Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects, microcontroller projects, vlsi projects, dsp projects, free projects, project review, project report, project presentation, free source code, free project report, Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects, final year java projects, final year asp.net projects, final year vb.net projects, vb.net projects, c# projects, final year c# projects, electrical projects, power electronics projects, motors and drives projects, robotics projects, ieee electrical projects, ieee power electronics projects, ieee robotics projects, power system projects, power system ieee projects, engineering projects, ieee engineering projects, engineering students projects, be projects, mca projects, mtech projects, btech projects, me projects, mtech projects, college projects, polytechnic projects, real time projects, ieee projects, non ieee projects, project presentation, project ppt, project pdf, project source code, project review, final year project, final year projects
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Distributed Data Mining In Credit Card Fraud Detection
1. DISTRIBUTED DATA MINING IN
CREDIT CARD FRAUD DETECTION
INTRODUCTION
Credit card transactions grow in number, taking a larger share of any
country’s payment system and this is turn has led to a higher rate of
stolen account numbers and subsequent losses by banks. Hence,
improved fraud detection has become essential to maintain the
viability of the country’s payment system.
Banks have used early fraud warning systems for some years. Large-
scale data-mining techniques can improve on the state of the art in
commercial practice. Scalable techniques to analyze massive
amounts of transaction data that efficiently compute fraud detectors
in a timely manner is an important problem, especially for e-
commerce.
Besides scalability and efficiency, the fraud-detection task exhibits
technical problems that include skewed distributions of training data
and non-uniform cost per error, both of which have not been widely
studied in the knowledge-discovery and datamining community.
In this project, a deep survey is made and evaluates a number of
techniques that address these three main issues concurrently.
Our proposed methods of combining multiple learned fraud detectors
under a “cost model” are general and demonstrably useful; our
empirical results demonstrate that we can significantly reduce loss
due to fraud through distributed data mining of fraud models.
DATA MINING AND MACHINE LEARNING
The aim of data mining is to extract knowledge from large amounts of
data. This knowledge is nontrivial and hidden in the data. Machine
learning is often used in data mining.
2. DATA MINING: A DEFINITION
Art/Science of uncovering non-trivial, valuable information from
a large database
Emphasis on:
Non-obvious (difficult)
Useful (cost vs benefit)
Large (automatic)
Yet, no rules, provided that the process is efficient in time, space and
human resources.
Data Mining is the process of finding interesting trends or
patterns in large datasets in order to guide future decisions.
Related to exploratory data analysis (area of statistics) and
knowledge discovery (area in artificial intelligence, machine
learning).
Data Mining is characterized by having VERY LARGE datasets.
DATA MINING VS. MACHINE LEARNING
Size: Databases are usually very large so algorithms must scale
well
Design Purpose: Databases are not usually designed for data
mining (but for other purposes), and thus, may not have
convenient attributes
Errors and Noise: Databases almost always contain errors
The aim of machine learning is to adapt to new circumstances, to
detect and extrapolate. A distinction can be made between
unsupervised and supervised machine learning algorithms.
3. PROPOSED SYSTEM
In today’s increasingly electronic society and with the rapid advances
of electronic commerce on the Internet, the use of credit cards for
purchases has become convenient and necessary.
Credit card transactions have become the de facto standard for
Internet and Webbased e-commerce. The US government estimates
that credit cards accounted for approximately US $13 billion in
Internet sales during 1998. This figure is expected to grow rapidly
each year.
However, the growing number of credit card transactions provides
more opportunity for thieves to steal credit card numbers and
subsequently commit fraud. When banks lose money because of
credit card fraud, cardholders pay for all of that loss through higher
interest rates, higher fees, and reduced benefits.
Hence, it is in both the banks’ and cardholders’ interest to reduce
illegitimate use of credit cards by early fraud detection. For many
years, the credit card industry has studied computing models for
automated detection systems; recently, these models have been the
subject of academic research, especially with respect to e-
commerce.
The credit card fraud-detection domain presents a number of
challenging issues for data mining:
There are millions of credit card transactions processed each day.
Mining such massive amounts of data requires highly efficient
techniques that scale.
The data are highly skewed—many more transactions are
legitimate than fraudulent.
Typical accuracy-based mining techniques can generate highly
accurate fraud detectors by simply predicting that all transactions
are legitimate, although this is equivalent to not detecting fraud at
all.
4. Each transaction record has a different dollar amount and thus has
a variable potential loss, rather than a fixed misclassification cost
per error type, as is commonly assumed in cost-based mining
techniques.
Our approach addresses the efficiency and scalability issues in
several ways. We divide large data set of labeled transactions (either
fraudulent or legitimate) into smaller subsets, apply mining
techniques to generate classifiers
in parallel, and combine the resultant base models by metalearning
from the classifiers’ behavior to generate a metaclassifier. Our
approach treats the classifiers as black boxes so that we can employ
a variety of learning algorithms.
Besides extensibility, combining multiple models computed over all
available data produces metaclassifiers that can offset the loss of
predictive performance that usually occurs when mining from data
subsets or sampling.
Furthermore, when we use the learned classifiers (for example,
during transaction authorization), the base classifiers can execute in
parallel, with the metaclassifier then combining their results. So, our
approach is highly efficient in generating these models and also
relatively efficient in applying them.
Another parallel approach focuses on parallelizing a particular
algorithm on a particular parallel architecture. However, a new
algorithm or architecture requires a substantial amount of parallel-
programming work.
Although our architecture and algorithm-independent approach is not
as efficient as some fine-grained parallelization approaches, it lets
users plug different off-the-shelf learning programs into a parallel and
distributed environment with relative ease and eliminates the need for
expensive parallel hardware.
5. We are going to use the ADACost algorithm.
SOFTWARE TOOLS
• ASP .NET
• Oracle Database
HARDWARE TOOLS
• Pentium Server with Client