SlideShare a Scribd company logo
1 of 16
1
Jānis Grabis
Arturs Rasnacis
SIMULATION BASED
EVALUATION AND TUNING OF
DISTRIBUTED FRAUD
DETECTION ALGORITHM
Institute of Information Technology, Riga Technical University, Latvia
SIA TrustSearch, Latvia
22
 Community and crowdsourcing based
fraud detection
– CryptoPolice.com > TheTrustSearch.com
 Complex internal dynamics and emergent
collective behavior
 Blockchain as a reward mechanism
Background
3
 Simulation is a suitable technique
dynamics in communities (Bernon
et al. 2007; Aiello et al. 2017)
 The incentives play a major role in
maintaining a viable community
(Chia 2011)
– Blockchains are a suitable
technology (Cai and Zhu
2016)
 Recent simulation studies on
security concerns in distributed
systems (Lee and Wei, 2016;
Panagopoulos et al. 2017)
 Evaluations should be accurate
 Evaluation results should be
obtained as fast as possible
 The optimal number of experts
should be involved
Requirements
Existing Work
44
Objective
• An agent-based approach is used to build the
simulation model
• Decision-making accuracy and response time
are evaluated
To develop a simulation model of the community
based fraud detection algorithm and to conduct
experimental studies to tune the parameters of this
algorithm
55
Community management platform
Community based fraud
detection
Internet user Fraud
application
Issue verdicts
Blockchain – storage of
approved verdicts and
reward
Community of
officers
Multi-stage
evaluation
66
Fraud detection process
Submit
application
Allocate to L1
officers
Issue verdicts
at L1
Evaluate
verdicts at L2
Gather
approvals at
L3
Issue final
decision
Approvals
received
• L1 level officers issue a verdict on
accepting or rejecting the application
• L2 level officers either accept or
reject the verdict
• L3 level officers make the final
approval level by voting
• The verdict is approved as soon as a
number of votes are received
77
Agent based simulation
approach
Officers are
characterized by
their ability to make
correct decisions
88
L3L2
L1
Simulation model
Generate
application
(P correct)
v3
t1
3
w32t2
32
v1
v2
Draw L1 officers (N1)
Generate decision-making time
Generate the verdict with probability P1,
P2
t1
2
t1
1
Assign
verdicts to L2
officers (N2)
Generate
decision-
making time
Verdicts are evaluated by
voting by L3 officers
S approvals are required
99
 Accuracy of fraud identification
– Ratio of correctly evaluated applications to all
applications?
 An application evaluation is correct if officers approve a valid
application or reject a false application;
 Evaluation time
– Time periods to evaluate an application
Experimental studies: objectives
1010
Parameter Value Definition
N1 5;20 Number of officers involved in evaluation at the L1 level
N2 5;20 Number of officers involved in evaluation at the L2 level
P 0.8 Probability of application being correct
P1 0.6; 0.9 Probability that verdict approves the correct application
P2 0.4;0.1 Probability that verdict approves the wrong application
P1 0.7;0.9 Probability that L2 level officer approves the accept verdict for correct
application (correct decision)
P2 0.1;0.2 Probability that L2 level officer declines the accept verdict for correct application
(wrong decision)
P3 0.1;0.3 Probability that L2 level officer declines the reject verdict for wrong application
(wrong decision)
P4 0.5;0.7 Probability that L2 level officer approves the reject verdict for wrong application
(correct decision)
P3 0.02 Probability to make a decision by L3 level officer in any given time period
P4 0.95 Probability of L3 level officer confirming the correct L2 decision
Time to issue a verdict time at L1
S 6 Number of approvals required at the L3 level
Experimental factors
1
it (5,2)LogNormal
1111
Experimental results:
Accuracy by number of officers
0.860.90.940.98
5 10 15 20
Correct
NL1
NL2=5
NL2=20
Number of officers involved in evaluation at the L1 level
Number of officers
involved in evaluation
at the L2 level
Probability P1 that
verdict approves the
correct application
does not have
significant impact in the
range tested (0.6;0.9)
1212
Experimental results:
Accuracy by probability of error
Probability P1 that L2 level officer approves
the Accept verdict for correct application
(correct decision)
1313
Experimental results:
Time by number of officers
Number of officers involved in evaluation at the L1 level
1414
Scenario Parameters Accuracy
S10 P1=0.1, P1=0.1, P2=0.9, P3=0.9, P4=0.1,
P4=0.1
0.04
S50 P1=0.5, P1=0.5, P2=0.5, P3=0.5, P4=0.5,
P4=0.5
0.49
S60 P1=0.6, P1=0.6, P2=0.4, P3=0.4, P4=0.6,
P4=0.6
0.61
S70 P1=0.6, P1=0.6, P2=0.3, P3=0.3, P4=0.7,
P4=0.7
0.78
Experimental results:
Underperforming officers
1515
 Accuracy is satisfactory
 Accuracy and decision-making time can be
improved by increasing the number of officers, at
the L1 level
– Negative consequences on viability of the community
and devaluate tokens issued to motivate the officers
 The identified trade-off between accuracy and
efficiency is consistent with previous findings on
distributed decision-making
 The simulation model is computationally capable
to deal with the networks of the size considered
Conclusion
16
grabis@rtu.lv
http://iti.rtu.lv/vitk/lv/katedra/darbinieki/janis-grabis
Thank you!

