Premium Essay

Real-Time Fraud Detection: How Stream Computing Can Help the Retail Banking Industry

In:

Submitted By filipemga
Words 56858
Pages 228
Para os meus pais, porque "o valor das coisas não está no tempo que elas duram, mas na intensidade com que acontecem. Por isso existem momentos inesquecíveis, coisas inexplicáveis e pessoas incomparáveis" como vocês! Obrigado por tudo, Filipe

Abstract
The Retail Banking Industry has been severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time Analysis, Fraud, Data Mining, Retail Banking Industry, Data Preprocessing, Data Classification, Behavior-based Models, Supervised Analysis, Semi-supervised Analysis

Sammanfattning
Privatbankerna har drabbats hårt av bedrägerier de senaste åren. Bedragare har lyckats kringgå forskning och tillgängliga system och lura bankerna och deras kunder. Därför vill vi införa en ny, polyvalent

Similar Documents

Premium Essay

Real-Time Fraud Detection

...coisas inexplicáveis e pessoas incomparáveis" como vocês! Obrigado por tudo, Filipe Abstract The Retail Banking Industry has been severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time Analysis, Fraud, Data Mining, Retail Banking Industry, Data Preprocessing, Data Classification, Behavior-based Models, Supervised Analysis, Semi-supervised...

Words: 56858 - Pages: 228

Premium Essay

Big Data Sap Hana

...producers, distributors, and consumers of goods and services. The growth in volume, variety, and velocity of data has created new challenges and opportunities. The information access, analysis, and management challenges of the intelligent economy can overwhelm organizations unprepared for the emerging changes. In this environment, it is not only access to data but the ability to analyze and act upon it that creates competitive advantage in commercial transactions, enables sustainable and secure management of communities, and promotes appropriate distribution of social, healthcare, and educational services. It is not only access to data but the ability to analyze and act upon it that creates competitive advantage. www.idc.com P.508.872.8200 F.508.935.4015 In This White Paper This IDC white paper discusses the emerging technologies of the Big Data movement. It breaks out these technologies according to their most effective roles and use cases. It also discusses why Big Data has become so important at this time and how Big Data can help enterprises reach their business goals. It considers the challenges created by Big Data and how they can be met. It identifies the relevant technology offered by SAP and shows how those technologies can help enterprises effectively leverage Big Data to their advantage. Global Headquarters: 5 Speen Street Framingham, MA 01701 USA Drivers of Big Data: Why Now? What's New? Commercial and public sector organizations are driven to invest in Big...

Words: 6068 - Pages: 25

Premium Essay

Bigdata

...4. 4.1 Big Data Introduction In 2004, Wal-Mart claimed to have the largest data warehouse with 500 terabytes storage (equivalent to 50 printed collections of the US Library of Congress). In 2009, eBay storage amounted to eight petabytes (think of 104 years of HD-TV video). Two years later, the Yahoo warehouse totalled 170 petabytes1 (8.5 times of all hard disk drives created in 1995)2. Since the rise of digitisation, enterprises from various verticals have amassed burgeoning amounts of digital data, capturing trillions of bytes of information about their customers, suppliers and operations. Data volume is also growing exponentially due to the explosion of machine-generated data (data records, web-log files, sensor data) and from growing human engagement within the social networks. The growth of data will never stop. According to the 2011 IDC Digital Universe Study, 130 exabytes of data were created and stored in 2005. The amount grew to 1,227 exabytes in 2010 and is projected to grow at 45.2% to 7,910 exabytes in 2015.3 The growth of data constitutes the “Big Data” phenomenon – a technological phenomenon brought about by the rapid rate of data growth and parallel advancements in technology that have given rise to an ecosystem of software and hardware products that are enabling users to analyse this data to produce new and more granular levels of insight. Figure 1: A decade of Digital Universe Growth: Storage in Exabytes Error! Reference source not found.3 1 ...

