SlideShare a Scribd company logo
How can you Identify Fraud in Fintech Lending using
Deep Learning
RATNAKAR PANDEY, HEAD OF INDIA ANALYTICS & DATA SCIENCE, KABBAGE
Disclaimer: The views expressed here are solely those of the presenter in his private capacity.
16th October 2018
“This series is solely for educational purposes only. This series does not intend to be complete or universal in nature and cannot be
considered as an alternative to an expert opinion on any specific issue. The series is based on views of the speaker/facilitator and
NASSCOM does not recommend/endorse the view-points per se and is primarily a medium to disseminate knowledge for the
greater good of the Products ecosystem. Any attendee who opens or otherwise accesses the content of the series at any point of
time, does so at their own risk and acknowledges and agrees that neither NASSCOM and nor its members and affiliates will not
be responsible for any loss or damage suffered by any person.
The content of this webinar series is solely for the purpose of NASSCOM members and NASSCOM digital channels and any
copying/distribution is liable for legal action.”
Legal Disclaimer
2
FRAUD IS A BIG PROBLEM
ACROSS THE WORLD
3
Outline
Demo of Multi Level Perceptron (MLP)
Classification Case Approach and Performance
Suggested Deep Learning Application Areas
Supervised Unsupervised
Need for Deep Learning
Existing Methods Why Deep Learning?
Frauds in Fintech Lending
Drivers Modus Operandi
Introduction
About Fintech About Kabbage
4
Fintech is an Integral Part of Our Life Now
$24.7 B
Invested in 2016 in
global fintech companies
1076
Deals in 2016 in
global fintech companies
Sources: KPMG, The Pulse of Fintech Q4 2016 | Capgemini World Fintech Report 2017 | PwC Global Fintech Report 2017 | www.forbes.com
50.2%
Of global customers have
done business with fintech
20%
Expected ROI on
fintech projects
20+
Global fintech
Unicorns
10K+
Global fintech
companies
Types
of
Fintech
Alternative Lending- Kabbage, Lendingclub, Prosper, Zopa
Payment / Billing Tech - Stripe, Paytm, Adyen, Ant Financial,
Square
Personal Finance / Asset Management Creditkarma, Bankrate,
NerdWallet
Robo Advisory- Wealthfront, Betterment, NerdWallet
Blockchain- Abra, 21, coinbase, Ethereum
5
Kabbage is Blazing a Trail in Big Data & Fintech
Kabbage is more than a lender for small businesses; our data and technology
platform is now being used as a fully branded product by other lenders, and
our products are expanding. We’ve received numerous awards & recognition,
including-
• CNBC Disruptors 50 list
• Inc. 500 list for three consecutive years
• The Forbes Most Promising Companies lists twice
• Glassdoor’s 2017 Best Places to Work list
6
Fraud Drivers- Superfast Decision Making and Faceless Channels
Decisioning within few minutes
Application on web and Mobile
May have higher exposure to
thin file and new to credit
More prone to invisible window
applications
Unconventional and evolving
data sources
Note: Even with these challenges the fraud rate in the industry is typically less than 20 bps for more data savvy lenders 7
How a Lending Fraud can be Classified?
Who
Commits?
How?
Who is the
Victim?
Borrower
Someone known to the
borrower- lead
generator, friends, family
employees etc.
Someone unknown to
the borrower
First Payment Default,
Bust Out, Synthetic
Identity, Stacking etc.
Friendly Fraud-
someone misuses the
trust
Fraud rings, Identity
Theft, Account Takeover
Lender Borrower, Lender Borrower, Lender
First Party Second Party Third Party
8
Sample Modus Operandi
• Stolen identity
• Synthetic identity
• May replicate best
customer (prime
and super prime)
• Falsified info
• No willingness to
pay
• Acquire multiple loans
in a short window (
invisible window)
• May provide all info
correctly
• More likely to be on
higher side in the risk
spectrum
• No or low willingness to
pay
• Mimic good payment
behavior for significant
time
• Bust out when gains
are highestCommon Fraud Related Terms- http://www.cpp.co.uk/helpful-info/fraud-glossary-of-terms
9
Current Situation- Heuristics and Regression Driven Approaches
Intuitive
Heuristics
Statistical
• Manual Reviews
• Experts Driven
• Gut feeling
• Thumb rules
• Driven by past experience
• Quick decision making
• Control/ confidence limits
• Outlier detection/ deviation from norm
• Decision tree, regression, time series
10
10,000 +
Features
Unstructured
Transactional
Social
Device
&
IP
Third Parties
Bureau
Why go Deep? Explosion of Features and Data Sources
• Uncover hard to detect patterns
(using traditional techniques) when
the incidence rate is low
• Find latent features (super variables)
without significant manual feature
engineering
• Real time fraud detection and self
learning models using streaming data
(KAFKA, MapR)
• Ensure consistent customer
experience and regulatory
compliance
• Higher operational efficiency
• Big data and data exhaust handling
capabilities
11
UNSUPERVISED DEEP LEARNING ALGORITHMS AND
USE CASES
12
Find Anomalies- Autoencoder
• Traditional techniques based on density or
distance works better with linearly separable
data
• Stacked Autoencoders (SAE) and Deep Belief
Networks ( DBN) make no assumptions about
the distribution of data and work better on non
linearly separable data
• Unsupervised learning algorithms for feature
learning, feature reduction and outlier detection
• Input vectors are used as output vectors and
reconstruction error computed
• The data points with higher reconstruction error
( MSE) are more likely to be outliers
• Helps in detecting different modus operandi of
fraudsters