More Related Content

Similar to Distributed Fraud Detection Algorithm Simulation

PenTest+: Everything you need to know about CompTIA’s new certification
PenTest+: Everything you need to know about CompTIA’s new certificationPenTest+: Everything you need to know about CompTIA’s new certification
PenTest+: Everything you need to know about CompTIA’s new certificationInfosec
 
Patterns for Extracting High Level Information from Bug Reports
Patterns for Extracting High Level Information from Bug ReportsPatterns for Extracting High Level Information from Bug Reports
Patterns for Extracting High Level Information from Bug ReportsRodrigo Rocha
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
Reliability.pdf
Reliability.pdfReliability.pdf
Reliability.pdfChiWaiYiu
 
COSC2536/2537 Security in Computing and Information Technology Assignments
COSC2536/2537 Security in Computing and Information Technology AssignmentsCOSC2536/2537 Security in Computing and Information Technology Assignments
COSC2536/2537 Security in Computing and Information Technology AssignmentsJohnsmith5188
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case StudyPriyanka Aash
 
Measurement Control Risk Based Test Cases Activities Latw09
Measurement Control Risk Based Test Cases Activities Latw09Measurement Control Risk Based Test Cases Activities Latw09
Measurement Control Risk Based Test Cases Activities Latw09Júlio Venâncio
 
Moe wynn caise13 presentation
Moe wynn   caise13 presentationMoe wynn   caise13 presentation
Moe wynn caise13 presentationcaise2013vlc
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOARDNIF
 
Violence-Detection-using-Transder-Learning.pptx
Violence-Detection-using-Transder-Learning.pptxViolence-Detection-using-Transder-Learning.pptx
Violence-Detection-using-Transder-Learning.pptxraihansikdar
 
Metrics in Security Operations
Metrics in Security OperationsMetrics in Security Operations
Metrics in Security OperationsSergey Soldatov
 
Data analysis market research
Data analysis   market researchData analysis   market research
Data analysis market researchsachinudepurkar
 
From testing to quality governance and problem resolution.pdf
From testing to quality governance and problem resolution.pdfFrom testing to quality governance and problem resolution.pdf
From testing to quality governance and problem resolution.pdfXavier Escudero Sabadell
 
Nitesh...........testing resume (1)
Nitesh...........testing resume (1)Nitesh...........testing resume (1)
Nitesh...........testing resume (1)9036858358
 
information retrival evaluation.ppt
information retrival evaluation.pptinformation retrival evaluation.ppt
information retrival evaluation.pptBonnieKabiru
 
2015 drupalcampcebu estimation_jrf
2015 drupalcampcebu estimation_jrf2015 drupalcampcebu estimation_jrf
2015 drupalcampcebu estimation_jrfJohnnie Fox
 
Cybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCCybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCFidelis Cybersecurity
 