Words: 22222 - Pages: 89

Premium Essay

Gaurav

... Nandakumar, M. Sasi Siddharth Thiagarajar College of Engineering, vr_muruganandham@hotmail.com, siddharth_mss@sify.com raamanujan@gmail.com, nandacivil@gmail.com The global economic scenario is undergoing a major innovative metamorphosis at a rate never experienced before. All organizations have their brands to face the global marketing challenges to secure a role of leader in this state of economic revolution. Our paper identifies the current marketing challenges and global economic threats for service industries. Besides our paper also explores the management strategies to overcome these challenges in the liberalized economy. The banking service is considered, where the franchising marketing strategies, introduction of new products and delightful customer service by new private sector banks and foreign banks pose a serious threat to the existence and survival of public sector banks profitwise. Hence our paper deeply discusses the benefits of e-banking with a view to minimize transaction cost cum operating expenses thereby increasing the overall net profit to enable for successful survival by overcoming the threats posed by foreign banks. 455 Ball Bouncing Exercise Jayanta K. Nandi, ICFAI Business School, Jaipur, jknandi@rediffmail.com This exercise is aimed at to demonstrate such dynamics that influence the individuals to achieve the organizational goal as a whole, more effectively and efficiently. During this exercise two balls...

Words: 23823 - Pages: 96

Free Essay

Big Data

...McKinsey Global Institute June 2011 Big data: The next frontier for innovation, competition, and productivity The McKinsey Global Institute The McKinsey Global Institute (MGI), established in 1990, is McKinsey & Company’s business and economics research arm. MGI’s mission is to help leaders in the commercial, public, and social sectors develop a deeper understanding of the evolution of the global economy and to provide a fact base that contributes to decision making on critical management and policy issues. MGI research combines two disciplines: economics and management. Economists often have limited access to the practical problems facing senior managers, while senior managers often lack the time and incentive to look beyond their own industry to the larger issues of the global economy. By integrating these perspectives, MGI is able to gain insights into the microeconomic underpinnings of the long-term macroeconomic trends affecting business strategy and policy making. For nearly two decades, MGI has utilized this “micro-to-macro” approach in research covering more than 20 countries and 30 industry sectors. MGI’s current research agenda focuses on three broad areas: productivity, competitiveness, and growth; the evolution of global financial markets; and the economic impact of technology. Recent research has examined a program of reform to bolster growth and renewal in Europe and the United States through accelerated productivity growth; Africa’s economic potential;...

Words: 60035 - Pages: 241

Free Essay

Mcda Analysis

...McKinsey Global Institute June 2011 Big data: The next frontier for innovation, competition, and productivity The McKinsey Global Institute The McKinsey Global Institute (MGI), established in 1990, is McKinsey & Company’s business and economics research arm. MGI’s mission is to help leaders in the commercial, public, and social sectors develop a deeper understanding of the evolution of the global economy and to provide a fact base that contributes to decision making on critical management and policy issues. MGI research combines two disciplines: economics and management. Economists often have limited access to the practical problems facing senior managers, while senior managers often lack the time and incentive to look beyond their own industry to the larger issues of the global economy. By integrating these perspectives, MGI is able to gain insights into the microeconomic underpinnings of the long-term macroeconomic trends affecting business strategy and policy making. For nearly two decades, MGI has utilized this “micro-to-macro” approach in research covering more than 20 countries and 30 industry sectors. MGI’s current research agenda focuses on three broad areas: productivity, competitiveness, and growth; the evolution of global financial markets; and the economic impact of technology. Recent research has examined a program of reform to bolster growth and renewal in Europe and the United States through accelerated productivity growth; Africa’s economic potential;...

