

© 2014, IJARCSSE All Rights Reserved Page | 854

Figure 2: Fusion Approach Using the Dempster-Shafer Theory & Bayesian Learning

2. Blast-Ssaha Hybridization
Blast -Ssaha Hybridization [25] is explained as hybridization of Blast and SSAHA algorithms. These algorithms
are basically the efficient and two-stage sequence alignment way of algorithm which is used for the analysing spending
behaviour of the customers. The algorithm performance is good, and also accuracy is high. This is very useful in the
telecommunication and the banking fraud detection with high processing speed. [26]
Merits: accuracy, high performance, and high speed.
Demerits: This algorithm does not detect the cloning of the credit cards.

Figure 3: Blast-Ssaha Hybridization

3. Neural Network (Bayesian Network)

Neural and Bayesian network is a approach of automatic credit card fraud detection system and it’s the type of
artificial intelligence programming. This approach is based on the variety of methods such as machine learning approach,
supervised and the data mining for reasoning under the uncertainty condition. Neural network uses approaches such as
self organizing map and back propagation neural network.[22] [23]
Merits: good accuracy, processing speed is high

© 2014, IJARCSSE All Rights Reserved Page | 855

Demerits: Even though processing speed is high, this method required high processing time for the large neural networks,
needs more training of data to operate.

Figure 4: Neural Network (Bayesian Network).

4. Genetic Algorithm
Genetic algorithm was first introduced by Holland (1975). The main aim of genetic algorithm was obtained
better solution as the time progresses. The fraud detection problem is one of the classifications of problem, in which
some of the statistical methods with of many data-mining algorithms that have been proposed to solve it. The decision
tree is the most popular among all other methods. The fraud detection is usually used in the domain of banking, data
mining, and E-commerce.[27]
Genetic algorithms [28] are the evolutionary algorithms; aim at obtaining the better solutions as time progresses.
Since their first introduction by Holland, they have been successfully applied to many problem domains from astronomy
to sports, from optimization to computer science, etc. They have also been used in the data mining mainly for the
variable selection and mostly coupled with the other data mining algorithms. In this study, we try to solve our
classification problem by using only a genetic algorithm solution.

5. Artificial Immune System

In 1998, Neal et al. [29] developed an arti_cial immune system (AIS), JISYS, applied it for the mortgage Fraud
detection, and reported some _rst results, still based on simulated data. The AIS emulates the mechanism of human
immune systems that save human bodies from complex natural biological attacks. The main developments within AIS
have focused on three main immunological theories: clonal selection, negative selection and immune Networks the
development of the fraud-detection system and for credit card that was based on the artificial immune systems. Artificial
immune systems in turn inspired by a concept of the biological immune system (BIS). In this paper we demonstrate the
analogy between the FDSCC transactions based on the AIS and BIS. FDSCC will assist promote e-commerce as it was
effectively reduce the losses due to the card not present and the other online credit card frauds. In this article we
demonstrate schematically in Figure 5, the analogy between fraud detection systems for credit card (FDSCC) transactions
based on the principles of Artificial Immune Systems (AIS) with that of biological immune system (BIS). [30]

© 2014, IJARCSSE All Rights Reserved Page | 856

Figure 5: the analogy between FDSCC and transactions based on the principles of AIS with that of BIS.

6. Decision Trees
In this study, the performance of classifier models built by using the well-known decision tree methods C5.0,
C&RT and CHAID. A decision tree is a tree structure which attempts to separate the given records into mutually
exclusive subgroups. To do this, starting from the root node, each node is split into child nodes in a binary or a multi split
fashion related to the method used based on the value of the attribute (input variable) which separates the given records
best. Records in a node is recursively separated into child nodes until there is no split that makes statistical difference on
the distribution of the records in the node or the number of records in a node is too small. Each decision tree method uses
its own splitting algorithms and splitting metrics. [22][31]

7. Support vector machine

A number of different SVM methods (SVM with polynomial, sigmoid, linear and RBF kernel functions) are
compared. SVM tries to find a hyper plane to separate the two classes while minimizing the classification error. SVM is a
new and promising classification and regression technique proposed by Vapnik and his group at AT&T Bell Laboratories.
SVM learns a separating hyper plane which maximizes the margin and produces good generalization ability.
In prior literature, SVM has been successfully applied to many areas such as telecommunication fraud
detection , pattern recognition , system intrusion detection SVM’s basic idea is to transform the attributes to a higher
dimensional feature space and find the optimal hyper plane in that space that maximizes the margin between the classes.
Briefly, SVM does this by using a polynomial, sigmoid, radial basis or a linear kernel function which satisfies the Mercer
condition. The kernel function reflects the geometric relationship between the input record and the support vector, or the
similarities of the features of the classes.

