This action might not be possible to undo. Are you sure you want to continue?
Department of Computer Engineering,Tathwade
Credit Card Fraud Detection System
1.1 Problem Definition
Design the software to implement computerized credit card fraud detection system. It mainly consists of customer, credit card, system, administrator, message sending system as mobile phones and computer. There are two phases of system, one is online credit card transaction and the other is credit card machine terminal transaction. The system must try to detect any kind of fraud, for instance change of place, excessive amount, abnormal timing or behavior and even the unusual frequency of transaction. The system will develop an entity set using bank database. A credit card transaction simulator is used to generate transactions randomly; these transactions are fed to the system as an input. System will also have its own memory and will use A.I. techniques and methodologies to prevent any misuse of the credit card. Incase of any fraud the system will send an email or SMS whichever is feasible to the owner of the credit card this will be considered as an output of the system. An entity set is generated considering previous history of the customer stored in the bank database; this is termed as profile of the customer. The profile of customer is maintained by the bank and is assumed to be updated by the system regularly. The profile of the customer will be generated by the system considering previous transactions of the customer if present. The system will generate output to fraudulent transactions so as it does not cause nuisance to the customer, for example if a customer is alerted for a fraudulent transaction and the customer approves the transaction as non fraudulent, then next time similar transaction will not generate fraud message. The entity set contains variables which are having priorities associated with each of them. These will focus on chances of detecting a transaction as a fraudulent transaction.
Department of Computer Engineering,Tathwade
Credit Card Fraud Detection System
System administrator will assign priorities to each transaction parameter considering customer requirements. E.g. User will give list of possible favorites such as grocery, petrol, electronic goods etc. AI technique in the system will see to it that the system does consider previously detected fraudulent transactions which were approved by the customer to be nonfraudulent.
1.3 Literature Servey: Recent Developments in Fraud Management
The technology for detecting credit card frauds is advancing at a rapid pace – rules based Systems, neural networks, chip cards and biometrics are some of the popular techniques Employed by Issuing and Acquiring banks these days. Apart from technological advances, another trend which has emerged during the recent years is that fraud prevention is moving from back-office transaction processing systems to frontoffice authorization systems to prevent committing of potentially fraudulent transactions. However, this is a challenging trade-off between the response time for processing an authorization request and extent of screening that should be carried out.
SIMPLE RULE SYSTEMS: Simple rule systems involve the creation of ‘if...then’ criteria to filter incoming Authorizations/transactions. Rule-based systems rely on a set of expert rules designed to Department of Computer Engineering,Tathwade 3
Credit Card Fraud Detection System identify specific types of high-risk transactions. Rules are created using the knowledge of what characterizes fraudulent transactions. For instance, a rule could look like – If
transaction amount is > $5000 and card acceptance location = Casino and Country = ‘a high-risk country’. Fraud rules enable to automate the screening processes leveraging the knowledge gained over time regarding the characteristics of both fraudulent and legitimate transactions. Typically, the effectiveness of a rule-based system will increase over time, as more rules are added to the system. It should be clear, however, that ultimately the effectiveness of the system depends on the knowledge and expertise of the person designing the rules. The disadvantage of this solution is that it can increase the probability of throwing many Valid transactions as exceptions, however, there are ways by which this limitation can be overcome to some extent by prioritizing the rules and fixing limits on number of filtered Transactions.
