SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
Catch	
  them	
  in	
  the	
  Act	
  
Fraud	
  Detec+on	
  with	
  	
  
WSO2	
  Analy+cs	
  Pla:orm	
  
Seshika	
  Fernando	
  
Technical	
  Lead	
  
WSO2	
  
	
  
Bad	
  News	
  
$4 Trillion in Global Fraud Losses	
  
That’s	
  5%	
  of	
  Global	
  GDP	
  
Good	
  News	
  
WSO2	
  Analy9cs	
  Pla;orm	
  +	
  Domain	
  Exper9se	
  ≈	
  Digital	
  Sherlock	
  
	
  
Domain	
  Exper+se	
   	
  	
  	
  	
  Generic	
  Rules	
  
	
  
	
  
	
  
Typical	
  Fraudster	
  
•  Use	
  stolen	
  cards	
  
•  Buy	
  Expensive	
  stuff	
  
•  In	
  Large	
  Quan++es	
  
•  Very	
  quickly	
  
•  At	
  odd	
  hours	
  
•  Ship	
  to	
  many	
  places	
  
•  Get	
  rejected	
  oSen	
  
Siddhi	
  Queries	
  
 from	
   	
  e1	
  =	
  Transac+onStream	
  -­‐>	
  	
  
	
   	
  e2	
  =	
  Transac+onStream[e1.cardNo	
  ==	
  e2.cardNo]	
  <2:>	
  
	
  within	
  5	
  min	
  
	
  select	
  e1.cardNo,	
  	
  e1.txnID,	
  	
  e2[0].txnID,	
  	
  e2[1].txnID	
  
	
  insert	
  into	
  FraudStream	
  
Transac9on	
  Velocity	
  
The	
  False	
  Posi9ve	
  Trap	
  
Rich	
  guy	
  
GiS	
  giver	
  
Impulse	
  Shopper	
  
Night	
  owl	
  
Many	
  girlfriends?	
  
	
  
๏  So	
  what	
  if	
  I	
  buy	
  Expensive	
  stuff	
  	
  
๏  And	
  why	
  can’t	
  I	
  buy	
  a	
  lot	
  	
  
๏  Very	
  Quickly	
  	
  
๏  At	
  odd	
  hours	
  	
  
๏  Ship	
  to	
  many	
  places	
  
	
  
Blocking	
  genuine	
  customers	
  could	
  be	
  counter	
  
produc9ve	
  and	
  costly	
  
How	
  to	
  avoid	
  False	
  Posi9ves	
  
•  Use	
  combina+ons	
  of	
  rules	
  
•  Give	
  weights	
  to	
  each	
  rule	
  
•  Single	
  number	
  that	
  reflects	
  many	
  fraud	
  indicators	
  
•  Use	
  a	
  threshold	
  to	
  reject	
  transac+ons	
  
•  You	
  just	
  bought	
  a	
  Diamond	
  Ring?	
  	
  
•  You	
  bought	
  20	
  Diamond	
  Rings,	
  in	
  15	
  minutes	
  
at	
  3am	
  from	
  an	
  IP	
  address	
  in	
  Nigeria?	
  	
  
How	
  to	
  score	
  
Score	
  =	
  	
  
	
  	
  0.001	
  *	
  itemPrice	
  	
  
	
  	
  +	
  	
  0.1	
  	
  *	
  itemQuan+ty	
   	
  	
  
	
  	
  +	
  	
  2.5	
  	
  *	
  isFreeEmail	
   	
  	
  
	
  	
  +	
  	
  5	
   	
  *	
  riskyCountry	
  	
  	
  	
  	
  	
  	
  	
  
	
  	
  +	
  	
  8	
   	
  *	
  suspicousIPRange	
   	
  	
  
	
  	
  +	
  	
  5	
   	
  *	
  suspicousUsername	
  
	
  	
  +	
  	
  3 	
  *	
  highTransac+onVelocity	
  
	
  	
  
 	
  
Are	
  we	
  safe	
  ?	
  
