A Secure Mechanism for Resilient of Data Mining-Based Fraud Detection
Journal: International Journal of Computer Science and Network Solutions (IJCSNS) (Vol.1, No. 3)Publication Date: 2013-11-01
Authors : K.Rachel Praveena K.Suresh Babu G. Sudhakar G. Venkata Rami Reddy;
Page : 76-88
Keywords : Data mining based fraud; Anomaly detection; protection and data stream mining.;
Abstract
A Secure Mechanism for Resilient of Data Mining-Based Fraud Detection Identity Crime is used to detect fraudulence in credit card. The synthetic identity fraud utilizes credible but incorrect identities that are simple to create but more complicated to be appropriate on real time. Identity crime is completed in the combination of both synthetic as well as real identity theft. Credit Crime detection is extremely important characteristic of every computer applications. Particularly Credit crime is a lot reported crime in the literature. Credit application fraud is one of the examples of Credit crime. The obtainable applications do not apply data mining techniques intended for Credit crime detection has restrictions. To overcome the restrictions as well as address the Credit crime in the real world, this paper presents a Java based and user-friendly application based on top of the multilayered detection approach proposed by Phua et al. The layers consist of CD (Communal Detection) as well as SD (Spike Detection). The CD algorithm knows how to find social relationships inside the dataset whereas the SD algorithm finds spikes inside duplicates. Both communal detection as well as spike detection become aware of more types of attacks, enhanced account for changing legal behaviour, as well as remove the redundant attributes. The grouping of these algorithms knows how to detect several attacks. Our prototype application in Java illustrates how the Credit crime is detected. The results disclose that this application can be used in real world applications at the same time as supplement.
Other Latest Articles
- Combining MLP and Using Decision Tree in Order to Detect the Intrusion into Computer Networks
- Software as a Service, Platform as a Service, Infrastructure as a Service − A Review
- User Behavior Analysis from Web Log using Log Analyzer Tool
- Proposing an Optimum Multicasting Routing Algorithm Using Ant Colony for Improving QoS in Wireless Mesh Network
- Optimizing Data-Oriented Architecture for Generating Random Numbers Uniform with Stack Machines Indeterminate Structure
Last modified: 2013-11-17 05:26:21