RISK SCORING TECHNOLOGIES Risk scoring tools are based on statistical models designed to recognize fraudulent transactions, based on a number of indicators derived from the transaction characteristics. Typically, these tools generate a numeric score indicating the likelihood of a transaction being fraudulent: the higher the score, the more suspicious the order. Risk scoring systems provide one of the most effective fraud prevention tools available. The primary advantage of risk scoring is the comprehensive evaluation of a transaction being captured by a single number. While individual fraud rules typically evaluate a few simultaneous conditions, a risk-scoring system arrives at the final score by weighting several dozens of fraud indicators, derived from the current transaction attributes as well as cardholder historical activities. E.g., transaction amounts more that three times the average transaction amount for the cardholder in the last one year. The second advantage of risk scoring is that, while a fraud rule would either flag or not flag a transaction, the actual score indicates the degree of suspicion on each
Department of Computer Engineering,Tathwade
The advantages neural networks offer over other techniques are that these models are able to learn from the past and thus. etc) to the occurrence of fraud. improve results as time passes. These neural network models are basically ‘trained’ by using examples of both legitimate and fraudulent transactions and are able to correlate and weigh various fraud indicators (e. A neural network is a computerized system that sorts data logically by performing the following tasks: 1. banks can detect fraudulent use of a card. so Department of Computer Engineering. transactions can be prioritized based on the risk score and given a limited capacity for manual review. They are based on the‘statistical knowledge’ contained in extensive databases of historical transactions. Identifies cardholder’s buying and fraudulent activity patterns. By employing neural networks effectively. a fingerprint or how he/she sign his/her name. BIOMETRICS Biometrics is the name given to a fraud prevention technique that records a unique characteristic of the cardholder like. unusual transaction amount. They can also extract rules and predict future activity based on the current situation. only those with the highest score would be reviewed. The principles of neural networking are motivated by the functions of the brain – especially pattern recognition and associative memory. 2. 3. and fraudulent ones in particular.g.. predicting future values or events based upon the associative memory of the patterns it has learned. NEURAL NETWORK TECHNOLOGIES Neural networks are an extension of risk scoring techniques. The neural network recognizes similar patterns.Tathwade 5 . faster and more efficiently. Processes data by trial and elimination (excluding data that is not relevant to the pattern).Credit Card Fraud Detection System transaction.Thus. Finds relationships in the patterns and current transaction data. card history.
Stores highly sensitive data such as signing or encryption keys in a highly secure Department of Computer Engineering. SMART CARDS To define in the simplest terms.Tathwade 6 . The computer can then compare the stored characteristic with that of the person presenting the card to make sure that the right person has the right card. hand based verification. Reliable and harder to tamper with than a magnetic stripe card. Smart credit cards operate in the same way as their magnetic counterparts. Smart cards have evolved significantly over the past decade and offer several advantages compared to a general-purpose magnetic stripe card. a smart card is a credit card with some intelligence in the form of an embedded CPU. however. This card-computer can be programmed to perform tasks and store information. and with PCs. which is capable of generating 72 quadrillion or more possible encryption keys and thus making it practically impossible to fraudulently decode information in the chip. These smart chips add extra security to the card. Biometrics. retinal and iris scanning and dynamic signature verification.Credit Card Fraud Detection System Understanding Credit Card Frauds that it can be read by a computer. seems to supercede PIN as a basis for the next generation of personal identity verification systems. which provides a means to identify an individual through the verification of unique physical or behavioral characteristics. the technology is still being run alongside the magnetic strip technology due to a slow uptake of smart card reading terminals in the world market. There are many types of biometrics systems under development such as finger print verification. but the intelligence is limited – meaning that the smart card's power falls far short of a desktop computer. The smart chip has made credit cards a lot more secure. Compatible with portable electronic devices such as phones and personal digital assistants (PDAs). The advantages are listed below: Stores many times more information than a magnetic stripe card. Smart credit cards contain 32-kilobyte microprocessors. the only difference being that an electronic chip is embedded in the card. Performs multiple functions in a wide range of industries.