Markov	
  Models	
  
•  Model	
  randomly	
  changing	
  systems	
  
•  Detect	
  rare	
  ac+vity	
  sequences	
  using	
  
•  Classifica+on	
  
•  Probability	
  Calcula+on	
  
•  Metric	
  Calcula+on	
  
Fraud	
  Detec9on	
  in	
  Real-­‐9me	
  
•  Encode	
  Domain	
  Knowledge	
  into	
  Generic	
  Rules	
  
•  Use	
  Fraud	
  Scoring	
  to	
  reduce	
  False	
  Posi+ves	
  
•  Use	
  Markov	
  Modelling	
  to	
  detect	
  rare	
  pakerns	
  
Have we
cracked
the case?
Dig	
  using	
  Big	
  
•  Provide	
  access	
  to	
  historical	
  data	
  to	
  dig	
  deeper	
  
•  Make	
  querying	
  and	
  filtering	
  easy	
  and	
  intui+ve	
  	
  
•  Provide	
  useful	
  visualiza+ons	
  to	
  isolate	
  
incidents	
  and	
  unearth	
  connec+ons	
  
Dashboard	
  
Fraud	
  Detec9on	
  Toolkit	
  
Events	
  
Events	
  
Events	
  
Events	
  
Payment	
  Fraud	
  
Dashboard	
  
Transac+ons	
  
Transac+ons	
  
Transac+ons	
  
Transac+ons	
  
Payment	
  
System	
  
An9	
  Money	
  Laundering	
  
Dashboard	
  
Bank	
  Txns	
  
Bank	
  Txns	
  
Bank	
  Txns	
  
Bank	
  Txns	
  
Core	
  
Banking	
  
System	
  
Iden9ty	
  Fraud	
  
Dashboard	
  
Events	
  
Events	
  
Events	
  
Events	
  
WSO2	
  
Iden+ty	
  
Server	
  
Thank	
  You	
  

Contenu connexe

En vedette

Miki,damian,borja
Miki,damian,borjaMiki,damian,borja
Miki,damian,borja
inmaiclass
 

En vedette (20)

WSO2Con EU 2015: Case Study – Digital Transformation: To Monetise Business by...
WSO2Con EU 2015: Case Study – Digital Transformation: To Monetise Business by...WSO2Con EU 2015: Case Study – Digital Transformation: To Monetise Business by...
WSO2Con EU 2015: Case Study – Digital Transformation: To Monetise Business by...
 
WSO2Con EU 2015: WSO2 For EXPO2015
WSO2Con EU 2015: WSO2 For EXPO2015WSO2Con EU 2015: WSO2 For EXPO2015
WSO2Con EU 2015: WSO2 For EXPO2015
 
Nota slide topik 5
Nota slide topik 5Nota slide topik 5
Nota slide topik 5
 
Containers in production with docker, coreos, kubernetes and apache stratos
Containers in production with docker, coreos, kubernetes and apache stratosContainers in production with docker, coreos, kubernetes and apache stratos
Containers in production with docker, coreos, kubernetes and apache stratos
 
Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing Global Efforts to Secure Cloud Computing
Global Efforts to Secure Cloud Computing
 
Adserving: Do we need an evolution or revolution?
Adserving: Do we need an evolution or revolution?Adserving: Do we need an evolution or revolution?
Adserving: Do we need an evolution or revolution?
 
War stories from building a public cloud
War stories from building a public cloudWar stories from building a public cloud
War stories from building a public cloud
 
WSO2Con EU 2015: Implementing National Interoperability Platform
WSO2Con EU 2015: Implementing National Interoperability PlatformWSO2Con EU 2015: Implementing National Interoperability Platform
WSO2Con EU 2015: Implementing National Interoperability Platform
 
WSO2Con EU 2015: A Complete Platform for Applications in a Connected Enterprise
WSO2Con EU 2015: A Complete Platform for Applications in a Connected EnterpriseWSO2Con EU 2015: A Complete Platform for Applications in a Connected Enterprise
WSO2Con EU 2015: A Complete Platform for Applications in a Connected Enterprise
 
WSO2Con EU 2015: Extending and Customizing WSO2 API Manager
WSO2Con EU 2015: Extending and Customizing WSO2 API ManagerWSO2Con EU 2015: Extending and Customizing WSO2 API Manager
WSO2Con EU 2015: Extending and Customizing WSO2 API Manager
 
Metodolodías aplicadas al laboratorio de química
Metodolodías aplicadas al laboratorio de químicaMetodolodías aplicadas al laboratorio de química
Metodolodías aplicadas al laboratorio de química
 
Private, Managed, Public - All Things WSO2 Cloud
Private, Managed, Public - All Things WSO2 CloudPrivate, Managed, Public - All Things WSO2 Cloud
Private, Managed, Public - All Things WSO2 Cloud
 
WSO2Con EU 2015: Implementing an Open API for Smart Thermostats with WSO2′s A...
WSO2Con EU 2015: Implementing an Open API for Smart Thermostats with WSO2′s A...WSO2Con EU 2015: Implementing an Open API for Smart Thermostats with WSO2′s A...
WSO2Con EU 2015: Implementing an Open API for Smart Thermostats with WSO2′s A...
 
