SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
Credit Card Fraud Detection System Python
1) Background/ Problem Statement
Recently, with the advent of technological innovation and the
emergence of new e-service payment solutions, such as e-commerce
and mobile payments, credit card transactions have become
ubiquitous. Because cashless transactions are so widely accepted,
fraudsters carry out fraudulent assaults frequently and modify their
strategies to escape detection. Credit card fraud is defined as
unauthorized card usage, unusual transaction behaviour, or
transactions on an inactive card. Credit card breaches have been
trending alarmingly in the past couple of years.
Our python-based Credit Card Fraud Detection System is designed as a
countermeasure to combat illegal activities. It ensures secured
transactions for credit-card owners when using their credit cards to
make electronic payments for goods and services. In the proposed
system, we used Random Forest Algorithm (RFA) for finding the
fraudulent transactions and the frequency of those transactions.
2) Working of the Project
Our Python-based Credit Card Fraud Detection System consists of 1
module: Admin. To access the system, the admin will need to login into
the system. The login is of two-factor authentication. Admin will enter
their email address and password. After entering the registered email
address, OTP will be sent to their respective email address.
After successfully logging into the system, the admin can view customer
details, create payment links, generate payment links and view
fraudulent customers. In View Customers, the admin can view all users
and their details like Name, Address, Phone number, Transaction
History, etc. In Create Payment Link, they will need to enter the amount
and country, and further, the payment link will be created.
After the Payment Link is created, the customer will need to enter their
Name, Phone number, Billing Address, Shipping Address, and CNIC
number. When all this data is entered and submitted rules are applied
accordingly, it will check which type of transaction it is like Completed
Transaction, Under-Review Transactions, Declined Transactions, and
Flagged Transactions. If all the rules are passed, only then the payment
will be successful.
The payment will be not successful if
1: More than 3 different credit card details are used for purchases.
2: If the customer’s IP address, Mac address or Email was flagged as
fraudulent already in the system when they tried to make transactions
in the past.
3: If the customer’s email address is from an unusual domain.
4: Transaction frequency is not normal.
5: The billing address is not the same as the shipping address.
6: Payment is made outside of the country set by the admin.
7: If the customer’s email address or CNIC number is used with more
than 3 credit cards for transactions in the past.
8: If the customer is using a VPN to make transactions.
9: The customer will have 24 hours to make payment via the link.
The Random Forest Algorithm is used to keep the transaction frequency
into account. The front end involves Html, CSS, and JavaScript and the
back end involves Python. The framework used is Django and the
database is MySQL. Custom Dataset is created for this project.
3) Advantages
- The system is easy to maintain.
- It is user-friendly.
- Higher accuracy of fraud detection.
- Fewer false declines.
- Faster detection of fraud.
4) System Description
The system comprises 1 major module with their sub-modules as
follows:
 ADMIN:
 Login: (2 Factor Authentication)
- The admin will need to login in using their username and
password.
- After entering their registered email, an OTP will be sent for
accessing the system.
 View Customer:
- The admin can view customers’ names and email IDs.
- They can also view customers’ addresses, phone numbers and
transaction history.
 Fraudulent Customers:
- The admin can see a list of all the Fraudulent Customers & change
the status.
 Generate Payment Link:
- To generate a payment link, the admin will need to enter the
amount and country.
- They will need to add a switch to exempt rules.
 Payment Link:
- The customer would require to enter details like Name, Phone
number, Billing Address, Shipping Address, and CNIC number.
- Then, they will have to enter their credit card details.
- If all the rules are passed, then only the payment will be
successful, otherwise, it will fail.
- The payment will be not successful if
1: More than 3 different credit card details are used for purchases.
2: If the customer’s IP address, Mac address or Email was flagged as
fraudulent already in the system when they tried to make transactions
in the past.
3: If the customer’s email address is from an unusual domain.
4: Transaction frequency is not normal.
5: The billing address is not the same as the shipping address.
6: Payment is made outside of the country set by the admin.
7: If the customer’s email address or CNIC number is used with more
than 3 credit cards for transactions in the past.
8: If the customer is using a VPN to make transactions.
9: The customer will have 24 hours to make payment via the link.
5) Project Life Cycle
The waterfall model is a classical model used in the system
development life cycle to create a system with a linear and sequential
approach. It is termed a waterfall because the model develops
systematically from one phase to another in a downward fashion. The
waterfall approach does not define the process to go back to the
previous phase to handle changes in requirements. The waterfall
approach is the earliest approach that was used for software
development.
6) System Requirements
I. Hardware Requirement
i.Laptop or PC
 Windows 7 or higher
 I3 processor system or higher
 4 GB RAM or higher
 100 GB ROM or higher
II. Software Requirement
ii.Laptop or PC
 Python
 Sublime Text Editor
 XAMP Server
7) Limitations/Disadvantages
- Users will need to provide all their details correctly, otherwise, it
will lead to the wrong outcome.
- There is no user module.
- The project is not hosted.
8) Application
- Our credit card fraud detection system is used to identify
suspicious events and report them to an analyst while letting
normal transactions be automatically processed.
9) Reference
 https://www.researchgate.net/publication/326986162_Credit_Card_Fraud
_Detection_Using_Machine_Learning_As_Data_Mining_Technique
 https://link.springer.com/chapter/10.1007/978-3-642-39736-3_17
 https://www.ijitee.org/wp-content/uploads/papers/v9i2/A5041119119.pdf
 http://www.ijtrd.com/papers/IJTRD16726.pdf