1.5 System description: Credit Card Fraud is one of the biggest threats to business establishments today. The system could also be modified as per the requirements of the concerned bank i. Also the parameters on which the transaction fraud is detected may be further enhanced by consulting with the banking firms to increase the efficiency of the system.Credit Card Fraud Detection System Manner Performs certain sensitive operations using signing or encryption keys in a secure fashion. and Security Cards etc. mailing etc. In simple terms. The same system can be implemented for any kind of card such as petro cards. A consortium of Europay MasterCard and Visa (EMV) recently issued a set of specifications for embedding chips in credit cards and processing transactions from such cards. Credit Card Fraud is defined as: When an individual uses another individuals’ credit card for personal reasons while the owner of the card and the card issuer are not aware of the fact that the card is being used. Credit card fraudsters employ a large number of modus operandi to commit fraud. 1. ATM cards. the market response has been slow so far due to large investments needed in implementing the EMV compliant programs. MasterCard and Visa have also issued deadlines for compliance with these specifications indicating that banks will have to bear a large portion of fraud losses if they do not comply with EMV specifications. However. to combat the fraud effectively. However. the system has a profound future scope the system developed uses primitive Artificial Intelligence techniques.e. Additional artificial intelligence techniques such as criminal mentality may be included in the system to make it more foolproof. it is important to first understand the mechanisms of executing a fraud. the system could use another mode of communication such as automated police phone dialing.4 Future scope: Credit card fraud detection system developed has very wide range of applications.Tathwade 7 . Department of Computer Engineering.
and fear from the risk of having their merchant account closed. This makes the internet extremely attractive to fraud Perpetrators . such as shopping on the internet poses a greater threat as the merchant (the web site) is no longer protected with advantages of physical verification such as signature check.e. the cardholder..Tathwade 8 . This section analyses the impact that credit card frauds have on all the players involved in transacting business through credit cards. and has no intention of either contacting the owner of the card or making repayments for the purchases made. The fraudulent activity on a card affects everybody. etc. the acquirer as well as the issuer. Increasingly. the individual using the card has no connection with the cardholder or issuer. IMPACT OF CREDIT CARD FRAUDS Unfortunately. occurrences of credit card frauds have only shown an upward trend so far. pay chargeback fees. In fact. While consumers may face trouble trying to get a fraudulent charge reversed. i. merchants lose the cost of the product sold. the merchant. the card not present scenario. merchants are far more at risk from credit card fraud than the cardholders. According to a recent survey. the rate at which internet fraud occurs is 12 to 15 times higher than ‘physical world’ fraud. Impact of Fraud on Cardholders It's interesting to note that cardholders are the least impacted party due to fraud in credit Department of Computer Engineering. Credit card frauds are committed in the following ways: An act of criminal deception (mislead with intent) by use of unauthorized account and/or personal information Illegal or unauthorized use of account for personal gain Misrepresentation of account information to obtain goods and/or services.Credit Card Fraud Detection System Further. Contrary to popular belief. it is almost impossible to perform any of the ‘physical world’ checks necessary to detect who is at the other end of the transaction. photo identification.
Cost of goods sold: Since it is unlikely that the merchandise will be recovered in a case of fraud. The cost of a fraudulent transaction consists of: 1. reversing the credit for the transaction. Furthermore. Impact of Fraud on Merchants Merchants are the most affected party in a credit card fraud. the merchant will have to completely absorb the cost of the fraudulent transaction.Credit Card Fraud Detection System card transactions as consumer liability is limited for credit card transactions by the legislation prevailing in most countries. this cost consists of several components. Since the shipping cost is usually bundled in the value of the order. delivery signature) available to challenge the cardholder’s dispute. Many banks even have their own standards that limit the consumer's liability to a greater extent. the merchant does not have any physical evidence (e. In case. Therefore. particularly more in the card-not-present transactions. In fact. 2. the merchant will have to write off the value of goods involved in a fraudulent transaction. fraudsters typically request high-priority shipping for their orders to enable rapid completion of the fraud.Tathwade 9 . the card-issuing bank will send a chargeback to the merchant (through the acquirer). and processes chargeback for the disputed amount. The impact of this loss will be highest for low-margin merchants. which could add up to a significant amount. The cardholder has to just report suspicious charges to the issuing bank.g. Department of Computer Engineering. it is almost impossible to reverse the chargeback. resulting in high shipping costs. the merchant will also need to absorb the cost of shipping for goods sold in a fraudulent transaction. Shipping cost: More relevant in a card-not-present scenario. which in turn investigates the issue with the acquirer and merchant. as they have to accept full liability for losses due to fraud. This is true for both card-present as well as cardnot-present scenarios. They also have a cardholder protection policy in place that covers for most losses of the cardholder. Whenever a legitimate cardholder disputes a credit card charge.
