Project Zero
Project Zero
Project Zero
ON BANK
PAYMENTS
GUIDED BY SUBMITTED BY
Mrs . ARATY V SANDRA V V
ASSISTANT PROFESSOR S3 MCA
DEPARTMENT OF MCA KVE22MCA-2014
LITERATURE SURVEY
INTRODUCTION
3
RELATED WORKS
20XX 4
SUMMARY RELATED WORKS
The problem with this approach is that it is time consuming to obtain the
knowledge from human experts .As consumers are putting more of their
personal information online and transacting much more business over
computers , Telecommunication fraud occurs .
This paper provides a detailed classification algorithm like the C4.5
algorithm for rule-based fraud detection. The C4.5 algorithm is a popular
choice for rule-based fraud detection because it is relatively simple to
understand and implement. It is also able to learn complex rules from data,
which is important for detecting fraud.
This paper focuses on the problem of finding fraudulent customers using
rule based systems, and gives the specific method to forecast the
behaviour of malicious arrearage.
6
REVIEW OF MACHINE LEARNING APPROACH ON
CREDIT CARD FRAUD DETECTION
Financial fraud is the act of gaining financial benefits by using illegal and
fraudulent methods Financial fraud can be committed in different areas,
such as insurance, banking, taxation, and corporate sectors. Credit card
fraud is the most popular fraud type addressed using ML techniques.
SVMs, DTs and Random forests algorithm used in this paper. It also
describes the research methodology, including the search criteria, study
selection, data extraction, and quality evaluation.
ONLINE PAYMENT FRAUD: FROM ANOMALY
DETECTION TO RISK MANAGEMENT
Online banking fraud occurs whenever a criminal can seize accounts and
transfer funds from an individual’s online bank accounts. As fraudsters
gain access to the payment systems as if they were the owners of the
accounts, they cannot be identified based on the account access process.
The assumption is that algorithms can detect anomalies in behavior
during payment transactions.
Python-Spark (Pyspark)
Logistic Regression
Random Forest
1. F1 – Score
2. Accuracy
3. Precision
4. AUC (Area Under Curve)
Can be executed in any Cloud, Linux, Windows, Android & iPhone O.S
1. Load Data
2. EDA-Exploratory Data Analysis
3. Pre-Process Data
4. Transform Data
5. Build Model & Save
6. Prediction (Single Input)
7. Prediction (Bulk Input)
When new data generates in Data Warehouse, the end user
can create new model without any support from software
engineers.
THANK YOU