SlideShare a Scribd company logo
1 of 4
Download to read offline
Traditional fraud prevention tools alone have failed to reduce fraud. In
spite of the myriad companies espousing new fraud prevention techniques,
fraud losses have consistently hovered around $0.06 per $100 for the last
twenty years. Why? Because fraudsters adapt and evolve their techniques
while the legacy technologies used to fight fraud are incapable of adapting
to continuously changing behaviors. While these technologies provide some
benefits, they also suffer from several important limitations in the face of
today’s ever evolving fraud schemes:
Next Generation, Real-Time Fraud Prevention and Profitability Maximization
The economy relies on secure and safe transactions. Maintaining a stable and efficient business depends
on effective security. In particular, eliminating fraud is fundamental to the ongoing viability of many busi-
nesses, especially those buying and selling on the Internet. The question businesses are asking is, “how do
we efficiently eliminate fraud in real-time?”
•	 Popular legacy approaches, including Business Rules, Data Mining and
Neural Networks, all use historical fraud data to train models and write
rules. Using only data from the past limits one’s ability to identify and
stop new fraud schemes. As a result, models and rules are outdated as
soon as they are implemented, requiring expensive tuning and model
refreshes.
•	 These approaches apply the same logic to every entity (card holder,
device, merchant, etc.), although the spending behavior of each entity
differs. In the case of business rules, gaining insight into individual
spending behaviors would require an unimaginable set of rules. Neural
Networks and Data Mining try to extract macroscopic behavioral patterns
from historical data. Solely relying on these approaches results in low
detection and high false positive rates.
•	 Modern fraudsters are exploiting the proliferation of payment
technologies and methods. Financial institutions’ inherent structural
rigidity can often also be a fraudster’s best friend, as silo structures and
delivery channels lead to stove-pipe, myopic anti-fraud strategies that fail
to share intelligence across relevant channels. This is especially important
in today’s connected world, where commerce occurs via a myriad of
channels and devices.
2
THE LIMITATIONS OF LEGACY TECHNOLOGIES
Anyone impressed by the increasing speed and colossal memory capacity of computers will not be able to find in
these, or any other astonishing computer traits, any manifestation of the slightest fragment of intelligence as long
as computer programming remains purely algorithmic.
An algorithmic program is a deductive set of successive operations applied in a fixed order. An algorithm enables
the computer to repeat long suites of logical operations tirelessly and accurately, as long as the algorithm is cor-
rect. An algorithmic program will neither know how to take any initiative nor stray from a fixed line of code. The
programmer must dictate the precise succession of acts for the machine to accomplish. Business problems that
require a minimum amount of reasoning, such as the continuously changing nature of fraud, cannot be tran-
scribed into an algorithmic form. Effective fraud prevention solutions must not rely exclusively on predefined
rules or structured queries to anticipate every possible scenario. This is also true of programs based on Data Min-
ing, Bayesian Networks, Neural Networks, object-oriented languages, etc. In the case of:
•	 Business Rules, you must predict these possibilities by writing all of the possible rules (obviously impossible).
•	 Data Mining, you must generate a decision tree that takes into account all possible cases (obviously
impossible).
•	 Neural Networks, you need to have access and train your system with all the possible patterns (obviously
impossible).
•	 Object-oriented languages, you must foresee, know and program all possible methods (obviously impossible).
THE EXAMPLE OF CHESS
What difference is there between a good game of electronic chess (programmed with all of the known algorith-
mic techniques like MinMax, Alpha-Beta, Scout, Mtd, SSS*, etc.) and an excellent player?
The computer works in “brute force”, working at a prodigious speed to react to the present situation and the
situations that might occur during the next five or six turns; after this line of horizon comes the invisible. Further-
more, the importance of a piece is simply determined by the affectation of a number. For example, it will sacrifice
a pawn to save a knight one time. The knight remaining has once again fooled the computer and distracted it by
this defensive strategy. An algorithm is, in essence, incompatible with the notions of strategies and evolution.
An excellent chess player works by goals and sub-goals. He fixes on an objective strategy from the beginning.
He progressively puts the conditions of the win in place of this objective in working out his strategy in goals and
sub-goals. His moves are therefore at the service of his strategy and not in “brute” response to the situations he
encounters.
33
CHARACTERISTICS OF AN EFFECTIVE REAL-TIME FRAUD PREVENTION SOLUTION
Effective real-time fraud prevention will require technologies characterized by several key features. It should:
1.	 Not rely on predefined rules. Effective fraud prevention solutions cannot rely exclusively on predefined rules,
patterns learned from historical data, or structured queries that try to anticipate every possible scenario as
