blog




  • Essay / Cards as a Threat to an Economic System

    Table of ContentsIntroductionCard ProcessAttack TechniquesCredit Card Fraud Detection IssuesCredit Card Fraud Detection MethodsBiometric ApproachLearningConclusionThe banking industry involves many transactions in its daily functioning and they have now realized that their main concern is how to detect fraud as early as possible. In this article I have included information regarding the basics of carding. How this threat is becoming more and more difficult day by day. Process on how this threat is implemented and how we can successfully prevent this threat from happening. The processes covered in this study are phishing, skimming, and trigulation and copying overview. And there are several methods for detecting the carding process which are also biometric approach and learning included here. These technologies will help diagnose credit card fraud and give an acceptable result. Using these techniques will help distinguish credit card transactions generally into two types: legitimate and fraudulent transactions. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essayIntroductionBank is a financial institution that accepts deposits from the public. And it became a big worry for the bank if any fraud occurred during deposits. It is mentioned by K. Chan & J Stolfo et. al that there are many types of fraud and, in general, financial fraud affects bank fraud a lot. According to Leukfeldt (2010) and Taylor et al (2006), Internet fraud will target many victims in the future. Computer criminals are constantly looking for new and better methods to increase their chances of success. An organization called Citigroup suffered a loss of approximately $2. 7 million lost - just one example - after hackers found a way to steal credit card information from its website and post fraudulent charges. In this article, we are going to discuss credit cards. Carding can be divided into two distinct stages: the set of techniques by which credit card and other payment information falls into the hands of criminals and the manner in which this information is used by criminals. Carding also covers several forms of cybercrime (such as spam, identity theft or credit card fraud), carding should also be taken seriously. Carding Process Carding can be divided into two distinct stages: collecting credit card information and cashing out. credit card information. So many frauds detected which affect the bank, merchants and customers alike. Some of them are listed below: Receipt of mails: of newly issued cards. Copying: or replication of card information through cloned websites. Phishing: in which the credit card number and password are hacked, such as through emails, etc. Triangulation: in this type of fraud. , the fraudster creates a genuine-looking website and advertises to sell products at much lower prices. Unknowing users attract towards these sites and carry out online transactions. They submit their card information to purchase these products. Then, fraudsters use this card information to make real transactions. Skimming: means obtaining credit card information and additional information to carry outpayments on behalf of victims. After collecting all this credit card data, the main objective is to steal data outside of the sale or commerce. Theft of money is called cashing. Carding Cashout Process – can be divided into four different types of methods. The following definitions are summarized: Online Card: Purchase a product online using stolen credit card information. It does not require a physical card, it only requires a credit card number and other information to make a payment. In-store carding: involves creating a fake encoded credit card. with stolen account information, which is used in a physical location (store). Selling gift cards: Includes the purchase of gift certificates from retailers in physical stores using counterfeit credit cards. Like buying things with Amazon gift cards. Criminals then sell these cards for a percentage of their real value. Cashing out: Refers to obtaining money instead of goods and services through the unauthorized use of stolen financial information. Instead of using the stolen information, criminals can also sell or trade it using carding forums. Carding forums: are meeting places (convergence parameters) where tutorials, software are exchanged or sold and stolen information. Indicated by the term traffic. According to Peretti (2009), the objectives or intentions of a carding forum are to inform, assist, teach and create the opportunity to exchange or offer stolen information or resources to make the carding possible. Attack Techniques The focus of phishing is on the use of email, but these days other information instruments can be used to trap, bait or attack individuals. The online press articles available on phishing in any case talked about phishing by email. The exercises can be separated into stages. Before a phishing attack occurs, preparation is necessary. A temporary and fake email account is necessary to decrease the risk of being caught. However, a simple fake email account does not give someone the opportunity to commit a phishing scheme. Some software is also required. Phishing kits and pre-made websites can be purchased from other criminals, which look like realistic sites. Another basic part of preparation is using a server. A server is basically a PC that takes on a stable task on different PCs in a system. A criminal can use impenetrable facilitation, for example Bulletproof facilitation uses a server and associated administrations (rented) to send spam and therefore emails. A PC criminal chooses an unfortunate victim, either intentionally or unknowingly. Regardless, there are circumstances where no goals are chosen at the start of the plan. In case this is the case, an objective will be chosen later when a phishing attack becomes possible. Once the email locations of PC clients are collected legally or illicitly and the exploited people are selected, the attack can occur. The phisher then sends messages, or, in other words, spam. These messages contain instruments that a phisher uses to collect data. When sending messages, it is imperative that a deceptive email - containing fake registrations or a connection to a deceptive site - goes beyond spam channels. The goal is to persuade individuals that the email can be considered important, that the substance of