International E-publication: Publish Projects, Dissertation, Theses, Books, Souvenir, Conference Proceeding with ISBN.  International E-Bulletin: Information/News regarding: Academics and Research

Prevention Technique from Hackers and Trackers in on-line-Transactions

Author Affiliations

  • 1Department of Computer Science B.B.A. University (A central University), Lucknow, INDIA

Res. J. Recent Sci., Volume 4, Issue (IVC-2015), Pages 53-59, (2015)

Abstract

With the advancement of electronic commerce technology and the use of credit card and other types of on-line–transaction facilities has increased in present modern era. In electronic commerce system, credit card is the most prominent idea due to development of the information technology around the wide world. Offline and online both accepted mode are used in present time. Credit card and on-line–transactions is becoming most common payment mode for providing cashless shopping in all over countries or world. It will be provide a convenient approach for online purchasing, payment bills etc. As becoming credit is convenient way for purchasing, fraud are also rising similar way. To distinguish fraud and genuine customer in such extremely sparse data environment is becoming more and more challenging. This paper provides the Prevention Technique from Hackers and Trackers in on-line-Transactions and verification also. To detect the fraud on credit card as well as other on line facilities which are provided by the different companies or organizations is significant for companies and their customers. It has not been prevented fraudulent transaction form being exonerated and the company must gain this type of the financial value of transaction. To minimize penalty of companies that is associated with higher cost and its interest rates also cause of unauthorized access

References

  1. Rahimi A., Mohammadi S. and Rahimi R., An efficient Iris authentication using chaos theory-based cryptography for e-commerce transactions, Internet Technology and Secured Transactions, International Conference for ICITST 2009, 1-6 (2009)
  2. 53-59 (2015)
  3. Murdoch S.J., Drimer S., Anderson R. and Bond M., Chip and PIN is Broken, IEEE Symposium on Security and Privacy (SP), 433-446 (2010)
  4. Sherly K.K., Nedunchezhian R., BOAT adaptive credit card fraud detection system, IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 1-7(2010)
  5. Lee, Yuh-Jye et.al., Yeh, Yi-Ren, Wang, Yu-Chiang Frank, Anomaly Detection via Online Oversampling Principal Component Analysis, IEEE Transactions on Knowledge and Data Engineering, 1460-1470 (2013)
  6. Himanshu Gupta, Vinod Kumar Sharma, Role of multiple encryption in secure electronic transaction, International Journal of Network Security and Its Applications (IJNSA), 3(6), 89-96 (2011)
  7. Zhang Boping and Shang Shiyu, An Improved SET Protocol, Proceedings of the 2009 International Symposium on Information Processing (ISIP’09), 267-272 (2009)
  8. Anjali Dadhich, Dr. Surendra Kumar Yadav, Evolutionary Algorithms, Fuzzy Logic and Artificial Immune Systems applied to Cryptography and Cryptanalysis: State-of-the-art review, International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), 3(6), 2112-2120 (2014)
  9. Avinash Ingole, R.C. Thool, Credit Card Fraud Detection Using Hidden Markov Model and Its Performance, International Journal of Advanced Research in Computer Science and Software Engineering, 3(6), 626-632 (2013)
  10. Alka Herenj, Susmita Mishra, Secure Mechanism for Credit Card Transaction Fraud Detection System, International Journal of Advanced Research in Computer and Communication Engineering, 2(2), 1244-1248 (2013)
  11. Krishna Kumar Tripathi et.al., Lata Ragha, “Hybrid Approach for Credit Card Fraud Detection”, International Journal of Soft Computing and Engineering (IJSCE), 3(4), 8-11 (2013)
  12. S.O. Falaki et.al., B.K. Alese, O.S. Adewale, J.O. Ayeni, G.A. Aderounmu and W.O. Ismaila, Probabilistic Credit Card Fraud Detection System in Online Transactions, International Journal of Software Engineering and Its Applications et.al., 6(4), 69-78(2012)
  13. A. Prakash and C. Chandrasekar, A parameter optimized approach for improving credit card fraud detection, IJCSI International Journal of Computer Science, 10(1), 360-366 (2013)
  14. Ranjit kumar, Sandeep Raj, Design and Analysis of Credit Card Fraud Detection Based on HMM, International Journal of Engineering and Innovative Technology (IJEIT), 2(3), 332-334 (2012)
  15. Narander kumar, Priyanka chaudhary, Minimize cyber losses in cyber world through the optimization technique, Ďntenational journal of computer science, 96(20), 18-22 (2014)
  16. http://docs.oracle.com/cd/E17904_01/core.1111/e10105/ sslconfig.htm (2015)
  17. Cisco Systems, Introduction to Secure Sockets Layer. 17. H. Otrok, Security testing and evaluation of Cryptographic Algorithms (2003)
  18. Otrok H. Haraty and R. El-Kassar A.N., Improving the Secure Socket Layer Protocol by modifying its Authentication functions, Automation Congress, 2006. WAC '06. World, 1-6 (2006)
  19. Parshotam, Rupinder Cheema and Aayush Gulati, Improving the Secure Socket Layer by Modifying the RSA Algorithm, International Journal of Computer Science, Engineering and Applications (IJCSEA), 2(3), 79-86 (2012)