fraud is constantly evolving.
2.	 Be data agnostic. The proliferation of payment types and methods requires technologies that are flexible and
can manage data in any format (structured and unstructured) and volume.
3.	 Automatically discover important features and associations, create new fields, enrich the data and automati-
cally build and test millions of artificial intelligence and machine learning models in parallel. These models
should then be automatically merged together to create the production ready models, that are extremely
accurate and durable.
4.	 Prevent rather than detect. Solutions that do not provide real real-time capabilities (before authorization) are
inefficient as they do not proactively prevent fraud losses from occurring.
5.	 Analyze the behavior on a 1-to-1 basis. Every individual’s spending behavior is different. Effectively reducing
fraud requires understanding this behavior at an individual level.
6.	 Offer multiple layers of protection. To efficiently prevent fraud, a solution must provide protection at the 	
following layers:
•	 Endpoint and Navigation, using advanced device ID and clickstream analytics.
•	 User and Account, for providing real-time cross-channel behavioral analysis (specific to each individual
cardholder and merchant outlet).
•	 Merchant and Business, for analysis of the relationships among internal and external entities to detect
organized or collusive criminal activities or misuse.
7.	 Maximize Profit. Traditionally, risk models have focused on identifying only fraud, often at the expense of
over-declining transactions. These over declines significantly reduce both customer satisfaction and profits. A
comprehensive solution should combine a decision score that maximizes profitability while minimizing risk by
leveraging payer value at both the account and institution level.
8.	 Adaptively learn over time. Once individual behavior is characterized, the technology should continuously
update these individual profiles to learn behavior over time.
Additionally, a comprehensive solution should be able to identify data breaches within hours of the first fraudu-
lent transactions occurring. A solution must manage two real-time behavioral profiling engines: a card profiling
engine (CPE) and a merchant profiling engine (MPE). The card profiling engine continuously updates the behav-
ioral profiles to learn the behavioral characteristics unique to each cardholder. The CPE uses these profiles to
evaluate every transaction in real-time and assign risk scores. These scores are passed to the MPE, where they
are grouped across multiple dimensions (e.g. specific merchant, branch, location). Within and across each group,
shared behavioral intelligence enables comprehensive profiling of all card behavior for every merchant. Once
suspected merchant breach location(s) are identified, the MPE updates the behavioral profiles for all cards visit-
ing these locations and raises the corresponding risk scores. This approach will enable the discovery of breaches
faster (as soon as the first fraudulent transactions occur).
44
THE BENEFITS OF SMART AGENT TECHNOLOGY
Smart Agents overcome the limits of algorithms. Rather than being pre-programmed to try and anticipate every
possible scenario or relying on pre-trained models, Smart Agents creates profiles specific to each entity (card-
holder, merchant, device, etc.) and adaptively learns from the activities of each entity. Each Smart Agent behaves
according to its goals, observations, acquired knowledge, and interactions with other Smart Agents. Each Smart
Agent pulls all relevant data across multiple channels, irrespective of data type, to produce robust virtual profiles.
Each profile is automatically updated in real-time, and the resulting intelligence is shared across all relevant busi-
ness lines (card present, card not present, ACH, wire, etc.). This 1-to-1 behavioral profiling provides unprecedent-
ed, omni-channel visibility into the behavior of cards and merchants.
Smart Agents enable best-in-class performance with minimal operational and capital resource requirements, as
they focus on extracting only relevant intelligence from data. This enables firms who incorporate Smart Agent
technology to operate efficiently at scale, without the need for expensive databases or high-end hardware. Ad-
ditionally, Smart Agents can represent any entity and work with any data. As a result, a single Smart Agent de-
ployment can provide fraud protection at multiple layers, from endpoints like mobile devices to POS terminals at
merchant outlets.
A complete fraud prevention solution should combine the benefits of existing Artificial Intelligence and Machine
Learning techniques (such as Data Mining, Neural Networks, and Case-based Reasoning), with the unique capabili-
ties of Smart Agent technology. The result is a comprehensive approach that is flexible and adapts to ever-chang-
ing fraud schemes.
ABOUT BRIGHTERION
Brighterion offers the world’s deepest and broadest portfolio of artificial intelligence and machine learning tech-
nologies, providing real-time intelligence that matters from all data sources regardless of type, complexity and
volume. Our technologies are successfully applied in cyber/homeland security, AML, real-time cross-channel fraud
prevention, onboarding and risk monitoring, behavioral device ID, data breach detection, trading strategies and
systems, marketing effectiveness and healthcare.
For more information please email us at corp@brighterion.com or visit Brighterion.com