Mais conteúdo relacionado

Semelhante a PY088.doc

6. electronic payment systems
6. electronic payment systems6. electronic payment systems
6. electronic payment systemsPratap Tirkey
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric TransactionIRJET Journal
 
Secure E-payment Protocol
Secure E-payment ProtocolSecure E-payment Protocol
Secure E-payment ProtocolCSCJournals
 
e payment system ppt
e payment system ppte payment system ppt
e payment system pptminisharma35
 
CASE STUDY - THE NEXTGEN POS SYSTEM (2).ppt
CASE STUDY - THE NEXTGEN POS SYSTEM (2).pptCASE STUDY - THE NEXTGEN POS SYSTEM (2).ppt
CASE STUDY - THE NEXTGEN POS SYSTEM (2).pptJayaprasanna4
 
Document Atm machine using c language mini project.pdf
Document  Atm machine using c language mini project.pdfDocument  Atm machine using c language mini project.pdf
Document Atm machine using c language mini project.pdfNEERAJRAJPUT81
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...Vesta Corporation
 
python pre-submission report.pdf
python pre-submission report.pdfpython pre-submission report.pdf
python pre-submission report.pdfSruthiMugle
 
SRS on online auction system
SRS on online auction systemSRS on online auction system
SRS on online auction systemsagar_paperwala
 
Safex pay wl-pg-presentation
Safex pay wl-pg-presentationSafex pay wl-pg-presentation
Safex pay wl-pg-presentationNeha Sahay
 
All You Need to Know About Mobile Payment Gateways in 2023.
All You Need to Know About Mobile Payment Gateways in 2023.All You Need to Know About Mobile Payment Gateways in 2023.
All You Need to Know About Mobile Payment Gateways in 2023.Techugo
 
Chapter 4 payment systems in e-commerce
Chapter 4  payment systems in e-commerceChapter 4  payment systems in e-commerce
Chapter 4 payment systems in e-commerceMarya Sholevar
 
Electronic payment systems
Electronic payment systemsElectronic payment systems
Electronic payment systemsRajiv Sikroria
 
Tim sloane preparing for rapid payments innovation
Tim sloane preparing for rapid payments innovationTim sloane preparing for rapid payments innovation
Tim sloane preparing for rapid payments innovationCO-OPFinancialServices
 
Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Danail Yotov
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 

Semelhante a PY088.doc (20)

Unit 5
Unit 5Unit 5
Unit 5
 
6. electronic payment systems
6. electronic payment systems6. electronic payment systems
6. electronic payment systems
 
Ch 2
Ch 2Ch 2
Ch 2
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
 
Secure E-payment Protocol
Secure E-payment ProtocolSecure E-payment Protocol
Secure E-payment Protocol
 
e payment system ppt
e payment system ppte payment system ppt
e payment system ppt
 