8. Hidden Markov Model

The double embedded stochastic process is carried in a hidden Marko model with used to model more complicated
processes (stochastic processes) as compared to the Traditional Markov Model. If incoming Credit card transaction is not
the accepted by trained Hidden Markov Model using sufficiently high probability which is considered to be fraudulent
transaction. HMM, [32] training is carried by Baum Welch algorithm and clustering is carried by K-mean algorithm.
HMM Sres data which is in the form of clusters, form three price values with ranges low, medium and high [33]. Initial
set probabilities of the transaction have chosen and the FDS checks are carried to find whether transaction is genuine or
fraudulent. HMM maintains a log for the each transactions, thus it reduces the tedious work of the employee but high
false alarm and high false positive are produced [34]
Hidden Markov Model: double embedded processes (stochastic process), which is used to model more complicated
processes (stochastic processes) as compare to that of traditional Markov Model. A Hidden Markov Model [35] is trained

© 2014, IJARCSSE All Rights Reserved Page | 857

with normal behaviour of the cardholder initially. And works on the user profiles and can be divided into three types as
given below, [36]
a. Lower profile.
b. Middle profile.
c. Higher profile.


A data stream outlier-detection algorithm is used for fraud detection of credit card, which is carried on the base of
reverse k nearest neighbours which is called as SODRNN. The SODRNN algorithm distinct quality is to scan the
database as many time as possible and it doest not suitable for the data stream environment [37].
The performance of the K nearest neighbor algorithm is carried with the help of three main factors which is proposed
by Mohammed J.Islam:
1. Distance Metric.
2. Distance Rule.
3. Number of Neighbors. (used to classify the samples)

Currently the credit card risk monitor system is one of the key factor for the merchants banks, the organization to
improve the merchants risk managements level in automatic, adequate and scientific way. We have many ways of
detection of the credit card fraud detection. If one of the method or the combination of the algorithms is applied for the
credit card fraud-detection system and the probability of the fraud transactions can be predicted soon after the credit card
transactions is carried by the banks. A series of anti fraud methods and strategies can be adopted for the prevention of
bank from great losses and reduces the risks. In this paper we had given contribution of various effective ways of the
credit card fraudulent detection.

[1] Amlan Kundu ,Suvasini Panigrahi , A.K. Majumdar, Shamik Sural , “The Credit card fraud detection: A fusion
approach using Dempster–Shafer theoryand Bayesian learning”, International journal on Information Fusion 10
[2] Kavita Rawat ,Jyoti Hazrati, “Credit Card Fraud Detection Using HiddenMarkov Model”, International Journal of
Latest Research in Science and Technology Vol.1,Issue 4,November-December (2012)
[3] Maryamsadat Hejazi, Yashwant Prasad Singh, “The Credit Card Fraud-Detection Using the Kernel Methods with
Support Vector Machine”, Journal of Advanced Computer Science and Technology Research 2 (2012)
[4] Chiyuan LI, ZhiqiangYAO,“The Validation of Credit Card Number on Wired and Wireless Internet”, Journal Of
Networks, Vol. 6, No. 3, March 2011
[5] Venkata Ratnam Ganji, Siva Naga Prasad Mannem, “Credit card fraud detection using anti-k nearest neighbor
algorithm”, (IJCSE) ISSN : 0975-3397 Vol. 4 No. 06 June 2012
[6] Manoel Fernando Alonso Gadi, Alair Pereira do Lago, Xidi Wang, “A comparasion of classification methods applied
on credit card fraud detection”, Article presented to Brazil, Sao Paulo, april 2008
[7] Tej Paul Bhatla, Vikram Prabhu & Amit Dua,“Understanding Credit Card Frauds”, Cards Business Review#2003–01
June 2003
[8] Clifton Phua,Ross Gayler, Vincent Lee, Kate Smith-Miles, “On the communal analysis suspicion scoring for identity
crime in streaming credit applications”, European Journal of Operational Research 195 (2009)
[9] Abhinav Srivastava, Amlan Kundu, Shamik Sural, “Credit Card Fraud-Detection Using the Hidden Markov Model”
[10] Dr. R.Dhanapal, V.Dheepa, “The Analysis of Credit Card Fraud Detection”, International Journal of Recent Trends
in the Engineering, Volume 2, No. 3, November 2009

