Professional Documents
Culture Documents
C 2
C 2
ABSTRACT
Now a day the usage of credit cards has dramatically increased. As credit
card becomes the most popular mode of payment for both online as well as regular
purchase, cases of fraud associated with it are also rising. In this paper, we model
the sequence of operations in credit card transaction processing using a Hidden
Markov Model (HMM) and show how it can be used for the detection of frauds.
An HMM is initially trained with the normal behavior of a cardholder. If an
incoming credit card transaction is not accepted by the trained HMM with
sufficiently high probability, it is considered to be fraudulent. At the same time, we
try to ensure that genuine transactions are not rejected. We present detailed
experimental results to show the effectiveness of our approach and compare it with
other techniques available in the literature.
EXISTING SYSTEM
All the existing method to detect the credit card was on the mode like the
detection occurs only after the complaint of the card holder about fraud done. It is
not a convenient way to avoid the loss happens to the cad holder. After getting the
complaint they detected the fraud on the basis of the IP address. For this they need
the help of the Cyber crime to detect the fraud and make action on it. It takes so
much man power.
Disadvantages
1) The main disadvantage of the existing system is the detection occurs only
after gets a written complaint.
2) In the existing system there is physical inconvenience exists.
3) The period occurs to detect the fraud will cause so many losses to the card
holder.
4) There is no particular security system in the existing so a hacker can easily
access others card.
PROPOSED SYSTEM
Here we are introducing a project for the credit cars fraud detection using
Hidden Markov Model (HMM). It is done on the basis of the spending profile of
the card holder. The usual spending of the cardholder is being checked by the FDS
(Fraud Detection system) in the bank .The system checks all the spending of the
user. When it turns unusual the method blocks the transaction on the card. And it
alerts the bank. It occurs automatically. It doesn’t need any man power.
Advantages
1) The main advantage is that the detection occurs much faster than any other
method.
2) In all the existing systems the real card holder should checked for the Fraud
detection. But in our method there is no need of the physical inconveniences of the
card holder. All the checking and the detection occur automatically.
4) This project provides most accurate method in credit card fraud detection.
MODULES
⦁ Register.
⦁ Sign in.
⦁ Security.
⦁ User side.
⦁ Purchase.
MODULE DESCRIPTION
1. Login
The Login module gives a login form to the user with a user name and password.
The user can access the special features only when they enters correct user name
and password
2. Register
In this module the hard holder registers new card. For this they are gives their
personal details, credit card details. In this module the user also can fix security
questions and answers for security purpose
3. Security
In this module we provide special features are the user can fix a spending
limit, set security questions and answers. The purpose of this segment is this
security questions arise when the user exceeds the spending limit. The user can
access further only when they answer these questions correctly.
4. User side
This module is for the user to view the home page, purchase things or view
reports. This report deals with what the user did with the credit card like purchase,
transactions etc.
5. Purchase
In this module all the transaction process like purchase with the credit card
occurs. The user submits the total amount to be credited after the completion of
purchase. The transaction occurs only when the total amount is below the
spending limit. If it exceeds the limit security questions are asked. The user can
proceed only when the answers are correct. Otherwise the card will be blocked.
SYSTEM REQUIREMENTS
Hardware Requirements:
Software Requirements:
SYSTEM STUDY
FEASIBILTY STUDY
The feasibility of the project is analyzed in this phase and business proposal
is put forth with a very general plan for the project and some cost estimates.
During system analysis the feasibility study of the proposed system is to be carried
out. This is to ensure that the proposed system is not a burden to the company. For
feasibility analysis, some understanding of the major requirements for the system
is essential.
➢ ECONOMICAL FEASIBILITY
➢ TECHNICAL FEASIBILITY
➢ SOCIAL FEASIBILITY
ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system will have on
the organization. The amount of fund that the company can pour into the research
and development of the system is limited. The expenditures must be justified.
Thus the developed system as well within the budget and this was achieved
because most of the technologies used are freely available. Only the customized
products had to be purchased.
TECHNICAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the technical
requirements of the system. Any system developed must not have a high demand
on the available technical resources. This will lead to high demands on the
available technical resources. This will lead to high demands being placed on the
client. The developed system must have a modest requirement, as only minimal or
null changes are required for implementing this system.
