P. 1


|Views: 279|Likes:
Published by Kundan Mishra

More info:

Published by: Kundan Mishra on Jan 28, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less





Credit Card Fraud Detection

The project titled “Credit card fake checking” is designed using Active Server Pages .NET with Microsoft Visual Studio.Net 2005 as front end and Microsoft SQL Server 2000 as back end which works in .Net framework version 2.0. The coding language used is C# .Net. Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. Unfortunately credit card fraud is a fact-oflife for all merchants who accept credit card payments as part of their business operation. The problem of fraud diagnosis can be seen as separating two kinds of events: the good and the bad transactions. Credit card fraud detection receives the card details and the value of purchase to verify whether the transaction is genuine or not. The types of goods that are bought in that transaction are not known to the Credit card fraud detection. It tries to find any anomaly in the transaction based on the spending profile of the cardholder, shipping address, and billing address, etc. If the Credit card fraud detection confirms the transaction to be malicious, it raises an alarm, and the issuing bank declines the transaction.












Also he can edit his own profile like changing his existing password. INTRODUCTION PROJECT DESCRIPTION MODULES  Authentication and Registration  View and Edit Profile  View and Purchase product  A Look on Product  A Look on Transactions and Customers  Fraud Detection System (FDS) MODULES DESCRIPTION Authentication and Registration New user can purchase products by registering his details into this site if he is not having login. Only the person who is having his own login can login into this site. When an already registered user enters into this site. his transaction history. View and Edit Profile After entering into the site by his login. View and Purchase product .1. it checks for authentication and allows if given ID is valid. the user can view his personal details.

view the existing products and can edit it. He can view the product specifications. Fraud Detection System (FDS) This gets activated for every transaction occurring in this site.After entering into the site. it will alarm the admin. he can also view the available products. A Look on Product Only the person who is having access rights can enter into this phase. A Look on Transactions and Customers Also Admin can view the transaction of all users. Admin can add new products. view his shopping cart and buy the product. If any variation occurs. . He can view the existing customer’s details. It compares the incoming transaction with the history of transactions done for the particular customer. choose the products.

some understanding of the major requirements for the system is essential. TECHNICAL FEASIBILITY This study is carried out to check the technical feasibility. Thus the developed system as well within the budget and this was achieved because most of the technologies used are freely available. SYSTEM STUDY 2. that is. This is to ensure that the proposed system is not a burden to the company. Only the customized products had to be purchased. Any system developed must not have a high demand on the available technical resources. This will lead to high demands on the available technical .1 FEASIBILTY STUDY The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates. For feasibility analysis.2. The expenditures must be justified. the technical requirements of the system. The amount of fund that the company can pour into the research and development of the system is limited. During system analysis the feasibility study of the proposed system is to be carried out. Three key considerations involved in the feasibility analysis are  ECONOMICAL FEASIBILITY  TECHNICAL FEASIBILITY  SOCIAL FEASIBILITY ECONOMICAL FEASIBILITY This study is carried out to check the economic impact that the system will have on the organization.

instead must accept it as a necessity. the genuine cardholder is not aware that someone else has seen or stolen his card information. Most of the time. as only minimal or null changes are required for implementing this system. Fraud detection based on the analysis of existing purchase data of cardholder is a promising way to reduce the rate of successful credit card frauds. This includes the process of training the user to use the system efficiently. as he is the final user of the system. every cardholder can be presented by a set of patterns containing information about the typical purchase category. 2. SOCIAL FEASIBILITY The aspect of study is to check the level of acceptance of the system by the user. The user must not feel threatened by the system. the time .resources. which is welcomed.2 Existing System: The popularity of online shopping is growing day by day. This will lead to high demands being placed on the client. The developed system must have a modest requirement.3 Proposal System: The only way to detect this kind of fraud is to analyze the spending patterns on every card and to figure out any inconsistency with respect to the “usual” spending patterns. Since humans tend to exhibit specific behavioristic profiles. His level of confidence must be raised so that he is also able to make some constructive criticism. Fraudster simply needs to know the card details. 2. The level of acceptance by the users solely depends on the methods that are employed to educate the user about the system and to make him familiar with it. As credit card becomes the most popular mode of payment for both online as well as regular purchase. cases of fraud associated with it are also rising.

since the last purchase. the amount of money spent.1 HARDWARE REQUIREMENTS The hardware used for the development of the project is: PROCESSOR RAM MONITOR HARD DISK FLOPPY DRIVE CDDRIVE KEYBOARD MOUSE : : : : : : : : PENTIUM III 766 MHz 128 MD SD RAM 15” COLOR 20 GB 1.2 SOFTWARE REQUIREMENTS The software used for the development of the project is: OPERATING SYSTEM ENVIRONMENT . 3.NET FRAMEWORK LANGUAGE : : : : WINDOWS 2000 PROFESSIONAL VISUAL STUDIO .0 C#.44 MB LG 52X STANDARD 102 KEYS 3 BUTTONS 3.NET 2005 VERSION 2. etc. SYSTEM SPECIFICATION 3.NET . we model the sequence of operations in credit card transaction processing using a Hidden Markov Model (HMM) and show how it can be used for the detection of frauds.