© 2014, IJARCSSE All Rights Reserved Page | 858

[11] Lokesh Sharma, Raghavendra Patidar, “the Credit Card Fraud Detection Using the Neural Network”, (IJSCE) ISSN:
2231-2307, Vol-1, Issue-NCAI2011, June 2011
[12] Chang-Tien Lu, Yufeng Kou, Sirirat Sinvongwattana Yo-Ping Huang, “The Survey of Fraud Detection Techniques”,
2004 IEEE International Conf on., Networking, Sensing & Control Taipei, Taiwan, March 21-23, 2004
[13] Jing Liu, Yang Xiao, Hui Chen, Suat Ozdemir, Srinivas Dodle, and Vikas Singh, “A Survey of Payment Card
Industry Data Security Standard”, IEEE Communications Surveys & Tutorials, Vol. 12, No. 3, Third Quarter 2010
[14] K.S.Arthisree, A.Jaganraj, “Identify Crime Detection Using Data Mining Techniques”, International Journal of
Advanced Research in the Computer Scic., & Software Engineering Volume 3, Issue 8, August 2013 ISSN: 2277
[15] Arunabha Mukhopadhyay, Sayali Mukherjee and Ambuj Mahanti,” Artificial Immune System for the detecting of
online credit card frauds”, CSI Communications | December 2011 | 13
[16] Manoel Fernando Alonso Gadi, Xidi Wang and Alair Pereira do Lago, “Credit Card Fraud Detection with Articial
Immune System”.
[17] Y. Sahin and E. Duman,“Detecting Credit Card Fraud by Decision Trees and Support Vector Machines”, Proceeding
of the International Multiconference of Enfineers and Computer Scientists 2001 Vol I.
[18] Dr R.Dhanapa , Gayathiri.P, “Credit Card Fraud Detection Using Decision Tree For Tracing Email And Ip”, IJCSI
[19] Ganesh Kumar.Nune, P.Vasanth Sena and T.P.Shekhar,” Novel Artificial Neural Networks & the Logistic Approach
for the Detecting Credit Card Deceit”, International Journal of Computer Science and Management Research Vol 1
Issue 3 October 2012 ISSN 2278-733X
[20] Krishna Kumar Tripathi, Mahesh A. Pavaskar,“Survey on Credit the Card Fraud Detection Method”, (IJETAE),
(ISSN 2250-2459, Volume 2, Issue 11, November 2012)
[21]Sandeep Pratap Singh, Shiv Shankar P.Shukla,Nitin Rakesh and Vipin Tyagi "Problem Reduction In the Online
Payment System with Hybrid Model" , (IJMIT) Vol.3, No.3, August 2011.
[22] A. Annie Portia, S. Benson Edwin Raj, “Analysis on the Credit Card Fraud Detection Method”, International
Conference on Comp, Communication & Electrical Tech. – ICCCET2011, 18th & 19th March, 2011.
[23] Masoumeh Zareapoor, Seeja.K.R, and M.Afshar.Alam, “Analysis of the Credit Card Fraud-Detection Tech: is based
on the Certain Design Criteria”, IJCA, (0975 – 8887) Volume 52– No.3, August 2012 .
[24] Khyati Chaudhary, Jyoti Yadav, Bhawna Mallick, “A review of Fraud Detection Techniques: Credit Card”,
International Journal of Computer Applications (0975 – 8887) Volume 45– No.1, May 2012.
[25] M. Hamdi Ozcelik, Ekrem Duman, “The Detecting credit card fraud by the genetic algorithm and the scatter search”.
Elsevier, Expert Systems with Apps, (2011). 38; (13057–13063).
[26] Masoumeh Zareapoor, Seeja.K.R, and M.Afshar.Alam, “Analysis of the Credit Card Fraud Detection Techniques:
the based on a Certain Design Criteria”, International Journal of Comp Apps (0975 –8887) Volume 52– No.3,
August 2012 .
[27] D.UmaDevi, K.RamaKalyani, “ The Fraud Detection of the Credit Card Payment System by the Genetic Algorithm”,
IJSER, Volume 3, Issue 7, July-2012.
[28] M. Hamdi Ozcelik, Ekrem Duman, “Detecting the credit card fraud by using the genetic algorithm and the scatter
search”. Expert Systems with Applications, (2011). 38; (13057–13063).
[29] J. Hunt, J. Timmis, D. Cooke, M. Neal, C. King “Development of an artificial immune system for real-world
applications”. Artificial Immune Systems and their Applications, Springer; (1998). (157–186).
[30] A. Brabazon, J. Cahill, P. Keenan1, D. Walsh, “Identifying Online Credit Card Fraud using Artificial Immune
Systems”,IEEE Congress on Evolutionary Computation (CEC), 2010.
[31] Y. Sahin and E. Duman, “Detecting Credit Card Fraud by Decision Trees and Support Vector Machines”,
International Multiconference of Engineers and computer scientists March, 2011.
[32] Abhinav Srivastava, Amlan Kundu, Shamik Sural and Arun K. Majumdar, "The Credit Card Fraud-Detection Using
the Hidden Markov Model" IEEE, Volume-5, No 1.

