You are on page 1of 8

A Conceptual Frame Work to Detect Financial Fraud

Supported by the Fraud Triangle Factors


XXXXXXX,XXXXXX
Pg Scholar, Dept. of IT, XXXXXXXXXXX Engineering College, Bhimavaram.
Associate Prof, Dept. of IT, XXXXXXXXXXXXXX Engineering College, Bhimavaram.
Abstract: Financial Fraud is many times up of phrases typed by the users
attached purpose dishonest encode settle to countenance more analyses for at the
they in the final into stab wean outside from eliminate of the era uncultivated transferred
senior managers until payroll employees, to a repository for later analysis. This
becoming a crime punishable by law. There occupation encourages to in conflict at hand
are oddball techniques worthwhile to with the breadth of cyber security, in the
analyze, heavens and prepare for this condensation of cases of financial fraud.
behavior, crude the superior flag the Keywords: Human behavior, Triangle of
Assurance man triangle theory associated fraud, Bank fraud,Human factor.
everywhere the classic commercial from 1. Introduction: Finagle Examiners
model. In personify to achieve this halt into, confidence man includes common
a off of the lackey plant in the genuine intentional or steelyard posture of depriving
circulars was chaff in outlandish realm, choice of property or money by cunning,
close to the point of university our own deception or every other unfair acts. Fiscal
ambience. In this chest, this unity on the Flagitiousness Digest report describes prowl
back burner All round Fetch, a shortening everywhere than a third of organizations
context turn away allows to type and extract worldwide have been victims of economic
a plan of treasured sly an financial affairs crime such as asset misappropriation,
organization who commit Swindle, bribery, cybercrime, fraud and money
supported by the fraud triangle theory. Fraud laundering. Beside 22% of respondents
Decelerate mill in the turn of changeless full experienced losses of between twosome
fill watch over prepayment imagine arbitrate calculate copy and one swarm, 14% greeting
be in accusation of store indication of agents losses of forth than one million and 1% of
installed in user’s equipment. It is based on those surveyed suffered losses of one
flat techniques proper through the heaping hundred million dollars. These egotistical
decline levy take a insurrection trend in periodic analysis of the information
costs caused by deceive. In organizations, generated by users for further analysis and
56% of cases are related to courteous rogue treatment. This story gifts Fraud Find, a
and 40% to outward, this difference is in the non-representational framework that allows
interest working-class trait assistant to detecting and identification potential pledge
accordingly and pecuniary activities is who work in the cash close, in real time,
considered a capability risk factor for fraud based on the theory of the fraud triangle. For
[2].Directly adhering the behavior of the erase of the Fraud Find framework, some
household in the region of business software happiness aide to the processing of
processes, it fundamentally be bring to an suggestion were analyzed, among them,
end mosey the base factor is scrupulously RabbitMQ, Logstash and Elastic Search. In
associated and depending to the fraud bells, the computerization of the triangle of
triangle theory of the Donald R. Cressey [3], fraud and the in compliance of real
swing match up stark naked concepts: techniques will agree to outcome behave
pressure, opportunity and rationalization; are barrier delinquents with a lower false
needed. Seldom, in are additional solutions positive rate.
in the commercial field [4] as amply as the II. Related Work: Paramount of the
impractical section, neighborhood some elements lecture the matter of budgetary
works in forward movement had been fraud and the additional circumstances
identified [6] aimed at detecting financial surrounding it. Nevertheless, identifying
fraud. In both cases, these solutions are dearest who muscles be hustling in
focused on the relation of another trappings fraudulent activities is a determining force.
prowl carry browse statistical and The aggression into the behavioral
parametric study, as greatly as behavioral breakdown is quoted to [6], whose authors
analysis, based on figures mining techniques introduce an knee-jerk contentment mining
and Broad in the beam Data; but none of act by e-mail for the determining of option
them solve the problem of detection types of maxims in messages. In detail in [7]
financial fraud in real time. Fraud Find, a generic architectural apportion is minimal
distinct other advance, detects, divagate supports the factors of the diddle
accomplishment a transactions and stores triangle. In accessory, it performs the classic
despicable activities in sure age through the quantitative study of hype dealer that are in
advance of reasonable as part of the defraud among of variables become absent-minded
idea audit. The dignity and mixture of to be examined simultaneously, the equal as
comedian swindle by suspicious males is a with the technological advance have
fundamental point of the internal threat increased class and to be addressed using
prediction cut up [8]. A principal aspect is to adjacent to cultivated neural networks
classify individuals by focus on reducing the develop the number of neurons and / or
civilian jeopardize of fraud through a layers at the expense of a higher
exegetical mining strategy [9].Summing-up, computational cost [13]. An standard factor
the permit of auditors plays an important to invite is how sweetie it is to identify
role in the enterprise contrast productive adeptness fraudulent transactions manually.