NET is largely syntax compatible. we can author applications in any .WEB TECHNOLOGY WEB SERVER BACK END : : : ACTIVE SERVER PAGES.NET application.NET ASP. or customize your application's configuration. or combine these in any way they see fit.0 SQL SERVER 2000 4. to name only a few possibilities. C#. it is a unified Web development platform that provides the services necessary for developers to build enterprise-class Web applications.NET application. scalable. While ASP. LANGUAGE SPECIFICATION 4. Developers can easily access the benefits of these technologies. cache frequently used data. Not only does this make Web development easier.NET is the next version of Active Server Pages (ASP). NET-based environment.NET. and stable applications.NET. ASP. Web Forms and Web services. Each is supported by the same infrastructure that allows you to use authentication schemes. but it also provides all the benefits that these tools have to offer. inheritance. ASP. including a GUI that developers can use to drop server controls onto a Web page and fully integrated debugging support. and JScript . . including Microsoft Visual Studio .NET is a compiled. Developers can choose from the following two features when creating an ASP. Additionally. it also provides a new programming model and infrastructure for more secure.1 FEATURES OF ASP.NET.NET Framework is available to any ASP. and so on. including Visual Basic . type safety.NET has been designed to work seamlessly with WYSIWYG HTML editors and other programming tools. the entire .NET INTERNETINFORMATION SERVER 5.NET compatible language. which include the managed common language runtime environment (CLR).

Developers can write this code in the global. which in turn can be obtained and manipulated by client and server applications. These controls allow we to rapidly build a Web Form out of reusable built-in or custom components. ASP. Using Web services.NET server controls to create common UI elements. XML Web services are not tied to a particular component technology or object-calling convention.NET provides easy-to-use application and session-state facilities that are familiar to ASP developers and are readily compatible with all other . This logic can include applicationlevel events. An XML Web service provides the means to access server functionality remotely. programs written in any language. we can use ASP.Web Forms allows us to build powerful forms-based Web pages. businesses can expose programmatic interfaces to their data or business logic. and running on any operating system can access XML Web services Each of these models can take full advantage of all ASP. As a result. using standards like HTTP and XML messaging to move data across firewalls. as well as the power of the . When building these pages. ASP. Accessing databases from ASP. simplifying the code of a page.NET Framework and .NET makes it easier than ever to access databases for this purpose. . It also allows us to manage the database from your code.NET applications is an often-used technique for displaying data to Web site visitors. ASP.NET features.NET Framework APIs.NET provides a simple model that enables Web developers to write logic that runs at the application level.NET Framework common language runtime.aspx text file or in a compiled class deployed as an assembly. XML Web services enable the exchange of data in client-server or server-server scenarios. and program them for common tasks. but developers can easily extend this model to suit the needs of their Web application. using any component model.

However. Enabling tracing also appends details about a request to the page. ASP. rather than interpreted.NET Framework and common language runtime. ASP. All ASP. Additionally.NET is also easily factorable. ASP. ASP. to a custom trace viewer that is stored in the root directory of your application.NET offers the TraceContext class. it can cause embarrassment if it is not removed.NET code is compiled.NET offers the IHttpHandler and IHttpModule interfaces. it has been designed to offer significant performance improvements over ASP and other Web development platforms.NET provides extensive caching services (both built-in services and caching APIs). to name only a few of its benefits. The problem is that removing the debug statements from your pages when your application is ready to be ported to a production server can require significant effort. and just-in-time (JIT) compilation to native code. which allows early binding. Writing custom debug statements to your Web page can help immensely in troubleshooting your application's code. ASP. but with a simpler programming model. which allows us to write custom debug statements to our pages as we develop them.NET takes advantage of performance enhancements found in the . or. They appear only when you have enabled tracing for a page or entire application.ASP. meaning that developers can remove modules (a session module. . if you so specify.NET also ships with performance counters that developers and system administrators can monitor to test new applications and gather metrics on existing applications. Implementing the IHttpHandler interface gives you a means of interacting with the low-level request and response services of the IIS Web server and provides functionality much like ISAPI extensions. Implementing the IHttpModule interface allows you to include custom events that participate in every request made to your application. for instance) that are not relevant to the application they are developing. strong typing.

thread management. which are human readable and writable. providing important services such as memory management. There are different types of application. Each of our applications can have a distinct configuration file and we can extend the configuration scheme to suit our requirements. or replace these schemes. To make communication on distributed environment to ensure that code be accessed by the . add to.NET configuration settings are stored in XML-based files. THE COMMON LANGUAGE RUNTIME (CLR): The common language runtime is the foundation of the .NET Framework can integrate with any other code. such as Windows-based applications and Webbased applications. 3. NET FRAMEWORK: 1.NET FRAMEWORK 1. or executed remotely. We can easily remove. It manages code at execution time. Eliminates the performance problems. 2. THE .NET provide default authorization and authentication schemes for Web applications.NET Framework is a new computing platform that simplifies application development in the highly distributed environment of the Internet. and remoting and also ensures more security and . OBJECTIVES OF.NET Framework and ASP. COMPONENTS OF .The .NET FRAMEWORK The . To provide a consistent object-oriented programming environment whether object codes is stored and executed locally on Internet-distributed. To provide a code-execution environment to minimizes software deployment and guarantees safe execution of code. ASP. depending upon the needs of our application.NET Framework.