Use Case- Deployment of Autoencoder for Credit Card Fraud Detection
13
Sequence Analysis- Recurrent Neural Network (LSTM)
• Recurrent Neural Network (RNN) are a special
type of feed-forward network used for
sequential data analysis where inputs are not
independent and are not of fixed length
• Rather in this case, inputs are dependent on
each other along the time dimension. In other
words, what happens in time ‘t’ may depend on
what happened in time ‘t-1’, ‘t-2’ and so on
• These are also called ‘memory’ networks as
previous inputs and states persist in the model
for doing a more optimal sequential analysis.
They can have both short term and long term
time dependence.
• Long Short Term Memory (LSTM) is one of the
most popular Deep Network used for sequential
data analysis.
• More on LSTM Here-
https://datafai.com/2018/03/08/recurrent-
neural-network-rnn-in-python/
Use Case- Use RNN (LSTM) to analyse web behaviour and logs to detect
fraudulent behavior
14
Find Networks - Clique and Links Graphs
Detect
Fraudulent
Cases
Find
Commonalities
Form Network
• Use variety of attributes (on-us/ off-us) to build linkage between known bad
customers and other customers with unknown status
• Larger the size of network, easier the detection and vice versa
• Overlap networks using enumerative approaches and find commonalities
• Use graph transduction (t-SNE) to detect potential fraudulent cases by doing peer
group (archetype) analysis to separate routine behavior from suspicious behavior -
“birds of same feather flock together”
15
SUPERVISED DEEP LEARNING ALGORITHMS AND USE
CASES
16
Real Time Detection- Convolution Neural Network (CNN)
• Convolution Neural Network (CNN) are
particularly useful for spatial data analysis, image
recognition, computer vision, natural language
processing, signal processing and variety of
other different purposes. They are biologically
motivated by functioning of neurons in visual
cortex to a visual stimuli.
• What makes CNN much more powerful
compared to the other feedback forward
networks for image recognition is the fact that
they do not require as much human
intervention and parameters as some of the
other networks such as MLP do. This is primarily
driven by the fact that CNNs have neurons
arranged in three dimensions.
• More on CNN Here-
https://datafai.com/2018/02/25/deep-learning-
convolution-neural-network-cnn-in-python/
Use Case- CNN for real time classification
17
Labeled Data- Multilayer Perceptron (MLP)
• These are the most basic networks and feed
forward the inputs to create output. They
consist of an input layer and an output layer
and many interconnected hidden layers and
neurons between the input and the output
layers.
• They can be used for any supervised regression
or classification problems
• Since they generally use some non linear
activation function such as Relu or Tanh to
compute the losses ( the difference between the
true output and computed output) such as
Mean Square Error ( MSE), Logloss, they are
more suitable for handling non linear problems.
• We will do a MLP Demo on credit card fraud
data
18
MLP Demo- Case Details
• Anonymized credit card transactions data from European customers
• 30 features ( 28 anonymized, duration elapsed, amount of transactions)
• Label- fraud or normal transaction
• 17bps incidence rate for fraudulent transactions
• 284,807 total transaction in data
Sources: http://mlg.ulb.ac.be | https://www.kaggle.com/dalpozz/creditcardfraud
19
MLP Demo- Tools and Techniques used
Python
2.7 or 3.6
Keras
2.0.2
TensorFlow
1.0.1
20
MLP Demo- Traditional Modeling Techniques Process
Manual
Feature
Engineering
After variable
treatments
drop variables
with little or no
explaining
power- WOE,
IV, Distribution
Look at WOE
to create bins
etc.
WOEDensity Dist.
21
MLP Demo- Network Training
Little or No Manual Feature Engineering
• No over or under sampling
• No variables dropped
• Only standardization of features done
• 75% training/ 25% validation
• No manual binning
Fitted Network
• Multi Layer Perceptron with three hidden layers.
o Activation function = Sigmoid
o # of neurons = 512 in the input layer
o Each consequent layer has half the neurons
o Cost function = logloss
o Optimizer = adam
o Epochs= 5
o Dropout rate = 30%
22
MLP Demo- Performance Summary
Metric Value
Accuracy Score 99.9%
Logloss 0.003
Precision Score 77%
Recall Score 75%
Area Under the
Curve (AUC)
87.4%
FScore 76.5%
23
MLP Demo- Hyperparameters Optimization
• Epochs = [5,10,15,20,25…]
• Batch Size = [5,10,20,30,40…]
• Optimizer= [‘SGD’, ’Adam’, ’RMSprop’…]
• Learning Rate = [0.01,0.05,0.1,0.2…]
• Momentum = [0.2,0.4,0.6,…]
• Weights Initiation= [‘Uniform’, ‘Normal’, …]
• Activation Function= [‘relu’,’sigmoid’, ‘tanh’, ‘softmax’,…]
• Drop-out rate= [0.0,0.2,0.4,0.5,…]
• Neurons= [5,10,20,30,40…]
Python scikit-learn gridsearch function, design of experiment( screening
design, fractional designs) needs to be combined with intutition and expertise
to come out with the best network!
24
Thank You!
Christopher McDougall- “Every morning in Africa, a gazelle wakes up, it knows it must outrun the fastest lion
or it will be killed. Every morning in Africa, a lion wakes up. It knows it must run faster than the slowest
gazelle, or it will starve. It doesn't matter whether you're the lion or a gazelle-when the sun comes up, you'd
better be running.
Working in the fraud analytics is the same way.
25
25
Next Webinar : Go-to-market strategy / Planning
Date : 2nd Nov 2018
Speaker: Ashok Munirathinam, Sr. Director, SAP Cloud Platform
SAP Asia Pacific & Japan
Queries: Ankita@nasscom.in
26