More Related Content

What's hot

Credit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client PresentationCredit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client PresentationAyapparaj SKS
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber SecurityRishi Kant
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber SecurityRajathV2
 
IRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET Journal
 
Credit card fraud detection using random forest & cart algorithm
Credit card fraud detection using random forest & cart algorithmCredit card fraud detection using random forest & cart algorithm
Credit card fraud detection using random forest & cart algorithmVenkat Projects
 
Fraud Detection in Insurance with Machine Learning for WARTA - Artur Suchwalko
Fraud Detection in Insurance with Machine Learning for WARTA - Artur SuchwalkoFraud Detection in Insurance with Machine Learning for WARTA - Artur Suchwalko
Fraud Detection in Insurance with Machine Learning for WARTA - Artur SuchwalkoInstitute of Contemporary Sciences
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentationHernan Huwyler
 
Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Santhosh L
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurityscoopnewsgroup
 
Streamlining aml processes through automation with ai
Streamlining aml processes through automation with aiStreamlining aml processes through automation with ai
Streamlining aml processes through automation with aiVarun Mittal
 
Cognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityCognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityRishi Kant
 
Predictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detectionPredictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detectionZensar Technologies Ltd.
 
A day in the life of a data scientist in an AI company
A day in the life of a data scientist in an AI companyA day in the life of a data scientist in an AI company
A day in the life of a data scientist in an AI companyFrancesca Lazzeri, PhD
 
Why machine learning is the best way to reduce fraud
Why machine learning is the best way to reduce fraud Why machine learning is the best way to reduce fraud
Why machine learning is the best way to reduce fraud GlobalTechCouncil
 
Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detectionijtsrd
 
Machine Learning in Banking
Machine Learning in Banking Machine Learning in Banking
Machine Learning in Banking vrtanes
 
Impact of machine learning on banking sector
Impact of machine learning on banking sectorImpact of machine learning on banking sector
Impact of machine learning on banking sectorAbhishek Verma
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionJustluk Luk
 

What's hot (20)

Credit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client PresentationCredit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client Presentation
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
IRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine LearningIRJET- Credit Card Fraud Detection using Machine Learning
IRJET- Credit Card Fraud Detection using Machine Learning
 
Credit card fraud detection using random forest & cart algorithm
Credit card fraud detection using random forest & cart algorithmCredit card fraud detection using random forest & cart algorithm
Credit card fraud detection using random forest & cart algorithm
 
Fraud Detection in Insurance with Machine Learning for WARTA - Artur Suchwalko
Fraud Detection in Insurance with Machine Learning for WARTA - Artur SuchwalkoFraud Detection in Insurance with Machine Learning for WARTA - Artur Suchwalko
Fraud Detection in Insurance with Machine Learning for WARTA - Artur Suchwalko
 
Fraud analytics
Fraud analyticsFraud analytics
Fraud analytics
 
Fraud Detection presentation
Fraud Detection presentationFraud Detection presentation
Fraud Detection presentation
 
Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...
 