THE . compilation. code execution.robustness. thereby creating a software environment that can exploit both managed and unmanaged features. but also supports the development of third-party runtime hosts.NET FRAME WORK CLASS LIBRARY It is a comprehensive.NET Framework not only provides several runtime hosts. Using Internet Explorer to host the runtime to enables embeds managed components or Windows Forms controls in HTML documents. such as Web Forms and XML Web services. Performance . Code that targets the runtime is known as managed code. while code that does not target the runtime is known as unmanaged code. thread execution. The . 1. The concept of code management is a fundamental principle of the runtime. object-oriented collection of reusable types used to develop applications ranging from traditional command-line or graphical user interface (GUI) applications to applications based on the latest innovations provided by ASP. and other system services these are all run on CLR. FEATURES OF THE COMMON LANGUAGE RUNTIME: The common language runtime manages memory. Robustness 3. Security 2. code safety verification. Productivity 4. The .NET.NET Framework can be hosted by unmanaged components that load the common language runtime into their processes and initiate the execution of managed code. Internet Explorer is an example of an unmanaged application that hosts the runtime (in the form of a MIME type extension).

programmers can write applications in their development language of choice. and components written in other languages by other developers. For example. The managed environment of the runtime eliminates many common software issues. such as Microsoft® SQL Server™ and Internet Information Services (IIS). The CTS ensures that all managed code is self-describing. managed code is never interpreted.SECURITY: The runtime enforces code access security. PRODUCTIVITY: The runtime also accelerates developer productivity. PERFORMANCE: The runtime is designed to enhance performance. ROBUSTNESS: The runtime also enforces code robustness by implementing a strict type. With regards to security. managed components are awarded varying degrees of trust. Although the common language runtime provides many standard runtime services. The security features of the runtime thus enable legitimate Internet-deployed software to be exceptionally feature rich. server-side applications. . or other sensitive functions. depending on a number of factors that include their origin to perform file-access operations. A feature called just-in-time (JIT) compiling enables all managed code to run in the native machine language of the system on which it is executing.and code-verification infrastructure called the common type system(CTS). the runtime can be hosted by high-performance. registry-access operations. Finally. the class library. yet take full advantage of the runtime.

any component that can read the XML format can process data. The transmitting component can simply transmit the dataset to its destination without regard to how the receiving component is implemented. The destination component might be a Visual Studio application or any other application implemented with any tool whatsoever. You might never need to directly edit an XML file containing data . XML was designed with exactly this kind of interoperability in mind.but it is very useful to understand the data architecture in ADO.NET offers several advantages over previous versions of ADO: 1.NET. ADO. you will have different requirements for working with data. Maintainability 3. Performance Scalability INTEROPERABILITY: ADO. SO. Because XML is the format for transmitting datasets across the network. Interoperability 2.DATA ACCESS WITH ADO.NET As you develop applications using ADO.NET applications can take advantage of the flexibility and broad acceptance of XML. .NET. The receiving component need not be an ADO. The only requirement is that the receiving component be able to read XML. Programmability 4.NET component.

.NET data-type conversion is not necessary. but substantial. software architects can choose to divide the server's business-logic processing and user-interface processing onto separate tiers on separate machines. this transformation is made easier. modest changes are possible.MAINTAINABILITY: In the life of a deployed system. PERFORMANCE: ADO.NET data components in Visual Studio encapsulate data access functionality in various ways that help you program more quickly and with fewer mistakes.NET accommodates scalability by encouraging programmers to conserve limited resources. Architectural changes are rarely attempted because they are so difficult. the application server tier is replaced with two tiers.NET application employs disconnected access to data. If the original application is implemented in ADO. ADO. system resources can become scarce and response time or throughput can suffer.NET using datasets. Faced with this problem. it does not retain database locks or active database connections for long durations.NET datasets offer performance advantages over ADO disconnected record sets. alleviating the shortage of system resources. SCALABILITY: ADO. Any ADO. In effect. In ADO. As the performance load on a deployed application server grows.