SOCIAL FEASIBILITY
The aspect of study is to check the level of acceptance of the system by the
user. This includes the process of training the user to use the system efficiently.
The user must not feel threatened by the system, instead must accept it as a
necessity.
The level of acceptance by the users solely depends on the methods that are
employed to educate the user about the system and to make him familiar with it.
His level of confidence must be raised so that he is also able to make some
constructive criticism, which is welcomed, as he is the final user of the system.
SYSTEM DESIGN
INPUT DESIGN:
OUTPUT DESIGN:
Output design generally refers to the results and information that are
generated by the system for many end-users; output is the main reason for
developing the system and the basis on which they evaluate the usefulness of the
application.
In the project output forms are view product, viewing purchased
product,connection,node information,path node.
DATABASE DESIGN
The database design is a must for any application developed especially more for
the data store projects. Since the chatting method involves storing the message in
the table and produced to the sender and receiver, proper handling of the table is a
must.
TABLE DESIGN:
Card details:
Cart:
Fraud users:
Product details:
UNIT TESTING:
The procedure level testing is made first. By giving improper inputs, the
errors occurred are noted and eliminated. Then the web form level testing is made.
For example storage of data to the table in the correct manner.
In the company as well as seeker registration form, the zero length username and
password are given and checked. Also the duplicate username is given and
checked. In the job and question entry, the button will send data to the server only
if the client side validations are made.
The dates are entered in wrong manner and checked. Wrong email-id and
web site URL (Universal Resource Locator) is given and checked.
INTEGRATION TESTING:
Testing is done for each module. After testing all the modules, the modules
are integrated and testing of the final system is done with the test data, specially
designed to show that the system will operate successfully in all its aspects
conditions. Thus the system testing is a confirmation that all is correct and an
opportunity to show the user that the system works.
VALIDATION TESTING:
The final step involves Validation testing, which determines whether the
software function as the user expected. The end-user rather than the system
developer conduct this test most software developers as a process called “Alpha
and Beta Testing” to uncover that only the end user seems able to find.
The compilation of the entire project is based on the full satisfaction of the
end users. In the project, validation testing is made in various forms. In question
entry form, the correct answer only will be accepted in the answer box. The
answers other than the four given choices will not be accepted.
SYSTEM IMPLEMENTATION
CONCLUSION
Every application has its own merits and demerits. The project has covered
almost all the requirements. Further requirements and improvements can easily be
done since the coding is mainly structured or modular in nature. Changing the
existing modules or adding new modules can append improvements. Further
enhancements can be made to the application, so that the web site functions very
attractive and useful manner than the present one.
BIBLIOGRAPHY
-APRES
2. MATTHEW MACDONALD:
“MICROSOFT VISUAL BASIC.NET PROGRAMMER’S COOKBOOK”
4. DOUGLAS O.REILLY ,
LANGUAGE SPECIFICATION
⦁ Security.
⦁ Robustness.
⦁ Productivity.
⦁ Performance.
SECURITY
ROBUSTNESS:
PRODUCTIVITY:
PERFORMANCE:
ASP.NET
Developers can choose from the following two features when creating an
ASP.NET application. Web Forms and Web services, or combine these in any way
they see fit. Each is supported by the same infrastructure that allows you to use
authentication schemes; cache frequently used data, or customizes your
application's configuration, to name only a few possibilities.
Each of these models can take full advantage of all ASP.NET features, as
well as the power of the .NET Framework and .NET Framework common
language runtime.
Writing custom debug statements to your Web page can help immensely in
troubleshooting your application's code. However, it can cause embarrassment if it
is not removed. The problem is that removing the debug statements from your
pages when your application is ready to be ported to a production server can
require significant effort.
⦁ Interoperability
⦁ Maintainability
⦁ Programmability
⦁ Performance Scalability
INTEROPERABILITY:
MAINTAINABILITY:
In the life of a deployed system, modest changes are possible, but
substantial, Architectural changes are rarely attempted because they are so
difficult. As the performance load on a deployed application server grows, system
resources can become scarce and response time or throughput can suffer. Faced
with this problem, software architects can choose to divide the server's
business-logic processing and user-interface processing onto separate tiers on
separate machines.