WSO2Con EU 2015: PaaS for Educational Environments – Almaviva
WSO2Con EU 2015: PaaS for Educational Environments – AlmavivaWSO2Con EU 2015: PaaS for Educational Environments – Almaviva
WSO2Con EU 2015: PaaS for Educational Environments – Almaviva
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Miki,damian,borja
Miki,damian,borjaMiki,damian,borja
Miki,damian,borja
 
WSO2Con EU 2015: Reference Architecture for EDA
WSO2Con EU 2015: Reference Architecture for EDAWSO2Con EU 2015: Reference Architecture for EDA
WSO2Con EU 2015: Reference Architecture for EDA
 
WSO2Con EU 2015: Towards a Winning API Strategy
WSO2Con EU 2015: Towards a Winning API StrategyWSO2Con EU 2015: Towards a Winning API Strategy
WSO2Con EU 2015: Towards a Winning API Strategy
 
Windows Azure
Windows AzureWindows Azure
Windows Azure
 
WSO2Con EU 2015: An Introduction to the WSO2 Data Analytics Platform
WSO2Con EU 2015: An Introduction to the WSO2 Data Analytics PlatformWSO2Con EU 2015: An Introduction to the WSO2 Data Analytics Platform
WSO2Con EU 2015: An Introduction to the WSO2 Data Analytics Platform
 

Similaire à WSO2Con EU 2015: Catch Them in the Act: Fraud Detection With WSO2 Analytics Platform

HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...
HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...
HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...
Hackito Ergo Sum
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
AdaCore
 

Similaire à WSO2Con EU 2015: Catch Them in the Act: Fraud Detection With WSO2 Analytics Platform (20)

WSO2Con ASIA 2016: Catch Them in the Act: Fraud Detection with the WSO2 Analy...
WSO2Con ASIA 2016: Catch Them in the Act: Fraud Detection with the WSO2 Analy...WSO2Con ASIA 2016: Catch Them in the Act: Fraud Detection with the WSO2 Analy...
WSO2Con ASIA 2016: Catch Them in the Act: Fraud Detection with the WSO2 Analy...
 
Fraud detection with Analytics wso2 asiacon2016
Fraud detection with Analytics wso2 asiacon2016 Fraud detection with Analytics wso2 asiacon2016
Fraud detection with Analytics wso2 asiacon2016
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Fraud Detection in Real-time @ Apache Big Data con
Fraud Detection in Real-time @ Apache Big Data conFraud Detection in Real-time @ Apache Big Data con
Fraud Detection in Real-time @ Apache Big Data con
 
Fraud Detection in Real-time @ Apache Big Data Con
Fraud Detection in Real-time @ Apache Big Data ConFraud Detection in Real-time @ Apache Big Data Con
Fraud Detection in Real-time @ Apache Big Data Con
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...
HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...
HES2011 - Yuval Vadim Polevoy – Money Is In The Eye Of The Beholder: New And ...
 
Crypto Hacks - Quit your Job and Become a Crypto Farmer
Crypto Hacks - Quit your Job and Become a Crypto FarmerCrypto Hacks - Quit your Job and Become a Crypto Farmer
Crypto Hacks - Quit your Job and Become a Crypto Farmer
 
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
BDWW17 London - Steve Bradbury, GRSC - Big Data to the Rescue: A Fraud Case S...
 