and Visual C# . these languages leverage the functionality of the . development. or operating system.NET Visual Studio . ASP. and deployment of Enterprise solutions. component model.NET uses these components to create ASP Web applications and XML Web services. desktop applications. XML WEB SERVICES XML Web services are applications that can receive the requested data using XML over HTTP.NET all use the same integrated development environment (IDE).NET. which contains all the documentation for these development tools. Visual C#. . you can use Visual Studio's powerful component-based development tools and other technologies to simplify teambased design.NET Framework.NET. or ATL Server. which provides a common language runtime and unified programming classes. Also it includes MSDN Library. In addition. Visual C++ . In Visual Studio . and mobile applications In addition to building high-performing desktop applications. XML Web services.NET. XML Web services are not tied to a particular component technology or object-calling convention but it can be accessed by any language. which allows them to share tools and facilitates in the creation of mixed-language solutions. Visual Basic .NET Framework and simplify the development of ASP Web applications and XML Web services. JScript.NET is a complete set of development tools for building ASP Web applications. Managed Extensions for C++.VISUAL STUDIO . Visual Studio supports the . you can quickly create and include XML Web services using Visual Basic.

net supports implementation inheritance. Visual Basic . we can use objects.NET supports multithreading concept.NET is also compliant with CLS (Common Language Specification) and supports structured exception handling.NET is a CLS-compliant language. The Visual Basic supports interfaces but not implementation inheritance. regardless of the languages used to create the application. VISUAL BASIC . classes. and components created in other CLScompliant languages in Visual Basic. XML is a subset of SGML that is optimized for delivery over the Web. CLR is the runtime environment provided by the .NET Visual Basic. NET. includes many new features. The World Wide Web Consortium (W3C) defines XML standards so that structured data will be uniform and independent of applications. interfaces and overloading. Any objects. . Visual basic.NET fully supports XML. providing the XML Designer to make it easier to edit XML and create XML schemas.NET . CLS is set of rules and constructs that are supported by the CLR (Common Language Runtime). Visual Basic.NET can be used in any other CLS-compliant language. it manages the execution of the code and also makes the development process easier by providing services.The use of CLS ensures complete interoperability among applications. Visual Studio . the latest version of visual basic. In addition. In addition.XML SUPPORT Extensible Markup Language (XML) provides a method for describing structured data. or components that created in Visual Basic.NET Framework. COMMON LANGUAGE SPECIFICATION (CLS) Visual Basic. classes.

such as objects and variables.NET the sub finalize procedure is available. destructors are used to release the resources allocated to the object.NET. whereas destructors are used to destroy them. we can drive from another class. CONSTRUCTORS AND DESTRUCTORS Constructors are used to initialize objects.NET. we can either use the existing code of the base class or override the existing code.NET. . with help of the implementation inheritance. it releases the memory occupied by the object. This means that.NET supports implementation inheritance. The . The sub finalize procedure is used to complete the tasks that must be performed when an object is destroyed. In the derived class. When the garbage collector comes across an object that is marked for garbage collection. while creating applications in Visual Basic. which is know as the base class that derived class inherits all the methods and properties of the base class. In other words. In addition. GARBAGE COLLECTION Garbage Collection is another new feature in Visual Basic. code can be reused. the garbage collector checks for the objects that are not currently in use by applications. the sub finalize procedure can be called only from the class it belongs to or from derived classes.NET Framework automatically releases memory for reuse by destroying objects that are no longer in use.IMPLEMENTATION INHERITANCE Visual Basic. the . In Visual Basic.NET Framework monitors allocated resources. Therefore. In Visual Basic. In addition. The sub finalize procedure is called automatically when an object is destroyed.

2 FEATURES OF SQL SERVER 2000 The OLAP Services feature available in SQL Server version 7. Using Try…Catch…Finally statements. MULTITHREADING Visual Basic. where each procedure has a different set of arguments. Overloading enables us to define multiple procedures with the same name. which enables us to detect and remove errors at runtime. References to the component now use the term Meta . In Visual Basic.NET.NET.NET supports structured handling. An application that supports multithreading can handle multiple tasks simultaneously. STRUCTURED EXCEPTION HANDLING Visual Basic. The term OLAP Services has been replaced with the term Analysis Services.0 is now called Microsoft SQL Server 2000 Meta Data Services. To decrease the time taken by an application to respond to user interaction.0 is now called SQL Server 2000 Analysis Services.OVERLOADING Overloading is another feature in Visual Basic.NET also supports multithreading. we can use multithreading to decrease the time taken by an application to respond to user interaction. we need to use Try…Catch…Finally statements to create exception handlers. we can create robust and effective exception handlers to improve the performance of our application. we can use it for constructors and properties in a class. 4. The Repository component available in SQL Server version 7. Besides using overloading for procedures. Analysis Services also includes a new data mining component. we must ensure that a separate thread in the application handles user interaction.

edit or analyses the data itself we work in tables datasheet view mode. REPORT 5. QUERY 3. Datasheet View Design View To build or modify the structure of a table we work in the table design view. VIEWS OF TABLE: We can work with a table in two types. FORM 4. MACRO TABLE: A database is a collection of data about a specific topic. Datasheet View To add.Data Services. . 1. 1. The term repository is used only in reference to the repository engine within Meta Data Services SQL-SERVER database consist of six type of objects. We can specify what kind of data will be hold. TABLE 2. Design View 2. They are.