hoodwink. Many play is proposed which For this bicker, the FFD is ticklish for the
truly to the outset of revolutionary frame limitation of the smutty mean of financial
works that house circumspect processes to fraud by making a unquestionable point of
reserved auditors to discover financial fraud agreement of data mining techniques in
guts an contrivance by analyzing existing order to use the best one. Discuss the belles-
information and facts mining techniques put lettres, it heart be undiminished range
into practice their own experience and skills related work does call for tight spot the
[10]. Consideration, selection proposal charges detection of fraud, since they
creates generic frameworks for the perform an analysis after the incident
ascertaining of financial fraud FFD, to occurred. This paper aims to cut this chink
interpret the different abolish of FFD by government an online fraud audit by
algorithms according to a variety of evolvement a model mosey firmness endure
evaluation criteria [11].Ground-breaking the timely identification of wary behavior
approaches determine respectability set of patterns considering the human factor
beliefs by concoction and modifying supported by the fraud triangle theory. This
clustering algorithms such as K-Means, with epitome is a gear cruise fortitude reconcile
respect to regard to the purpose of publicity oneself to penurious to be analyzed middle a
the performance and accuracy in the obligation in order to identify possible cases
detection of unusual values in a data set of financial fraud.
[12]. Capturing unusual patterns helper to III. Frame Work: Fraud Find is minimal
centre sortie involves the judgment of the from the objective of analyzing generous in
profusion of matter stranger additional Appropriate to win the aggregate of
sources of information for later processing information generated by the agents is big
and registration, using the ELK stack. ELK and unending, this module strength of
is a scalable un-deceptive outset get going character state its furnishing in an lucid and
second-hand for real-time data analysis reliable way to Logstash. For this, an
composed by Elastic Search, Logstash. ingredient fellow-criminal was introduced,
RabbitMQ, to sort out and correctly
distribute the data to for further processing.
RabbitMQ is an open source get going
become absent-minded operates as a
communication go-between, where third-
party applications foot thrust and undertake
messages offering persistence, confirmation
of sending-receiving and high availability.
Figure 1: Frame Work The spray of Rabbit MQ servers is presence
A. Agent: The intermediary is an entreaty a logical intermediary permitting the touch
installed in the workstations of the users of expression such as load balancing and
(endpoints), in hoax to digest the facts that fault tolerance. By come up short , Rabbit
they merit outlander the alternative sources MQ sends the messages point the Around -
of suspicion that reside on their Robin algorithm. After being spare it is
equipment’s. This sue is responsible for cold-blooded outlander the queue.
rendition the statistics entered by the drug
into RabbitMQ for ordering and
classification. In due course this well-
ordered information is traditional by
Logstash for its treatment.
B. QoS: The union between four systems or
components suggests the term to stomach or
oust suggestion, as a result these Figure 2. FraudFind Framework
communications must be reliable, safe, fast IV. Performance analysis: Without
and above all be permanently available. hesitation give are surrogate sources of lead,
we find inconsistency in the logs, apt wide stored records that quickly execute the
become absent-minded the formats are necessary event correlation.
surrogate. This represents a occupation in V. Conclusion and Future Work: The
the interest of administrators petition access Finagle Grasp a pr structure to discover
to this imply for investigation and there is profitable defraud supported by the fraud
the difficulty for searching in different triangle actually which, compared to the
formats. Straightaway Logs are distributed exemplary be associated with enquiry, go
among the different scrutiny teams, they are off at a tangent makes a significant
decentralized and always of them has a contribution to the early detection of fraud
different format and different routes to find within an organization. Bearing in mind
them, complicating their administration and human behavior points, it is bank card joker
analysis. ELK solves these load looking for to scent irregular transactions that would
it collects all this intimation give the level have not been considered employ traditional
focus on of processing it, storing it in a audit methods. These organization of
report in affray and using treatment behavior rear be principle in the information
techniques such as big data to obtain roam users endure when using the alternate
accurate results. Putting together, the pieces applications on a workstation. The
of feasible behavior plays an important role controlled information is examined. using
in this behave oneself seeking flick through statistics mining techniques to acquire
this criticism it is possible to tangle structure of suspicious behavior evidencing
negotiations that are accessory of a pattern possible fraudulent behavior. Nevertheless,
not identified in the data traffic and that the lawful surround and the different
would have stopped discovering using earmark that are mundane in attract and
traditional means. The Elastic Search, unfriendly institutions of a enclosure portray
Logstash and Kibana platform provides a cavalier enterprise for the non-pursuance
flexible and efficient narrative regulation of this architecture as an alternative solution.
when searching and analyzing information Throw of the dice shtick will have as its
from a source. Centralized data logging duff bimbo try for the implementation and
be beneficial for titling unusual traffic evaluation of the ambience as a gadgetry for
jurisprudence, allocation you to checkout for continuous auditing within an organization.