More Related Content

What's hot

A Cashless Society
A Cashless SocietyA Cashless Society
A Cashless Society
Anshuman Mahanty
 
Digital wallet
Digital walletDigital wallet
Digital wallet
Lokesh Jajoo
 
Bitcoin
BitcoinBitcoin
Bitcoin
ghanbarianm
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atm
khurda
 
Features of Credit Card
Features of Credit CardFeatures of Credit Card
Features of Credit Card
Aseem R
 
Payments 101 - Basics of Payments
Payments 101 - Basics of PaymentsPayments 101 - Basics of Payments
Payments 101 - Basics of Payments
Kapish Kaushal
 
What's cryptocurrency ?
What's cryptocurrency ?What's cryptocurrency ?
What's cryptocurrency ?
Everythingcrypto
 
An introduction to SWIFT gpi
An introduction to SWIFT gpiAn introduction to SWIFT gpi
An introduction to SWIFT gpi
BNP Paribas Cash Management
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
crypt00
 
An Introduction to Cryptocurrency Funds | Timothy Spangler | Lunch & Learn
An Introduction to Cryptocurrency Funds | Timothy Spangler | Lunch & LearnAn Introduction to Cryptocurrency Funds | Timothy Spangler | Lunch & Learn
An Introduction to Cryptocurrency Funds | Timothy Spangler | Lunch & Learn
UCICove
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
Ashraf Bashir
 