we work in forms design view. 1. Views of Form: We can work with forms in several primarily there are two views. Form View The form view which display the whole design of the form.QUERY: A query is a question that has to be asked the data. graphs and pictures. The data that make up the answer is either dynaset (if you edit it) or a snapshot (it cannot be edited). REPORT: A report is used to vies and print information from the database. option buttons. includes textboxes. We can add control to the form that are bound to fields in a table or query. They are. Forms use the familiar controls such as textboxes and checkboxes.A form displays only the information we want to see in the way we want to see it. Access either displays the dynaset or snapshot for us to view or perform an action on it. Design View 2.Each time we run query. Access gathers data that answers the question from one or more table. such as deleting or updating. This makes viewing and entering data easy. The report can ground records into many levels and compute totals and average by . we get latest information in the dynaset. Form View Design View To build or modify the structure of a form. FORMS: A form is used to view and edit information in the database record by record .

We write macros to automate the common tasks the work easy and save the time. MACRO : A macro is a set of actions. Such as opening a form or printing a report . Each action in macros does something. Also the report is attractive and distinctive because we have control over the size and appearance of it. .checking values from many records at once.

. 5. Therefore.5. Computer software design changes continuously as new methods. However techniques for software designs do exist. procedural details. better analysis and broader understanding evolved.) and interface between modules. Software Design methodology lacks the depth. flexibility and quantitative nature that are normally associated with more classical engineering disciplines. SYSTEM DESIGN Design is multi-step process that focuses on data structure software architecture. The design process also translates the requirements into the presentation of software that can be accessed for quality before coding begins. Software Design is at relatively early stage in its revolution. Input design is one of the most expensive phases of the operation of computerized system and is often the major problem of a system. (algorithms etc. criteria for design qualities are available and design notation can be applied.1 INPUT DESIGN Input design is the process of converting user-originated inputs to a computerbased format.

2 OUTPUT DESIGN Output design generally refers to the results and information that are generated by the system for many end-users.5. the output design determines the input to be given to the application. output is the main reason for developing the system and the basis on which they evaluate the usefulness of the application. . In any system.

Since the chatting method involves storing the message in the table and produced to the sender and receiver.5. admin table is designed to be unique in accepting the username and the length of the username and password should be greater than zero. SYSTEM ARCHITECTURE DIAGRAM .3 DATABASE DESIGN The database design is a must for any application developed especially more for the data store projects. proper handling of the table is a must. In the project.

DATA FLOW DIAGRAM: Authentication and Registration .

View and Edit Profile View and Purchase product .

A Look on Product A Look on Transactions and Customers .

Fraud Detection System (FDS) .




Client .

Then the web form level testing is made. After testing all the modules. Thus the system testing is a confirmation that all is correct and an opportunity to show the user that the system works.2 INTEGRATION TESTING Testing is done for each module. In the project. The dates are entered in wrong manner and checked. specially designed to show that the system will operate successfully in all its aspects conditions. the correct answer only will be accepted in the answer box. . which determines whether the software function as the user expected. The end-user rather than the system developer conduct this test most software developers as a process called “Alpha and Beta Testing” to uncover that only the end user seems able to find. The answers other than the four given choices will not be accepted. In the company as well as seeker registration form. the zero length username and password are given and checked. The compilation of the entire project is based on the full satisfaction of the end users. Also the duplicate username is given and checked. Wrong email-id and web site URL (Universal Resource Locator) is given and checked. the button will send data to the server only if the client side validations are made. the modules are integrated and testing of the final system is done with the test data. 6.6. 6. the errors occurred are noted and eliminated. For example storage of data to the table in the correct manner. In question entry form. In the job and question entry.1 UNIT TESTING The procedure level testing is made first. By giving improper inputs.3 VALIDATION TESTING The final step involves Validation testing. SYSTEM TESTING AND MAINTENANCE 6. validation testing is made in various forms.

the system should be capable of adapting these changes. . By giving improper inputs. This is the final step in system life cycle. Then the web form level testing is made.MAINTENANCE: The objectives of this maintenance work are to make sure that the system gets into work all time without any bug. In our project the process can be added without affecting other parts of the system. which runs in an online fashion. Also the duplicate username is given and checked. The dates are entered in wrong manner and checked. The client side validations are made. Wrong email-id is given and checked. Nowadays there is the rapid change in the software world. Here we implement the tested error-free system into real-life environment and make necessary changes. and is checked for errors like runtime errors. In the project system testing is made as follows: The procedure level testing is made first. Doing this will not affect the system’s performance or its accuracy. This is called the maintenance of the system. Here system maintenance is done every months or year based on company policies. The system liable to accept any modification after its implementation. the zero length username and password are given and checked. In the form. the errors occurred are noted and eliminated. Due to this rapid change. This system has been designed to favour all new changes. long run errors and other maintenances like table verification and reports. Provision must be for environmental changes which may affect the computer or software system. For example storage of data to the table in the correct manner. Maintenance plays a vital role.

