Spirit of Identity Fraud And Counterfeit Detection
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - June Issue 2013 by IJCTT Journal|
|Volume-4 Issue-6 |
|Year of Publication : 2013|
|Authors :M.Swathi, K.Kalpana|
M.Swathi, K.Kalpana "Spirit of Identity Fraud And Counterfeit Detection "International Journal of Computer Trends and Technology (IJCTT),V4(6):1891-1895 June Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: - Now-a-days the shopping as been evolved as70% online and 30% as offline. In this 30% also 20% have been paid by smart cards. This smart cards usage have found wide spread due to flexible usage. The applications for these credit cards are based on internet or manual applications by the customers who require the smart cards and various loans. The applications in above cases found fraud is a specific case of identity crime. The application fraud pattern is represented by some specific features which may be found duplicates relative to the established base of some criteria. In the existing system we use Communal Detection (CD) i.e. Communal detection Spike Detection (SD) i.e. Spike Detection. Communal Detection (CD) finds real social relationships to reduce the suspicion score and tamper resistant to synthetic social relationships. It is white list-oriented approach on a fixed set of attributes. Spike Detection (SD) finds spikes in duplicates to increase the suspicion score, and is probe-resistant for attributes. The existing system detects the whether the applicant is fraud. It is the attribute-oriented approach on a variable-size set of attributes. In the existing system the fraudster datum nre stored in the database manually. In this proposed system, Communal Detection (CD) and Spike Detection (SD) can detect more types of attacks, better account for varying legal actions, and remove the redundant attributes and to store the fraudulent datum in blacklist using CBR algorithm. CBR algorithm analysis using retrieval, diagnosis and resolution to make the data more secure and to find the fraudulent data. The data that already present or fraudulent is encountered and thrown into the blacklist. Together Communal Detection (CD), Spike Detection (SD) and CBR ensure the data provided by the customer is original. This proposed system makes the system more efficient and enhance the security.
 Resilient Identity Crime Detection Clifton Phua, Member, IEEE, Kate Smith-Miles, Senior Member, IEEE, Vincent Cheng-Siong Lee, and Ross Gayler
 A. Bifet and R. Kirkby Massive Online Analysis, Technical Manual, Univ. of Waikato, 2009.
 R. Bolton and D. Hand, “Unsupervised Profiling Methods for Fraud Detection,” Statistical Science, vol. 17, no. 3, pp. 235-255,2001.
 P. Brockett, R. Derrig, L. Golden, A. Levine, and M. Alpert, “Fraud Classification Using Principal Component Analysis of RIDITs,”The J. Risk and Insurance, vol. 69, no. 3, pp. 341-371, 2002, doi: 10.1111/1539-6975.00027.
 R. Caruana and A. Niculescu-Mizil, “Data Mining in Metric Space: An Empirical Analysis of Supervised Learning Performance Criteria,” Proc. 10th ACM SIGKDD Int’l Conf. Knowledge Discoveryand Data Mining (KDD ’04), 2004, doi: 10.1145/1014052.1014063.
 P. Christen and K. Goiser, “Quality and Complexity Measures for Data Linkage and Deduplication,” Quality Measures in DataMining, F. Guillet and H. Hamilton, eds., vol. 43, Springer, 2007, doi: 10.1007/978-3-540-44918-8.
 C. Cortes, D. Pregibon, and. Volinsky, “Computational Methods for Dynamic Graphs,” Computational and Graphical Statistics,vol. 12, no. 4, pp. 950-970, 2003, doi: 10.1198/1061860032742.
 Experian. Experian Detect: Application Fraud Prevention System,Whitepaper, http://www.experian.com/products/pdf/experian_dete ct.pdf, 2008.
 T. Fawcett, “An Introduction to ROC Analysis,” Pattern Recognition Letters, vol. 27, pp. 861-874, 2006, doi: 10.1016/j.patrec. 2005.10.010.
 A. Goldenberg, G. Shmueli, R. Caruana, and S. Fienberg, “Early Statistical Detection of Anthrax Outbreaks by Tracking Over-the-Counter Medication Sales,” Proc. Nat’l Academy of Sciences USA (PNAS ’02), vol. 99, no. 8, pp. 5237-5240, 2002.
Keywords : Communal Detection, Spike Detection, Case Based Reasoning, fraud detection