Credit Card Fraud Detection Using Hidden Markov Model-A Survey
Credit Card Fraud Detection Using Hidden Markov Model-A Survey
Credit Card Fraud Detection Using Hidden Markov Model-A Survey
ISSN 1990-9233
© IDOSI Publications, 2014
DOI: 10.5829/idosi.mejsr.2014.20.06.11387
Abstract: Due to a rapid advancement in the electronic commerce technology, the use of credit cards has
dramatically increased. As credit card becomes the most popular mode of payment for both online as well as
regular purchase, cases of fraud associated with it are also rising. In this paper, we model the sequence of
operations in credit card transaction processing using a Hidden Markov Model (HMM) and show how it can
be used for the detection of frauds. An HMM is initially trained with the normal behavior of a cardholder.
Key words: Electronic commerce technology Mode of payment Hidden Markov Model
Corresponding Author: Nitu Kumari, Department of MCA, Bharath University, Selaiyur, Chennai, 73, Tamil Nadu, India.
697
Middle-East J. Sci. Res., 20 (6): 697-699, 2014
This will lead to high demands on the available technical Data Flow Diagram:
resources. This will lead to high demands being placed on
the client [8]. The developed system must have a modest
requirement, as only minimal or null changes are required
for implementing this system.
698
Middle-East J. Sci. Res., 20 (6): 697-699, 2014
Future Enhancement: The”CREDIT CARD FRAUD 5. Kerana Hanirex, D. and K.P. Kaliyamurthie, 2013.
DETECTION USING HIDDEN MARKOV MODEL”was Multi-classification approach for detecting thyroid
successfully designed. Every application has its own attacks, International Journal of Pharma and Bio
merits and demerits. The project has covered almost all Sciences, 4(3): B1246-B1251.
the requirements. Further requirements and improvements 6. Khanaa, V., K. Mohanta and T. Saravanan, 2013.
can easily be done since the coding is mainly structured Comparative study of uwb communications over fiber
or modular in nature. Changing the existing modules or using direct and external modulations, Indian Journal
adding new modules can append improvements. Further of Science and Technology, 6 (suppl 6): 4845- 4847.
enhancements can be made to the application, so that the 7. Kumar Giri, R. and M. Saikia, 2013. Multipath routing
web site functions very attractive and useful manner than for admission control and load balancing in wireless
the present one. mesh networks, International Review on Computers
and Software, 8(3): 779-785.
REFERENCES 8. Kumaravel, A. and K. Rangarajan, 2013. Routing
alogrithm over semi-regular tessellations, 2013 IEEE
1. ASP.NET Programming (Black Book) – Steven Conference on Information and Communication
Holzner. Technologies, ICT 2013.
2. ASP.NET Complete Reference – Jeffrey R. Shapiro. 9. Kumaravel, A. and K. Rangarajan, 2013. Algorithm for
3. SQL Server 7.0 – Stephen Wynkoop. automaton specification for exploring dynamic
4. SQL Server 2000 Complete Reference – Kevinloney labyrinths, Indian Journal of Science and
George Koch. Technology, 6(6).
699