Words: 60035 - Pages: 241

Premium Essay

Computer Security

...CHAPTER 3 CO M P U TE R A N D I NT E R N E T C R IME QUOTE In view of all the deadly computer viruses that have been spreading lately, Weekend Update would like to remind you: when you link up to another computer, you’re linking up to every computer that that computer has ever linked up to. —Dennis Miller, Saturday Night Live, U.S. television show VIGNETTE Treatment of Sasser Worm Author Sends Wrong Message Unleashed in April 2004, the Sasser worm hit IT systems around the world hard and fast. Unlike most computer viruses before it, the Sasser worm didn’t spread through e-mail, but moved undetected across the Internet from computer to computer. It exploited a weakness in Microsoft Windows XP and Windows 2000 operating systems. By the first weekend in May, American Express, the Associated Press, the British Coast Guard, universities, and hospitals reported that the Sasser worm had swamped their systems. Computer troubles led Delta Airlines to cancel 40 flights and delay many others. Microsoft quickly posted a $250,000 reward, and by mid-May, authorities apprehended Sven Jaschen, a German teenager. Jaschen confessed and was convicted after a three-day trial. Jaschen could have received up to five years in prison, but because he was tried as a minor, the court suspended his 21-month sentence, leaving him with only 30 hours of community service. Copyright © 2007 by Thomson Course Technology. All rights reserved. This publication is protected by federal copyright...

Words: 18526 - Pages: 75

Free Essay

Management Information Systems

...studymaterial.ca ADMS 2511 MIS Notes Ch 1 – Modern Organization in the Global, Web-Based Environment Management information systems (MIS)- deals with the planning of info tech to help people perform tasks related to info processing and management Information technology (IT)- any computer-based tool used with info to support the needs of an org Importance of Planning for IT -a new info system can apply to the whole org, or a specific area of the org Application portfolios- are groups of new system proposals (apps that have to be added/modified) IT Planning -begins with an organizational strategic plan -states  the  firm’s  mission,  goals,  and  steps  to  reach  those  goals -IT architecture describes  the  way  an  org’s  info  resources  should  be  used  to  accomplish  its  mission -includes both technical (hardware operating systems) and managerial aspects (managing the IT dpt, how area managers will be involved) IT strategic plan- LT goals that describe the IT infrastructure and major IT initiatives to achieve the organization’s  goals -it must meet three main objectives: -must  be  aligned  with  the  org’s  strategic  plan -must provide for an IT architecture that networks users, apps, and databases -must efficiently allocate IS resources among different projects so they can all be completed on time, within budget, and function properly IT steering committee- composed of managers/staff who rep diff organizational units -they  establish  IT  priorities  to  ensure  MIS  function...

Words: 24496 - Pages: 98

Free Essay

Core Concepts of Ais

...CORE CONCEPTS OF Accounting Information Systems Twelfth Edition Mark G. Simkin, Ph.D. Professor Department of Accounting and Information Systems University of Nevada Jacob M. Rose, Ph.D. Professor Department of Accounting and Finance University of New Hampshire Carolyn Strand Norman, Ph.D., CPA Professor Department of Accounting Virginia Commonwealth University JOHN WILEY & SONS, INC. VICE PRESIDENT & PUBLISHER SENIOR ACQUISITIONS EDITOR PROJECT EDITOR ASSOCIATE EDITOR SENIOR EDITORIAL ASSISTANT PRODUCTION MANAGER PRODUCTION EDITOR MARKETING MANAGER CREATIVE DIRECTOR SENIOR DESIGNER PRODUCTION MANAGEMENT SERVICES SENIOR ILLUSTRATION EDITOR PHOTO EDITOR MEDIA EDITOR COVER PHOTO George Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the...