Telegraphic transferred and MICR
Telegraphic transferred and MICRTelegraphic transferred and MICR
Telegraphic transferred and MICR
Avishek Raut
 
Bitcoin and the future of cryptocurrency
Bitcoin and the future of cryptocurrencyBitcoin and the future of cryptocurrency
Bitcoin and the future of cryptocurrency
Ben Hall
 
Understanding Cryptocurrency
Understanding CryptocurrencyUnderstanding Cryptocurrency
Understanding Cryptocurrency
Kapil Gupta
 
The Future of Money: Decentralized Finance
The Future of Money: Decentralized FinanceThe Future of Money: Decentralized Finance
The Future of Money: Decentralized Finance
J. Scott Christianson
 
Introduction to Cryptocurrency (Bitcoin)
Introduction to Cryptocurrency (Bitcoin)Introduction to Cryptocurrency (Bitcoin)
Introduction to Cryptocurrency (Bitcoin)
Kashif Khans
 
Central banks and the future of digital money. A practical proposal for centr...
Central banks and the future of digital money. A practical proposal for centr...Central banks and the future of digital money. A practical proposal for centr...
Central banks and the future of digital money. A practical proposal for centr...
eraser Juan José Calderón
 
Atm security
Atm securityAtm security
Atm security
Sajan Sahu
 
BITCOIN EXPLAINED
BITCOIN EXPLAINEDBITCOIN EXPLAINED
BITCOIN EXPLAINED
Murlidhar Sarda
 

What's hot (20)

A Cashless Society
A Cashless SocietyA Cashless Society
A Cashless Society
 
Digital wallet
Digital walletDigital wallet
Digital wallet
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atm
 
Features of Credit Card
Features of Credit CardFeatures of Credit Card
Features of Credit Card
 
Payments 101 - Basics of Payments
Payments 101 - Basics of PaymentsPayments 101 - Basics of Payments
Payments 101 - Basics of Payments
 
What's cryptocurrency ?
What's cryptocurrency ?What's cryptocurrency ?
What's cryptocurrency ?
 
An introduction to SWIFT gpi
An introduction to SWIFT gpiAn introduction to SWIFT gpi
An introduction to SWIFT gpi
 
Cryptocurrency
CryptocurrencyCryptocurrency
Cryptocurrency
 
An Introduction to Cryptocurrency Funds | Timothy Spangler | Lunch & Learn
An Introduction to Cryptocurrency Funds | Timothy Spangler | Lunch & LearnAn Introduction to Cryptocurrency Funds | Timothy Spangler | Lunch & Learn
An Introduction to Cryptocurrency Funds | Timothy Spangler | Lunch & Learn
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Telegraphic transferred and MICR
Telegraphic transferred and MICRTelegraphic transferred and MICR
Telegraphic transferred and MICR
 
Bitcoin and the future of cryptocurrency
Bitcoin and the future of cryptocurrencyBitcoin and the future of cryptocurrency
Bitcoin and the future of cryptocurrency
 
Understanding Cryptocurrency
Understanding CryptocurrencyUnderstanding Cryptocurrency
Understanding Cryptocurrency
 
The Future of Money: Decentralized Finance
The Future of Money: Decentralized FinanceThe Future of Money: Decentralized Finance
The Future of Money: Decentralized Finance
 
Introduction to Cryptocurrency (Bitcoin)
Introduction to Cryptocurrency (Bitcoin)Introduction to Cryptocurrency (Bitcoin)
Introduction to Cryptocurrency (Bitcoin)
 
Central banks and the future of digital money. A practical proposal for centr...
Central banks and the future of digital money. A practical proposal for centr...Central banks and the future of digital money. A practical proposal for centr...
Central banks and the future of digital money. A practical proposal for centr...
 