this email is soundand authentic. This is the most fundamental minute. Individuals are just a trap, far from being misled or not. A client downloading a connected document without realizing that the document contains types of malware or spyware that will take data. On the other hand, an injured person clicks on a hyperlink that sends them to a fake site, or, in other words, to the phisher. The unfortunate victim has to fill in crucial data here – PIN code, card number, etc. - which the phisher can use to obtain cold hard cash. It is essential that a phisher also finds the confirmation codes that can be used to complete the exchanges. The people involved and the information flows between them will be discussed here. Since some phishing preparation is required, a few providers and server hosts can be included. . Apart from service providers and hosts, no other performers are included. The phisher attacks an unfortunate victim, possibly with the help of providers and hosts, obtains data if he is lucky and then uses this data to obtain money. Phishing can be condensed with a few basic perspectives, including attack, target, planning, persuasion, and capture. Either way, it takes a lot of skill and vitality to get things done. A second attack technique is skimming. Skimming differs from other attack techniques because the information is obtained by devices instead of being broken in using computers. These devices can be purchased or made. Activities can be divided into stages. See the figure who does not like activities related to skimming. It starts with choosing a goal. This could be an ATM in a very populated area. Targets, for example banks, stores, restaurants or other locations, can be selected, where individuals pay using ATMs, skimmers use these ATMs to retrieve data. When collecting data in stores, restaurants and the like, the skimmer must first penetrate (obtain entry to) a target and place a card-reading gadget on the target's ATM. This usually happens in stores. To enter a store, a skimmer can persuade or ask individuals, for example, representatives - enthusiastically or reluctantly - to place a gadget on a store's ATM. Once the data is stored on the gadget, it is recovered. After collecting data from stores, restaurants, banks or convenience stores, the skimmer - masked - returns to the ATM and collects the gadgets, which contain all the important data that the skimmer can use for money or offer . In the skimming process, certain actors are involved as shown in the figure. When choosing a store or restaurant, most of the time it is left to an employer or someone with access to the store's ATM. A skimmer can also enter a store or other association independently of anyone. However, according to online news reports, this is not standard. It is less demanding for a skimmer tasked with penetrating by a worker. In addition, there are equipment suppliers (skimming gadgets) who, obviously, provide the skimmer with all the essential instruments for burglary such as gadgets, card readers, small cameras or console overlays. . Here too the skimmer can do this without anyone's help, but again it is significantly less demanding or less expensive to docall another person who supplies burglar-proof instruments. Ultimately, individual data (PIN, Visa data and control codes) will be recovered from a customer or injured person using theft instruments. A skimmer can use data to create fake cards and use those cards to withdraw money from an ATM or offer the data. A skimmer may take an interest in using the victim's data to withdraw money from ATMs with fake cards and then offer it to the skimmer for a small imaginable reward. Another conceivable skimming situation which can be cited but which is not mentioned in the articles covered is that a skimming scheme can occur in the city where the skimmers persuade - with affectations - or push the young people to hand over their visas and paste their codes. With this remittance data, cash can be easily withdrawn from ATMs. This is a precedent which demonstrates that the consequences of this investigation can be completed. written giving exploratory results and real information for school scientists to carry out probes. The purpose of this is sensitive financial information related to misrepresentation that must be kept classified for the motivation behind customer protection. Currently, we identify here the distinctive properties that a cheat localization framework should have in order to produce legitimate results: The framework must be able to cope with asymmetric dispersions, in that only a small portion of all credit card transactions are fraudulent. There should be a proper way to deal with noise. Noise is errors in the data, such as incorrect dates. This noise in the real data limits the generalization accuracy that can be achieved, regardless of the size of the training set. Good metrics are needed to evaluate the classifier framework. For example, general accuracy is not suitable for evaluation on asymmetric transport, because even with high precision; all misleading exchanges can be misclassified. Another problem with this field is data overlap. Many transactions may appear to be fraudulent transactions when in reality they are genuine transactions. The opposite also happens when a fraudulent transaction appears genuine. The framework must take into account the amount of cash lost due to extortion and the amount of cash that will be required to distinguish that extortion. For example, there is no benefit to terminating a deceptive exchange whose amount is much less than the amount of money needed to distinguish it. Systems should be able to adapt to new types of fraud. For some time, effective fraud techniques have been declining in effectiveness as they become well-known because an effective fraudster is always finding new and inventive ways to accomplish their job. Credit Card Fraud Detection Methods A legitimate and intensive written study explains that there are different techniques that can be used to recognize the identification of credit card extortion. Some of these approaches are: Artificial neural networkBayesian networkNeural networkHidden Markov methodGenetic algorithm. In our research paper, as stated earlier, we will focus on Genetic Algorithm and how it is used in credit card fraud detection systems.Biometric ApproachKenneth Aguilar and Cesar Ponce et al. characterizes that all humans have.