An Enhanced Authentication Technique to Mitigate the Online Transaction Fraud

  • Vipin Khattri
  • Sandeep Kumar NayakEmail author
  • Deepak Kumar Singh
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 989)


Online transactions provide benefits to the customer and financial organization in terms of reducing operating cost, time, efforts, papers, and increasing the comfort and ease. Beside these benefits online transaction has a side effect likeforged online transaction. This side effect results in loss of money. This forged online transaction is performed by fraudsters who are well equipped with the dynamic novel idea to steal an amount of money from the customer through online transaction. Although security measures are already implemented this forged online transactions are increasing every year. This is happening due to fraudsters creating novel ideas continuously to perform forged online transaction. Therefore, security measures need improvements continuously on a regular basis. The key aspiration of this paper is to create an improved authentication technique to prevent forged online transaction. This study produces an enhanced authentication using a mobile application to mitigate online transaction fraud.


Forged online transaction Online transaction Multi-factor authentication One time password Authentication Authorization 



We extend our gratitude toward the Integral University for acknowledging our research work and providing us with Manuscript Communication Number-IU/R&D/2018-MCN000407. We also extend the same toward the Shri Ramswaroop Memorial University for giving us financial support for our research work.


  1. 1.
    Bhatla, T.P., Prabhu, V., Dua, A.: Understanding credit card frauds. Cards Bus. Rev. 1(6), (2003)Google Scholar
  2. 2.
    Kulat, A., Kulkarni, R., Bhagwat, N., Desai, K., Kulkarni, M.P.: Prevention of online transaction frauds using OTP generation based on dual layer security mechanism. Int. Res. J. Eng. Technol. (IRJET). 3(4), 1058–1060 (2016)Google Scholar
  3. 3.
    Jamdar, P.A., Bendale, S.K., Durgawale, D.A.: Secure mechanism for credit/debit card transaction fraud detection by using fingerprint authentication system. Int. J. Comput. Sci. Netw. Secur. (IJCSNS). 16(3), 35–38 (2016)Google Scholar
  4. 4.
    Khattri, V., Singh, D.K.: A Novel Distance Authentication Mechanism to Prevent the Online Transaction Fraud, pp. 157–169. Advances in Fire and Process Safety, Springer, Singapore (2018)Google Scholar
  5. 5.
    Singh, P., Singh, M.: Fraud detection by monitoring customer behavior and activities. Int. J. Comput. Appl. 111(11), 23–32 (2015)Google Scholar
  6. 6.
    Prakash, A., Chandrasekar, C.: An optimized multiple semi-hidden markov model for credit card fraud detection. Indian J. Sci. Technol. 8(2), 165–171 (2015)CrossRefGoogle Scholar
  7. 7.
    Khan, M.Z., Pathan, J.D., Ahmed, A.H.E.: Credit card fraud detection system using hidden markov model and k-clustering. Int. J. Adv. Res. Comput. Commun. Eng. 3(2), 5458–5461 (2014)Google Scholar
  8. 8.
    Bekirev, A.S., Klimov, V.V., Kuzin, M.V., Shchukin, B.A.: Payment card fraud detection using neural network committee and clustering. Opt. Mem. Neural Netw. 24(3), 193–200 (2015)CrossRefGoogle Scholar
  9. 9.
    Van Vlasselaer, V., Bravo, C., Caelen, O., Eliassi-Rad, T., Akoglu, L., Snoeck, M., Baesens, B.: APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions. Decis. Support. Syst. 75, 38–48 (2015)CrossRefGoogle Scholar
  10. 10.
    Khan, A.U.S., Akhtar, N., Qureshi, M.N.: Real-time credit-card fraud detection using artificial neural network tuned by simulated annealing algorithm. In: Proceedings of International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 113–121. (2014)Google Scholar
  11. 11.
    Behera, T.K., Panigrahi, S.: Credit card fraud detection: a hybrid approach using fuzzy clustering & neural network. In: Second International Conference on Advances in Computing and Communication Engineering (ICACCE), pp. 494–499. (2015)Google Scholar
  12. 12.
    Halvaiee, N.S., Akbari, M.K.: A novel model for credit card fraud detection using Artificial Immune Systems. Appl. Soft Comput. 24, 40–49 (2014)CrossRefGoogle Scholar
  13. 13.
    Soltani, N., Akbari, M.K., Javan, M.S.: A new user-based model for credit card fraud detection based on artificial immune system. In: 16th IEEE CSI International Symposium on Artificial Intelligence and Signal Processing, pp. 029–033. (2012)Google Scholar
  14. 14.
    Assis, C.A., Pereira,A., Pereira, M.A., Carrano, E.G.: A genetic programming approach for fraud detection in electronic transactions. In: IEEE Symposium on Computational Intelligence in Cyber Security, pp. 1–8. (2014)Google Scholar
  15. 15.
    RamaKalyani, K., UmaDevi, D.: Fraud detection of credit card payment system by genetic algorithm. Int. J. Sci. & Eng. Res. 3(7), 1–6 (2012)Google Scholar
  16. 16.
    Kennedy, E., Millard, C.: Data security and multi-factor authentication: Analysis of requirements under EU law and in selected EU Member States. Comput. Law & Secur. Rev. 32(1), 91–110 (2016)CrossRefGoogle Scholar
  17. 17.
    Zhang, F., Kondoro, A., Muftic, S.: Location-based authentication and authorization using smart phones. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1285–1292. (2012)Google Scholar
  18. 18.
    Aloul, F. A., Zahidi, S., El-Hajj, W.: Two factor authentication using mobile phones. In: IEEE Conference on Computer Systems and Applications, pp. 641–644. (2009)Google Scholar
  19. 19.

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Vipin Khattri
    • 1
  • Sandeep Kumar Nayak
    • 1
    Email author
  • Deepak Kumar Singh
    • 2
  1. 1.Department of Computer ApplicationIntegral UniversityLucknowIndia
  2. 2.Jaipuria Institute of ManagementLucknowIndia

Personalised recommendations