A Proposed Architecture for Real Time Credit Card Fraud Detection

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The world has known a huge evolution especially in the field of e-commerce. Owing to this technology, everything has become available to the user the thing that resulted in a significant increase of the credit card use. As a consequence, it has become the most popular tool for online payment transactions. Nevertheless, the risk of credit card transactions constitutes a major problem as it plays a crucial role in criminal activities. Thanks to e-commerce, the online payment does not require the physical card or the cardholder's presence. However, it is a two faced coin; anyone who knows the details of a certain card can easily make fraud transactions and the cardholder comes to know only after the fraud transaction is carried out. When it comes to security, all actors are affected namely the cardholder, the bank and the merchants. Hence, the urgent need for a powerful system that allows fraud transactions to be detected and processed in real time. In the work at hand, we are going to propose a system that "shields" the credit card from any kind of fraud. In other words, we intend to create a system which detects the fraud based on big data technology; precisely Apache storm and Machine Learning in order to minimize the latency and to process transactions data in real time.



  • Keywords

    Big data, Hadoop, Machine learning, Real time credit card fraud detection, Spark, Storm.

  • References

      [1] “E-commerce _ International _ le commerce électronique, nouveau thème des stratégies de développement - Le Moci - Actualité du Moci.” .

      [2] T. H. E. Leading, P. Covering, and P. Systems, “FAST,” no. 1109, 2017.

      [3] A. Khan, N. Akhtar, and M. Qureshi, “Real-Time Credit-Card Fraud Detection using Artificial Neural Network Tuned by Simulated Annealing Algorithm,” nt. Conf. Recent Trends …, 2014.

      [4] Rajeshwari U and B. S. Babu, “Real-time credit card fraud detection using Streaming Analytics,” 2016 2nd Int. Conf. Appl. Theor. Comput. Commun. Technol., pp. 439–444, 2016.

      [5] A. Delamaire, “Credit card fraud and detection techniques : a review Title Credit card fraud and detection techniques : a review Credit card fraud and detection techniques: a review,” Banks Bank Syst., vol. 4, no. 2, 2009.

      [6] Gartner Inc., “What Is Big Data? - Gartner IT Glossary - Big Data,” Gartner IT Glossary. p. 1, 2013.

      [7] A. Z. Santovena, “Big Data : Evolution , Components , Challenges and Opportunities by,” p. 126, 2013.

      [8] C. L. Philip Chen and C. Y. Zhang, “Data-intensive applications, challenges, techniques and technologies: A survey on Big Data,” Inf. Sci. (Ny)., vol. 275, pp. 314–347, 2014.

      [9] A. Ingole and R. C. Thool, “Credit Card Fraud Detection Using Hidden Markov Model and Its Performance,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 3, no. 6, pp. 626–632, 2013.

      [10] K. K. Tripathi and M. A. Pavaskar, “Survey on Credit Card Fraud Detection Methods,” Int. J. Emerg. Technol. Adv. Eng., vol. 2, no. 11, p. 721, 2012.

      [11] R. J. Bolton, D. J. Hand, and D. J. H, “Unsupervised Profiling Methods for Fraud Detection,” Proc. Credit Scoring Credit Control VII, pp. 5–7, 2001.

      [12] K. R. Seeja and M. Zareapoor, “FraudMiner: A Novel Credit Card Fraud Detection Model Based on Frequent Itemset Mining,” Sci. World J., vol. 2014, pp. 1–10, 2014.

      [13] A. Naik, K. Phulmamdikar, S. Pradhan, and S. Thorat, “Real Time Credit Card Transaction Analysis,” vol. 1, no. 11, pp. 1663–1666, 2016.

      [14] “MapReduce.” [Online]. Available: https://fr.hortonworks.com/apache/mapreduce/.

      [15] S. Ounacer, M. A. Talhaoui, S. Ardchir, A. Daif, and M. Azouazi, “A New Architecture for Real Time Data Stream Processing,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 11, pp. 44–51, 2017.

      [16] W. Is et al., “Welcome to ApacheTM HadoopTM!,” Innovation, no. November 2008. pp. 2009–2012, 2012.

      [17] Apache Spark, “Apache SparkTM - Lightning-Fast Cluster Computing,” Spark.Apache.Org. 2015.

      [18] Apache Storm, “Storm, distributed and fault-tolerant realtime computation,” Storm.Apache.Org. 2015.

      [19] L. Wall et al., “simple easy learnin Storm,” p. 2, 2015.




Article ID: 23254
DOI: 10.14419/ijet.v7i4.32.23254

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.