The design of FFML: A rule-based policy modelling language for proactive fraud management in financial data streams

Developing fraud management policies and fraud detection systems is a vital capability for financial institutions towards minimising the effect of fraud upon customer service delivery, bottom line financial losses and the adverse impact on the organisation's brand image reputation. Rapidly changing attacks in real-time financial service platforms continue to demonstrate fraudster's ability to actively re-engineer their methods in response to ad hoc security protocol deployments, and highlights the distinct gap between the speed of transaction execution within streaming financial data and corresponding fraud technology frameworks that safeguard the platform. This paper presents the design of FFML, a rule-based policy modelling language and encompassing architecture for facilitating the conceptual level expression and implementation of proactive fraud controls within multi-channel financial service platforms. It is demonstrated how a domain specific language can be used to abstract the financial platform into a data stream based information model to reduce policy modelling complexity and deployment latencies through an innovative policy mapping language usable by both expert and non-expert users. FFML is part of a comprehensive suite of assistive tools and knowledge-based systems developed to support fraud analysts' daily work of designing new high level fraud management policies, mapping into executable code of the underpinning application programming interface and deployment of active monitoring and compliance functionality within the financial platform.

[1]  Diane Lambert,et al.  Detecting fraud in the real world , 2002 .

[2]  Azzedine Boukerche,et al.  Neural Fraud Detection in Mobile Phone Operations , 2000, IPDPS Workshops.

[3]  Michael Stonebraker,et al.  Aurora: a new model and architecture for data stream management , 2003, The VLDB Journal.

[4]  Constantinos S. Hilas,et al.  Testing the Fraud Detection Ability of Different User Profiles by Means of FF-NN Classifiers , 2006, ICANN.

[5]  Akhil Sahai,et al.  Cauldron: a policy-based design tool , 2006, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06).

[6]  David Luckham,et al.  The power of events - an introduction to complex event processing in distributed enterprise systems , 2002, RuleML.

[7]  Kate Smith-Miles,et al.  Adaptive communal detection in search of adversarial identity crime , 2007, DDDM '07.

[8]  Jennifer Widom,et al.  Active Database Systems: Triggers and Rules For Advanced Database Processing , 1994 .

[9]  Philip S. Yu,et al.  Active Mining of Data Streams , 2004, SDM.

[10]  Andreas Reuter,et al.  Transaction Processing: Concepts and Techniques , 1992 .

[11]  Jennifer Widom,et al.  STREAM: the stanford stream data manager (demonstration description) , 2003, SIGMOD '03.

[12]  Hyerim Bae,et al.  Automatic control of workflow processes using ECA rules , 2004, IEEE Transactions on Knowledge and Data Engineering.

[13]  Babis Theodoulidis,et al.  Analysis of stock market manipulations using knowledge discovery techniques applied to intraday trade prices , 2011, Expert Syst. Appl..

[14]  Chang-Tien Lu,et al.  Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.

[15]  Teresa F. Lunt,et al.  A survey of intrusion detection techniques , 1993, Comput. Secur..

[16]  Kemal Bicakci,et al.  One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication , 2003, ISCIS.

[17]  Emil C. Lupu,et al.  The Ponder Policy Specification Language , 2001, POLICY.

[18]  Ying Xing,et al.  The Design of the Borealis Stream Processing Engine , 2005, CIDR.

[19]  Rüdiger W. Brause,et al.  Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.

[20]  Richard J. Sullivan The Changing Nature of US Card Payment Fraud: Issues for Industry and Public Policy , 2010, WEIS.

[21]  Michael Stonebraker,et al.  On rules, procedure, caching and views in data base systems , 1990, SIGMOD '90.

[22]  Michael Stonebraker,et al.  On rules, procedures, caching and views in database systems , 1994, SIGMOD 1994.

[23]  Choong Seon Hong,et al.  A Network Management Architecture Using XML-Based Policy Information Base , 2003, ICOIN.

[24]  John Shawe-Taylor,et al.  Fraud detection and management in mobile telecommunications networks , 1997 .

[25]  Corinna Cortes,et al.  Signature-Based Methods for Data Streams , 2001, Data Mining and Knowledge Discovery.

[26]  Frederick Reiss,et al.  TelegraphCQ: Continuous Dataflow Processing for an Uncertain World , 2003, CIDR.

[27]  Jinoh Kim,et al.  Design and implementation of policy decision point in policy-based network , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).

[28]  Vitalian A. Danciu,et al.  From processes to policies - concepts for large scale policy generation , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).

[29]  Guido Dedene,et al.  Auto claim fraud detection using Bayesian learning neural networks , 2005, Expert Syst. Appl..

[30]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[31]  Arie van Deursen,et al.  Domain-specific languages: an annotated bibliography , 2000, SIGP.

[32]  Steven J. Murdoch,et al.  Thinking Inside the Box: System-Level Failures of Tamper Proofing , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[33]  Pedro R. Falcone Sampaio,et al.  A survey of signature based methods for financial fraud detection , 2009, Comput. Secur..

[34]  Elisa Bertino,et al.  Policy languages for digital identity management in federation systems , 2006, Seventh IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06).

[35]  Axelle Apvrille,et al.  XML distributed security policy for clusters , 2004, Comput. Secur..

[36]  Ronnie Alves,et al.  Establishing Fraud Detection Patterns Based on Signatures , 2006, ICDM.

[37]  Jennifer Widom,et al.  STREAM: The Stanford Stream Data Manager , 2003, IEEE Data Eng. Bull..

[38]  Joseph Bonneau,et al.  What's in a Name? , 2020, Financial Cryptography.

[39]  Tom Fawcett,et al.  Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.

[40]  Jorge Lobo,et al.  A Policy Description Language , 1999, AAAI/IAAI.

[41]  Douglas L. Reilly,et al.  Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.

[42]  Pedro R. Falcone Sampaio,et al.  Specifying and Compiling High Level Financial Fraud Policies into StreamSQL , 2009, ICEIS.

[43]  Bernd Freisleben,et al.  CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).

[44]  Richard John Anthony Policy-based autonomic computing with integral support for self-stabilisation , 2009, Int. J. Auton. Comput..