Practical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in CybersecurityPractical Applications of Machine Learning in Cybersecurity
Practical Applications of Machine Learning in Cybersecurity
 
Streamlining aml processes through automation with ai
Streamlining aml processes through automation with aiStreamlining aml processes through automation with ai
Streamlining aml processes through automation with ai
 
CVtesting
CVtestingCVtesting
CVtesting
 
Cognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityCognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber security
 
Predictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detectionPredictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detection
 
A day in the life of a data scientist in an AI company
A day in the life of a data scientist in an AI companyA day in the life of a data scientist in an AI company
A day in the life of a data scientist in an AI company
 
Why machine learning is the best way to reduce fraud
Why machine learning is the best way to reduce fraud Why machine learning is the best way to reduce fraud
Why machine learning is the best way to reduce fraud
 
Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detection
 
Machine Learning in Banking
Machine Learning in Banking Machine Learning in Banking
Machine Learning in Banking
 
Impact of machine learning on banking sector
Impact of machine learning on banking sectorImpact of machine learning on banking sector
Impact of machine learning on banking sector
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 

Viewers also liked

Кузнецов С.О., Корепанова Н.В. Методы обнаружения знаний в задаче сравнения э...
Кузнецов С.О., Корепанова Н.В. Методы обнаружения знаний в задаче сравнения э...Кузнецов С.О., Корепанова Н.В. Методы обнаружения знаний в задаче сравнения э...
Кузнецов С.О., Корепанова Н.В. Методы обнаружения знаний в задаче сравнения э...bigdatabm
 
Stanje dece u_svetu_2015-sazetak_web
Stanje dece u_svetu_2015-sazetak_webStanje dece u_svetu_2015-sazetak_web
Stanje dece u_svetu_2015-sazetak_webUNICEF Srbija
 
Pivot webform instructions
Pivot webform instructionsPivot webform instructions
Pivot webform instructionsbakason
 
Moodle Generating Science Inquiry Activities - Dr. Mingming Diao
Moodle Generating Science Inquiry Activities - Dr. Mingming DiaoMoodle Generating Science Inquiry Activities - Dr. Mingming Diao
Moodle Generating Science Inquiry Activities - Dr. Mingming DiaoMoodlemootAU2014
 
Diez de velasco introduccion a la historia de las religiones
Diez de velasco   introduccion a la historia de las religionesDiez de velasco   introduccion a la historia de las religiones
Diez de velasco introduccion a la historia de las religionesPatricio Jofre
 
Fiona Watts - ASQA? Moodle makes it easier.
Fiona Watts - ASQA? Moodle makes it easier.Fiona Watts - ASQA? Moodle makes it easier.
Fiona Watts - ASQA? Moodle makes it easier.MoodlemootAU2014
 
Faculty of Health Sciences/Faculty of health sciences yearbook 2014
Faculty of Health Sciences/Faculty of health sciences   yearbook 2014Faculty of Health Sciences/Faculty of health sciences   yearbook 2014
Faculty of Health Sciences/Faculty of health sciences yearbook 2014University of Pretoria
 
Student Progress Reports – beyond ticking the boxes - Lindy Klein
Student Progress Reports – beyond ticking the boxes - Lindy KleinStudent Progress Reports – beyond ticking the boxes - Lindy Klein
Student Progress Reports – beyond ticking the boxes - Lindy KleinMoodlemootAU2014
 
Pole Dancing Myths - Poleates
Pole Dancing Myths - PoleatesPole Dancing Myths - Poleates
Pole Dancing Myths - PoleatesDee Heath
 
Krishkare Infrared thermometer F03B Hindi Manual
Krishkare Infrared thermometer F03B Hindi ManualKrishkare Infrared thermometer F03B Hindi Manual
Krishkare Infrared thermometer F03B Hindi Manualkrishkare.com
 
