Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Fraud Find Financial Fraud Detection by Analyzing Human Behavior

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

FRAUD FIND FINANCIAL FRAUD DETECTION BY

ANALYZING HUMAN BEHAVIOR

A mini project report submitted in partial fulfillment of the requirements

for the award of the degree of

BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE AND ENGINEERING

by
ZOHA KHADEER (18S41A05B9)
SUNKARI KALYAN (18S41A05A8)
SYEDA RAFATH FATHIMA (18S41A05B0)
NOUSHIN SULTANA (17S41A0563)

Under the Guidance of


Mr. MD.SIRAJUDDIN
Associate Professor

Department of Computer Science & Engineering


VAAGESWARI COLLEGE OF ENGINEERING
(Affiliated to JNTU Hyderabad &Approved by AICTE New Delhi)
Ramakrishna colony, Karimnagar-505481
2021
Department of Computer Science & Engineering
VAAGESWARI COLLEGE OF ENGINEERING
(Affiliated to JNTU Hyderabad &Approved by AICTE New Delhi)
Ramakrishna colony, Karimnagar-505481

CERTIFICATE
This is to certify that the mini project report entitled “FRAUD FIND
FINANCIAL FRAUD DETECTION BY ANALYZING HUMAN BEHAVIOR”
submitted by the following students in partial fulfillment of the requirements for the
award of the Degree of Bachelor of Technology in CSE, and is a bonafide record of the
work performed by.

ZOHA KHADEER (18S41A05B9)


SUNKARI KALYAN (18S41A05A8)
SYEDA RAFATH FATHIMA (18S41A05B0)
NOUSHIN SULTANA (17S41A0563)

The work embodied in this mini project report has not been submitted to any
other institution for the award of the degree

Internal Guide Head Of The Department

Mr. MD.SIRAJUDDIN Dr. N. CHANDRAMOULI


Associate Professor Associate Professor

Principal External Examinar


Dr. CH SRINIVAS

ii
ACKNOWLEDGEMENT
We wish to pay our sincere thanks to Dr. CH. SRINIVAS, Principal,
Vaageswari College of Engineering, Karimnagar, for providing all required facilities
and his support during the mini project work.

Wewould like to thank Dr. N. CHANDRAMOULI, Associate. Professorand


HOD of the Computer Science and Engineering Department for his valuable suggestions
during the mini project work.

We sincerely extend our thanks to the project guide Mr. MD.SIRAJUDDIN


Associate Professor of Computer Science and Engineering Department, for sparing his
valuable time in guiding the project work and giving feedback with many useful
suggestions during the mini project work.

We are also conveying our heartfelt thanks to the Institute authority,


Department, Library, and Laboratory staff of Vaageswari College of Engineering for
their co-operation during our project. We thank our beloved friends for their help and
encouragement regarding the concepts and experimentation

iii
ABSTRACT

Financial Fraud is commonly represented by the use of illegal practices where


they can intervene from senior managers until payroll employees, becoming a crime
punishable by law. There are many techniques developed to analyze, detect and prevent
this behavior,being the most important the fraud triangle theory associated with the
classic financial audit model. In order to perform this research, a survey of the related
works in the existing literature was carried out, with the purpose of establishing our
own framework. In this context, this paper presents FraudFind, a conceptual framework
that allows to identify and outline a group of people inside abanking organization who
commit fraud, supported by the fraud triangle theory.
FraudFind works in the approach of continuous audit that will be in charge of
collecting information of agents installed in user’s equipment. It is based on semantic
techniques applied through the collection of phrases typed by the users under study for
later being transferred to a repository for later analysis. This proposal encourages to
contribute with the field of cybersecurity, in the reduction of cases of financial fraud.

iv
CONTENTS
TITLE PAGE NO.
CERTIFICATE ii
ACKNOWLEDGEMENT iii
ABSTRACT iv
LIST OF FIGURES vii
CHAPTER 1
INTRODUCTION 1
1.1 Introduction of Project 1
1.2 Motivation 6
1.3 Objective of Project 7
CHAPTER 2
LITERATURE SURVEY 8
2.1 Introduction 8
2.2 Existing System 9
2.2.1 Disadvantages of Existing System 10
2.3 Proposed System 10
CHAPTER 3
SYSTEM ANALYSIS 12
3.1 Introduction 12
3.2 System Specifications 13
3.2.1 Software Requirements 13
3.2.2 Hardware Requirements 13
3.3 Algorithms 14
CHAPTER 4
SYSTEM DESIGN 16
4.1 Introduction 16
4.2 System Design 17
4.3 Architecture Diagram 17
4.4 Data Flow Diagram 18
4.5 Uml Diagrams 19
4.5.1 Use Case Diagram 20
4.5.2 Class Diagram 21
v
4.5.3 Sequence Diagram 22
CHAPTER 5
IMPLEMENTATION 23
5.1 Introduction 23
5.2 Java Web Application 36
5.3 Coding 38
CHAPTER 6
TESTING AND EVALUATION 44
6.1 Introduction 44
6.2 Types Of Testing 45
6.3 Types Of Tests 45
CHAPTER 7
RESULTS 49
CHAPTER 8
CONCLUSION 56
REFERENCES 57

vi
LIST OF FIGURES
PAGE NO.
Fig 1.1 Structure of Data Mining 2
Fig :4.1 SDLC Methodology 16
Fig:4.2.Arctieacture Diagram 17
Fig: 4.3 Data flow diagram 18
Fig 4.4 Use Case Diagram 20
Fig 4.5 Class Diagram 21
Fig 4.6 Sequence Diagrams(User) 22
Fig. 5.1. Working of Java Program 24
Fig. 5.2. Java in other Operating Systems 24
Fig.5.3. Program Running in Java Platform 25
Fig. 5.4. JAVA 2 SDK 27
Fig: 5.5 Compilation and Execution of JAVA Program 32
Fig.5.5.1 TCP/IP Model 32
Fig. 6.1 Levels of Testing 45
Fig:7.1 Home page 49
Fig:7.2 Auditor login page 49
Fig: 7.3 Auditor main page 50
Fig: 7.4 Agent login page 50
Fig: 7.5 Admin registration page 51
Fig: 7.6 Selecting finger print 51
Fig: 7.7 Admin login page 52
Fig: 7.8 Admin main page 52
Fig: 7.9 View and authorize user page 53
Fig: 7.10 User main page 53
Fig: 7.11 Requesting account number 54
Fig: 7.12 Generating account number 54
Fig: 7.13 Auditor permitting transactions 55
Fig: 7.14 User is financial fraud 55

vii

You might also like