In effect, the application server tier is replaced with two tiers, alleviating the
shortage of system resources. If the original application is implemented in
ADO.NET using datasets, this transformation is made easier.
PERFORMANCE:
SCALABILITY:
VISUAL STUDIO .NET
Visual Studio .NET is a complete set of development tools for building
ASP Web applications, XML Web services, desktop applications, and mobile
applications In addition to building high-performing desktop applications, you
can use Visual Studio's powerful component-based development tools and other
technologies to simplify team-based design, development, and deployment of
Enterprise solutions.
Visual Basic .NET, Visual C++ .NET, and Visual C# .NET all use the
same integrated development environment (IDE), which allows them to share tools
and facilitates in the creation of mixed-language solutions. In addition, these
languages leverage the functionality of the .NET Framework and simplify the
development of ASP Web applications and XML Web services.
XML SUPPORT:
Visual Basic. NET, the latest version of visual basic, includes many new
features. The Visual Basic supports interfaces but not implementation inheritance.
IMPLEMENTATION INHERITANCE:
GARBAGE COLLECTION:
OVERLOADING:
MULTITHREADING:
FEATURES OF SQL-SERVER
They are,
1. TABLE
2. QUERY
3. FORM
4. REPORT
5. MACRO
TABLE:
VIEWS OF TABLE:
1. Design View
2. Datasheet View
Design View
To build or modify the structure of a table we work in the table design view. We
can specify what kind of data will be hold.
Datasheet View
To add, edit or analyses the data itself we work in tables datasheet view mode.
QUERY:
A query is a question that has to be asked the data. Access gathers data that
answers the question from one or more table. The data that make up the answer is
either dynaset (if you edit it) or a snapshot (it cannot be edited).Each time we run
query, we get latest information in the dynaset. Access either displays the dynaset
or snapshot for us to view or perform an action on it, such as deleting or updating.
FORMS:
Views of Form:
They are,
1. Design View
2. Form View
Design View
Form View
The form view which display the whole design of the form.
REPORT:
A report is used to vies and print information from the database. The report
can ground records into many levels and compute totals and average by checking
values from many records at once. Also the report is attractive and distinctive
because we have control over the size and appearance of it.
MACRO:
MODULE:
Modules are units of code written in access basic language. We can write and use
module to automate and customize the database in very sophisticated ways
SCREENS:
HOME:
Customer Registration:
Card details:
Edit Profiles:
Customer Purchasing product:
CREDIT CARD TRANSACTION DETAILS:
Security details:
Registered Customer Details:
FRAUD USERS DETAILS:
Admin Product Entry Details:
Login Customer Details:
CODINGS
Edit profile
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
{
string usrname = Convert.ToString(Session["user"]);
con.Open();
SqlDataReader dr = cmd.ExecuteReader();
if (dr.Read())
txtUserName.Text = dr[0].ToString();
txtPassword.Text = dr[1].ToString();
txtConPass.Text = dr[2].ToString();
txtAddress.Text = dr[3].ToString();
txtPhone.Text = dr[4].ToString();
txtEmail.Text = dr[5].ToString();
txtLimit.Text = dr[6].ToString();
txtPlaceid.Text = dr[7].ToString();
con.Close();
SqlCommand cmd;
con.Open();
cmd.ExecuteNonQuery();
con.Close();
//Response.Write("<script>alert('Updated Successfully!!!')</script>");
Response.Redirect("usershome.aspx");
}
Purchase
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
SqlCommand cmd;
protected void Page_Load(object sender, EventArgs e)
if (Page.IsPostBack == false)
//ddlProdname.Items.Clear();
