Towards a Proactive Fraud Management Framework for Financial Data Streams

Effective and efficient fraud prevention is a core capability required from financial institutions towards detecting and minimizing losses due to unlawful transactions. With the ubiquitous availability of unmanned customer interaction channels (e.g., Internet and mobile banking), the challenge of controlling fraud has increased substantially demanding fraud management frameworks capable of providing fraud analysts with effective mechanisms for defining fraud policies, and system architectures for large scale real-time screening of click stream data, arising from multiple channels at differing time windows. In this paper we describe a fraud management framework encompassing a rule-based financial fraud modelling language (FFML) for conceptual level modelling and validation of fraud policies and a fraud prevention architecture based on implementing fraud policies using StreamSQL, a novel and emerging standard for processing real-time data streams. A key element of the framework is the attempt to detect fraud proactively, blocking transactions encompassing suspicious click stream patterns. The framework described in this paper is being developed as an integral part of the FSA compliance program within the SpartaPay payment gateway, a multi-channel financial platform for managing micropayments.

[1]  Azzedine Boukerche,et al.  Neural Fraud Detection in Mobile Phone Operations , 2000, IPDPS Workshops.

[2]  Michael Stonebraker,et al.  Aurora: a new model and architecture for data stream management , 2003, The VLDB Journal.

[3]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[4]  David Luckham,et al.  The power of events - an introduction to complex event processing in distributed enterprise systems , 2002, RuleML.

[5]  Satish K. Tripathi,et al.  A routing framework for providing robustness to node failures in mobile ad hoc networks , 2004, Ad Hoc Networks.

[6]  Jennifer Widom,et al.  STREAM: The Stanford Stream Data Manager , 2003, IEEE Data Eng. Bull..

[7]  John Shawe-Taylor,et al.  An Unsupervised Neural Network Approach to Profiling the Behavior of Mobile Phone Users for Use in Fraud Detection , 2001, J. Parallel Distributed Comput..

[8]  Dipak Ghosal,et al.  Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges , 2003, MASCOTS Tutorials.

[9]  Sung-Ju Lee,et al.  Split multipath routing with maximally disjoint paths in ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[10]  Diane Lambert,et al.  Detecting fraud in the real world , 2002 .

[11]  Fabio Casati,et al.  Chapter 79 – Business Process Cockpit: Extended Abstract , 2002, VLDB 2002.

[12]  Farooq Anjum,et al.  Security for Wireless Ad Hoc Networks: Anjum/Ad hoc Networks , 2007 .

[13]  Tom Fawcett,et al.  Adaptive Fraud Detection , 1997, Data Mining and Knowledge Discovery.

[14]  Óscar Corcho,et al.  SWS for Financial Overdrawn Alerting , 2004, SEMWEB.

[15]  Mike Burmester,et al.  Secure multipath communication in mobile ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[16]  Sung-Ju Lee,et al.  AODV-BR: backup routing in ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).

[17]  Lae-Jeong Park Learning of Neural Networks for Fraud Detection Based on a Partial Area Under Curve , 2005, ISNN.

[18]  David J. Hand,et al.  Statistical fraud detection: A review , 2002 .

[19]  A. Yasinsac,et al.  Identifying flaws in the secure routing protocol , 2003, Conference Proceedings of the 2003 IEEE International Performance, Computing, and Communications Conference, 2003..

[20]  Fabio Casati,et al.  Business Process Cockpit , 2002, VLDB.

[21]  Douglas L. Reilly,et al.  Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.

[22]  Jennifer Widom,et al.  The CQL continuous query language: semantic foundations and query execution , 2006, The VLDB Journal.

[23]  Corinna Cortes,et al.  Signature-Based Methods for Data Streams , 2001, Data Mining and Knowledge Discovery.

[24]  Pedro A. Ortega,et al.  A Medical Claim Fraud/Abuse Detection System based on Data Mining: A Case Study in Chile , 2006, DMIN.

[25]  Panayiotis Kotzanikolaou,et al.  Secure Multipath Routing for Mobile Ad Hoc Networks , 2005, Second Annual Conference on Wireless On-demand Network Systems and Services.

[26]  Chang-Tien Lu,et al.  Survey of fraud detection techniques , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.

[27]  S. V. Raghavan,et al.  SMORT: Scalable multipath on-demand routing for mobile ad hoc networks , 2007, Ad Hoc Networks.

[28]  Jun-Jang Jeng,et al.  RuleBAM: a rule-based framework for business activity management , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.

[29]  Kemal Bicakci,et al.  One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication , 2003, ISCIS.

[30]  Rüdiger W. Brause,et al.  Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.

[31]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[32]  Samir Ranjan Das,et al.  Performance of Multipath Routing for On-Demand Protocols in Mobile Ad Hoc Networks , 2001, Mob. Networks Appl..

[33]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[34]  John J. McCarthy,et al.  The Rule Engine for the Java Platform , 2008 .

[35]  Anne Rogers,et al.  Hancock: a language for extracting signatures from data streams , 2000, KDD '00.

[36]  Ronnie Alves,et al.  Establishing Fraud Detection Patterns Based on Signatures , 2006, ICDM.

[37]  Mahesh K. Marina,et al.  Ad hoc on-demand multipath distance vector routing , 2006, Wirel. Commun. Mob. Comput..

[38]  Guido Dedene,et al.  Auto claim fraud detection using Bayesian learning neural networks , 2005, Expert Syst. Appl..