A Comprehensive Strategy for Detecting Credit Card Fraud in E-Commerce Utilizing DNS Authentication

Main Article Content

Prof. Pradnya Patil
Prof. Minal Sonkar
Prof. Pallavi Patil
Prof. Priyanka Deshmukh
Prof. Trupti Patil

Abstract

E-commerce has transformed global trade, enabling businesses to reach audiences worldwide since the World Wide Web's inception in 1990. Companies like Amazon demonstrate this growth, evolving from a small online bookstore to a retail giant. E-commerce's appeal lies in its global reach, cost-efficiency, and 24/7 availability. However, security challenges, especially credit card fraud, remain significant, causing substantial losses to businesses, particularly small and medium-sized enterprises. Addressing fraud in e-commerce through machine learning techniques is crucial. Techniques such as Logistic Regression, Decision Trees, and Hidden Markov Models each offer unique advantages and limitations for detecting fraud, with some able to operate in real time. These methods help reduce false positives and improve fraud detection, making them integral to secure e-commerce environments. This paper introduces a system that uses disposable domain names and custom DNS servers to detect transaction inconsistencies, thus addressing proxy-based fraud attempts. By generating unique hostnames for each transaction, the system enables real-time monitoring and validation of client transactions. This DNS profiling approach strengthens e-commerce security, reduces financial risks, and enhances trust. The findings underscore the need for advanced fraud detection, contributing to safer online transactions and offering valuable insights for future secure e-commerce systems.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Prof. Pradnya Patil, Prof. Minal Sonkar, Prof. Pallavi Patil, Prof. Priyanka Deshmukh, and Prof. Trupti Patil, “A Comprehensive Strategy for Detecting Credit Card Fraud in E-Commerce Utilizing DNS Authentication”, IJSCE, vol. 14, no. 5, pp. 30–35, Nov. 2024, doi: 10.35940/ijsce.F3656.14051124.
Section
Articles

How to Cite

[1]
Prof. Pradnya Patil, Prof. Minal Sonkar, Prof. Pallavi Patil, Prof. Priyanka Deshmukh, and Prof. Trupti Patil, “A Comprehensive Strategy for Detecting Credit Card Fraud in E-Commerce Utilizing DNS Authentication”, IJSCE, vol. 14, no. 5, pp. 30–35, Nov. 2024, doi: 10.35940/ijsce.F3656.14051124.

References

T. Yorozu, M. Hirano, K. Oka and Y. Tagawa, "Electron Spectroscopy Studies on Magneto-Optical Media and Plastic Substrate Interface," in IEEE Translation Journal on Magnetics in Japan, vol. 2, no. 8, pp. 740-741, Aug. 1987, doi: https://doi.org/10.1109/TJMJ.1987.4549593

A. Susanto, P. Lestari, S. Hidayatuloh and A. Fitriyani, "Factors Affecting College Students' Trust in Online Shopping Transactions," 2019 7th International Conference on Cyber and IT Service Management (CITSM), Jakarta, Indonesia, 2019, pp. 1-5, doi: https://doi.org/10.1109/CITSM47753.2019.8965359.

S. Sanyala and M. W. Hisamb, "Factors Affecting Customer Satisfaction with Ecommerce Websites - An Omani Perspective," 2019 International Conference on Digitization (ICD),

Sharjah, United Arab Emirates, 2019, pp. 232-236, doi: https://doi.org/10.1109/ICD47981.2019.910578

N. Malini and M. Pushpa, "Analysis on credit card fraud identification techniques based on KNN and outlier detection," 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Chennai, India, 2017, pp. 255-258, doi: https://doi.org/10.1109/AEEICB.2017.7972424.

Imane Karkaba, EL Mehdi Adnani, Mohammed Errital, Deep Learning Detecting Fraud in Credit Card Transactions, Journal of Theoretical and Applied Information Technology, 15th May 2023. Vol.101. No 9, pp. 3557-3565, doi: https://doi.org/10.1109/SIEDS.2018.8374722.

R. Laurens, H. Rezaeighaleh, C. C. Zou and J. Jusak, "Using Disposable Domain Names to Detect Online Card Transaction Fraud," ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-7, doi: https://doi.org/10.1109/ICC.2019.8761144.

K. Shah, H. Sinha and P. Mishra, "Analysis of Cross-Platform Mobile App Development Tools," 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), Bombay, India, 2019, pp. 1-7, doi: https://doi.org/10.1109/I2CT45611.2019.9033872

D. Fortunato and J. Bernardino, "Progressive web apps: An alternative to the native mobile Apps," 2018 13th Iberian Conference on Information Systems and Technologies (CISTI), Caceres, Spain, 2018, pp. 1-6, doi: https://doi.org/10.23919/CISTI.2018.8399228.

Ramakishore, S., & Karpagavalli, Dr. P. (2020). K-Nearest Neighbor Based Enhanced-CBIR System. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 4, pp. 550–554). Doi: https://doi.org/10.35940/ijitee.b7711.029420

Srinivas, B., & Rao, G. S. (2019). A Hybrid CNN-KNN Model for MRI brain Tumor Classification. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 2, pp. 5230–5235). Doi: https://doi.org/10.35940/ijrte.b1051.078219

Jain, N., & Kumar, R. (2022). A Review on Machine Learning & It’s Algorithms. In International Journal of Soft Computing and Engineering (Vol. 12, Issue 5, pp. 1–5). Doi: https://doi.org/10.35940/ijsce.e3583.1112522

Assegie, T. A. (2021). K-Nearest Neighbor Based URL Identification Model for Phishing Attack Detection. In Indian Journal of Artificial Intelligence and Neural Networking (Vol. 1, Issue 2, pp. 18–21). Doi: https://doi.org/10.54105/ijainn.b1019.041221

M, N., Vidyashankara, & Kumar, G. H. (2020). Recognition of Leaves in Videos. In International Journal of Inventive Engineering and Sciences (Vol. 5, Issue 8, pp. 1–3). Doi: https://doi.org/10.35940/ijies.l0946.025820

Most read articles by the same author(s)

<< < 1 2 3 4 5 > >>