Loss of Reputation: Maintaining reputation and goodwill is very important for merchants as excessive chargeback’s and fraud monitoring could both drive cardholders away from transacting business with a merchant. Like in the case of chargeback’s issued to the merchant. Card association fees: Visa and MasterCard have put in place fairly strict programs that penalize merchants generating excessive chargebacks. This is because processing a chargeback requires the merchant to receive and research the claim. 4. there are administrative and manpower costs that the bank has to incur. Even in cases when the Issuer/Acquirer is not bearing the direct cost of the fraud. it is sometimes possible that the Issuer/Acquirer bears the costs of fraud.Credit Card Fraud Detection System 3. contact the consumer. 6. Impact of Fraud on Banks (Issuer/Acquirer) Based on the scheme rules defined by both MasterCard and Visa. each chargeback requires one to two hours to process.g.Tathwade 10 . and respond to the acquiring bank or issuer with adequate documentation. 1% of all transactions or 2. the merchant has to pay an additional processing fee to the acquiring bank for every chargeback. there are some indirect costs that will finally be borne by them. Administrative cost: Every transaction that generates a chargeback requires significant administrative costs for the merchant. if a merchant exceeds established chargeback rates for any three-month period (e. the merchant could be penalized with a fee for every chargeback. 5. the merchant’s contract to accept cards could be terminated. The issuers and acquirers also have to make huge investments in preventing frauds by deploying sophisticated IT systems for detection of fraudulent transactions. Typically. Merchant bank fees: In addition to the penalties charged by card associations. In extreme cases. On average.5% of the total dollar volume). Department of Computer Engineering.
In doing so this module maintains track record of each and every credit card holder.6 Working of the system: Credit card fraud detection system comprises of mainly three modules the simulator. Also we can create new credit card holder accounts. the fraud detection system module and sms module.Tathwade 11 . This terminal device is registered at the service provider bank. Profile is nothing but the track record of the credit card usage by the credit card holder.Credit Card Fraud Detection System 1. Credit Card Snapshot: Department of Computer Engineering. Client form maintains all the necessary information of the customer r the credit card holder. Simply stated it is the history of the card. Profile of the customer is updated at each new transaction. The Credit card fraud detection system also has client form in order to maintain and create database of this service provider bank. If the fraud detection system module detects fraud transaction it generates fraud signal which is fed to the sms module. This is termed as profile of the customer. The sms module simply accepts the signal and sends sms to the respective credit card holder. The system being self learning does not generate fraud signal if the similar transaction has already been approved by credit card holder. The simulator module generates random transactions this module was designed to simulate the working of credit card swiping machine also known as terminal device. The simulator generated transactions are fed to the fraud detection system module which checks for fraudulent transaction. Various other vital customer details are maintained and updated by this module.
Tathwade 12 .Visa 5 .Credit Card Snapshot Here are what some of the numbers stand for: The first digit in your credit-card number signifies the system: 3 .Discover Card The structure of the card number varies by system. Visa . For example. 2. digits five through 11 are the account number.Digits two through six are the bank number. two through four.Digits three and four are type and currency. The digits after the bank number up through digit 15 are the account number. digits seven through 12 or seven through 15 are the account number and digit 13 or 16 is a check digit. American Express .Credit Card Fraud Detection System Fig 1. digits 12 through 14 are the card number within the account and digit 15 is a check digit. two through five or two through six are the bank number (depending on whether digit two is a 1. Carte Blanche and Diners Club with 38.MasterCard 6 . 3 or other).travel/entertainment cards (such as American Express and Diners Club) 4 . MasterCard .Digits two and three. Department of Computer Engineering. and digit 16 is a check digit. American Express card numbers start with 37.
