International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 45 - Issue 22 |
Published: May 2012 |
Authors: Pankaj Richhariya, Prashant K Singh |
![]() |
Pankaj Richhariya, Prashant K Singh . A Survey on Financial Fraud Detection Methodologies. International Journal of Computer Applications. 45, 22 (May 2012), 15-22. DOI=10.5120/7080-9373
@article{ 10.5120/7080-9373, author = { Pankaj Richhariya,Prashant K Singh }, title = { A Survey on Financial Fraud Detection Methodologies }, journal = { International Journal of Computer Applications }, year = { 2012 }, volume = { 45 }, number = { 22 }, pages = { 15-22 }, doi = { 10.5120/7080-9373 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2012 %A Pankaj Richhariya %A Prashant K Singh %T A Survey on Financial Fraud Detection Methodologies%T %J International Journal of Computer Applications %V 45 %N 22 %P 15-22 %R 10.5120/7080-9373 %I Foundation of Computer Science (FCS), NY, USA
Owing to levitate and rapid escalation of E-Commerce, cases of financial fraud allied with it are also intensifying and which results in trouncing of billions of dollars worldwide each year. Fraud detection involves scrutinizing the behavior of populations of users in order to ballpark figure, detect, or steer clear of objectionable behavior: Undesirable behavior is a extensive term including delinquency: swindle, infringement, and account evasion. Factually, swindle transactions are speckled with genuine transactions and simple pattern matching techniques are not often sufficient to detect those frauds accurately. In this survey we, will focuses on classifying fraudulent behaviors, identifying the major sources and characteristics of the data based on which fraud detection has been conducted. This paper provide a comprehensive survey and review of different techniques to detect the financial fraud detection used in various fraud like credit card fraud detection, online auction fraud, telecommunication fraud detection, and computer intrusion detection.