FRAUD FIND FINANCIAL FRAUD DETECTION BY
ANALYZING HUMAN BEHAVIOR
A mini project report submitted in partial fulfillment of the requirements
for the award of the degree of
BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE AND ENGINEERING
by
ZOHA KHADEER (18S41A05B9)
SUNKARI KALYAN (18S41A05A8)
SYEDA RAFATH FATHIMA (18S41A05B0)
NOUSHIN SULTANA (17S41A0563)
Under the Guidance of
Mr. MD.SIRAJUDDIN
Associate Professor
Department of Computer Science & Engineering
VAAGESWARI COLLEGE OF ENGINEERING
(Affiliated to JNTU Hyderabad &Approved by AICTE New Delhi)
Ramakrishna colony, Karimnagar-505481
2021
Department of Computer Science & Engineering
VAAGESWARI COLLEGE OF ENGINEERING
(Affiliated to JNTU Hyderabad &Approved by AICTE New Delhi)
Ramakrishna colony, Karimnagar-505481
CERTIFICATE
This is to certify that the mini project report entitled “FRAUD FIND
FINANCIAL FRAUD DETECTION BY ANALYZING HUMAN BEHAVIOR”
submitted by the following students in partial fulfillment of the requirements for the
award of the Degree of Bachelor of Technology in CSE, and is a bonafide record of the
work performed by.
ZOHA KHADEER (18S41A05B9)
SUNKARI KALYAN (18S41A05A8)
SYEDA RAFATH FATHIMA (18S41A05B0)
NOUSHIN SULTANA (17S41A0563)
The work embodied in this mini project report has not been submitted to any
other institution for the award of the degree
Internal Guide Head Of The Department
Mr. MD.SIRAJUDDIN Dr. N. CHANDRAMOULI
Associate Professor Associate Professor
Principal External Examinar
Dr. CH SRINIVAS
ii
ACKNOWLEDGEMENT
We wish to pay our sincere thanks to Dr. CH. SRINIVAS, Principal,
Vaageswari College of Engineering, Karimnagar, for providing all required facilities
and his support during the mini project work.
Wewould like to thank Dr. N. CHANDRAMOULI, Associate. Professorand
HOD of the Computer Science and Engineering Department for his valuable suggestions
during the mini project work.
We sincerely extend our thanks to the project guide Mr. MD.SIRAJUDDIN
Associate Professor of Computer Science and Engineering Department, for sparing his
valuable time in guiding the project work and giving feedback with many useful
suggestions during the mini project work.
We are also conveying our heartfelt thanks to the Institute authority,
Department, Library, and Laboratory staff of Vaageswari College of Engineering for
their co-operation during our project. We thank our beloved friends for their help and
encouragement regarding the concepts and experimentation
iii
ABSTRACT
Financial Fraud is commonly represented by the use of illegal practices where
they can intervene from senior managers until payroll employees, becoming a crime
punishable by law. There are many techniques developed to analyze, detect and prevent
this behavior,being the most important the fraud triangle theory associated with the
classic financial audit model. In order to perform this research, a survey of the related
works in the existing literature was carried out, with the purpose of establishing our
own framework. In this context, this paper presents FraudFind, a conceptual framework
that allows to identify and outline a group of people inside abanking organization who
commit fraud, supported by the fraud triangle theory.
FraudFind works in the approach of continuous audit that will be in charge of
collecting information of agents installed in user’s equipment. It is based on semantic
techniques applied through the collection of phrases typed by the users under study for
later being transferred to a repository for later analysis. This proposal encourages to
contribute with the field of cybersecurity, in the reduction of cases of financial fraud.
iv
CONTENTS
TITLE PAGE NO.
CERTIFICATE ii
ACKNOWLEDGEMENT iii
ABSTRACT iv
LIST OF FIGURES vii
CHAPTER 1
INTRODUCTION 1
1.1 Introduction of Project 1
1.2 Motivation 6
1.3 Objective of Project 7
CHAPTER 2
LITERATURE SURVEY 8
2.1 Introduction 8
2.2 Existing System 9
2.2.1 Disadvantages of Existing System 10
2.3 Proposed System 10
CHAPTER 3
SYSTEM ANALYSIS 12
3.1 Introduction 12
3.2 System Specifications 13
3.2.1 Software Requirements 13
3.2.2 Hardware Requirements 13
3.3 Algorithms 14
CHAPTER 4
SYSTEM DESIGN 16
4.1 Introduction 16
4.2 System Design 17
4.3 Architecture Diagram 17
4.4 Data Flow Diagram 18
4.5 Uml Diagrams 19
4.5.1 Use Case Diagram 20
4.5.2 Class Diagram 21
v
4.5.3 Sequence Diagram 22
CHAPTER 5
IMPLEMENTATION 23
5.1 Introduction 23
5.2 Java Web Application 36
5.3 Coding 38
CHAPTER 6
TESTING AND EVALUATION 44
6.1 Introduction 44
6.2 Types Of Testing 45
6.3 Types Of Tests 45
CHAPTER 7
RESULTS 49
CHAPTER 8
CONCLUSION 56
REFERENCES 57
vi
LIST OF FIGURES
PAGE NO.
Fig 1.1 Structure of Data Mining 2
Fig :4.1 SDLC Methodology 16
Fig:4.2.Arctieacture Diagram 17
Fig: 4.3 Data flow diagram 18
Fig 4.4 Use Case Diagram 20
Fig 4.5 Class Diagram 21
Fig 4.6 Sequence Diagrams(User) 22
Fig. 5.1. Working of Java Program 24
Fig. 5.2. Java in other Operating Systems 24
Fig.5.3. Program Running in Java Platform 25
Fig. 5.4. JAVA 2 SDK 27
Fig: 5.5 Compilation and Execution of JAVA Program 32
Fig.5.5.1 TCP/IP Model 32
Fig. 6.1 Levels of Testing 45
Fig:7.1 Home page 49
Fig:7.2 Auditor login page 49
Fig: 7.3 Auditor main page 50
Fig: 7.4 Agent login page 50
Fig: 7.5 Admin registration page 51
Fig: 7.6 Selecting finger print 51
Fig: 7.7 Admin login page 52
Fig: 7.8 Admin main page 52
Fig: 7.9 View and authorize user page 53
Fig: 7.10 User main page 53
Fig: 7.11 Requesting account number 54
Fig: 7.12 Generating account number 54
Fig: 7.13 Auditor permitting transactions 55
Fig: 7.14 User is financial fraud 55
vii