often called a magstripe. The magstripe is made up of tiny iron-based magnetic particles in a plastic-like film.Credit Card Fraud Detection System The stripe on the back of a credit card is a magnetic stripe.Tathwade 13 . Each particle is really a tiny bar magnet about 20-millionths of an inch long. It must be noted that this is just a model and by no means similar to the working of our system. Department of Computer Engineering. The general functioning of the credit card transaction The model for fraud detection system is represented in the following diagram. It is depicted just to understand the system working. It briefly lays the foundation of where the terminal is located or how does the bank come into picture. The general functioning of the credit card transaction is as shown below: Fig 2.
Tathwade 14 . Credit card role Department of Computer Engineering.Credit Card Fraud Detection System Credit card role is depicted in the figure below: Fig 3.
The credit card service provider bank needs to employ special staff to deal with such situations hence causing unnecessary overhead. The major risk of all is that the customer will never again deal with the dealer. The dealer has to repay the customer or give him some refund. Department of Computer Engineering.Tathwade 15 . Authorization of transaction 1. This may result in loss of credit in the market. These losses may be avoided by use of this system. The credit card company has to stop the card usage for which it needs to block the card which adds to its expenses this may be avoided. The dealer has to pay the credit card bank the loss occurred or compensation. This may be avoided.3 Advantages of the system: Credit card fraud detection will minimize economic losses of the credit card holder. The dealer suffers the most when credit card fraud occurs.Credit Card Fraud Detection System Authorization of transaction takes place as follows: Fig 4.
also the system to detect fraud may be used to monitor accounts of user. petro cards. The account may be of any type.7 Applications of the system: The credit card fraud detection is applicable to security needed for any kind of card. ATM cards etc. Though it is mainly concerned with credit card it may be applied to smart card.Tathwade 16 . Department of Computer Engineering.Credit Card Fraud Detection System 1. security cards.
Tathwade 17 .Credit Card Fraud Detection System Chapter 2 Requirement Analysis Department of Computer Engineering.
System should be available at not too high price. The system should try to avoid unnecessary faults in detecting fraud. Two types of system requirements are: Functional requirements Nonfunctional requirements Department of Computer Engineering. 2. structuring.2 System Requirements System requirements describe the system services and constraints in detail. User Requirements 2. Nonfunctional Requirements Requirements analysis of the credit card fraud detection system is as follows: 2. prioritizing and validation. Functional Requirements b. System should be user friendly.1 User Requirements User Requirements specify services provided by system and constraints under which it must operate. The system should not cause overhead cost for sending sms. Software requirement analysis involves requirement collection. classification. System should be automated such that it automatically sends sms to the customer having a fraud transaction. System should be compatible on existing transaction system. System should be self learning. System Requirements a. Requirement analysis consists of two parts: 1.Tathwade 18 .Credit Card Fraud Detection System 2 Requirement Analysis Requirement analysis bridges the gap between system engineering and software analysis design.
2 Nonfunctional Requirements Requirements relate to whole system not to individual system feature. visual studio. 2.Tathwade 19 .3 Functional Requirements Functional requirements for the system describe the functionality or services that should be provided by system functions in detail. 2. The credit card holder must get the transaction details of the detected faulty transaction.4.2. its input and output expectation.2 Hardware Requirements Processor: RAM: Hard Disk: Keyboard: Mouse: P4 256MB 10 GB 101 Keys Keyboard scroll mouse Department of Computer Engineering.1 Software Requirements Language: c# .2.4 Software & Hardware Requirements 2. This means that they are often critical than functional requirement. 2.net 2003 Operating System: Windows Xp Data base : sql server. its input and output expectation. 2.Credit Card Fraud Detection System 2. Different functional requirements are listed below: The system should support following facilities: The system should give a pop up screen when fraud is detected.1 Functional Requirements Functional requirements for the system describe the functionality or services that should be provided by system functions in detail.4. The system should automatically send a sms to the faulty transaction credit card holder The transaction details of the faulty transaction should be visible.
