Fraud Detection Using Data Mining Techniques

Journal Title: Engineering and Scientific International Journal - Year 2017, Vol 4, Issue 4

Abstract

The purpose of this study is to develop a data mining model for fraud detection in various fields such as online transactions (i.e) net banking, tax payers, credit cards etc. and securing data from the third parties(intruders). For fraud detection, very large volumes of data are to be mined and needs some complex mechanism in order to extract full information about those integrators and frauds. It is truly based on baseline study. Some base line studies might help in establishing the extent of fraud detection. These baseline studies uses some current technologies such as ID3 algorithm, Hashing algorithms, Apriori algorithm, query outlier analyses, use case diagrams, pattern reorganization, etc. In order to detect fraud, they depend upon some random audits, informants and some undercover operations. To overcome this problem we used a hashing association mining technique. This study might increase the efficiency and accuracy in fraud identification. For fraud detection, there is no need of any electronically signatures and ensures that some process would not be rejected so that it would increase the performance or working of false alarm rate for fraud detection. Not only have credit cards, but also in every fields such as money laundering, taxed payers and so on. The algorithm is based on the traversal path using hashing approach which is a theoretical approach. Not only managing fraud detection in tax payers but also it is applicable for integrators in network areas in changing data. It uses various tools in finding the frauds and also the integrators. This paper is mainly concentrates on fraud detection and integrators. There is a major need to develop the hierarchical tree structure into different constraints for the fraud detection system. The rate efficiency of this system will determine by analysing raw data and compare with previous techniques. This algorithm will build or improve the alertness by alarm rate which may be classified into two types, one is false alarm rate and the other is actual alarm rate. With the help of these alarm rates, frauds and as well as integrators might be easily detected. So there is a necessity of alarm or alertness for the frauds and integrators.

Authors and Affiliations

Henrik E

Keywords

Related Articles

Quasi-stationary thermoelastic problem with moving heat source in unidirectional Dirichlet’s rod

In this paper we deal quasi-stationary, nonhomogeneous thermo elastic problem with Dirichlet’s boundary condition in one dimensional rod of isotropic material occupying the region 0   x a . Initial temperature of the r...

Improving Iris Performance using Segmentation with CASIA Database

We can recognize humans each other according to their numerous characteristics of age. Identity verification (authentication) in computer systems has been traditionally based on something like password, key, card, pin an...

Optimal sitting and sizing of Distributed Generation

Matlab is one the important programming stream and consider as hottest research area now a day’s, this area has very vast application in real world. Efficient methods and technologies are highly required to this world to...

Literature Review: Cloud Computing–Security Issues, Technologies and Challenges

Cloud computing is drastically increasing so to make cloud computing more popular the very first step for the organization is to identify exact place where the cloud related threats lie. The changes from server to servic...

Evaluation of factors for Post occupancy Satisfaction analysis of a Residential Building – A review

— In India, Construction has become increasingly a major part of development. In this Construction, residential construction plays a major part of construction. Residential project’s success is directly depend upon the c...

Download PDF file
  • EP ID EP631410
  • DOI -
  • Views 160
  • Downloads 0

How To Cite

Henrik E (2017). Fraud Detection Using Data Mining Techniques. Engineering and Scientific International Journal, 4(4), 30-32. https://europub.co.uk/articles/-A-631410