Atm security
Atm securityAtm security
Atm security
 
BITCOIN EXPLAINED
BITCOIN EXPLAINEDBITCOIN EXPLAINED
BITCOIN EXPLAINED
 
Digital wallet
Digital walletDigital wallet
Digital wallet
 

Similar to Nasscom how can you identify fraud in fintech lending using deep learning

Artificial Intelligence Primer
Artificial Intelligence PrimerArtificial Intelligence Primer
Artificial Intelligence Primer
Imam Hoque
 
Project PPT sem 2.pptx
Project PPT sem 2.pptxProject PPT sem 2.pptx
Project PPT sem 2.pptx
swapnilsalunke1620
 
Brighterion bai july 2016 fraud white paper
Brighterion bai july 2016 fraud white paperBrighterion bai july 2016 fraud white paper
Brighterion bai july 2016 fraud white paper
Andrew Morrison
 
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxShare Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
yatintaneja6
 
Credit Card Fraud Detection project.pptx
Credit Card Fraud Detection project.pptxCredit Card Fraud Detection project.pptx
Credit Card Fraud Detection project.pptx
sanjivaniahire31
 
Do you really need a dApp?
Do you really need a dApp? Do you really need a dApp?
Do you really need a dApp?
Edward Tsang
 
Next Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4jNext Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4j
Neo4j
 
[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing
Natalino Busa
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
Rishi Kant
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
Ivan Zoratti
 
Sean White- Kansas City
Sean White- Kansas CitySean White- Kansas City
Sean White- Kansas City
Splunk
 
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
TigerGraph
 
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j
 
How Startups can leverage big data?
How Startups can leverage big data?How Startups can leverage big data?
How Startups can leverage big data?
Rackspace
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
IRJET Journal
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
cVidya Networks
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
Shakas Technologies
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
Mouaz Alnouri
 
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
StampedeCon
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunk
 

Similar to Nasscom how can you identify fraud in fintech lending using deep learning (20)

Artificial Intelligence Primer
Artificial Intelligence PrimerArtificial Intelligence Primer
Artificial Intelligence Primer
 
Project PPT sem 2.pptx
Project PPT sem 2.pptxProject PPT sem 2.pptx
Project PPT sem 2.pptx
 
Brighterion bai july 2016 fraud white paper
Brighterion bai july 2016 fraud white paperBrighterion bai july 2016 fraud white paper
Brighterion bai july 2016 fraud white paper
 
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptxShare Credit_Card_Fraud_Detection_ML_MP (1).pptx
Share Credit_Card_Fraud_Detection_ML_MP (1).pptx
 
Credit Card Fraud Detection project.pptx
Credit Card Fraud Detection project.pptxCredit Card Fraud Detection project.pptx
Credit Card Fraud Detection project.pptx
 
Do you really need a dApp?
Do you really need a dApp? Do you really need a dApp?
Do you really need a dApp?
 
Next Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4jNext Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4j
 
[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing[Ai in finance] AI in regulatory compliance, risk management, and auditing
[Ai in finance] AI in regulatory compliance, risk management, and auditing
 
Machine Learning in Cyber Security
Machine Learning in Cyber SecurityMachine Learning in Cyber Security
Machine Learning in Cyber Security
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
 
Sean White- Kansas City
Sean White- Kansas CitySean White- Kansas City
Sean White- Kansas City
 
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
 
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
 
How Startups can leverage big data?
How Startups can leverage big data?How Startups can leverage big data?
How Startups can leverage big data?
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
 
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
 

More from Ratnakar Pandey

Computer vision and face recognition using python
Computer vision and face recognition using pythonComputer vision and face recognition using python
Computer vision and face recognition using python
Ratnakar Pandey
 
Fintech Overview and Growth Drivers
Fintech Overview and Growth DriversFintech Overview and Growth Drivers
Fintech Overview and Growth Drivers
Ratnakar Pandey
 
Blockchain and its impact on Data Science and Financial Services
Blockchain and its impact on Data Science and Financial ServicesBlockchain and its impact on Data Science and Financial Services
Blockchain and its impact on Data Science and Financial Services
Ratnakar Pandey
 
Key consulting frameworks_for_data_scientist
Key consulting frameworks_for_data_scientistKey consulting frameworks_for_data_scientist
Key consulting frameworks_for_data_scientist
Ratnakar Pandey
 