Credit Card Fraud Detection System Chapter 3 System Analysis 3.1.Tathwade 20 .1 System Enginering: 3.1 System goals: Department of Computer Engineering.
1 Identify Customer’s Needs The main purpose of this step is to identify system goals which are defined by using the question like . people. The response time of the system should be minimal. The system should be user friendly. The system also needs various other data such as assets owned by the customer in order to have a rough background of the economic condition of the customer.1. and other details are required. 3. and database.1. phone no..what info is to be produced. hardware. Evaluate feasibility study 3. What info should be provided? What functions & performance are required? The customer’s needs are identified to find out the features that are required for system’s success.1.Credit Card Fraud Detection System The main objectives of System analysis are1.Tathwade 21 . 5. Technical Feasibility Department of Computer Engineering. Allocate functions to software. Perform economic & technical analysis 4. The system should try to detect out of track transactions. The system should be foolproof enough so as not to create nuisance to the card holder. The customer details like address.2 Feasibility Study It is necessary to evaluate feasibility of a project. Identify the customer’s needs 2. Four primary areas for feasibility study are: a.1. Customer should not have too much overhead cost for operating the system. Economic Feasibility b. Establish cost & schedule constraints 3.
NET 3.minimum 256MB RAM HDD .SQL SERVER Visual Studio . Economic Feasibility b.Tathwade 22 .minimum 10 GB or more of free Hard-disk space Cell phone – Nokia with data cable compatible Software Requirement: Operating System . Legal Feasibility d. Hence operation cost of the system will be negligible compared with the benefits as only RAM of the server will have to be enhanced to Department of Computer Engineering.Credit Card Fraud Detection System c. Four primary areas for feasibility study are: a. 3.3 System Analysis Feasibility Study It is necessary to evaluate feasibility of a project. Alternatives 3. Legal Feasibility d.Project Cost & Performance Hardware Requirement: P4 (Pentium IV) or higher processor RAM . The system will reside on the already existing bank server which will trace on every incoming fraud. Technical Feasibility c.WINDOWS Xp Database .1.4 Alternatives: Such kind of system is not available in Indian Software Market.3. Alternatives a. Economic Feasibility This involves the study of cost benefit analysis.1.
The system is also technically feasible as variety of languages are available for development like VC++. and at the same time collects information about performance. Department of Computer Engineering. databases such as DB2. c. Also the dealers will not get affected adding to the economic value of the system. Technical Feasibility During technical feasibility analyst evaluates technical merits of the system concept. maintainability. oracle could also have been used. reliability.C++.Credit Card Fraud Detection System higher power in proportion of the traffic of transactions.ASP . VB .Tathwade 23 . The sms module requires data cable enabled cell phone connected to the USB of the computer in use. Also development cost of the system is bearable by the bank compared to the losses it has to suffer.C. b. The user interface is required to deal with entry and maintain accounts of the card holders. This system will save vital customer money. Allocation and Trade-offs Each system function with its performance and interface characteristics is allocated to one or more system elements.JAVA etc.
Credit Card Fraud Detection System Chapter 4 System Design 4.Tathwade 24 .System Design: System design can be classified into two parts namely: Data Flow Diagrams UML(Unified Modeling Language) Diagrams Department of Computer Engineering.
1. System System Db Display Fig 5.2 DFD Level ‘1’: Department of Computer Engineering.C.F. 4.1 Data Flow Diagram (DFD) This section of report gives the dataflow of the system with the help of dataflow diagrams as given below.Tathwade 25 .1.1 DFD Level ‘0’: Bank Server SMS System C.Credit Card Fraud Detection System 4. DFD Level ‘0’ 5. Thus helping us to get knowledge of how the data in the system flows and how interaction between them takes place.D.