CASE STUDY - THE NEXTGEN POS SYSTEM (2).ppt
CASE STUDY - THE NEXTGEN POS SYSTEM (2).pptCASE STUDY - THE NEXTGEN POS SYSTEM (2).ppt
CASE STUDY - THE NEXTGEN POS SYSTEM (2).ppt
 
Document Atm machine using c language mini project.pdf
Document  Atm machine using c language mini project.pdfDocument  Atm machine using c language mini project.pdf
Document Atm machine using c language mini project.pdf
 
All What You Need To Know About Merchant Account
All What You Need To Know About Merchant AccountAll What You Need To Know About Merchant Account
All What You Need To Know About Merchant Account
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
 
python pre-submission report.pdf
python pre-submission report.pdfpython pre-submission report.pdf
python pre-submission report.pdf
 
SRS on online auction system
SRS on online auction systemSRS on online auction system
SRS on online auction system
 
Safex pay wl-pg-presentation
Safex pay wl-pg-presentationSafex pay wl-pg-presentation
Safex pay wl-pg-presentation
 
All You Need to Know About Mobile Payment Gateways in 2023.
All You Need to Know About Mobile Payment Gateways in 2023.All You Need to Know About Mobile Payment Gateways in 2023.
All You Need to Know About Mobile Payment Gateways in 2023.
 
Chapter 4 payment systems in e-commerce
Chapter 4  payment systems in e-commerceChapter 4  payment systems in e-commerce
Chapter 4 payment systems in e-commerce
 
Electronic payment systems
Electronic payment systemsElectronic payment systems
Electronic payment systems
 
Tim sloane preparing for rapid payments innovation
Tim sloane preparing for rapid payments innovationTim sloane preparing for rapid payments innovation
Tim sloane preparing for rapid payments innovation
 
Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
Payments primer
Payments primerPayments primer
Payments primer
 

Último

Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...Splashtop Inc
 
MUT4SLX: Extensions for Mutation Testing of Stateflow Models
MUT4SLX: Extensions for Mutation Testing of Stateflow ModelsMUT4SLX: Extensions for Mutation Testing of Stateflow Models
MUT4SLX: Extensions for Mutation Testing of Stateflow ModelsUniversity of Antwerp
 
8 Steps to Build a LangChain RAG Chatbot.
8 Steps to Build a LangChain RAG Chatbot.8 Steps to Build a LangChain RAG Chatbot.
8 Steps to Build a LangChain RAG Chatbot.Ritesh Kanjee
 
Telebu Social -Whatsapp Business API : Mastering Omnichannel Business Communi...
Telebu Social -Whatsapp Business API : Mastering Omnichannel Business Communi...Telebu Social -Whatsapp Business API : Mastering Omnichannel Business Communi...
Telebu Social -Whatsapp Business API : Mastering Omnichannel Business Communi...telebusocialmarketin
 
Boost Efficiency: Sabre API Integration Made Easy
Boost Efficiency: Sabre API Integration Made EasyBoost Efficiency: Sabre API Integration Made Easy
Boost Efficiency: Sabre API Integration Made Easymichealwillson701
 
Steps to Successfully Hire Ionic Developers
Steps to Successfully Hire Ionic DevelopersSteps to Successfully Hire Ionic Developers
Steps to Successfully Hire Ionic Developersmichealwillson701
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Revolutionize Your Field Service Management with FSM Grid
Revolutionize Your Field Service Management with FSM GridRevolutionize Your Field Service Management with FSM Grid
Revolutionize Your Field Service Management with FSM GridMathew Thomas
 
Enterprise Content Managements Solutions
Enterprise Content Managements SolutionsEnterprise Content Managements Solutions
Enterprise Content Managements SolutionsIQBG inc
 
Einstein Copilot Conversational AI for your CRM.pdf
Einstein Copilot Conversational AI for your CRM.pdfEinstein Copilot Conversational AI for your CRM.pdf
Einstein Copilot Conversational AI for your CRM.pdfCloudMetic
 
MinionLabs_Mr. Gokul Srinivas_Young Entrepreneur
MinionLabs_Mr. Gokul Srinivas_Young EntrepreneurMinionLabs_Mr. Gokul Srinivas_Young Entrepreneur
MinionLabs_Mr. Gokul Srinivas_Young EntrepreneurPriyadarshini T
 
