Location-Based Credit Card Fraud Detection with Two Way Authentication
K. Vineela1, K. Mounisha2, S.Prayla Shyry3
1Vineela K, student, Computer Science and Engineering, Sathyabama Institute of Science and Technology, Chennai, (Tamil Nadu), India.
2Mounisha K, student, Computer Science and Engineering, Sathyabama Institute of Science and Technology, Chennai, (Tamil Nadu), India.
3Dr S PraylaShyry, Professor, School of Computing, Sathyabama Institute of Science and Technology, Chennai, (Tamil Nadu), India.
Manuscript received on March 12, 2020. | Revised Manuscript received on March 25, 2020. | Manuscript published on March 30, 2020. | PP: 3693-3697 | Volume-8 Issue-6, March 2020. | Retrieval Number: F9135038620/2020©BEIESP | DOI: 10.35940/ijrte.F9135.038620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The quick expansion of internet transactions has provided rise to a considerable quantity. Nevertheless,the Internet world is opened, your shopping devices have pesky insects, and also crooks can make use of a negative methods such as for instance Trojan and also pseudo base station. This leads to major raising of credit card fraud functions. If a criminal steal or perhaps cheats the info on the credit card of a cardholder, the criminal can utilize the credit card to ingest. Based on the Nilson Report in October 2016, over thirty-one trillion dollars have been produced globally by internet transaction methods within 2015, boosting 7.3 % than 2014. Globally losses at credit card fraud rose to twenty-one billion dollars throughout 2015, and can perhaps attain thirty-one billion dollars by 2020. Our proposed system is capable to stay away from the fraud transactions using previous data achieving the anticipated security level.
Keywords: Credit card; Application Access; Security; Crooks;.
Scope of the Article: Security Technology and Information Assurance.