DFD Level ‘1’ 4.2 Unified Modeling Language: Department of Computer Engineering.Tathwade 26 .Credit Card Fraud Detection System Fig 6.
and Color Space Conversion.2. Use case diagram for simulator: <<extern>> generates random place/terminal id simulates transaction <<extend>> <<extern>> simulator generates item according to amount according to item terminal id generates random card no <<extend>> Department of Computer Engineering. constructing. It is very expressive language. A use case diagram represents a particular sequence of transactions between the system and an actor (an end user or system external to the system being analyzed). Image Transformation.Credit Card Fraud Detection System The Unified Modeling Language (UML) is a graphical language for visualizing. specifying.2. Use case diagrams allow you to capture business events by analyzing how objects external to the system interact with the system.1 UML Diagrams for Magic Image Processor System 4. 4. You can use case diagrams to analyze system requirements and to help you define system boundaries. addressing all the views needed to develop and then deploy such systems.1 Use Case Diagram A use case diagram is a graph of actors. and documenting the artifacts of a software intensive system. Following section shows different UML diagrams for Magic Image Processor system itself. communication (participation) associations between the actors and the use cases. and different modules of system such as Image Resize. Image Enhancement. and generalizations among the use cases. a set of use cases enclosed by a system boundary.Tathwade 27 .
Tathwade 28 .Credit Card Fraud Detection System Figno 11. Use case diagram for fraud detection system Use case diagram for administrator: Department of Computer Engineering. Use case diagram for simulator Use case diagram for fraud detection system: <<extend>> validate transaction check card limit & balance <<extend>> fraud alert Fraud detection sys <<extern>> evaluate fraud meter initiate SMS system send SMS Figno 12.
2 Component Diagram It shows the organizations and dependencies among a set of components.Credit Card Fraud Detection System <<extern>> create place table <<extern>> create new account Admin <<extern>> create profile table create item & amount table Figno 13. It provides the realization of an interface It represents a physical module of code. Use case diagram for administrator: 4. Component is a replaceable part of a system.Tathwade 29 . Component diagram for Credit Card Fraud Detection System: Department of Computer Engineering. Components can be packed logically. It conforms to a set of interfaces.2.
cs SMS_se nd. Component diagram for Credit Card Fraud Detection System 4.log generate transaction main. and inheritance relationships d) Multiplicity and navigation indicators e) Role names Department of Computer Engineering.cs create new account send SMS to card owner Figno 17.3 Class Diagram A class diagram shows the existence of classes and their relations in the logical view of a system. dependency.cs credit card.Credit Card Fraud Detection System credit card.2. aggregation. It shows a) UML modeling elements in class diagram b) Classes and their structure and behavior c) Associations.Tathwade 30 .data fraud_po p_up.cs display fraudulent transaction client.cs simulator .
Class diagram for Simulator Department of Computer Engineering.Credit Card Fraud Detection System Figno 7 .Tathwade 31 .
Tathwade 32 .Credit Card Fraud Detection System Class diagram for Fraud Detection System : Department of Computer Engineering.
Class diagram for Fraud Detection System Class diagram for Messaging System : Department of Computer Engineering.Credit Card Fraud Detection System Figno 8.Tathwade 33 .
Tathwade 34 .Credit Card Fraud Detection System Figno 9. Class diagram for Messaging System Class Diagram For Client Information: Department of Computer Engineering.
Credit Card Fraud Detection System Figno10.Tathwade 35 . Class Diagram For Client Information Department of Computer Engineering.