investigation of the existing system and it’s constraints on implementation.0 web server under the Windows 2000 Professional and accessed from various clients. The important factor that should be considered here is that the conversion should not disrupt the functioning of the organization. designing of methods to achieve changeover and evaluation of changeover methods. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user. The implementation stage involves careful planning. site preparation and file conversion for installing a candidate system.Implementation is the stage of the project when the theoretical design is turned out into a working system. It is the phase that focuses on user training. The application is implemented in the Internet Information Services 5. confidence that the new system will work and be effective. . Implementation is the process of converting a new system design into operation.

the computer system and its environment is tested to the satisfaction of the user. Initially as a first step the executable form of the application is to be created and loaded in the common server machine which is accessible to the entire user and the server is to be connected to a network. The final stage is to document the entire system which provides components and the operating procedures of the system. Further enhancements can be made to the application.7. 7. so that the web site functions very attractive and useful manner than the present one. The project has covered almost all the requirements. SYSTEM IMPLEMENTATION Implementation is the most crucial stage in achieving a successful system and giving the user’s confidence that the new system is workable and effective. This type of conversation is relatively easy to handle. Changing the existing modules or adding new modules can append improvements. A simple operating procedure is included so that the user can understand the different functions clearly and quickly. And so the system is going to be implemented very soon. Implementation of a modified application to replace an existing one. . The system that has been developed is accepted and proved to be satisfactory for the user. Further requirements and improvements can easily be done since the coding is mainly structured or modular in nature. Each program is tested individually at the time of development using the data and has verified that this program linked together in the way specified in the programs specification. provide there are no major changes in the system.1 SCOPE FOR FUTURE DEVELOPMENT Every application has its own merits and demerits.

As credit card becomes the most popular mode of payment. If an incoming credit card transaction is not accepted by the HMM with sufficiently high probability.  In this paper.8.  An HMM is trained with normal behavior of cardholder. CONCLUSION  Most online shoppers use credit cards to pay for their purchases. cases of fraud associated with it are also increasing. we model the sequence of operations in credit card transaction processing using a Hidden Markov Model (HMM) and show how it can be used for the detection of frauds. it is considered to be fraudulent. .  We present detailed experimental results to show the effectiveness of our approach.

D.G. epaynews. “Parallel Granular Networks for Fast Credit Card Fraud Detection. no.” http://www2. Hand. and Exposition.” Proc. vol. 130-144.html.J.Q.J.K.acnielsen.” Proc. D. Zhang. 2002. [2] D.L. Pan. 2. BIBLIOGRAPHY [1] “Global Consumer Attitude Towards On-Line Shopping. “Credit Card Fraud Detection with a Neural-Network. Stolfo. Freisleben. 2000. Chan.” Proc. G.K. W. Aleskerov. vol. 111-131.” Proc. 2000. Reilly. Blunt. [5] M. 572-577. Syeda.9. 1994.L.W. Ghosh and D. W. “Data Mining for Fun and Profit. Rao. pp. Fan.com/statistics/fraud. M. “Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project. Fan. IEEE/IAFE: Computational Intelligence for . [7] S. pp. Chan. 15.” Statistical Science. DARPA Information Survivability Conf. Prodromidis. Kelly. 2.J. and Y. 2007. and N. Lee. A. 1997. Adams. Prodromidis. Stolfo. “CARDWATCH: A Neural Network Based Database Mining System for Credit Card Fraud Detection. [3] “Statistics for General and On-Line Card Fraud.W.com/reports/documents/2005_cc_online shopping.M. IEEE Int’l Conf.pdf.” http://www. Y. pp. vol. “Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results. Mar. 27th Hawaii Int’l Conf. pp. [6] S. Mar. A. B. 3. and B. System Sciences: Information Systems: Decision Support and Knowledge-Based Systems. AAAI Workshop AI Methods in Fraud and Risk Management. Fuzzy Systems. and P. Lee. 2007.” Proc. [8] E. 83-90. [4] S. 621-630. pp. and P.

