safer digital payment ecosystem, enhancing user
confidence in UPI transactions.
2 LITERATURE SURVEY
i) CARDWATCH: a neural network based database
mining system for credit card fraud detection
https://ieeexplore.ieee.org/document/618940
Here we introduce CARDWATCH, a database mining
method that can identify credit card fraud. An intuitive
graphical user interface, connectivity to several
commercial databases, and a neural network learning
module form the basis of the system. Very high
success rates in detecting fraud were found in tests
using autoassociative neural network models and
synthetically created credit card data.
ii) Understanding telephony fraud as an essential step
to better fight it
https://www.semanticscholar.org/paper/Understandi
ng-telephony-fraud-as-an-essential-step-
Sahin/4f88de8f9ffb34aa147b2c10d4bf08b350ae917
b
The first large-scale network, which reached around
7 billion people over a century ago, was the telephone
network. The complex nature of telecommunications
and the possibility of monetising several services
make it an attractive target for fraudsters. Academic
studies on these networks are few because of their
complexity and closed nature. A comprehensive
examination of fraud in telecommunication networks
is the first part of this thesis. We present a taxonomy
that differentiates between basic reasons,
weaknesses, ways of exploitation, types of fraud, and
benefits to fraudsters. We break it down for you and
show how our taxonomy sheds light on CAller NAMe
(CNAM) revenue sharing fraud. We look at two types
of wholesale billing fraud that operators face head-on
in the second part of the article. New forms of
interconnect telecom fraud include Over-The-Top
(OTT) bypass fraud. Directed via IP to a voice chat
app on a smartphone, rather than terminating it over
the telco infrastructure, is how OTT bypass works.
We analyse the effects of this fraud on a small
European country and how to identify it using more
than 15,000 test calls and a thorough user survey. A
big wholesale scam, the International Revenue Share
fraud (IRSF), will be discussed later. Calls from IRSF
numbers are being diverted to "international premium
rate services" by con artists. In order to gain a deeper
understanding of the IRSF ecosystem, we examine
data from several third-party premiu rate service
providers' worldwide premium rate tests. Using this
data, we suggest characteristics for IRSF-detection
for both the source and destination numbers of calls.
The latter section of the thesis delves into consumer-
side telephonic fraud, namely voice spam. A recent
approach to stop unsolicited phone calls includes
linking the spammer with a phone bot (“robocallee”)
that impersonates a genuine person. Lenny, a bot,
plays pre-recorded audio messages to communicate
with the user.
iii) Fraud detection system: A survey
https://www.sciencedirect.com/science/article/abs/pi
i/S1084804516300571
Credit card, telecommunication, and healthcare
insurance systems are just a few examples of the
many forms of electronic commerce that have
emerged as a result of the proliferation of both
personal computers and large corporations. There are
legitimate and dishonest individuals on these
networks, unfortunately. There were a number of
methods in which fraudsters gained access to e-
commerce platforms. Fraud prevention systems
(FPSs) do not adequately safeguard e-commerce
networks. Electronic commerce systems may be
protected, nevertheless, through FDS-FPS
cooperation. Several challenges, including as concept
drift, real-time detection, skewed distribution, and
huge data, impede the performance of FDS. In a
systematic fashion, this survey study examines these
worries and roadblocks that impede FDS operation.
Our five e-commerce platforms include online
auctions, credit card processing, telecommunications,
healthcare insurance, and auto insurance. We will go
over the two main categories of online shopping
fraud. Additionally, selected E-commerce sites'
modern FDSs approaches are showcased. Here is a
concise synopsis of the patterns and conclusions that
will shape future study.
iv) Network Analysis (From Criminal Intelligence
Analysis, P 67-84, 1990, Paul P Andrews, Jr and
Marilyn B Peterson, ed. -- See NCJ-125011)
https://www.ojp.gov/ncjrs/virtual-
library/abstracts/network-analysis-criminal-
intelligence-analysis-p-67-84-1990-paul-p
Relational matrices and maps of relationships are
described together since they both provide the same
information. You may find the frequency, intensity,
and strength of the relational linkages between the
subjects of investigation using the diagrams and
matrices. The presentation of mathematical models
serves to demonstrate how conclusions may be
derived from network models. We take a look at a
sophisticated use of network analysis by the police.
twelve figures and fourteen references.