手のひらで動くCloudtack
手のひらで動くCloudtack手のひらで動くCloudtack
手のひらで動くCloudtacksigsig_jp
 
Faculty of Humanities/Humanities (undergraduate)-2014
Faculty of Humanities/Humanities (undergraduate)-2014Faculty of Humanities/Humanities (undergraduate)-2014
Faculty of Humanities/Humanities (undergraduate)-2014University of Pretoria
 

Viewers also liked (18)

Кузнецов С.О., Корепанова Н.В. Методы обнаружения знаний в задаче сравнения э...
Кузнецов С.О., Корепанова Н.В. Методы обнаружения знаний в задаче сравнения э...Кузнецов С.О., Корепанова Н.В. Методы обнаружения знаний в задаче сравнения э...
Кузнецов С.О., Корепанова Н.В. Методы обнаружения знаний в задаче сравнения э...
 
Singapore company incorporation consultants pte ltd
Singapore company incorporation consultants pte ltd Singapore company incorporation consultants pte ltd
Singapore company incorporation consultants pte ltd
 
Stanje dece u_svetu_2015-sazetak_web
Stanje dece u_svetu_2015-sazetak_webStanje dece u_svetu_2015-sazetak_web
Stanje dece u_svetu_2015-sazetak_web
 
Pivot webform instructions
Pivot webform instructionsPivot webform instructions
Pivot webform instructions
 
Moodle Generating Science Inquiry Activities - Dr. Mingming Diao
Moodle Generating Science Inquiry Activities - Dr. Mingming DiaoMoodle Generating Science Inquiry Activities - Dr. Mingming Diao
Moodle Generating Science Inquiry Activities - Dr. Mingming Diao
 
Diez de velasco introduccion a la historia de las religiones
Diez de velasco   introduccion a la historia de las religionesDiez de velasco   introduccion a la historia de las religiones
Diez de velasco introduccion a la historia de las religiones
 
Fiona Watts - ASQA? Moodle makes it easier.
Fiona Watts - ASQA? Moodle makes it easier.Fiona Watts - ASQA? Moodle makes it easier.
Fiona Watts - ASQA? Moodle makes it easier.
 
Faculty of Health Sciences/Faculty of health sciences yearbook 2014
Faculty of Health Sciences/Faculty of health sciences   yearbook 2014Faculty of Health Sciences/Faculty of health sciences   yearbook 2014
Faculty of Health Sciences/Faculty of health sciences yearbook 2014
 
Training-Brochure
Training-BrochureTraining-Brochure
Training-Brochure
 
Student Progress Reports – beyond ticking the boxes - Lindy Klein
Student Progress Reports – beyond ticking the boxes - Lindy KleinStudent Progress Reports – beyond ticking the boxes - Lindy Klein
Student Progress Reports – beyond ticking the boxes - Lindy Klein
 
Pole Dancing Myths - Poleates
Pole Dancing Myths - PoleatesPole Dancing Myths - Poleates
Pole Dancing Myths - Poleates
 
CEO Club Ukraine Booklet
CEO Club Ukraine BookletCEO Club Ukraine Booklet
CEO Club Ukraine Booklet
 
Poklon od marije
Poklon od marijePoklon od marije
Poklon od marije
 
Krishkare Infrared thermometer F03B Hindi Manual
Krishkare Infrared thermometer F03B Hindi ManualKrishkare Infrared thermometer F03B Hindi Manual
Krishkare Infrared thermometer F03B Hindi Manual
 
手のひらで動くCloudtack
手のひらで動くCloudtack手のひらで動くCloudtack
手のひらで動くCloudtack
 
Faculty of Humanities/Humanities (undergraduate)-2014
Faculty of Humanities/Humanities (undergraduate)-2014Faculty of Humanities/Humanities (undergraduate)-2014
Faculty of Humanities/Humanities (undergraduate)-2014
 
Faculty of Theology/Theology 2014 (1)
Faculty of Theology/Theology 2014 (1)Faculty of Theology/Theology 2014 (1)
Faculty of Theology/Theology 2014 (1)
 
MArketing_Design_Project
MArketing_Design_ProjectMArketing_Design_Project
MArketing_Design_Project
 