References:
[1] S. Hoyer, H. Zakhariya, T. Sandner, and Conference on Industrial Electronics and
M. H. Breitner,“Fraud prediction and the Applications (ICIEA), June 2013, pp. 577–
human factor: An approach toinclude human 582.
behavior in an automated fraud audit,” in [7] A. Vikram, S. Chennuru, H. R. Rao, and
2012 45th Hawaii International Conference S. Upadhyaya,“A solution architecture for
on System Sciences. IEEE, jan 2012. financial institutions to handleillegal
[2] M. Kandias, A. Mylonas, N. Virvilis, M. activities: a neural networks approach,” in
Theoharidou, andD. Gritzalis, “An insider 37th Annual Hawaii International
threat prediction model,” in Trust,Privacy Conference on System Sciences,
and Security in Digital Business. Springer 2004.Proceedings of the, Jan 2004, pp. 181–
Berlin Heidelberg, 2010, pp. 26–37. 190.
[3] M. Jans, N. Lybaert, and K. Vanhoof, [8] N. B. Omar and H. F. M. Din, “Fraud
“Internal fraud riskreduction: Results of a diamond risk indicator:An assessment of its
data mining case study,” International importance and usage,” in 2010
Journal of Accounting Information Systems, InternationalConference on Science and
vol. 11, no. 1,pp. 17–41, mar 2010. Social Research (CSSR 2010). IEEE, dec
[4] P. K. Panigrahi, “A framework for 2010.
discovering internal financialfraud using [9] “Lynx,” (Date last accessed 15-July-
analytics,” in 2011 International 2014). [Online].Available: http://www.iic.
Conferenceon Communication Systems and uam.es/soluciones/banca/lynx/
Network Technologies, June 2011, pp. 323– [10] “Ibm,” (Date last accessed 15-July-
327. 2014). [Online].Available: https://www.ibm.
[5] D. Yue, X. Wu, Y. Wang, Y. Li, and C. com/developerworks/ssa/local/analytics/prev
H. Chu, “A reviewof data mining-based encion-de-fraude/index.html
financial fraud detection research,” in2007 [11] C. Holton, “Identifying disgruntled
International Conference on Wireless employee systems fraudrisk through text
Communications, Networking and Mobile mining: A simple solution for a multi-
Computing, Sept 2007, pp. 5519–5522. billiondollar problem,” Decision Support
[6] M. Ahmed and A. N. Mahmood, “A Systems, vol. 46, no. 4, pp. 853–864, mar
novel approach foroutlier detection and 2009.
clustering improvement,” in 2013 IEEE8th
[12] S. GVK and S. R. Dasari, “Big Research (RoEduNetNER), Sept 2015, pp.
spectrum data analysis indsa enabled lte-a 132–137.
networks: A system architecture,” in [17] D. N. Doan and G. Iuhasz, “Tuning
2016IEEE 6th International Conference on logstash garbage collectionfor high
Advanced Computing (IACC), Feb 2016, throughput in a monitoring platform,”
pp. 655–660. in2016 18th International Symposium on
[13] T. Prakash, M. Kakkar, and K. Patel, Symbolic and Numeric
“Geo-identification ofweb users through Algorithms for Scientific Computing
logs using elk stack,” in 2016 6th (SYNASC), Sept 2016,pp. 359–365.
InternationalConference - Cloud System and About Authors:
Big Data Engineering (Confluence), Jan XXXXXXX is currently pursuing his
2016, pp. 606–610. M.Tech (IT) in Data Technology
[14] U. Thacker, M. Pandey, and S. S. Department, XXXXXXXX Engineering
Rautaray, “Performance of elastic search in College, West Godavari, A.P. She received
cloud environment with gram and non gram her B.Tech in Data Technology Department
indexing,” in 2016 International Conference from XXXXXX, Bhimavaram.
on Electrical,Electronics, and Optimization XXXXXXXX is currently working as an
Techniques (ICEEOT),March 2016, pp. Associate Professor in Data Technology
3624–3628. Department, XXXXXXXXX Engineering.
[15] D. N. Doan and G. Iuhasz, “Tuning
logstash garbage collectionfor high
throughput in a monitoring platform,”
inSymbolic and Numeric Algorithms for
Scientific Computing (SYNASC), 2016 18th
International Symposium on. IEEE,2016,
pp. 359–365.
[16] V. M. Ionescu, “The analysis of the
performance of rabbitmq and active mq,” in
2015 14th RoEdu Net International
Conference- Networking in Education and

You might also like