03.2024_North America VMUG Optimizing RevOps using the power of ChatGPT in Ma...
03.2024_North America VMUG Optimizing RevOps using the power of ChatGPT in Ma...03.2024_North America VMUG Optimizing RevOps using the power of ChatGPT in Ma...
03.2024_North America VMUG Optimizing RevOps using the power of ChatGPT in Ma...jackiepotts6
 
If your code could speak, what would it tell you? Let GitHub Copilot Chat hel...
If your code could speak, what would it tell you? Let GitHub Copilot Chat hel...If your code could speak, what would it tell you? Let GitHub Copilot Chat hel...
If your code could speak, what would it tell you? Let GitHub Copilot Chat hel...Maxim Salnikov
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfICS
 
User Experience Designer | Kaylee Miller Resume
User Experience Designer | Kaylee Miller ResumeUser Experience Designer | Kaylee Miller Resume
User Experience Designer | Kaylee Miller ResumeKaylee Miller
 
BusinessGPT - SECURITY AND GOVERNANCE FOR GENERATIVE AI.pptx
BusinessGPT  - SECURITY AND GOVERNANCE  FOR GENERATIVE AI.pptxBusinessGPT  - SECURITY AND GOVERNANCE  FOR GENERATIVE AI.pptx
BusinessGPT - SECURITY AND GOVERNANCE FOR GENERATIVE AI.pptxAGATSoftware
 
Technical improvements. Reasons. Methods. Estimations. CJ
Technical improvements.  Reasons. Methods. Estimations. CJTechnical improvements.  Reasons. Methods. Estimations. CJ
Technical improvements. Reasons. Methods. Estimations. CJpolinaucc
 
renewable energy renewable energy renewable energy renewable energy
renewable energy renewable energy renewable energy  renewable energyrenewable energy renewable energy renewable energy  renewable energy
renewable energy renewable energy renewable energy renewable energyjeyasrig
 
BATbern52 Swisscom's Journey into Data Mesh
BATbern52 Swisscom's Journey into Data MeshBATbern52 Swisscom's Journey into Data Mesh
BATbern52 Swisscom's Journey into Data MeshBATbern
 
8 key point on optimizing web hosting services in your business.pdf
8 key point on optimizing web hosting services in your business.pdf8 key point on optimizing web hosting services in your business.pdf
8 key point on optimizing web hosting services in your business.pdfOffsiteNOC
 

Último (20)

Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
Splashtop Enterprise Brochure - Remote Computer Access and Remote Support Sof...
 
MUT4SLX: Extensions for Mutation Testing of Stateflow Models
MUT4SLX: Extensions for Mutation Testing of Stateflow ModelsMUT4SLX: Extensions for Mutation Testing of Stateflow Models
MUT4SLX: Extensions for Mutation Testing of Stateflow Models
 
8 Steps to Build a LangChain RAG Chatbot.
8 Steps to Build a LangChain RAG Chatbot.8 Steps to Build a LangChain RAG Chatbot.
8 Steps to Build a LangChain RAG Chatbot.
 
Telebu Social -Whatsapp Business API : Mastering Omnichannel Business Communi...
Telebu Social -Whatsapp Business API : Mastering Omnichannel Business Communi...Telebu Social -Whatsapp Business API : Mastering Omnichannel Business Communi...
Telebu Social -Whatsapp Business API : Mastering Omnichannel Business Communi...
 
Boost Efficiency: Sabre API Integration Made Easy
Boost Efficiency: Sabre API Integration Made EasyBoost Efficiency: Sabre API Integration Made Easy
Boost Efficiency: Sabre API Integration Made Easy
 
Steps to Successfully Hire Ionic Developers
Steps to Successfully Hire Ionic DevelopersSteps to Successfully Hire Ionic Developers
Steps to Successfully Hire Ionic Developers
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Revolutionize Your Field Service Management with FSM Grid
Revolutionize Your Field Service Management with FSM GridRevolutionize Your Field Service Management with FSM Grid
Revolutionize Your Field Service Management with FSM Grid
 