B.Tech Project Report
B.Tech Project ReportB.Tech Project Report
B.Tech Project ReportRohit Singh
 
Toreon - pentesting - why every company should do this!
Toreon - pentesting - why every company should do this!Toreon - pentesting - why every company should do this!
Toreon - pentesting - why every company should do this!Sebastien Deleersnyder
 

Similar to Distributed Fraud Detection Algorithm Simulation (20)

PenTest+: Everything you need to know about CompTIA’s new certification
PenTest+: Everything you need to know about CompTIA’s new certificationPenTest+: Everything you need to know about CompTIA’s new certification
PenTest+: Everything you need to know about CompTIA’s new certification
 
Patterns for Extracting High Level Information from Bug Reports
Patterns for Extracting High Level Information from Bug ReportsPatterns for Extracting High Level Information from Bug Reports
Patterns for Extracting High Level Information from Bug Reports
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Reliability.pdf
Reliability.pdfReliability.pdf
Reliability.pdf
 
COSC2536/2537 Security in Computing and Information Technology Assignments
COSC2536/2537 Security in Computing and Information Technology AssignmentsCOSC2536/2537 Security in Computing and Information Technology Assignments
COSC2536/2537 Security in Computing and Information Technology Assignments
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 
Measurement Control Risk Based Test Cases Activities Latw09
Measurement Control Risk Based Test Cases Activities Latw09Measurement Control Risk Based Test Cases Activities Latw09
Measurement Control Risk Based Test Cases Activities Latw09
 
Moe wynn caise13 presentation
Moe wynn   caise13 presentationMoe wynn   caise13 presentation
Moe wynn caise13 presentation
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOAR
 
Violence-Detection-using-Transder-Learning.pptx
Violence-Detection-using-Transder-Learning.pptxViolence-Detection-using-Transder-Learning.pptx
Violence-Detection-using-Transder-Learning.pptx
 
Metrics in Security Operations
Metrics in Security OperationsMetrics in Security Operations
Metrics in Security Operations
 
Data analysis market research
Data analysis   market researchData analysis   market research
Data analysis market research
 
Testing
TestingTesting
Testing
 
From testing to quality governance and problem resolution.pdf
From testing to quality governance and problem resolution.pdfFrom testing to quality governance and problem resolution.pdf
From testing to quality governance and problem resolution.pdf
 
Nitesh...........testing resume (1)
Nitesh...........testing resume (1)Nitesh...........testing resume (1)
Nitesh...........testing resume (1)
 
information retrival evaluation.ppt
information retrival evaluation.pptinformation retrival evaluation.ppt
information retrival evaluation.ppt
 
2015 drupalcampcebu estimation_jrf
2015 drupalcampcebu estimation_jrf2015 drupalcampcebu estimation_jrf
2015 drupalcampcebu estimation_jrf
 
Cybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCCybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOC
 
B.Tech Project Report
B.Tech Project ReportB.Tech Project Report
B.Tech Project Report
 
Toreon - pentesting - why every company should do this!
Toreon - pentesting - why every company should do this!Toreon - pentesting - why every company should do this!
Toreon - pentesting - why every company should do this!
 

More from Jānis Grabis

Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...Jānis Grabis
 
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...Jānis Grabis
 
Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...
Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...
Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...Jānis Grabis
 
Product Life-Cycle Perspective on ICT Product Supply Chain Resilience
Product Life-Cycle Perspective on ICT Product Supply Chain Resilience Product Life-Cycle Perspective on ICT Product Supply Chain Resilience
Product Life-Cycle Perspective on ICT Product Supply Chain Resilience Jānis Grabis
 
IoT Data Analytics in Retail: Framework and Implementation
IoT Data Analytics in Retail: Framework and ImplementationIoT Data Analytics in Retail: Framework and Implementation
IoT Data Analytics in Retail: Framework and ImplementationJānis Grabis
 
Blockchain Enabled Distributed Storage and Sharing of Personal Data Assets
Blockchain Enabled Distributed Storage and Sharing of Personal Data AssetsBlockchain Enabled Distributed Storage and Sharing of Personal Data Assets
Blockchain Enabled Distributed Storage and Sharing of Personal Data AssetsJānis Grabis
 
RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....
RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....
RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....Jānis Grabis
 
Optimization of Gaps Resolution Strategy in Implementation of ERP Systems
Optimization of Gaps Resolution Strategy in Implementation of ERP SystemsOptimization of Gaps Resolution Strategy in Implementation of ERP Systems
Optimization of Gaps Resolution Strategy in Implementation of ERP SystemsJānis Grabis
 
Maģistra studijas informācijas tehnoloģijā
Maģistra studijas informācijas tehnoloģijāMaģistra studijas informācijas tehnoloģijā
Maģistra studijas informācijas tehnoloģijāJānis Grabis
 
A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...
A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...
A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...Jānis Grabis
 
Near real-time big-data processing for data driven applications
Near real-time big-data processing for data driven applicationsNear real-time big-data processing for data driven applications
Near real-time big-data processing for data driven applicationsJānis Grabis
 
Promoting Collaborative Studies with Microsoft Dynamics Lifecycle Services
Promoting Collaborative Studies with Microsoft Dynamics Lifecycle ServicesPromoting Collaborative Studies with Microsoft Dynamics Lifecycle Services
Promoting Collaborative Studies with Microsoft Dynamics Lifecycle ServicesJānis Grabis
 
Design of Vehicle Routing Capability (ASDENCA 2017)
Design of Vehicle Routing Capability (ASDENCA 2017)Design of Vehicle Routing Capability (ASDENCA 2017)
Design of Vehicle Routing Capability (ASDENCA 2017)Jānis Grabis
 
Context-aware Customizable Routing Solution for Fleet Management
Context-aware Customizable Routing Solution for Fleet ManagementContext-aware Customizable Routing Solution for Fleet Management
Context-aware Customizable Routing Solution for Fleet ManagementJānis Grabis
 
Context-Aware Adaption of Software Entities Using Rules
Context-Aware Adaption of Software Entities Using RulesContext-Aware Adaption of Software Entities Using Rules
Context-Aware Adaption of Software Entities Using RulesJānis Grabis
 
Uzņemšana RTU Informācijas tehnoloģijas studiju programmā
Uzņemšana RTU Informācijas tehnoloģijas studiju programmāUzņemšana RTU Informācijas tehnoloģijas studiju programmā
Uzņemšana RTU Informācijas tehnoloģijas studiju programmāJānis Grabis
 
Design of Capability Delivery Adjustments @ASDENCA
Design of Capability Delivery Adjustments @ASDENCADesign of Capability Delivery Adjustments @ASDENCA
Design of Capability Delivery Adjustments @ASDENCAJānis Grabis
 
Selection and Evolutionary Development of Software-Service Bundles: a Capabil...
Selection and Evolutionary Development of Software-Service Bundles: a Capabil...Selection and Evolutionary Development of Software-Service Bundles: a Capabil...
Selection and Evolutionary Development of Software-Service Bundles: a Capabil...Jānis Grabis
 

More from Jānis Grabis (20)

Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
 
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
Workplace Topology Model for Assessment of Static and Dynamic Interactions Am...
 
Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...
Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...
Endurant Ecosystems: Model-based Assessment of Resilience of Digital Business...
 
Product Life-Cycle Perspective on ICT Product Supply Chain Resilience
Product Life-Cycle Perspective on ICT Product Supply Chain Resilience Product Life-Cycle Perspective on ICT Product Supply Chain Resilience
Product Life-Cycle Perspective on ICT Product Supply Chain Resilience
 
PoEM 2020 Opening
PoEM 2020 OpeningPoEM 2020 Opening
PoEM 2020 Opening
 
IoT Data Analytics in Retail: Framework and Implementation
IoT Data Analytics in Retail: Framework and ImplementationIoT Data Analytics in Retail: Framework and Implementation
IoT Data Analytics in Retail: Framework and Implementation
 
Artss@itms2020
Artss@itms2020Artss@itms2020
Artss@itms2020
 
Blockchain Enabled Distributed Storage and Sharing of Personal Data Assets
Blockchain Enabled Distributed Storage and Sharing of Personal Data AssetsBlockchain Enabled Distributed Storage and Sharing of Personal Data Assets
Blockchain Enabled Distributed Storage and Sharing of Personal Data Assets
 
RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....
RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....
RTU Informācijas tehnoloģijas studiju programmas bakalaura darba izstrādes 2....
 