© 2014, IJARCSSE All Rights Reserved Page | 859

[33]S. Patil, and V. Bhusari, “Study of the Hidden Markov Model in Credit Card Fraudulent-Detection”, IJCA (0975 –
8887) Volume 20– No.5, April 2011.
[34] V.Bhusari ,S.Patil ," Study of Hidden Markov Model in the Credit Card Fraudulent Detection ",International Journal
of Computer Applications (0975 - 8887) Volume 20- No.5, April 2011.
[35] Amlan Kundu, Abhinav Srivastava, Shamik Sural, Arun K. Majumdar. “The Credit Card Fraud-Detection using the
Hidden Markov Model”. IEEE Transactions on dependable and secure computing,Volume 5; (2008) (37-48).
[36] Masoumeh Zareapoor, Seeja.K.R, and M.Afshar.Alam, “Analysis of the Credit Card Fraud Detection Tech: which is
based on the Certain Design Criteria”, IJCA, (0975 – 8887) .
[37] Venkata Ganji, Siva Naga Prasad Mannem, “Credit card fraud detection using the anti-k nearest neighbor
algorithm”, International Journal on Computer Sci., & Engineering (IJCSE), Vol. 4 No. 06 June 2012.


Ms. Rajeswari. K was born on September 20th, 1989, in Pondicherry, India. She received the
B.Tech degree in Information Technology from the Christ College of Engineering and Technology,
Pondicherry University and she is currently pursuing the first year M.Tech under the stream of
Networking from Sri Manakula Vinayagar Engineering college , Pondicherry University.

Ms. Durga.M as born on February 5th 1991, in Pondicherry, India. She received the B. Tech degree
in Information Technology from the Indira Gandhi College of Engineering and Technology for
women, Anna University and she is currently pursuing the final year M.Tech under the stream of
Networking from Sri Manakula Vinayagar Engineering college , Pondicherry University.

Mr. Sakthivel Punniyakodi was born on March 16th 1991, in Pondicherry, India. He received the
B. Tech degree in Information Technology from the Christ College of Engineering and
Technology, Pondicherry University and he is currently pursuing the first year M.Tech under the
stream of Computer Science from Sri Manakula Vinayagar Engineering college , Pondicherry

Mr. Venkatesh @ Saravanan.R was born on 17th June on 1989, in Karaikal, Pondicherry, India. He
received the Diploma in Computer science from the Karaikal Polytechnic college, Pondicherry
university in 2007,then B.Tech degree in computer science from the Bharathiyar College of
engineering and technology, karaikal, Pondicherry university,2010 ,he was worked in Iwiz Hitec
Solutions (P) Ltd, Chennai as JAVA Programming in Software development around 2years and he
is currently doing his Final year M.Tech in Networking from Sri Manakula Vinayagar Engineering
college , Pondicherry University.

© 2014, IJARCSSE All Rights Reserved Page | 860

Mr. Anandan.K was born on March 11th 1992, in Pondicherry, India. He received the Diploma in
Computer science from the Krishnasamy Memorial polytechnic college, Anna university, B. Tech
degree in Computer science and engineering from the Sri Manakula Vinayagar Engineering
college , Pondicherry University, he was worked in HCL Info system and he is currently pursuing
the first year M.Tech under the stream of Networking from Sri Manakula Vinayagar Engineering
college , Pondicherry University.

© 2014, IJARCSSE All Rights Reserved Page | 861