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
Protecting the Keys to the Kingdom - The Case for Adaptive Authentication for...
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Blockchain Webinar
Blockchain WebinarBlockchain Webinar
Blockchain Webinar
 
Blockchain Introduction
Blockchain IntroductionBlockchain Introduction
Blockchain Introduction
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Build Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and GraphsBuild Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and Graphs
 
Threats to network
Threats to networkThreats to network
Threats to network
 
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 

Plus de WSO2

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Fueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsFueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected Products
WSO2
 
A Reference Methodology for Agile Digital Businesses
 A Reference Methodology for Agile Digital Businesses A Reference Methodology for Agile Digital Businesses
A Reference Methodology for Agile Digital Businesses
WSO2
 

Plus de WSO2 (20)

Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Mastering API Lifecycle: Design, Deployment, and Effective Consumption
Mastering API Lifecycle: Design, Deployment, and Effective ConsumptionMastering API Lifecycle: Design, Deployment, and Effective Consumption
Mastering API Lifecycle: Design, Deployment, and Effective Consumption
 
Utilizing Ballerina for Cloud Native Integrations
Utilizing Ballerina for Cloud Native IntegrationsUtilizing Ballerina for Cloud Native Integrations
Utilizing Ballerina for Cloud Native Integrations
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
How to Create a Service in Choreo
How to Create a Service in ChoreoHow to Create a Service in Choreo
How to Create a Service in Choreo
 
Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023
 
Platform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzurePlatform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on Azure
 
GartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfGartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdf
 
[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos Identity
 
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
 
CIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfCIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdf
 
Delivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoDelivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing Choreo
 
Fueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsFueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected Products
 
A Reference Methodology for Agile Digital Businesses
 A Reference Methodology for Agile Digital Businesses A Reference Methodology for Agile Digital Businesses
A Reference Methodology for Agile Digital Businesses
 
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
 
Lessons from the pandemic - From a single use case to true transformation
 Lessons from the pandemic - From a single use case to true transformation Lessons from the pandemic - From a single use case to true transformation
Lessons from the pandemic - From a single use case to true transformation
 

Dernier

Dernier (20)

Foundation First - Why Your Website and Content Matters - David Pisarek
Foundation First - Why Your Website and Content Matters - David PisarekFoundation First - Why Your Website and Content Matters - David Pisarek
Foundation First - Why Your Website and Content Matters - David Pisarek
 
How to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail SuccessHow to Leverage Behavioral Science Insights for Direct Mail Success
How to Leverage Behavioral Science Insights for Direct Mail Success
 
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best PracticesInstant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
 
Pillar-Based Marketing Master Class - Ryan Brock
Pillar-Based Marketing Master Class - Ryan BrockPillar-Based Marketing Master Class - Ryan Brock
Pillar-Based Marketing Master Class - Ryan Brock
 
Digital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew RupertDigital Strategy Master Class - Andrew Rupert
Digital Strategy Master Class - Andrew Rupert
 
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptxDigital-Marketing-Into-by-Zoraiz-Ahmad.pptx
Digital-Marketing-Into-by-Zoraiz-Ahmad.pptx
 
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel LeminTurn Digital Reputation Threats into Offense Tactics - Daniel Lemin
Turn Digital Reputation Threats into Offense Tactics - Daniel Lemin
 
The+State+of+Careers+In+Retention+Marketing-2.pdf
The+State+of+Careers+In+Retention+Marketing-2.pdfThe+State+of+Careers+In+Retention+Marketing-2.pdf
The+State+of+Careers+In+Retention+Marketing-2.pdf
 
Social media, ppt. Features, characteristics
Social media, ppt. Features, characteristicsSocial media, ppt. Features, characteristics
Social media, ppt. Features, characteristics
 
Labour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptxLabour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptx
 
Cash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girlCash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girl
 
Unraveling the Mystery of the Hinterkaifeck Murders.pptx
Unraveling the Mystery of the Hinterkaifeck Murders.pptxUnraveling the Mystery of the Hinterkaifeck Murders.pptx
Unraveling the Mystery of the Hinterkaifeck Murders.pptx
 
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan ScheltgenHow to Create a Social Media Plan Like a Pro - Jordan Scheltgen
How to Create a Social Media Plan Like a Pro - Jordan Scheltgen
 
Unlocking the Mystery of the Voynich Manuscript
Unlocking the Mystery of the Voynich ManuscriptUnlocking the Mystery of the Voynich Manuscript
Unlocking the Mystery of the Voynich Manuscript
 
What is Google Search Console and What is it provide?
What is Google Search Console and What is it provide?What is Google Search Console and What is it provide?
What is Google Search Console and What is it provide?
 
Generative AI Content Creation - Andrew Jenkins
Generative AI Content Creation - Andrew JenkinsGenerative AI Content Creation - Andrew Jenkins
Generative AI Content Creation - Andrew Jenkins
 
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
Generative AI Master Class - Generative AI, Unleash Creative Opportunity - Pe...
 