Deep learning
Deep learningDeep learning
Deep learning
Ratnakar Pandey
 
Basics of investment in Equity and Mutual Funds Markets
Basics of investment in Equity and Mutual Funds MarketsBasics of investment in Equity and Mutual Funds Markets
Basics of investment in Equity and Mutual Funds Markets
Ratnakar Pandey
 
Fraud deep learning_v2
Fraud deep learning_v2Fraud deep learning_v2
Fraud deep learning_v2
Ratnakar Pandey
 

More from Ratnakar Pandey (7)

Computer vision and face recognition using python
Computer vision and face recognition using pythonComputer vision and face recognition using python
Computer vision and face recognition using python
 
Fintech Overview and Growth Drivers
Fintech Overview and Growth DriversFintech Overview and Growth Drivers
Fintech Overview and Growth Drivers
 
Blockchain and its impact on Data Science and Financial Services
Blockchain and its impact on Data Science and Financial ServicesBlockchain and its impact on Data Science and Financial Services
Blockchain and its impact on Data Science and Financial Services
 
Key consulting frameworks_for_data_scientist
Key consulting frameworks_for_data_scientistKey consulting frameworks_for_data_scientist
Key consulting frameworks_for_data_scientist
 
Deep learning
Deep learningDeep learning
Deep learning
 
Basics of investment in Equity and Mutual Funds Markets
Basics of investment in Equity and Mutual Funds MarketsBasics of investment in Equity and Mutual Funds Markets
Basics of investment in Equity and Mutual Funds Markets
 
Fraud deep learning_v2
Fraud deep learning_v2Fraud deep learning_v2
Fraud deep learning_v2
 

Recently uploaded

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 

Recently uploaded (20)