A collaboration diagram shows an interaction organized around the objects in the interaction and their links to each other. Sequence diagrams 2.Tathwade 36 . so the sequence of messages and the concurrent threads must be determined using sequence numbers. Collaboration diagrams. In particular. a collaboration diagram shows the relationships among the objects. Unlike a sequence diagram. it shows the objects participating in the interaction by their "lifelines" and the messages that they exchanged arranged in time sequence. a collaboration diagram does not show time as a separate dimension. On the other hand. Department of Computer Engineering.2. It does not show the associations among the objects. Interaction diagrams come in two forms based on the same underlying information but each emphasizing a particular aspect of it: 1. A sequence diagram shows an interaction arranged in time sequence.4 Sequence Diagram Interaction Diagram A pattern of interaction among objects is shown on an interaction diagram.Credit Card Fraud Detection System 4.
save transaction inform simulator display transaction if fraudulent initiate SMS system alert fraud display fraudulent transaction send SMS to appropriate card owner Figno 14.Sequence diagram for credit card fraud detection system Collaboration diagram for credit card fraud detection system: 5: display transaction 8: display fraudulent transaction 2: check for fraudulent transaction 3: if non-fraudulent .Tathwade 37 .save transaction 9: send SMS to appropriate card owner 1: generate new transaction simulato r 4: inform simulator 7: alert fraud fraud detection system 6: if fraudulent initiate SMS system Message sending system Department of Computer Engineering.Credit Card Fraud Detection System Sequence diagram for credit card fraud detection system: simulator fraud detection system generate new transaction Message sending system check for fraudulent transaction if non-fraudulent .
Tathwade 38 . Activity diagram for Credit Card Fraud Detection System: simulator fraud detection system SMS system simulate transaction check for fraud send SMS If fraudulent if non-frudulent get Phone no from client information save transaction send sms to the received no display transaction update entire entity set for card no dislpay transaction information Figno 16.2. Collaboration diagram for credit card fraud detection system 5.5 Activity Diagram An activity diagram is a special case of a state diagram in which all of the states are action states and most of the transitions are triggered by completion of the actions in the source states. They are useful for showing workflow and parallel processing. Activity diagram for Credit Card Fraud Detection System Department of Computer Engineering.Credit Card Fraud Detection System Figno 15. The purpose of this diagram is to focus on flows driven by internal processing.
6 Deployment Diagram Deployment diagrams show the configuration of run-time processing elements and the software components. Software component instances represent run-time manifestations of code units. they should be shown on component diagrams.Credit Card Fraud Detection System 5. and objects that live on them.1. Deployment diagram for Credit Card Fraud Detection System Department of Computer Engineering. processes.2.Tathwade 39 . Deployment diagram for Credit Card Fraud Detection System: sql server data base simulator message sending system fraud detection system GSM mobile device Figno18. Components that do not exist as run-time entities (because they have been compiled away) do not appear on these diagrams.
Tathwade 40 .Credit Card Fraud Detection System Chapter 3 References Department of Computer Engineering.
57 (10): 25–26.com www. Fraud Prevention Reference Guide. Anonymous. L.com www. 621-630.mastercard. Syst.Credit Card Fraud Detection System References: Books: 1) C# programming – Wrox publication 2) C# in 21 days – SAMS publication. 1994. Bill Rini.White Paper on Controlling Online Credit Card Fraud. September 2001.P Chan. 2001. Websites: Credit / Debt Management http://credit.activexperts.com www.windowsix. IEEE Intelligent Systems. The Future Threat of Credit Card Crime. 14(6): 67–74. Sci.wrox.com Department of Computer Engineering.about. W Fan. pp.. January 2002. RCMP Gazette.visa. 3) Learning C# – by Maurch 4) S. Reilly "Credit card fraud detection with a neural network". 1999. Certegy. 1995.mastercsharp.com www.Tathwade 41 .com www. Distributed data mining in credit card fraud detection.com/cs/fraud/ Duncan M D G. Conf. A Prodromidis & S Stolfo. Window Six. in Proc.americanexpress. 27th Hawaii Int. 2002.com www. Ghosh and D. http://www.
Credit Card Fraud Detection System www.nokia.orkut.forum.microsoft.Tathwade 42 .developer’shome.com www.com Department of Computer Engineering.com www.com www.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.