4
Tradional fraud prevenon tools alone have failed to reduce fraud. In spite of the myriad companies espousing new fraud prevenon techniques, fraud losses have consistently hovered around $0.06 per $100 for the last twenty years. Why? Because fraudsters adapt and evolve their techniques while the legacy technologies used to fight fraud are incapable of adapng to connuously changing behaviors. While these technologies provide some benefits, they also suffer from several important limitaons in the face of today’s ever evolving fraud schemes: Next Generation, Real-Time Fraud Prevention and Profitability Maximization The economy relies on secure and safe transacons. Maintaining a stable and efficient business depends on effecve security. In parcular, eliminang fraud is fundamental to the ongoing viability of many busi- nesses, especially those buying and selling on the Internet. The queson businesses are asking is, “how do we efficiently eliminate fraud in real-me?” Popular legacy approaches, including Business Rules, Data Mining and Neural Networks, all use historical fraud data to train models and write rules. Using only data from the past limits one’s ability to idenfy and stop new fraud schemes. As a result, models and rules are outdated as soon as they are implemented, requiring expensive tuning and model refreshes. These approaches apply the same logic to every enty (card holder, device, merchant, etc.), although the spending behavior of each enty differs. In the case of business rules, gaining insight into individual spending behaviors would require an unimaginable set of rules. Neural Networks and Data Mining try to extract macroscopic behavioral paerns from historical data. Solely relying on these approaches results in low detecon and high false posive rates. Modern fraudsters are exploing the proliferaon of payment technologies and methods. Financial instuons’ inherent structural rigidity can oſten also be a fraudster’s best friend, as silo structures and delivery channels lead to stove-pipe, myopic an-fraud strategies that fail to share intelligence across relevant channels. This is especially important in today’s connected world, where commerce occurs via a myriad of channels and devices.

Brighterion bai july 2016 fraud white paper

Embed Size (px)

Citation preview

Page 1: Brighterion bai july 2016 fraud white paper

Traditional fraud prevention tools alone have failed to reduce fraud. In spite of the myriad companies espousing new fraud prevention techniques, fraud losses have consistently hovered around $0.06 per $100 for the last twenty years. Why? Because fraudsters adapt and evolve their techniques while the legacy technologies used to fight fraud are incapable of adapting to continuously changing behaviors. While these technologies provide some benefits, they also suffer from several important limitations in the face of today’s ever evolving fraud schemes:

Next Generation, Real-Time Fraud Prevention and Profitability Maximization

The economy relies on secure and safe transactions. Maintaining a stable and efficient business depends on effective security. In particular, eliminating fraud is fundamental to the ongoing viability of many busi-nesses, especially those buying and selling on the Internet. The question businesses are asking is, “how do we efficiently eliminate fraud in real-time?”

• Popular legacy approaches, including Business Rules, Data Mining and Neural Networks, all use historical fraud data to train models and write rules. Using only data from the past limits one’s ability to identify and stop new fraud schemes. As a result, models and rules are outdated as soon as they are implemented, requiring expensive tuning and model refreshes.

• These approaches apply the same logic to every entity (card holder, device, merchant, etc.), although the spending behavior of each entity differs. In the case of business rules, gaining insight into individual spending behaviors would require an unimaginable set of rules. Neural Networks and Data Mining try to extract macroscopic behavioral patterns from historical data. Solely relying on these approaches results in low detection and high false positive rates.

• Modern fraudsters are exploiting the proliferation of payment technologies and methods. Financial institutions’ inherent structural rigidity can often also be a fraudster’s best friend, as silo structures and delivery channels lead to stove-pipe, myopic anti-fraud strategies that fail to share intelligence across relevant channels. This is especially important in today’s connected world, where commerce occurs via a myriad of channels and devices.

Page 2: Brighterion bai july 2016 fraud white paper

2

THE LIMITATIONS OF LEGACY TECHNOLOGIES

Anyone impressed by the increasing speed and colossal memory capacity of computers will not be able to find in these, or any other astonishing computer traits, any manifestation of the slightest fragment of intelligence as long as computer programming remains purely algorithmic.

An algorithmic program is a deductive set of successive operations applied in a fixed order. An algorithm enables the computer to repeat long suites of logical operations tirelessly and accurately, as long as the algorithm is cor-rect. An algorithmic program will neither know how to take any initiative nor stray from a fixed line of code. The programmer must dictate the precise succession of acts for the machine to accomplish. Business problems that require a minimum amount of reasoning, such as the continuously changing nature of fraud, cannot be tran-scribed into an algorithmic form. Effective fraud prevention solutions must not rely exclusively on predefined rules or structured queries to anticipate every possible scenario. This is also true of programs based on Data Min-ing, Bayesian Networks, Neural Networks, object-oriented languages, etc. In the case of:

• Business Rules, you must predict these possibilities by writing all of the possible rules (obviously impossible).

• Data Mining, you must generate a decision tree that takes into account all possible cases (obviously impossible).

• Neural Networks, you need to have access and train your system with all the possible patterns (obviously impossible).

• Object-oriented languages, you must foresee, know and program all possible methods (obviously impossible).

THE EXAMPLE OF CHESS

What difference is there between a good game of electronic chess (programmed with all of the known algorith-mic techniques like MinMax, Alpha-Beta, Scout, Mtd, SSS*, etc.) and an excellent player?