Optimization of Gaps Resolution Strategy in Implementation of ERP Systems
Optimization of Gaps Resolution Strategy in Implementation of ERP SystemsOptimization of Gaps Resolution Strategy in Implementation of ERP Systems
Optimization of Gaps Resolution Strategy in Implementation of ERP Systems
 
Maģistra studijas informācijas tehnoloģijā
Maģistra studijas informācijas tehnoloģijāMaģistra studijas informācijas tehnoloģijā
Maģistra studijas informācijas tehnoloģijā
 
A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...
A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...
A Mathematical Model for Evaluation of Data Analytics Implementation Alternat...
 
Near real-time big-data processing for data driven applications
Near real-time big-data processing for data driven applicationsNear real-time big-data processing for data driven applications
Near real-time big-data processing for data driven applications
 
Promoting Collaborative Studies with Microsoft Dynamics Lifecycle Services
Promoting Collaborative Studies with Microsoft Dynamics Lifecycle ServicesPromoting Collaborative Studies with Microsoft Dynamics Lifecycle Services
Promoting Collaborative Studies with Microsoft Dynamics Lifecycle Services
 
Design of Vehicle Routing Capability (ASDENCA 2017)
Design of Vehicle Routing Capability (ASDENCA 2017)Design of Vehicle Routing Capability (ASDENCA 2017)
Design of Vehicle Routing Capability (ASDENCA 2017)
 
Context-aware Customizable Routing Solution for Fleet Management
Context-aware Customizable Routing Solution for Fleet ManagementContext-aware Customizable Routing Solution for Fleet Management
Context-aware Customizable Routing Solution for Fleet Management
 
Context-Aware Adaption of Software Entities Using Rules
Context-Aware Adaption of Software Entities Using RulesContext-Aware Adaption of Software Entities Using Rules
Context-Aware Adaption of Software Entities Using Rules
 
Uzņemšana RTU Informācijas tehnoloģijas studiju programmā
Uzņemšana RTU Informācijas tehnoloģijas studiju programmāUzņemšana RTU Informācijas tehnoloģijas studiju programmā
Uzņemšana RTU Informācijas tehnoloģijas studiju programmā
 
Design of Capability Delivery Adjustments @ASDENCA
Design of Capability Delivery Adjustments @ASDENCADesign of Capability Delivery Adjustments @ASDENCA
Design of Capability Delivery Adjustments @ASDENCA
 
Selection and Evolutionary Development of Software-Service Bundles: a Capabil...
Selection and Evolutionary Development of Software-Service Bundles: a Capabil...Selection and Evolutionary Development of Software-Service Bundles: a Capabil...
Selection and Evolutionary Development of Software-Service Bundles: a Capabil...
 

Recently uploaded

cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 

Recently uploaded (20)

cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 

Distributed Fraud Detection Algorithm Simulation

  • 1. 1 Jānis Grabis Arturs Rasnacis SIMULATION BASED EVALUATION AND TUNING OF DISTRIBUTED FRAUD DETECTION ALGORITHM Institute of Information Technology, Riga Technical University, Latvia SIA TrustSearch, Latvia
  • 2. 22  Community and crowdsourcing based fraud detection – CryptoPolice.com > TheTrustSearch.com  Complex internal dynamics and emergent collective behavior  Blockchain as a reward mechanism Background
  • 3. 3  Simulation is a suitable technique dynamics in communities (Bernon et al. 2007; Aiello et al. 2017)  The incentives play a major role in maintaining a viable community (Chia 2011) – Blockchains are a suitable technology (Cai and Zhu 2016)  Recent simulation studies on security concerns in distributed systems (Lee and Wei, 2016; Panagopoulos et al. 2017)  Evaluations should be accurate  Evaluation results should be obtained as fast as possible  The optimal number of experts should be involved Requirements Existing Work
  • 4. 44 Objective • An agent-based approach is used to build the simulation model • Decision-making accuracy and response time are evaluated To develop a simulation model of the community based fraud detection algorithm and to conduct experimental studies to tune the parameters of this algorithm
  • 5. 55 Community management platform Community based fraud detection Internet user Fraud application Issue verdicts Blockchain – storage of approved verdicts and reward Community of officers Multi-stage evaluation
  • 6. 66 Fraud detection process Submit application Allocate to L1 officers Issue verdicts at L1 Evaluate verdicts at L2 Gather approvals at L3 Issue final decision Approvals received • L1 level officers issue a verdict on accepting or rejecting the application • L2 level officers either accept or reject the verdict • L3 level officers make the final approval level by voting • The verdict is approved as soon as a number of votes are received
  • 7. 77 Agent based simulation approach Officers are characterized by their ability to make correct decisions
  • 8. 88 L3L2 L1 Simulation model Generate application (P correct) v3 t1 3 w32t2 32 v1 v2 Draw L1 officers (N1) Generate decision-making time Generate the verdict with probability P1, P2 t1 2 t1 1 Assign verdicts to L2 officers (N2) Generate decision- making time Verdicts are evaluated by voting by L3 officers S approvals are required
  • 9. 99  Accuracy of fraud identification – Ratio of correctly evaluated applications to all applications?  An application evaluation is correct if officers approve a valid application or reject a false application;  Evaluation time – Time periods to evaluate an application Experimental studies: objectives
  • 10. 1010 Parameter Value Definition N1 5;20 Number of officers involved in evaluation at the L1 level N2 5;20 Number of officers involved in evaluation at the L2 level P 0.8 Probability of application being correct P1 0.6; 0.9 Probability that verdict approves the correct application P2 0.4;0.1 Probability that verdict approves the wrong application P1 0.7;0.9 Probability that L2 level officer approves the accept verdict for correct application (correct decision) P2 0.1;0.2 Probability that L2 level officer declines the accept verdict for correct application (wrong decision) P3 0.1;0.3 Probability that L2 level officer declines the reject verdict for wrong application (wrong decision) P4 0.5;0.7 Probability that L2 level officer approves the reject verdict for wrong application (correct decision) P3 0.02 Probability to make a decision by L3 level officer in any given time period P4 0.95 Probability of L3 level officer confirming the correct L2 decision Time to issue a verdict time at L1 S 6 Number of approvals required at the L3 level Experimental factors 1 it (5,2)LogNormal
  • 11. 1111 Experimental results: Accuracy by number of officers 0.860.90.940.98 5 10 15 20 Correct NL1 NL2=5 NL2=20 Number of officers involved in evaluation at the L1 level Number of officers involved in evaluation at the L2 level Probability P1 that verdict approves the correct application does not have significant impact in the range tested (0.6;0.9)
  • 12. 1212 Experimental results: Accuracy by probability of error Probability P1 that L2 level officer approves the Accept verdict for correct application (correct decision)
  • 13. 1313 Experimental results: Time by number of officers Number of officers involved in evaluation at the L1 level
  • 14. 1414 Scenario Parameters Accuracy S10 P1=0.1, P1=0.1, P2=0.9, P3=0.9, P4=0.1, P4=0.1 0.04 S50 P1=0.5, P1=0.5, P2=0.5, P3=0.5, P4=0.5, P4=0.5 0.49 S60 P1=0.6, P1=0.6, P2=0.4, P3=0.4, P4=0.6, P4=0.6 0.61 S70 P1=0.6, P1=0.6, P2=0.3, P3=0.3, P4=0.7, P4=0.7 0.78 Experimental results: Underperforming officers
  • 15. 1515  Accuracy is satisfactory  Accuracy and decision-making time can be improved by increasing the number of officers, at the L1 level – Negative consequences on viability of the community and devaluate tokens issued to motivate the officers  The identified trade-off between accuracy and efficiency is consistent with previous findings on distributed decision-making  The simulation model is computationally capable to deal with the networks of the size considered Conclusion