Abstract
Regularly the scam threat entails intended scams performed for gaining profits and the goal is to focus on this domain of services aiding payments with the electronic money. Precisely the usage of tools for prognostic safety estimation at the time of execution monitors the operational performance with respect to payments within money payment service and attempts to equalize them with the anticipated performance offered by the operational framework. The assessment variations from the specified performance required for abnormalities representing probable mishandling of the services in terms of money laundering behaviours. The assessment of the applications in terms of the designed scheme offering calibrations based on estimation and detection behaviour of the prognostic safety estimator created employed real-time processing and assessed logs. The intention of the analysis is to locate the mishandling prototypes imitating given money laundering mechanism in an artificial operational performance based on the features seized from the real-time payment actions with cloud infrastructure.






Similar content being viewed by others
References
Bhattacharya, S., Jha, S., Tharakunnel, K., & Westland, C. J. (2010). Data mining for credit card fraud. Decision Support System, 50, 602–613.
Cao, L., Zhang, H., Zhao, Y., Luo, D., & Zhang, C. (2011). Combined mining: Discovering informative knowledge in complex data. IEEE Transactions, 41(3), 699–712.
Chuang, K. T., Lin, K. P., & Chen, M. S. (2007). Quality aware sampling and its application in incremental data mining. IEEE Transactions on Knowledge and Data Engineering, 19(4), 468–484.
Cao, L. (2012). Social security and social welfare data mining: An overview. IEEE Transactions on Systems, Man and Cybernetics-Part C: Applications & Reviews, 42(6), 837–853.
Chang, W. H., & Chang, J. S. (2012). An early fraud detection methods for online auctions. Electronic Commerce Research and Applications, 11, 346–360.
Clifton, P., Kate, S. M., Lee, S. C. V., & Gaylor, R. (2012). Resilient identity crime detection. IEEE Transactions. https://doi.org/10.1109/TKDE.2010.262.
Dharwa, J. N., & Patel, A. R. (2011). A data mining with hybrid approach based transaction risk score generation method for fraud detection of online transaction. Journal of Computer Applications, 16(1), 18–25.
Drezewski, R., Spielak, J., & Filipowski, W. (2012). System supporting money laundering detection. Digital Investigations, 9, 8–21.
Duman, E., & Ozcelik, H. M. (2011). Detecting credit card fraud by genetic algorithm and scatter search. Expert System with Applications, 38, 13057–13063.
Edge, E. M., & Sampaio, F. P. R. (2012). The design of FFML: A rule-based policy modeling language for proactive fraud management in financial data streams. Expert System with Applications, 39, 9966–9985.
Farvaresh, H., & Sepehri, M. M. (2010). A data mining framework for detecting subscription fraud in telecommunication. Engineering Applications of Artificial Intelligence, 24, 182–194.
He, Z., Xu, X., Huang, Z. J., & Deng, S. (2004). Mining class outliers: Concepts, algorithms and applications in CRM. Expert System with Applications, 27, 681–697.
Huang, R., Tawfik, H., & Nagar, A. K. (2012). A novel hybrid artificial immune inspired approach for online break-in fraud detection. In Proceedings of the International Conference on Computer Science (pp. 2733–2742).
Thillaiarasu, N., Pandian, S. C., Vijayakumar, V., et al. (2019). Wireless Networks. https://doi.org/10.1007/s11276-019-02113-4.
Thillaiarasu, N., & ChenthurPandian, S. (2019). Cluster Computing, 22(Suppl 1), 1179. https://doi.org/10.1007/s10586-017-1178-8.
Hajian, S., & Ferrer, J. D. (2013). A methodology for direct and indirect discrimination prevention in data mining. IEEE Transactions on Knowledge and Data Engineering., 25(7), 1445–1459.
Jha, S., Guillen, M., & Westland, C. J. (2012). Employing transaction aggregation strategy to detect fraud. Expert System with Applications, 39, 12650–12657.
Nagasubramanian, G., Sakthivel, R. K., Patan, R., Gandomi, A. H., Sankayya, M., & Balusamy, B. (2018). Securing e-health records using keyless signature infrastructure blockchain technology in the cloud. Neural Computing and Applications. https://doi.org/10.1007/s00521-018-3915-1.
Kumar, S., Rakesh, N., & Gayathri, B. B. (2019). Enhancing network lifetime through power-aware routing in MANET. International Journal of Internet Technology and Secured Transactions, 9(12), 96–111.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chandran, R., Kumar, S.R. & Gayathri, N. Designing a Locating Scams for Mobile Transaction with the Aid of Operational Activity Analysis in Cloud. Wireless Pers Commun 117, 3015–3028 (2021). https://doi.org/10.1007/s11277-020-07302-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-07302-5