Вы находитесь на странице: 1из 26

A CROSS METHODOLOGY FOR CREDIT CARD

DECEPTION RECOGNITION USING ROUGH SET


AND DECISION TREE TECHNIQUE

UNDER THE GUIDENCE OF


N.R.G.K. PRASAD I.ANUSHA (315232915004)
Asst. Professor, M.Tech,(Ph.D) M.Tech, (CST)
ABSTRACT
The use of credit cards is prevalent in modern day society.
The number of credit card fraud cases is constantly increasing in spite
of the chip cards worldwide integration and existing protection
systems.
This is why the problem of fraud detection is very important now
In this paper the general description of the developed fraud detection
system and comparisons between models based on using of decision
tree rough set and cryptography techniques which can be used in credit
card fraud detection mechanisms.
INTRODUCTION

In the credit card transaction credit card credentials for online transaction
and physical card for offline transaction is used. When physical card is
given for the transaction, the credit card details or the card itself can be
stolen and if the owner of the card is not aware about the loss of card it may
result in the fraudulent transactions by unauthorized users and the financial
company is at the loss.
EXISTING SYSTEM
Credit Card is plastic money and is widely used as a mode of payment.
Credit card owners are increasing at a high rate and all users transact with a
sense of security and confidence, hence credit card
security is a prime concern for online transactions.
It is important to safeguard the process so that the e-commerce platform
providers as well as the credit card
providers along with the user using the credit card are not at a loss. Secure
services can be provided only with a reliable and safe model to protect the
transactions
PROPOSED SYSTEM
This section deals with the proposed work. This work is meant for improving the
credit card fraud detection.
This proposed work is made up of various important facts. These are mentioned as
follows:
Preprocessing using Rough Set
Rough sets theory was introduced as a mathematical tool for data analysis.
Data preprocessing reduces the data complexity and offers better chances for
subsequent analysis.
The best features can be found by determining the dependency between any
conditional feature and the decision feature..
PROPOSED ARCHITECTURE

Apply j48

Reduced data set

Apply Rough set

Apply data set


Data Flow Diagram
NUMBER OF MODULES
The modules involved are
Admin/User Module
Purchase & Billing Module
Update Module
Deposit Module

Admin/User Module
In our proposed system provide the login credentials for every user so every user can login to our
system by using their credentials but Admin can create the new user only. Every user credentials
storing and retrieving based cryptography system while creating the new user and login user.

Purchase & Billing Module


This module is used for selecting the items from stock which items they want and generate the bill.
After generating the bill if user wants to pay the money by using credit cards then system generate
the OTP based on decision tree technique, by using this OTP money transaction performed.

Update Module
In this module user can modify or update their profile based on user ID and security questions which
are mentioned while user registration. Main use of this functionality is modified their credentials and
security questions, answers while hacking their credentials by hackers.

Deposit Module
This system provides the option for deposit the money into our account this module used for pay
the amount for credit cards.
MINIMUM HARDWARE REQUIREMENTS

System : Dual core processor


Hard Disk : 80 GB.
RAM : 1 GB
MINIMUM SOFTWARE REQUIREMENTS

Operating system : Windows 7 Ultimate (32-bit) OS


Front End : Visual Studio 2010
Coding Language : C#.NET
Database : SQL Server 2008
USE CASE DIAGRAM:
System

Registration

User
Login

Add/View Products

Administration
View Orders

Data Sets

Dataset Keys for


Verification

Success

Logout
CLASS DIAGRAM

webserver
admin users
mobile users
users
groups
feed backs
add_details()
ranks
view_details()
friend match graph
view_all_users()
register
add groups()
view frauds()
add details()
logout()
view details()
logout()

login
user name register
password
name
password
login()
email
register()
mobile
reset()
end user uid and password
user name
cards register()
reset()
view profile()
transaction()
failed tans()
logout()
SEQUENCE DIAGRAM

web server user


admin

add/view details search products

add/view card information


check transaction

generate keys
security key

verification

verify keys
ACTIVITY DIAGRAM

start

user register

yes login no

add data no
user name and
password wrong
log out
view products

buy product

yes
privacy data
sets keys

verify keys

save
transactions
SCREEN SHOTS
USER REGISTRATION
UPDATE USER PROFILE

In this page user can modify or update their profile based on user Id and
security questions which are mentioned while user registration.
Main use of this functionality is modified their credentials and
security questions, answers while hacking their credentials by hackers.
USER PROFILE UP DATION
ADD PRODUCTS

This functionality was used for adding the new products which their want
to adding, after adding the items or products users can purchase those
products by using their credit cards.
admin can only add the products then users can purchase those
product by their using credit cards
ADD PRODUCTS
VIEW PRODUCTS
PURCHASE BILL
TRANSACTION
List of users
CONCLUSION
Credit card use is prevalent and used by everyone. Owing to the internet
platform payment system is vulnerable to fraud attacks. The fraud detection
systems in credit card transactions need to be very robust and precise, giving
minimum false alerts and exactly classifying the fraud and non-fraud
transactions. The system proposed in this article is very much effective and
accurate. Last section showed that the performance of the proposed system is
much better than existing work. Using this framework, financial institutions
can compare the transaction information with the historical profile patterns to
predict the probability of being fraudulent for a new transaction, and provide
a scientific basis for the authorization mechanisms. Furthermore, resources of
the institutions can be focused on more suspicious transactions to decrease
the fraud levels.

Вам также может понравиться