A Comprehensive Strategy for Detecting Credit Card Fraud in E-Commerce Utilizing DNS Authentication
- 1. Assistant. Professor, Department of Computer Engineering, K.J. Somaiya Institute of Technology, Mumbai (Maharashtra), India.
Contributors
Contact person:
- 1. Assistant. Professor, Department of Computer Engineering, K.J. Somaiya Institute of Technology, Mumbai (Maharashtra), India.
- 2. Assistant. Professor, Department of Computer Science and Business Systems, Bharati Vidyapeeth (Deemed to be University), DET, Kharghar, Navi Mumbai (Maharashtra), India.
Description
Abstract: E-commerce has transformed global trade, enabling businesses to reach audiences worldwide since the World Wide Web's inception in 1990. Companies like Amazon demonstrate this growth, evolving from a small online bookstore to a retail giant. E-commerce's appeal lies in its global reach, cost-efficiency, and 24/7 availability. However, security challenges, especially credit card fraud, remain significant, causing substantial losses to businesses, particularly small and medium-sized enterprises. Addressing fraud in e-commerce through machine learning techniques is crucial. Techniques such as Logistic Regression, Decision Trees, and Hidden Markov Models each offer unique advantages and limitations for detecting fraud, with some able to operate in real time. These methods help reduce false positives and improve fraud detection, making them integral to secure e-commerce environments. This paper introduces a system that uses disposable domain names and custom DNS servers to detect transaction inconsistencies, thus addressing proxy-based fraud attempts. By generating unique hostnames for each transaction, the system enables real-time monitoring and validation of client transactions. This DNS profiling approach strengthens e-commerce security, reduces financial risks, and enhances trust. The findings underscore the need for advanced fraud detection, contributing to safer online transactions and offering valuable insights for future secure e-commerce systems.
Files
F365614060125.pdf
Files
(884.1 kB)
Name | Size | Download all |
---|---|---|
md5:4417e1ea5dbb2603d9eb211889ca3e28
|
884.1 kB | Preview Download |
Additional details
Identifiers
- DOI
- 10.35940/ijsce.F3656.14051124
- EISSN
- 2231-2307
Dates
- Accepted
-
2024-11-15Manuscript received on 27 October 2024 | Revised Manuscript received on 14 November 2024 | Manuscript Accepted on 15 November 2024 | Manuscript published on 30 November 2024.
References
- T. Yorozu, M. Hirano, K. Oka and Y. Tagawa, "Electron Spectroscopy Studies on Magneto-Optical Media and Plastic Substrate Interface," in IEEE Translation Journal on Magnetics in Japan, vol. 2, no. 8, pp. 740-741, Aug. 1987, doi: https://doi.org/10.1109/TJMJ.1987.4549593
- A. Susanto, P. Lestari, S. Hidayatuloh and A. Fitriyani, "Factors Affecting College Students' Trust in Online Shopping Transactions," 2019 7th International Conference on Cyber and IT Service Management (CITSM), Jakarta, Indonesia, 2019, pp. 1-5, doi: https://doi.org/10.1109/CITSM47753.2019.8965359
- S. Sanyala and M. W. Hisamb, "Factors Affecting Customer Satisfaction with Ecommerce Websites - An Omani Perspective," 2019 International Conference on Digitization (ICD), Sharjah, United Arab Emirates, 2019, pp. 232-236, doi: https://doi.org/10.1109/ICD47981.2019.910578
- N. Malini and M. Pushpa, "Analysis on credit card fraud identification techniques based on KNN and outlier detection," 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Chennai, India, 2017, pp. 255-258, doi: https://doi.org/10.1109/AEEICB.2017.7972424
- Imane Karkaba, EL Mehdi Adnani, Mohammed Errital, Deep Learning Detecting Fraud in Credit Card Transactions, Journal of Theoretical and Applied Information Technology, 15th May 2023. Vol.101. No 9, pp. 3557-3565, doi: https://doi.org/10.1109/SIEDS.2018.8374722.
- R. Laurens, H. Rezaeighaleh, C. C. Zou and J. Jusak, "Using Disposable Domain Names to Detect Online Card Transaction Fraud," ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-7, doi: https://doi.org/10.1109/ICC.2019.8761144.
- K. Shah, H. Sinha and P. Mishra, "Analysis of Cross-Platform Mobile App Development Tools," 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), Bombay, India, 2019, pp. 1-7, doi: https://doi.org/10.1109/I2CT45611.2019.9033872
- D. Fortunato and J. Bernardino, "Progressive web apps: An alternative to the native mobile Apps," 2018 13th Iberian Conference on Information Systems and Technologies (CISTI), Caceres, Spain, 2018, pp. 1-6, doi: https://doi.org/10.23919/CISTI.2018.8399228
- Ramakishore, S., & Karpagavalli, Dr. P. (2020). K-Nearest Neighbor Based Enhanced-CBIR System. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 4, pp. 550–554). Doi: https://doi.org/10.35940/ijitee.b7711.029420
- Srinivas, B., & Rao, G. S. (2019). A Hybrid CNN-KNN Model for MRI brain Tumor Classification. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 2, pp. 5230–5235). Doi: https://doi.org/10.35940/ijrte.b1051.078219
- Jain, N., & Kumar, R. (2022). A Review on Machine Learning & It's Algorithms. In International Journal of Soft Computing and Engineering (Vol. 12, Issue 5, pp. 1–5). Doi: https://doi.org/10.35940/ijsce.e3583.1112522
- Assegie, T. A. (2021). K-Nearest Neighbor Based URL Identification Model for Phishing Attack Detection. In Indian Journal of Artificial Intelligence and Neural Networking (Vol. 1, Issue 2, pp. 18–21). Doi: https://doi.org/10.54105/ijainn.b1019.041221
- M, N., Vidyashankara, & Kumar, G. H. (2020). Recognition of Leaves in Videos. In International Journal of Inventive Engineering and Sciences (Vol. 5, Issue 8, pp. 1–3). Doi: https://doi.org/10.35940/ijies.l0946.025820