Skip to main content

Advertisement

Log in

Designing a Locating Scams for Mobile Transaction with the Aid of Operational Activity Analysis in Cloud

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Regularly the scam threat entails intended scams performed for gaining profits and the goal is to focus on this domain of services aiding payments with the electronic money. Precisely the usage of tools for prognostic safety estimation at the time of execution monitors the operational performance with respect to payments within money payment service and attempts to equalize them with the anticipated performance offered by the operational framework. The assessment variations from the specified performance required for abnormalities representing probable mishandling of the services in terms of money laundering behaviours. The assessment of the applications in terms of the designed scheme offering calibrations based on estimation and detection behaviour of the prognostic safety estimator created employed real-time processing and assessed logs. The intention of the analysis is to locate the mishandling prototypes imitating given money laundering mechanism in an artificial operational performance based on the features seized from the real-time payment actions with cloud infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Bhattacharya, S., Jha, S., Tharakunnel, K., & Westland, C. J. (2010). Data mining for credit card fraud. Decision Support System, 50, 602–613.

    Article  Google Scholar 

  2. Cao, L., Zhang, H., Zhao, Y., Luo, D., & Zhang, C. (2011). Combined mining: Discovering informative knowledge in complex data. IEEE Transactions, 41(3), 699–712.

    Google Scholar 

  3. Chuang, K. T., Lin, K. P., & Chen, M. S. (2007). Quality aware sampling and its application in incremental data mining. IEEE Transactions on Knowledge and Data Engineering, 19(4), 468–484.

    Article  Google Scholar 

  4. Cao, L. (2012). Social security and social welfare data mining: An overview. IEEE Transactions on Systems, Man and Cybernetics-Part C: Applications & Reviews, 42(6), 837–853.

    Article  Google Scholar 

  5. Chang, W. H., & Chang, J. S. (2012). An early fraud detection methods for online auctions. Electronic Commerce Research and Applications, 11, 346–360.

    Article  Google Scholar 

  6. Clifton, P., Kate, S. M., Lee, S. C. V., & Gaylor, R. (2012). Resilient identity crime detection. IEEE Transactions. https://doi.org/10.1109/TKDE.2010.262.

    Article  Google Scholar 

  7. Dharwa, J. N., & Patel, A. R. (2011). A data mining with hybrid approach based transaction risk score generation method for fraud detection of online transaction. Journal of Computer Applications, 16(1), 18–25.

    Article  Google Scholar 

  8. Drezewski, R., Spielak, J., & Filipowski, W. (2012). System supporting money laundering detection. Digital Investigations, 9, 8–21.

    Article  Google Scholar 

  9. Duman, E., & Ozcelik, H. M. (2011). Detecting credit card fraud by genetic algorithm and scatter search. Expert System with Applications, 38, 13057–13063.

    Article  Google Scholar 

  10. Edge, E. M., & Sampaio, F. P. R. (2012). The design of FFML: A rule-based policy modeling language for proactive fraud management in financial data streams. Expert System with Applications, 39, 9966–9985.

    Article  Google Scholar 

  11. Farvaresh, H., & Sepehri, M. M. (2010). A data mining framework for detecting subscription fraud in telecommunication. Engineering Applications of Artificial Intelligence, 24, 182–194.

    Article  Google Scholar 

  12. He, Z., Xu, X., Huang, Z. J., & Deng, S. (2004). Mining class outliers: Concepts, algorithms and applications in CRM. Expert System with Applications, 27, 681–697.

    Article  Google Scholar 

  13. Huang, R., Tawfik, H., & Nagar, A. K. (2012). A novel hybrid artificial immune inspired approach for online break-in fraud detection. In Proceedings of the International Conference on Computer Science (pp. 2733–2742).

  14. Thillaiarasu, N., Pandian, S. C., Vijayakumar, V., et al. (2019). Wireless Networks. https://doi.org/10.1007/s11276-019-02113-4.

    Article  Google Scholar 

  15. Thillaiarasu, N., & ChenthurPandian, S. (2019). Cluster Computing, 22(Suppl 1), 1179. https://doi.org/10.1007/s10586-017-1178-8.

    Article  Google Scholar 

  16. Hajian, S., & Ferrer, J. D. (2013). A methodology for direct and indirect discrimination prevention in data mining. IEEE Transactions on Knowledge and Data Engineering., 25(7), 1445–1459.

    Article  Google Scholar 

  17. Jha, S., Guillen, M., & Westland, C. J. (2012). Employing transaction aggregation strategy to detect fraud. Expert System with Applications, 39, 12650–12657.

    Article  Google Scholar 

  18. Nagasubramanian, G., Sakthivel, R. K., Patan, R., Gandomi, A. H., Sankayya, M., & Balusamy, B. (2018). Securing e-health records using keyless signature infrastructure blockchain technology in the cloud. Neural Computing and Applications. https://doi.org/10.1007/s00521-018-3915-1.

    Article  Google Scholar 

  19. Kumar, S., Rakesh, N., & Gayathri, B. B. (2019). Enhancing network lifetime through power-aware routing in MANET. International Journal of Internet Technology and Secured Transactions, 9(12), 96–111.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramesh Chandran.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chandran, R., Kumar, S.R. & Gayathri, N. Designing a Locating Scams for Mobile Transaction with the Aid of Operational Activity Analysis in Cloud. Wireless Pers Commun 117, 3015–3028 (2021). https://doi.org/10.1007/s11277-020-07302-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07302-5

Keywords