Fraud Find Financial Fraud Detection by Analyzing Human Behavior
Fraud Find Financial Fraud Detection by Analyzing Human Behavior
Fraud Find Financial Fraud Detection by Analyzing Human Behavior
BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE AND ENGINEERING
by
ZOHA KHADEER (18S41A05B9)
SUNKARI KALYAN (18S41A05A8)
SYEDA RAFATH FATHIMA (18S41A05B0)
NOUSHIN SULTANA (17S41A0563)
CERTIFICATE
This is to certify that the mini project report entitled “FRAUD FIND
FINANCIAL FRAUD DETECTION BY ANALYZING HUMAN BEHAVIOR”
submitted by the following students in partial fulfillment of the requirements for the
award of the Degree of Bachelor of Technology in CSE, and is a bonafide record of the
work performed by.
The work embodied in this mini project report has not been submitted to any
other institution for the award of the degree
ii
ACKNOWLEDGEMENT
We wish to pay our sincere thanks to Dr. CH. SRINIVAS, Principal,
Vaageswari College of Engineering, Karimnagar, for providing all required facilities
and his support during the mini project work.
iii
ABSTRACT
iv
CONTENTS
TITLE PAGE NO.
CERTIFICATE ii
ACKNOWLEDGEMENT iii
ABSTRACT iv
LIST OF FIGURES vii
CHAPTER 1
INTRODUCTION 1
1.1 Introduction of Project 1
1.2 Motivation 6
1.3 Objective of Project 7
CHAPTER 2
LITERATURE SURVEY 8
2.1 Introduction 8
2.2 Existing System 9
2.2.1 Disadvantages of Existing System 10
2.3 Proposed System 10
CHAPTER 3
SYSTEM ANALYSIS 12
3.1 Introduction 12
3.2 System Specifications 13
3.2.1 Software Requirements 13
3.2.2 Hardware Requirements 13
3.3 Algorithms 14
CHAPTER 4
SYSTEM DESIGN 16
4.1 Introduction 16
4.2 System Design 17
4.3 Architecture Diagram 17
4.4 Data Flow Diagram 18
4.5 Uml Diagrams 19
4.5.1 Use Case Diagram 20
4.5.2 Class Diagram 21
v
4.5.3 Sequence Diagram 22
CHAPTER 5
IMPLEMENTATION 23
5.1 Introduction 23
5.2 Java Web Application 36
5.3 Coding 38
CHAPTER 6
TESTING AND EVALUATION 44
6.1 Introduction 44
6.2 Types Of Testing 45
6.3 Types Of Tests 45
CHAPTER 7
RESULTS 49
CHAPTER 8
CONCLUSION 56
REFERENCES 57
vi
LIST OF FIGURES
PAGE NO.
Fig 1.1 Structure of Data Mining 2
Fig :4.1 SDLC Methodology 16
Fig:4.2.Arctieacture Diagram 17
Fig: 4.3 Data flow diagram 18
Fig 4.4 Use Case Diagram 20
Fig 4.5 Class Diagram 21
Fig 4.6 Sequence Diagrams(User) 22
Fig. 5.1. Working of Java Program 24
Fig. 5.2. Java in other Operating Systems 24
Fig.5.3. Program Running in Java Platform 25
Fig. 5.4. JAVA 2 SDK 27
Fig: 5.5 Compilation and Execution of JAVA Program 32
Fig.5.5.1 TCP/IP Model 32
Fig. 6.1 Levels of Testing 45
Fig:7.1 Home page 49
Fig:7.2 Auditor login page 49
Fig: 7.3 Auditor main page 50
Fig: 7.4 Agent login page 50
Fig: 7.5 Admin registration page 51
Fig: 7.6 Selecting finger print 51
Fig: 7.7 Admin login page 52
Fig: 7.8 Admin main page 52
Fig: 7.9 View and authorize user page 53
Fig: 7.10 User main page 53
Fig: 7.11 Requesting account number 54
Fig: 7.12 Generating account number 54
Fig: 7.13 Auditor permitting transactions 55
Fig: 7.14 User is financial fraud 55
vii