No Cookies No Problem - Steve Krull, Be Found Online
No Cookies No Problem - Steve Krull, Be Found OnlineNo Cookies No Problem - Steve Krull, Be Found Online
No Cookies No Problem - Steve Krull, Be Found Online
 
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose GuirgisCreator Influencer Strategy Master Class - Corinne Rose Guirgis
Creator Influencer Strategy Master Class - Corinne Rose Guirgis
 
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting GroupSEO Master Class - Steve Wiideman, Wiideman Consulting Group
SEO Master Class - Steve Wiideman, Wiideman Consulting Group
 

WSO2Con EU 2015: Catch Them in the Act: Fraud Detection With WSO2 Analytics Platform

  • 1. Catch  them  in  the  Act   Fraud  Detec+on  with     WSO2  Analy+cs  Pla:orm   Seshika  Fernando   Technical  Lead   WSO2    
  • 2. Bad  News   $4 Trillion in Global Fraud Losses   That’s  5%  of  Global  GDP  
  • 3. Good  News   WSO2  Analy9cs  Pla;orm  +  Domain  Exper9se  ≈  Digital  Sherlock    
  • 4. Domain  Exper+se          Generic  Rules        
  • 5. Typical  Fraudster   •  Use  stolen  cards   •  Buy  Expensive  stuff   •  In  Large  Quan++es   •  Very  quickly   •  At  odd  hours   •  Ship  to  many  places   •  Get  rejected  oSen   Siddhi  Queries  
  • 6.  from    e1  =  Transac+onStream  -­‐>        e2  =  Transac+onStream[e1.cardNo  ==  e2.cardNo]  <2:>    within  5  min    select  e1.cardNo,    e1.txnID,    e2[0].txnID,    e2[1].txnID    insert  into  FraudStream   Transac9on  Velocity  
  • 7. The  False  Posi9ve  Trap   Rich  guy   GiS  giver   Impulse  Shopper   Night  owl   Many  girlfriends?     ๏  So  what  if  I  buy  Expensive  stuff     ๏  And  why  can’t  I  buy  a  lot     ๏  Very  Quickly     ๏  At  odd  hours     ๏  Ship  to  many  places     Blocking  genuine  customers  could  be  counter   produc9ve  and  costly  
  • 8. How  to  avoid  False  Posi9ves   •  Use  combina+ons  of  rules   •  Give  weights  to  each  rule   •  Single  number  that  reflects  many  fraud  indicators   •  Use  a  threshold  to  reject  transac+ons   •  You  just  bought  a  Diamond  Ring?     •  You  bought  20  Diamond  Rings,  in  15  minutes   at  3am  from  an  IP  address  in  Nigeria?    
  • 9. How  to  score   Score  =        0.001  *  itemPrice        +    0.1    *  itemQuan+ty          +    2.5    *  isFreeEmail          +    5    *  riskyCountry                    +    8    *  suspicousIPRange          +    5    *  suspicousUsername      +    3  *  highTransac+onVelocity      
  • 10.     Are  we  safe  ?  
  • 11. Markov  Models   •  Model  randomly  changing  systems   •  Detect  rare  ac+vity  sequences  using   •  Classifica+on   •  Probability  Calcula+on   •  Metric  Calcula+on  
  • 12. Fraud  Detec9on  in  Real-­‐9me   •  Encode  Domain  Knowledge  into  Generic  Rules   •  Use  Fraud  Scoring  to  reduce  False  Posi+ves   •  Use  Markov  Modelling  to  detect  rare  pakerns  
  • 14.
  • 15.
  • 16.
  • 17. Dig  using  Big   •  Provide  access  to  historical  data  to  dig  deeper   •  Make  querying  and  filtering  easy  and  intui+ve     •  Provide  useful  visualiza+ons  to  isolate   incidents  and  unearth  connec+ons  
  • 18. Dashboard   Fraud  Detec9on  Toolkit   Events   Events   Events   Events  
  • 19. Payment  Fraud   Dashboard   Transac+ons   Transac+ons   Transac+ons   Transac+ons   Payment   System  
  • 20. An9  Money  Laundering   Dashboard   Bank  Txns   Bank  Txns   Bank  Txns   Bank  Txns   Core   Banking   System  
  • 21. Iden9ty  Fraud   Dashboard   Events   Events   Events   Events   WSO2   Iden+ty   Server  
  • 22.