Similar to Brighterion bai july 2016 fraud white paper

Machine Learning in Banking
Machine Learning in BankingMachine Learning in Banking
Machine Learning in Bankingaccenture
 
A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...
A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...
A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...Shakas Technologies
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET Journal
 
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxShare Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxyatintaneja6
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
shyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptx
shyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptxshyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptx
shyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptxShyamaprasadMS
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSIRJET Journal
 
Nasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningNasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningRatnakar Pandey
 
RSB72-PPT.pptx
RSB72-PPT.pptxRSB72-PPT.pptx
RSB72-PPT.pptxAryanGour1
 
IRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud DetectionIRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud DetectionIRJET Journal
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning TechniquesIRJET Journal
 
IRJET- Credit Card Fraud Detection using Random Forest
IRJET-  	  Credit Card Fraud Detection using Random ForestIRJET-  	  Credit Card Fraud Detection using Random Forest
IRJET- Credit Card Fraud Detection using Random ForestIRJET Journal
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...Institute of Contemporary Sciences
 
Market Abuse Detection
Market Abuse DetectionMarket Abuse Detection
Market Abuse DetectionRaja Das
 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...IRJET Journal
 
Artificial Intelligence Primer
Artificial Intelligence PrimerArtificial Intelligence Primer
Artificial Intelligence PrimerImam Hoque
 

Similar to Brighterion bai july 2016 fraud white paper (20)

Machine Learning in Banking
Machine Learning in BankingMachine Learning in Banking
Machine Learning in Banking
 
A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...
A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...
A_New_Framework_for_Fraud_Detection_in_Bitcoin_Transactions_Through_Ensemble_...
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxShare Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
Project PPT sem 2.pptx
Project PPT sem 2.pptxProject PPT sem 2.pptx
Project PPT sem 2.pptx
 
shyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptx
shyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptxshyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptx
shyampresentaaaaaaaaaaaaaaaaaaaaaaa.pptx
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
 
Nasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learningNasscom how can you identify fraud in fintech lending using deep learning
Nasscom how can you identify fraud in fintech lending using deep learning
 
IBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insuranceIBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insurance
 
RSB72-PPT.pptx
RSB72-PPT.pptxRSB72-PPT.pptx
RSB72-PPT.pptx
 
Fraud management
Fraud managementFraud management
Fraud management
 
IRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud DetectionIRJET- Survey on Credit Card Fraud Detection
IRJET- Survey on Credit Card Fraud Detection
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
 
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptxCredit Card Fraud Detection_ Mansi_Choudhary.pptx
Credit Card Fraud Detection_ Mansi_Choudhary.pptx
 
IRJET- Credit Card Fraud Detection using Random Forest
IRJET-  	  Credit Card Fraud Detection using Random ForestIRJET-  	  Credit Card Fraud Detection using Random Forest
IRJET- Credit Card Fraud Detection using Random Forest
 
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...Ai and machine learning help detect, predict and prevent fraud -  IBM Watson ...
Ai and machine learning help detect, predict and prevent fraud - IBM Watson ...
 
Market Abuse Detection
Market Abuse DetectionMarket Abuse Detection
Market Abuse Detection
 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
 
Artificial Intelligence Primer
Artificial Intelligence PrimerArtificial Intelligence Primer
Artificial Intelligence Primer
 

Recently uploaded

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 

Recently uploaded (20)

Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 

Brighterion bai july 2016 fraud white paper

  • 1. Traditional fraud prevention tools alone have failed to reduce fraud. In spite of the myriad companies espousing new fraud prevention techniques, fraud losses have consistently hovered around $0.06 per $100 for the last twenty years. Why? Because fraudsters adapt and evolve their techniques while the legacy technologies used to fight fraud are incapable of adapting to continuously changing behaviors. While these technologies provide some benefits, they also suffer from several important limitations in the face of today’s ever evolving fraud schemes: Next Generation, Real-Time Fraud Prevention and Profitability Maximization The economy relies on secure and safe transactions. Maintaining a stable and efficient business depends on effective security. In particular, eliminating fraud is fundamental to the ongoing viability of many busi- nesses, especially those buying and selling on the Internet. The question businesses are asking is, “how do we efficiently eliminate fraud in real-time?” • Popular legacy approaches, including Business Rules, Data Mining and Neural Networks, all use historical fraud data to train models and write rules. Using only data from the past limits one’s ability to identify and stop new fraud schemes. As a result, models and rules are outdated as soon as they are implemented, requiring expensive tuning and model refreshes. • These approaches apply the same logic to every entity (card holder, device, merchant, etc.), although the spending behavior of each entity differs. In the case of business rules, gaining insight into individual spending behaviors would require an unimaginable set of rules. Neural Networks and Data Mining try to extract macroscopic behavioral patterns from historical data. Solely relying on these approaches results in low detection and high false positive rates. • Modern fraudsters are exploiting the proliferation of payment technologies and methods. Financial institutions’ inherent structural rigidity can often also be a fraudster’s best friend, as silo structures and delivery channels lead to stove-pipe, myopic anti-fraud strategies that fail to share intelligence across relevant channels. This is especially important in today’s connected world, where commerce occurs via a myriad of channels and devices.
  • 2. 2 THE LIMITATIONS OF LEGACY TECHNOLOGIES Anyone impressed by the increasing speed and colossal memory capacity of computers will not be able to find in these, or any other astonishing computer traits, any manifestation of the slightest fragment of intelligence as long as computer programming remains purely algorithmic. An algorithmic program is a deductive set of successive operations applied in a fixed order. An algorithm enables the computer to repeat long suites of logical operations tirelessly and accurately, as long as the algorithm is cor- rect. An algorithmic program will neither know how to take any initiative nor stray from a fixed line of code. The programmer must dictate the precise succession of acts for the machine to accomplish. Business problems that require a minimum amount of reasoning, such as the continuously changing nature of fraud, cannot be tran- scribed into an algorithmic form. Effective fraud prevention solutions must not rely exclusively on predefined rules or structured queries to anticipate every possible scenario. This is also true of programs based on Data Min- ing, Bayesian Networks, Neural Networks, object-oriented languages, etc. In the case of: • Business Rules, you must predict these possibilities by writing all of the possible rules (obviously impossible). • Data Mining, you must generate a decision tree that takes into account all possible cases (obviously impossible). • Neural Networks, you need to have access and train your system with all the possible patterns (obviously impossible). • Object-oriented languages, you must foresee, know and program all possible methods (obviously impossible). THE EXAMPLE OF CHESS What difference is there between a good game of electronic chess (programmed with all of the known algorith- mic techniques like MinMax, Alpha-Beta, Scout, Mtd, SSS*, etc.) and an excellent player? The computer works in “brute force”, working at a prodigious speed to react to the present situation and the situations that might occur during the next five or six turns; after this line of horizon comes the invisible. Further- more, the importance of a piece is simply determined by the affectation of a number. For example, it will sacrifice a pawn to save a knight one time. The knight remaining has once again fooled the computer and distracted it by this defensive strategy. An algorithm is, in essence, incompatible with the notions of strategies and evolution. An excellent chess player works by goals and sub-goals. He fixes on an objective strategy from the beginning. He progressively puts the conditions of the win in place of this objective in working out his strategy in goals and sub-goals. His moves are therefore at the service of his strategy and not in “brute” response to the situations he encounters.
