Fraud Detection Using Data Mining Techniques

Journal Title: Engineering and Scientific International Journal - Year 2017, Vol 4, Issue 4

Abstract

The purpose of this study is to develop a data mining model for fraud detection in various fields such as online transactions (i.e) net banking, tax payers, credit cards etc. and securing data from the third parties(intruders). For fraud detection, very large volumes of data are to be mined and needs some complex mechanism in order to extract full information about those integrators and frauds. It is truly based on baseline study. Some base line studies might help in establishing the extent of fraud detection. These baseline studies uses some current technologies such as ID3 algorithm, Hashing algorithms, Apriori algorithm, query outlier analyses, use case diagrams, pattern reorganization, etc. In order to detect fraud, they depend upon some random audits, informants and some undercover operations. To overcome this problem we used a hashing association mining technique. This study might increase the efficiency and accuracy in fraud identification. For fraud detection, there is no need of any electronically signatures and ensures that some process would not be rejected so that it would increase the performance or working of false alarm rate for fraud detection. Not only have credit cards, but also in every fields such as money laundering, taxed payers and so on. The algorithm is based on the traversal path using hashing approach which is a theoretical approach. Not only managing fraud detection in tax payers but also it is applicable for integrators in network areas in changing data. It uses various tools in finding the frauds and also the integrators. This paper is mainly concentrates on fraud detection and integrators. There is a major need to develop the hierarchical tree structure into different constraints for the fraud detection system. The rate efficiency of this system will determine by analysing raw data and compare with previous techniques. This algorithm will build or improve the alertness by alarm rate which may be classified into two types, one is false alarm rate and the other is actual alarm rate. With the help of these alarm rates, frauds and as well as integrators might be easily detected. So there is a necessity of alarm or alertness for the frauds and integrators.

Authors and Affiliations

Henrik E

Keywords

Related Articles

Residual Stresses in Machining: A Review

The most challenge is considered in Aviation industries is milling part features from prismatic blocks to part features by means of floor and wall thicknesses is very comparable to sheet metal assemblies. The distortion...

Status of Ground water Quality in Identified Areas of Karwi City, Utter Pradesh, India

Ground water is the primary source of water for human consumption, as well as for agricultural and industrial uses in many regions all over the world. District Chitrakoot lies between Lat. 24048′ to 25012′ N and Lang. 80...

Cross Layer Intrusion Detection System in WSNs using Self Rejuvenating Module

The Wireless Sensor Networks (WSN) had been inferior to different attacks at different layers of the union stack. So that the rare intrusion detection systems (IDS) has been projected to act the WSNs. But routinely told...

Morphometric analysis of the Catchments of Himayatsagar and Osmansagar Reservoirs - Hyderabad

The linking of the geomorphological parameters with the hydrological characteristics of the basin provides a simple way to understand the hydrologic behaviour of the different basins particularly of the ungauged basins b...

Molecular interaction of various transition metals with aqueous solutions at different temperature

The viscosities and densities of various transition metals CuSO4.5H2O, MnSO4.H2O, NiCl2.6H2O, CoCl2.6H2O and ZnSo4.7H2O in aqueous medium have been calculated at different temperature like 303K, 306K, 309K, 312K and 315K...

Download PDF file
  • EP ID EP631410
  • DOI -
  • Views 153
  • Downloads 0

How To Cite

Henrik E (2017). Fraud Detection Using Data Mining Techniques. Engineering and Scientific International Journal, 4(4), 30-32. https://europub.co.uk/articles/-A-631410