A.S.L. “Agent-Based Distributed Learning Applied to Fraud Detection.. 2007. no. Brause. “Neural Data Mining for Credit Card Fraud Detection. D. 1999.bsys. Mar. vol. V. [10] W.” Proc. 2002. Fan. and S. and V. [14] S. pp. T. 1997. Lee.monash. [13] C. 6. 14. K.. “A Web Services-Based Collaborative Scheme for Credit Card Fraud Detection. pp. Langsdorf. 6. 378-383.J. Smith. 1. pp. e-Technology. . 2004. 220-226. pp. “A Comprehensive Survey of Data Mining-Based Fraud Detection Research. pp. 50-59. “Minority Report in Fraud Detection: Classification of Skewed Data. Stolfo and A. Int’l Conf. Lee. Tools with Artificial Intelligence. and Automated Learning.edu. IEEE Int’l Conf. and R. “A Neural Classifier with Fraud Density Map for Effective Credit Card Fraud Detection. Hepp. no. e-Commerce and e-Service. Tsai.” ACM SIGKDD Explorations Newsletter. Columbia Univ.au/people/cphua/. Alahakoon. 103-106. vol. Kim and T. 1999. [9] M.L. 67-74.” Proc. “Distributed Data Mining in Credit Card Fraud Detection.Financial Eng. Prodromidis.” IEEE Intelligent Systems. [15] C. Gayler. Intelligent Data Eng. 177-181.” http:// www. Prodromidis. pp. 1999. [12] C. Chiu and C. [11] R.J. Phua.” Proc. Stolfo. Phua. and M. IEEE Int’l Conf. 2004.” Technical Report CUCS-014-99. Kim.

Home Page Contact as .

Admin Login Admin home page .

View product details Enter new product .

Upload image View Customer Details .

Edit product Admin view Transaction .

Gateway login .

Valid card details Set card limit .

Update card details .

Gateway Admin Inbox Before blocked After Blocked .

New user registration .

User Login User process .

View profile .

Edit user profile Change password .

View transaction details .

View product details Customer request .

Purchase product .

Inbox: Before blocked

After blocked

After Activated:

//string crdno=objbalvalidation. using System.loginvalidation(vtxtuname. if (valid) { Session["sessionid"] = vtxtuname.Collections. using System.Write("Check your Username And Password "). using System.Text. using System. using System. } } .UI. EventArgs e) { string vtxtuname = txtuname. Response. vtxtpasword).UI.WebParts. "<script language=javascript>alert('check username and password')</script>").Web.UI.Data.aspx").UI. using System.RegisterStartupScript(typeof(Page).Web.Text.getcardnumber(vtxtuname). try { valid = objbalvalidation.Page { protected void Page_Load(object sender. EventArgs e) { } protected void submit_Click(object sender. bool valid.WebControls.CODING: User Login. public partial class userlogin : System.Web. "Check Username and password".Configuration.cs using System.Security.Redirect("authendicateuserviewproduct.Web. ClientScript. string vtxtpasword = txtpawd.Web. } else { //Response. //Session["cardno"] = crdno.UI. bluserlogin objbalvalidation = new bluserlogin(). using System.WebControls. using System. using System.Web.Web.HtmlControls.aspx.

Web.Redirect("userdetails.Web.Open().catch { throw.Web.AppSettings["conn"].SqlClient. using System. /// <summary> /// Summary description for dluserlogin /// </summary> public class dluserlogin { string cardno=null.Data. using System. string pass) { SqlConnection con = new SqlConnection(strng).WebParts. using System.Web.UI. con.UI. using System. using System.Security.aspx").Web.WebControls. . } finally { objbalvalidation = null. using System.WebControls. using System. using System. } } dluserlogin.UI.cs using System.Data. public dluserlogin() { // // TODO: Add constructor logic here // } public bool loginvalidation(string uname. EventArgs e) { Response. string strng = ConfigurationManager.Configuration.UI. using System.Web.HtmlControls. } } protected void lbtn_Click(object sender.

string username = uname.StoredProcedure.ToString() == username) && (dr. } } } . } } return valid. cmd.ExecuteReader().Close(). try { dr = cmd. con).CommandType = CommandType.Read()) { if ((dr.GetValue(1). } finally { cmd. SqlCommand cmd = new SqlCommand("checklogin".bool valid=false.GetValue(0).Dispose().Dispose(). string password = pass. while (dr. con. con. SqlDataReader dr.ToString() == password)) { valid = true. } catch { throw.

WebParts. using System.Visible = false. using System. using System. ddlmonth.Web.DataSource = alyear.UI. ArrayList almonth = new ArrayList().Configuration. month = 0. i <= DateTime.DataBind().WebControls.Now. btnsubmit. protected void Page_Load(object sender. using System. . ArrayList alyear = new ArrayList().Web.Userdetails.Collections.Web.aspx. i <= 12.Page { bluserdetails objbal = new bluserdetails(). using System.UI.cs using System.DataSource = almonth.UI.Visible = false. } for (i = 1.UI. i++) { almonth. using System.Year. int year = 0.Web. using System. } ddlyear. ddlyear.Add(i).Web. bool check.WebControls. ddlmonth. using System.Add(i).DataBind(). DateTime dt = new DateTime().Web.UI.Web. if (!IsPostBack) { int i. using System. EventArgs e) { Image1.HtmlControls. public partial class userdetails : System.Security. for (i = 1950. i++) { alyear.Data.