Enterprise Content Managements Solutions
Enterprise Content Managements SolutionsEnterprise Content Managements Solutions
Enterprise Content Managements Solutions
 
Einstein Copilot Conversational AI for your CRM.pdf
Einstein Copilot Conversational AI for your CRM.pdfEinstein Copilot Conversational AI for your CRM.pdf
Einstein Copilot Conversational AI for your CRM.pdf
 
MinionLabs_Mr. Gokul Srinivas_Young Entrepreneur
MinionLabs_Mr. Gokul Srinivas_Young EntrepreneurMinionLabs_Mr. Gokul Srinivas_Young Entrepreneur
MinionLabs_Mr. Gokul Srinivas_Young Entrepreneur
 
03.2024_North America VMUG Optimizing RevOps using the power of ChatGPT in Ma...
03.2024_North America VMUG Optimizing RevOps using the power of ChatGPT in Ma...03.2024_North America VMUG Optimizing RevOps using the power of ChatGPT in Ma...
03.2024_North America VMUG Optimizing RevOps using the power of ChatGPT in Ma...
 
If your code could speak, what would it tell you? Let GitHub Copilot Chat hel...
If your code could speak, what would it tell you? Let GitHub Copilot Chat hel...If your code could speak, what would it tell you? Let GitHub Copilot Chat hel...
If your code could speak, what would it tell you? Let GitHub Copilot Chat hel...
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdf
 
User Experience Designer | Kaylee Miller Resume
User Experience Designer | Kaylee Miller ResumeUser Experience Designer | Kaylee Miller Resume
User Experience Designer | Kaylee Miller Resume
 
BusinessGPT - SECURITY AND GOVERNANCE FOR GENERATIVE AI.pptx
BusinessGPT  - SECURITY AND GOVERNANCE  FOR GENERATIVE AI.pptxBusinessGPT  - SECURITY AND GOVERNANCE  FOR GENERATIVE AI.pptx
BusinessGPT - SECURITY AND GOVERNANCE FOR GENERATIVE AI.pptx
 
Technical improvements. Reasons. Methods. Estimations. CJ
Technical improvements.  Reasons. Methods. Estimations. CJTechnical improvements.  Reasons. Methods. Estimations. CJ
Technical improvements. Reasons. Methods. Estimations. CJ
 
renewable energy renewable energy renewable energy renewable energy
renewable energy renewable energy renewable energy  renewable energyrenewable energy renewable energy renewable energy  renewable energy
renewable energy renewable energy renewable energy renewable energy
 
BATbern52 Swisscom's Journey into Data Mesh
BATbern52 Swisscom's Journey into Data MeshBATbern52 Swisscom's Journey into Data Mesh
BATbern52 Swisscom's Journey into Data Mesh
 
8 key point on optimizing web hosting services in your business.pdf
8 key point on optimizing web hosting services in your business.pdf8 key point on optimizing web hosting services in your business.pdf
8 key point on optimizing web hosting services in your business.pdf
 