The computer works in “brute force”, working at a prodigious speed to react to the present situation and the situations that might occur during the next five or six turns; after this line of horizon comes the invisible. Further-more, the importance of a piece is simply determined by the affectation of a number. For example, it will sacrifice a pawn to save a knight one time. The knight remaining has once again fooled the computer and distracted it by this defensive strategy. An algorithm is, in essence, incompatible with the notions of strategies and evolution.

An excellent chess player works by goals and sub-goals. He fixes on an objective strategy from the beginning. He progressively puts the conditions of the win in place of this objective in working out his strategy in goals and sub-goals. His moves are therefore at the service of his strategy and not in “brute” response to the situations he encounters.

Page 3: Brighterion bai july 2016 fraud white paper

33

CHARACTERISTICS OF AN EFFECTIVE REAL-TIME FRAUD PREVENTION SOLUTION

Effective real-time fraud prevention will require technologies characterized by several key features. It should:

1. Not rely on predefined rules. Effective fraud prevention solutions cannot rely exclusively on predefined rules, patterns learned from historical data, or structured queries that try to anticipate every possible scenario as fraud is constantly evolving.

2. Be data agnostic. The proliferation of payment types and methods requires technologies that are flexible and can manage data in any format (structured and unstructured) and volume.

3. Automatically discover important features and associations, create new fields, enrich the data and automati-cally build and test millions of artificial intelligence and machine learning models in parallel. These models should then be automatically merged together to create the production ready models, that are extremely accurate and durable.

4. Prevent rather than detect. Solutions that do not provide real real-time capabilities (before authorization) are inefficient as they do not proactively prevent fraud losses from occurring.

5. Analyze the behavior on a 1-to-1 basis. Every individual’s spending behavior is different. Effectively reducing fraud requires understanding this behavior at an individual level.

6. Offer multiple layers of protection. To efficiently prevent fraud, a solution must provide protection at the following layers:• Endpoint and Navigation, using advanced device ID and clickstream analytics.• User and Account, for providing real-time cross-channel behavioral analysis (specific to each individual

cardholder and merchant outlet).• Merchant and Business, for analysis of the relationships among internal and external entities to detect

organized or collusive criminal activities or misuse. 7. Maximize Profit. Traditionally, risk models have focused on identifying only fraud, often at the expense of

over-declining transactions. These over declines significantly reduce both customer satisfaction and profits. A comprehensive solution should combine a decision score that maximizes profitability while minimizing risk by leveraging payer value at both the account and institution level.

8. Adaptively learn over time. Once individual behavior is characterized, the technology should continuously update these individual profiles to learn behavior over time.

Additionally, a comprehensive solution should be able to identify data breaches within hours of the first fraudu-lent transactions occurring. A solution must manage two real-time behavioral profiling engines: a card profiling engine (CPE) and a merchant profiling engine (MPE). The card profiling engine continuously updates the behav-ioral profiles to learn the behavioral characteristics unique to each cardholder. The CPE uses these profiles to evaluate every transaction in real-time and assign risk scores. These scores are passed to the MPE, where they are grouped across multiple dimensions (e.g. specific merchant, branch, location). Within and across each group, shared behavioral intelligence enables comprehensive profiling of all card behavior for every merchant. Once suspected merchant breach location(s) are identified, the MPE updates the behavioral profiles for all cards visit-ing these locations and raises the corresponding risk scores. This approach will enable the discovery of breaches faster (as soon as the first fraudulent transactions occur).

Page 4: Brighterion bai july 2016 fraud white paper

44

THE BENEFITS OF SMART AGENT TECHNOLOGY

Smart Agents overcome the limits of algorithms. Rather than being pre-programmed to try and anticipate every possible scenario or relying on pre-trained models, Smart Agents creates profiles specific to each entity (card-holder, merchant, device, etc.) and adaptively learns from the activities of each entity. Each Smart Agent behaves according to its goals, observations, acquired knowledge, and interactions with other Smart Agents. Each Smart Agent pulls all relevant data across multiple channels, irrespective of data type, to produce robust virtual profiles. Each profile is automatically updated in real-time, and the resulting intelligence is shared across all relevant busi-ness lines (card present, card not present, ACH, wire, etc.). This 1-to-1 behavioral profiling provides unprecedent-ed, omni-channel visibility into the behavior of cards and merchants.

Smart Agents enable best-in-class performance with minimal operational and capital resource requirements, as they focus on extracting only relevant intelligence from data. This enables firms who incorporate Smart Agent technology to operate efficiently at scale, without the need for expensive databases or high-end hardware. Ad-ditionally, Smart Agents can represent any entity and work with any data. As a result, a single Smart Agent de-ployment can provide fraud protection at multiple layers, from endpoints like mobile devices to POS terminals at merchant outlets.

A complete fraud prevention solution should combine the benefits of existing Artificial Intelligence and Machine Learning techniques (such as Data Mining, Neural Networks, and Case-based Reasoning), with the unique capabili-ties of Smart Agent technology. The result is a comprehensive approach that is flexible and adapts to ever-chang-ing fraud schemes.

ABOUT BRIGHTERION

Brighterion offers the world’s deepest and broadest portfolio of artificial intelligence and machine learning tech-nologies, providing real-time intelligence that matters from all data sources regardless of type, complexity and volume. Our technologies are successfully applied in cyber/homeland security, AML, real-time cross-channel fraud prevention, onboarding and risk monitoring, behavioral device ID, data breach detection, trading strategies and systems, marketing effectiveness and healthcare.

For more information please email us at [email protected] or visit Brighterion.com