if(window.Add(j).which){ key = event. switch(month) { case 1: case 3: case 5: case 7: case 8: case 10: case 12: for(j=1.SelectedValue = dt. j <= 29.Day.year = Int32. j++) { aldate.Parse(ddlyear.which.SelectedValue).SelectedValue). j <= 28.keyCode. case 2: if (checkleap(year)) { for (j = 1. } public void binddays(int year. j++) aldate. // To Bind Date in Drop Down List binddays( year. } txtcardno.Attributes.}else if(event. } break.Add(j).int month) { int j.} return (key == 45 || key == 13 || key == 8 || key == 9 || key == 189 || (key >= 48 && key <= 58) )"). } } else { for (j = 1.Add(j). month).Add("onkeypress".j<=31. "var key.Parse(ddlmonth. ddldate.event){ key = event.j++) { aldate. ArrayList aldate = new ArrayList().ToString(). month = Int32. .

binddays(year.Add(j). month). j <= 30.Parse(ddlyear. binddays(year. break.Parse(ddlmonth. .SelectedValue).} break. EventArgs e) { } protected void ddlyear_SelectedIndexChanged(object sender. month). month = Int32.SelectedValue).DataSource = aldate. j++) aldate.Parse(ddlyear. } ddldate.SelectedValue). ddldate. EventArgs e) { year = Int32.Parse(ddlmonth. } protected void btnsubmit_Click(object sender. } public bool checkleap(int year) { if ((year % 4 == 0) && (year % 100 == 0) || (year % 400 == 0)) return true. case 4: case 6: case 9: case 11: for (j = 1.DataBind(). month = Int32. } protected void ddldatel_SelectedIndexChanged(object sender.SelectedValue). EventArgs e) { int intpreresult = 0. } protected void ddlmonth_SelectedIndexChanged(object sender. EventArgs e) { year = Int32. else return false.

Text. Response.Text = "". vtxtphoneno.SelectedValue + "/" + ddlyear.SelectedValue. vtxtsex. txtcardno.//Save values to Bussiness layer string vtxtname = txtname. string vtxtpwd = txtpwd. txtaddress. string vtxtmailid = txtmailid. string vtxtcardno = txtcardno. txtmailid. string vtxtuname = txtuname.Text. "<script language=javascript>alert('Details Stored Successfully')</script>"). string vtxtaddress = txtaddress. string vtxtdob = ddlmonth. string vtxtsex = DropDownList1.SelectedValue = "". vtxtuname. txtsecans. if (revalid) { try { intpreresult = objbal.Text = "". bool revalid = cardvalidation(vtxtcardno).Text = "". string vtxtsecans = txtsecans. vtxtdob.Text.Text = "". if (intpreresult > 0) { ClientScript.Text. vtxtsecque.Text = "". vtxtaddress. vtxtpwd). "Details Stored Successfully". DropDownList1. string vtxtphoneno = txtphno. string vtxtsecque = ddlsecquestion.Text = "".Text = "". txtphno. //bool revalid. vtxtmailid. txtpwd.Text.Redirect("userlogin.SelectedValue.RegisterStartupScript(typeof(Page).SelectedValue + "/" + ddldate.storeuserdetails(vtxtname. txtname. txtuname.SelectedValue. ddlsecquestion.Text = "".Text.Text. vtxtcardno.Text.aspx").SelectedValue = "". vtxtsecans. } else .

} } else ClientScript.Write(ee.GetType(). Try another Username". i++) { tempno[i] =int. for (int i = 0. int strlength. "Username Not Available".RegisterStartupScript(typeof(Page). Try another Username')</script>"). } catch (Exception ex) { String str = ex. strlength = crdno. } public bool cardvalidation(string secardno) { string crdno = secardno. for (int i = 0. "User Name Already Exists .RegisterStartupScript(this.Message.RegisterStartupScript(this.Parse(crdno[i]. i < strlength.ToString()). Chose some other user name')</script>").Message. //Response. ClientScript.Length. "<script language=javascript>alert('Username not Available .GetType(). int[] tempno=new int[crdno. i++) { if (i % 2 != 0) { .ClientScript. "<script language=javascript>alert('Enter The Valid Card Number')</script>"). } int tempval=0.Length]. } finally { objbal = null. "Enter The Valid Card Number". "<script language=javascript>alert('User Name Already Exists .ToString()). i < strlength.

if (tempno[i] >= 10) { int k.ImageUrl = "D:\\creditcardfraudsystem1\\image\\wr.Visible = true.bmp".bmp". l = tempno[i] / 10. return valid. btnsubmit.tempno[i] = tempno[i] * 2.Text. EventArgs e) { string txtunam=txtuname. } tempval = tempval + tempno[i]. if (check) { Image1. check=objbal. else valid = false. } protected void LinkButton1_Click(object sender. } else { Image1. if (tempval % 10 == 0) valid = true.Visible = true. l. } else tempno[i] = tempno[i]. k = tempno[i] % 10.ImageUrl = "D:\\creditcardfraudsystem1\\image\\cr. } bool valid.checkvaliduser(txtunam). } Image1. } } . tempno[i] = k + l.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->