PY088.doc

  • 1. Credit Card Fraud Detection System Python 1) Background/ Problem Statement Recently, with the advent of technological innovation and the emergence of new e-service payment solutions, such as e-commerce and mobile payments, credit card transactions have become ubiquitous. Because cashless transactions are so widely accepted, fraudsters carry out fraudulent assaults frequently and modify their strategies to escape detection. Credit card fraud is defined as unauthorized card usage, unusual transaction behaviour, or transactions on an inactive card. Credit card breaches have been trending alarmingly in the past couple of years. Our python-based Credit Card Fraud Detection System is designed as a countermeasure to combat illegal activities. It ensures secured transactions for credit-card owners when using their credit cards to make electronic payments for goods and services. In the proposed system, we used Random Forest Algorithm (RFA) for finding the fraudulent transactions and the frequency of those transactions.
  • 2. 2) Working of the Project Our Python-based Credit Card Fraud Detection System consists of 1 module: Admin. To access the system, the admin will need to login into the system. The login is of two-factor authentication. Admin will enter their email address and password. After entering the registered email address, OTP will be sent to their respective email address. After successfully logging into the system, the admin can view customer details, create payment links, generate payment links and view fraudulent customers. In View Customers, the admin can view all users and their details like Name, Address, Phone number, Transaction History, etc. In Create Payment Link, they will need to enter the amount and country, and further, the payment link will be created. After the Payment Link is created, the customer will need to enter their Name, Phone number, Billing Address, Shipping Address, and CNIC number. When all this data is entered and submitted rules are applied accordingly, it will check which type of transaction it is like Completed Transaction, Under-Review Transactions, Declined Transactions, and Flagged Transactions. If all the rules are passed, only then the payment will be successful. The payment will be not successful if 1: More than 3 different credit card details are used for purchases. 2: If the customer’s IP address, Mac address or Email was flagged as fraudulent already in the system when they tried to make transactions in the past. 3: If the customer’s email address is from an unusual domain.
  • 3. 4: Transaction frequency is not normal. 5: The billing address is not the same as the shipping address. 6: Payment is made outside of the country set by the admin. 7: If the customer’s email address or CNIC number is used with more than 3 credit cards for transactions in the past. 8: If the customer is using a VPN to make transactions. 9: The customer will have 24 hours to make payment via the link. The Random Forest Algorithm is used to keep the transaction frequency into account. The front end involves Html, CSS, and JavaScript and the back end involves Python. The framework used is Django and the database is MySQL. Custom Dataset is created for this project.
  • 4. 3) Advantages - The system is easy to maintain. - It is user-friendly. - Higher accuracy of fraud detection. - Fewer false declines. - Faster detection of fraud.
  • 5. 4) System Description The system comprises 1 major module with their sub-modules as follows:  ADMIN:  Login: (2 Factor Authentication) - The admin will need to login in using their username and password. - After entering their registered email, an OTP will be sent for accessing the system.  View Customer: - The admin can view customers’ names and email IDs. - They can also view customers’ addresses, phone numbers and transaction history.  Fraudulent Customers: - The admin can see a list of all the Fraudulent Customers & change the status.  Generate Payment Link: - To generate a payment link, the admin will need to enter the amount and country. - They will need to add a switch to exempt rules.  Payment Link: - The customer would require to enter details like Name, Phone number, Billing Address, Shipping Address, and CNIC number. - Then, they will have to enter their credit card details. - If all the rules are passed, then only the payment will be successful, otherwise, it will fail. - The payment will be not successful if 1: More than 3 different credit card details are used for purchases.
  • 6. 2: If the customer’s IP address, Mac address or Email was flagged as fraudulent already in the system when they tried to make transactions in the past. 3: If the customer’s email address is from an unusual domain. 4: Transaction frequency is not normal. 5: The billing address is not the same as the shipping address. 6: Payment is made outside of the country set by the admin. 7: If the customer’s email address or CNIC number is used with more than 3 credit cards for transactions in the past. 8: If the customer is using a VPN to make transactions. 9: The customer will have 24 hours to make payment via the link.
  • 7. 5) Project Life Cycle The waterfall model is a classical model used in the system development life cycle to create a system with a linear and sequential approach. It is termed a waterfall because the model develops systematically from one phase to another in a downward fashion. The waterfall approach does not define the process to go back to the previous phase to handle changes in requirements. The waterfall approach is the earliest approach that was used for software development.
  • 8. 6) System Requirements I. Hardware Requirement i.Laptop or PC  Windows 7 or higher  I3 processor system or higher  4 GB RAM or higher  100 GB ROM or higher II. Software Requirement ii.Laptop or PC  Python  Sublime Text Editor  XAMP Server
  • 9. 7) Limitations/Disadvantages - Users will need to provide all their details correctly, otherwise, it will lead to the wrong outcome. - There is no user module. - The project is not hosted. 8) Application - Our credit card fraud detection system is used to identify suspicious events and report them to an analyst while letting normal transactions be automatically processed. 9) Reference  https://www.researchgate.net/publication/326986162_Credit_Card_Fraud _Detection_Using_Machine_Learning_As_Data_Mining_Technique  https://link.springer.com/chapter/10.1007/978-3-642-39736-3_17  https://www.ijitee.org/wp-content/uploads/papers/v9i2/A5041119119.pdf  http://www.ijtrd.com/papers/IJTRD16726.pdf