ddl();
con.Open();
cmd.ExecuteNonQuery();
con.Close();
call();
txtPrice.Text = "";
txtQuantity.Text = "";
txtTOtal.Text = "";
//ddlProdname.Items.Clear();
ddl();
con.Open();
da.Fill(ds);
gvItems.DataSource = ds;
gvItems.DataBind();
con.Close();
{
con.Open();
SqlDataReader dr = cmd.ExecuteReader();
while (dr.Read())
ddlProdname.Items.Add(dr[0].ToString());
con.Close();
//ddlProdname.Items.Clear();
con.Open();
SqlDataReader dr = cmd.ExecuteReader();
if (dr.Read())
txtPrice.Text = dr[0].ToString();
con.Close();
double a = Convert.ToDouble(txtPrice.Text);
int b = Convert.ToInt32(txtQuantity.Text);
double c = a * b;
txtTOtal.Text = c.ToString();
double tot = 0;
con.Open();
while (dr.Read())
con.Close();
con.Open();
cmd.ExecuteNonQuery();
con.Close();
con.Open();
cmd.ExecuteNonQuery();
con.Close();
call();
Session["tot"] = tot;
Response.Redirect("carddetails.aspx");
admin login
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
Response.Redirect("AdminHome.aspx");
Loginfo
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
SqlCommand cmd;
con.Open();
cmd.ExecuteNonQuery();
con.Close();
}
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
con.Open();
SqlDataReader dr = cmd.ExecuteReader();
if (dr.Read())
txtUserName.Text = dr[0].ToString();
txtPassword.Text = dr[1].ToString();
txtConPass.Text = dr[2].ToString();
txtAddress.Text = dr[3].ToString();
txtPhone.Text = dr[4].ToString();
txtEmail.Text = dr[5].ToString();
txtLimit.Text = dr[6].ToString();
txtPlaceid.Text = dr[7].ToString();
con.Close();
}
SqlConnection con = new
SqlConnection(ConfigurationManager.AppSettings["connection"]);
SqlCommand cmd;
con.Open();
cmd.ExecuteNonQuery();
con.Close();
//Response.Write("<script>alert('Updated Successfully!!!')</script>");
Response.Redirect("usershome.aspx");
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
con.Open();
SqlDataReader dr = cmd.ExecuteReader();
if (dr.Read())
Session["user"] = txtUserName.Text;
Response.Redirect("UsersHome.aspx");
con.Close();
using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Data.SqlClient;
SqlCommand cmd;
if (Page.IsPostBack == false)
{
ddlProdname.Items.Clear();
ddl();
con.Open();
cmd.ExecuteNonQuery();
con.Close();
call();
txtPrice.Text = "";
txtQuantity.Text = "";
txtTOtal.Text = "";
//ddlProdname.Items.Clear();
ddl();
}
con.Open();
da.Fill(ds);
gvItems.DataSource = ds;
gvItems.DataBind();
con.Close();
con.Open();
SqlDataReader dr = cmd.ExecuteReader();
while (dr.Read())
{
ddlProdname.Items.Add(dr[0].ToString());
con.Close();
//ddlProdname.Items.Clear();
con.Open();
SqlDataReader dr = cmd.ExecuteReader();
if (dr.Read())
txtPrice.Text = dr[0].ToString();
con.Close();
ddlProdname.Items.Clear();
ddl();
double a = Convert.ToDouble(txtPrice.Text);
int b = Convert.ToInt32(txtQuantity.Text);
double c = a * b;
txtTOtal.Text = c.ToString();
double tot = 0;
con.Open();
SqlDataReader dr = cmd.ExecuteReader();
while (dr.Read())
{
tot = tot +Convert.ToDouble(dr[0]);
con.Close();
con.Open();
cmd.ExecuteNonQuery();
con.Close();
con.Open();
cmd.ExecuteNonQuery();
con.Close();
call();
Session["tot"] = tot;
Response.Redirect("carddetails.aspx");
}
SYSTEM DEVELOPMENT
cycle model for software engineering. Often considered the classic approach to the
systems development life cycle, the waterfall model describes a development
method that is linear and sequential. Waterfall development has distinct goals for
each phase of development. Imagine a waterfall on the cliff of a steep mountain.
Once the water has flowed over the edge of the cliff and has begun its journey
down the side of the mountain, it cannot turn back. It is the same with waterfall
development. Once a phase of development is completed, the development
proceeds to the next phase and there is no turning back.