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 

Nasscom how can you identify fraud in fintech lending using deep learning

  • 1. How can you Identify Fraud in Fintech Lending using Deep Learning RATNAKAR PANDEY, HEAD OF INDIA ANALYTICS & DATA SCIENCE, KABBAGE Disclaimer: The views expressed here are solely those of the presenter in his private capacity. 16th October 2018
  • 2. “This series is solely for educational purposes only. This series does not intend to be complete or universal in nature and cannot be considered as an alternative to an expert opinion on any specific issue. The series is based on views of the speaker/facilitator and NASSCOM does not recommend/endorse the view-points per se and is primarily a medium to disseminate knowledge for the greater good of the Products ecosystem. Any attendee who opens or otherwise accesses the content of the series at any point of time, does so at their own risk and acknowledges and agrees that neither NASSCOM and nor its members and affiliates will not be responsible for any loss or damage suffered by any person. The content of this webinar series is solely for the purpose of NASSCOM members and NASSCOM digital channels and any copying/distribution is liable for legal action.” Legal Disclaimer 2
  • 3. FRAUD IS A BIG PROBLEM ACROSS THE WORLD 3
  • 4. Outline Demo of Multi Level Perceptron (MLP) Classification Case Approach and Performance Suggested Deep Learning Application Areas Supervised Unsupervised Need for Deep Learning Existing Methods Why Deep Learning? Frauds in Fintech Lending Drivers Modus Operandi Introduction About Fintech About Kabbage 4
  • 5. Fintech is an Integral Part of Our Life Now $24.7 B Invested in 2016 in global fintech companies 1076 Deals in 2016 in global fintech companies Sources: KPMG, The Pulse of Fintech Q4 2016 | Capgemini World Fintech Report 2017 | PwC Global Fintech Report 2017 | www.forbes.com 50.2% Of global customers have done business with fintech 20% Expected ROI on fintech projects 20+ Global fintech Unicorns 10K+ Global fintech companies Types of Fintech Alternative Lending- Kabbage, Lendingclub, Prosper, Zopa Payment / Billing Tech - Stripe, Paytm, Adyen, Ant Financial, Square Personal Finance / Asset Management Creditkarma, Bankrate, NerdWallet Robo Advisory- Wealthfront, Betterment, NerdWallet Blockchain- Abra, 21, coinbase, Ethereum 5
  • 6. Kabbage is Blazing a Trail in Big Data & Fintech Kabbage is more than a lender for small businesses; our data and technology platform is now being used as a fully branded product by other lenders, and our products are expanding. We’ve received numerous awards & recognition, including- • CNBC Disruptors 50 list • Inc. 500 list for three consecutive years • The Forbes Most Promising Companies lists twice • Glassdoor’s 2017 Best Places to Work list 6
  • 7. Fraud Drivers- Superfast Decision Making and Faceless Channels Decisioning within few minutes Application on web and Mobile May have higher exposure to thin file and new to credit More prone to invisible window applications Unconventional and evolving data sources Note: Even with these challenges the fraud rate in the industry is typically less than 20 bps for more data savvy lenders 7
  • 8. How a Lending Fraud can be Classified? Who Commits? How? Who is the Victim? Borrower Someone known to the borrower- lead generator, friends, family employees etc. Someone unknown to the borrower First Payment Default, Bust Out, Synthetic Identity, Stacking etc. Friendly Fraud- someone misuses the trust Fraud rings, Identity Theft, Account Takeover Lender Borrower, Lender Borrower, Lender First Party Second Party Third Party 8
  • 9. Sample Modus Operandi • Stolen identity • Synthetic identity • May replicate best customer (prime and super prime) • Falsified info • No willingness to pay • Acquire multiple loans in a short window ( invisible window) • May provide all info correctly • More likely to be on higher side in the risk spectrum • No or low willingness to pay • Mimic good payment behavior for significant time • Bust out when gains are highestCommon Fraud Related Terms- http://www.cpp.co.uk/helpful-info/fraud-glossary-of-terms 9
  • 10. Current Situation- Heuristics and Regression Driven Approaches Intuitive Heuristics Statistical • Manual Reviews • Experts Driven • Gut feeling • Thumb rules • Driven by past experience • Quick decision making • Control/ confidence limits • Outlier detection/ deviation from norm • Decision tree, regression, time series 10
  • 11. 10,000 + Features Unstructured Transactional Social Device & IP Third Parties Bureau Why go Deep? Explosion of Features and Data Sources • Uncover hard to detect patterns (using traditional techniques) when the incidence rate is low • Find latent features (super variables) without significant manual feature engineering • Real time fraud detection and self learning models using streaming data (KAFKA, MapR) • Ensure consistent customer experience and regulatory compliance • Higher operational efficiency • Big data and data exhaust handling capabilities 11
  • 12. UNSUPERVISED DEEP LEARNING ALGORITHMS AND USE CASES 12
  • 13. Find Anomalies- Autoencoder • Traditional techniques based on density or distance works better with linearly separable data • Stacked Autoencoders (SAE) and Deep Belief Networks ( DBN) make no assumptions about the distribution of data and work better on non linearly separable data • Unsupervised learning algorithms for feature learning, feature reduction and outlier detection • Input vectors are used as output vectors and reconstruction error computed • The data points with higher reconstruction error ( MSE) are more likely to be outliers • Helps in detecting different modus operandi of fraudsters Use Case- Deployment of Autoencoder for Credit Card Fraud Detection 13