  • 3. 33 CHARACTERISTICS OF AN EFFECTIVE REAL-TIME FRAUD PREVENTION SOLUTION Effective real-time fraud prevention will require technologies characterized by several key features. It should: 1. Not rely on predefined rules. Effective fraud prevention solutions cannot rely exclusively on predefined rules, patterns learned from historical data, or structured queries that try to anticipate every possible scenario as fraud is constantly evolving. 2. Be data agnostic. The proliferation of payment types and methods requires technologies that are flexible and can manage data in any format (structured and unstructured) and volume. 3. Automatically discover important features and associations, create new fields, enrich the data and automati- cally build and test millions of artificial intelligence and machine learning models in parallel. These models should then be automatically merged together to create the production ready models, that are extremely accurate and durable. 4. Prevent rather than detect. Solutions that do not provide real real-time capabilities (before authorization) are inefficient as they do not proactively prevent fraud losses from occurring. 5. Analyze the behavior on a 1-to-1 basis. Every individual’s spending behavior is different. Effectively reducing fraud requires understanding this behavior at an individual level. 6. Offer multiple layers of protection. To efficiently prevent fraud, a solution must provide protection at the following layers: • Endpoint and Navigation, using advanced device ID and clickstream analytics. • User and Account, for providing real-time cross-channel behavioral analysis (specific to each individual cardholder and merchant outlet). • Merchant and Business, for analysis of the relationships among internal and external entities to detect organized or collusive criminal activities or misuse. 7. Maximize Profit. Traditionally, risk models have focused on identifying only fraud, often at the expense of over-declining transactions. These over declines significantly reduce both customer satisfaction and profits. A comprehensive solution should combine a decision score that maximizes profitability while minimizing risk by leveraging payer value at both the account and institution level. 8. Adaptively learn over time. Once individual behavior is characterized, the technology should continuously update these individual profiles to learn behavior over time. Additionally, a comprehensive solution should be able to identify data breaches within hours of the first fraudu- lent transactions occurring. A solution must manage two real-time behavioral profiling engines: a card profiling engine (CPE) and a merchant profiling engine (MPE). The card profiling engine continuously updates the behav- ioral profiles to learn the behavioral characteristics unique to each cardholder. The CPE uses these profiles to evaluate every transaction in real-time and assign risk scores. These scores are passed to the MPE, where they are grouped across multiple dimensions (e.g. specific merchant, branch, location). Within and across each group, shared behavioral intelligence enables comprehensive profiling of all card behavior for every merchant. Once suspected merchant breach location(s) are identified, the MPE updates the behavioral profiles for all cards visit- ing these locations and raises the corresponding risk scores. This approach will enable the discovery of breaches faster (as soon as the first fraudulent transactions occur).
  • 4. 44 THE BENEFITS OF SMART AGENT TECHNOLOGY Smart Agents overcome the limits of algorithms. Rather than being pre-programmed to try and anticipate every possible scenario or relying on pre-trained models, Smart Agents creates profiles specific to each entity (card- holder, merchant, device, etc.) and adaptively learns from the activities of each entity. Each Smart Agent behaves according to its goals, observations, acquired knowledge, and interactions with other Smart Agents. Each Smart Agent pulls all relevant data across multiple channels, irrespective of data type, to produce robust virtual profiles. Each profile is automatically updated in real-time, and the resulting intelligence is shared across all relevant busi- ness lines (card present, card not present, ACH, wire, etc.). This 1-to-1 behavioral profiling provides unprecedent- ed, omni-channel visibility into the behavior of cards and merchants. Smart Agents enable best-in-class performance with minimal operational and capital resource requirements, as they focus on extracting only relevant intelligence from data. This enables firms who incorporate Smart Agent technology to operate efficiently at scale, without the need for expensive databases or high-end hardware. Ad- ditionally, Smart Agents can represent any entity and work with any data. As a result, a single Smart Agent de- ployment can provide fraud protection at multiple layers, from endpoints like mobile devices to POS terminals at merchant outlets. A complete fraud prevention solution should combine the benefits of existing Artificial Intelligence and Machine Learning techniques (such as Data Mining, Neural Networks, and Case-based Reasoning), with the unique capabili- ties of Smart Agent technology. The result is a comprehensive approach that is flexible and adapts to ever-chang- ing fraud schemes. ABOUT BRIGHTERION Brighterion offers the world’s deepest and broadest portfolio of artificial intelligence and machine learning tech- nologies, providing real-time intelligence that matters from all data sources regardless of type, complexity and volume. Our technologies are successfully applied in cyber/homeland security, AML, real-time cross-channel fraud prevention, onboarding and risk monitoring, behavioral device ID, data breach detection, trading strategies and systems, marketing effectiveness and healthcare. For more information please email us at corp@brighterion.com or visit Brighterion.com