Credit Card Fraud Detection Analysis
J. Keziya Rani,S.Prem Kumar,U.Ram Mohan, C.Uma Shankar. "Credit Card Fraud Detection Analysis"International Journal of Computer Trends and Technology (IJCTT),V2(2):268-271 - Sep to Oct Issue 2011 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: Computer security and certain aspects of cyber crime is beeing increasing day by day. The detailed study of the present day most commonly encountered cyber crime like Credit card fraud analysis is presented in this paper . The model reported in this paper is based on Hidden Markov Model(HMM), is a markov chain for which the state is only partially observable. In HMM model , We quantize the purchase values x into M price ranges V1; V2; . . . VM, forming the observation symbols at the issuing bank. The actual price range for each symbol is configurable based on the spending habit of individual cardholders. These price ranges can be determined dynamically by applying a clustering algorithm on the values of each cardholder’s transactions, In this work, we consider only three price ranges, namely, low (l), medium (m), and high(h). Our set of observation symbols is, therefore, V ¼ fl; m; hg making M ¼ 3. Keywords: Computer Security, Cyber Crime, Credit Card, HMM model.
References-
[1]Association rules applied to credit card fraud detection Original Research Article Expert Systems with Applications, Volume 36, Issue 2, Part 2, March 2009, Pages 3630-3640
[2]Ekrem Duman, M. Hamdi Ozcelik Detecting credit card fraud by genetic algorithm and scatter search Original Research Article Expert Systems with Applications, Volume 38, Issue 10, 15 September 2011, Pages 13057-13063
[3]Subagging for credit scoring models Original Research Article European Journal of Operational Research, Volume 201, Issue 2, 1 March 2010, Pages 490- 499Giuseppe Paleologo, André Elisseeff, Gianluca Antonini
[4]The comparisons of data mining techniques for the predictive accuracy of probability of default of credit card clients Original Research Article Expert Systems with Applications, Volume 36, Issue 2, Part 1, March 2009, Pages 2473-2480 I-Cheng Yeh
[5]Fraud Detection Handbook of Statistical Analysis and Data Mining Applications, 2009, Pages 347-361 Robert Nisbet, John Elder, Gary Mine
KeywordsCAI strategy, Measuring Performance.