  • 14. Sequence Analysis- Recurrent Neural Network (LSTM) • Recurrent Neural Network (RNN) are a special type of feed-forward network used for sequential data analysis where inputs are not independent and are not of fixed length • Rather in this case, inputs are dependent on each other along the time dimension. In other words, what happens in time ‘t’ may depend on what happened in time ‘t-1’, ‘t-2’ and so on • These are also called ‘memory’ networks as previous inputs and states persist in the model for doing a more optimal sequential analysis. They can have both short term and long term time dependence. • Long Short Term Memory (LSTM) is one of the most popular Deep Network used for sequential data analysis. • More on LSTM Here- https://datafai.com/2018/03/08/recurrent- neural-network-rnn-in-python/ Use Case- Use RNN (LSTM) to analyse web behaviour and logs to detect fraudulent behavior 14
  • 15. Find Networks - Clique and Links Graphs Detect Fraudulent Cases Find Commonalities Form Network • Use variety of attributes (on-us/ off-us) to build linkage between known bad customers and other customers with unknown status • Larger the size of network, easier the detection and vice versa • Overlap networks using enumerative approaches and find commonalities • Use graph transduction (t-SNE) to detect potential fraudulent cases by doing peer group (archetype) analysis to separate routine behavior from suspicious behavior - “birds of same feather flock together” 15
  • 16. SUPERVISED DEEP LEARNING ALGORITHMS AND USE CASES 16
  • 17. Real Time Detection- Convolution Neural Network (CNN) • Convolution Neural Network (CNN) are particularly useful for spatial data analysis, image recognition, computer vision, natural language processing, signal processing and variety of other different purposes. They are biologically motivated by functioning of neurons in visual cortex to a visual stimuli. • What makes CNN much more powerful compared to the other feedback forward networks for image recognition is the fact that they do not require as much human intervention and parameters as some of the other networks such as MLP do. This is primarily driven by the fact that CNNs have neurons arranged in three dimensions. • More on CNN Here- https://datafai.com/2018/02/25/deep-learning- convolution-neural-network-cnn-in-python/ Use Case- CNN for real time classification 17
  • 18. Labeled Data- Multilayer Perceptron (MLP) • These are the most basic networks and feed forward the inputs to create output. They consist of an input layer and an output layer and many interconnected hidden layers and neurons between the input and the output layers. • They can be used for any supervised regression or classification problems • Since they generally use some non linear activation function such as Relu or Tanh to compute the losses ( the difference between the true output and computed output) such as Mean Square Error ( MSE), Logloss, they are more suitable for handling non linear problems. • We will do a MLP Demo on credit card fraud data 18
  • 19. MLP Demo- Case Details • Anonymized credit card transactions data from European customers • 30 features ( 28 anonymized, duration elapsed, amount of transactions) • Label- fraud or normal transaction • 17bps incidence rate for fraudulent transactions • 284,807 total transaction in data Sources: http://mlg.ulb.ac.be | https://www.kaggle.com/dalpozz/creditcardfraud 19
  • 20. MLP Demo- Tools and Techniques used Python 2.7 or 3.6 Keras 2.0.2 TensorFlow 1.0.1 20
  • 21. MLP Demo- Traditional Modeling Techniques Process Manual Feature Engineering After variable treatments drop variables with little or no explaining power- WOE, IV, Distribution Look at WOE to create bins etc. WOEDensity Dist. 21
  • 22. MLP Demo- Network Training Little or No Manual Feature Engineering • No over or under sampling • No variables dropped • Only standardization of features done • 75% training/ 25% validation • No manual binning Fitted Network • Multi Layer Perceptron with three hidden layers. o Activation function = Sigmoid o # of neurons = 512 in the input layer o Each consequent layer has half the neurons o Cost function = logloss o Optimizer = adam o Epochs= 5 o Dropout rate = 30% 22
  • 23. MLP Demo- Performance Summary Metric Value Accuracy Score 99.9% Logloss 0.003 Precision Score 77% Recall Score 75% Area Under the Curve (AUC) 87.4% FScore 76.5% 23
  • 24. MLP Demo- Hyperparameters Optimization • Epochs = [5,10,15,20,25…] • Batch Size = [5,10,20,30,40…] • Optimizer= [‘SGD’, ’Adam’, ’RMSprop’…] • Learning Rate = [0.01,0.05,0.1,0.2…] • Momentum = [0.2,0.4,0.6,…] • Weights Initiation= [‘Uniform’, ‘Normal’, …] • Activation Function= [‘relu’,’sigmoid’, ‘tanh’, ‘softmax’,…] • Drop-out rate= [0.0,0.2,0.4,0.5,…] • Neurons= [5,10,20,30,40…] Python scikit-learn gridsearch function, design of experiment( screening design, fractional designs) needs to be combined with intutition and expertise to come out with the best network! 24
  • 25. Thank You! Christopher McDougall- “Every morning in Africa, a gazelle wakes up, it knows it must outrun the fastest lion or it will be killed. Every morning in Africa, a lion wakes up. It knows it must run faster than the slowest gazelle, or it will starve. It doesn't matter whether you're the lion or a gazelle-when the sun comes up, you'd better be running. Working in the fraud analytics is the same way. 25 25
  • 26. Next Webinar : Go-to-market strategy / Planning Date : 2nd Nov 2018 Speaker: Ashok Munirathinam, Sr. Director, SAP Cloud Platform SAP Asia Pacific & Japan Queries: Ankita@nasscom.in 26