Words: 241803 - Pages: 968

Premium Essay

Mba Syllabus

...3 of UGC Act, 1956) FACULTY OF MANAGEMENT SCHOOL OF MANAGEMENT MBA FULL TIME CURRICULUM AND SYLLABUS - 2013-14 1 Code MB 13101 MB 13102 MB 13103 MB 13104 MB 13105 MB 13106 SRM University MBA - Revised Curriculum - 2013-14 Semester –I Thinking and Communication Skills (Practical) Accounting for Decision Making Philosophy for Management Economics for Managers Managerial Statistics Managerial Skills (Practical) Semester-II Financial Management Management Information System Marketing Human Resource Management Production And Operation Management Legal Aspects of Business Semester- III Summer Internship (8 weeks)(Practical) Entrepreneurship Strategic Management Business Analytics (Practical) Elective-1 Elective-2 Elective-3 Elective-4 Semester- IV Elective-5 Elective-6 Industrial Elective (Practical) Total Credit L 0 2 3 2 2 0 T 0 4 0 2 4 0 P 4 0 0 0 0 6 C 2 4 3 3 4 3 19 4 3 4 2 4 3 20 2 3 3 2 3 3 3 3 22 3 3 5 11 72 MB 13207 MB 13208 MB 13209 MB 13210 MB 13211 MB 13212 MB 13313 MB 13314 MB 13315 MB 13316 2 2 3 2 3 2 0 2 2 0 2 2 2 2 2 2 0 4 2 2 0 2 2 0 2 2 0 2 2 2 2 2 2 0 0 0 0 0 0 0 4 0 0 4 0 0 0 0 0 0 10 MB 13417 Functional Electives Marketing Finance Systems Human Resource Operations Vertical Electives Pharma Hospitality Enterprise Resource Planning Agriculture Hospital and Health Care Retailing Auto Industry Project Management Media and Communication Banking Financial Service Insurance   2 MB 13FM01 MB 13FM02 MB 13FM03 MB 13FM04...

Words: 53231 - Pages: 213

Premium Essay

Ways to

...in Banking Insight and Foresight Institute for Development and Research in Banking Technology (Established by Reserve Bank of India) Foreword The Indian banking industry, almost in keeping with the deep entrepreneurial approach of the country s business, has come a long way. This report is an effort to capture some exemplary initiatives and developments so far as well as discuss the emerging trends. The insights and understanding of the technology trends and ground-level work being done by the banks has been culled from the nominations received from banks for the IDRBT Banking Technology Excellence Awards 2010. The transformation of Indian banks in the last decade has been phenomenal from local branch banking to global presence and anywhere-anytime banking. Most of the regular banking transactions can today be carried out from mobile phones. Sustained reforms and information technology (IT) have played a pivotal role since the initiation of the second phase of reforms post 1998. The benefits of technology such as scale, speed and low error rate are also reflecting in the performance, productivity and profitability of banks, which have improved tremendously in the past decade. Regulatory initiatives from the Central Bank have also played a large role in the banking sector. Robust technology-enabled organizations have now become the mainstay of the industry. Initiatives such as electronic clearing service (ECS), national electronic funds transfer (NEFT), real-time gross...

Words: 24716 - Pages: 99

Premium Essay

Business Law.Types of Companies

...Definition: An information system can be any organized combination of people, hardware, software, computer networks and data resources that stores and retrieves, transforms, and disseminates information in an organization. Roles of IS in Business: There are three fundamental reasons for all business applications of information technology. They are found in the three vital roles that information system can perform for a business enterprise.  Support of its business processes and operations.  Support of decision making by its employees and managers.  Support of its strategies for competitive advantage. Trends in IS: The business applications of information systems have expanded significantly over the years.  Data Processing (1950s – 1960s): Electronic data processing systems which includes transaction processing, record keeping, and traditional accounting applications.  Management Reporting (1960s – 1970s): Management information systems that include preparation of management reports of pre specified information to support decision making.  Decision Support (1970s – 1980s): Decision support systems include interactive ad hoc support of managerial decision making process.  Strategic and End User Support (1980s – 1990s): o End user computing systems: Direct computing support for end user productivity and work group collaboration. o Executive information systems: Critical information for top management. o Expert Systems: Knowledge based expert advice for...

Words: 13881 - Pages: 56

Free Essay

Cams

...CAMS Karim Rajwani, CAMS Mansoor Siddiqi, CAMS Saskia Rietbroek, CAMS Ed Rodriguez, CAMS Nancy J. Saur, CAMS Wendy Steichen, CAMS Brian J. Stoeckert, CAMS Charles Taylor, CAMS Will Voorhees, CAMS Natalie Ware, CAMS Peter Warrack, CAMS Amy Wotapka, CAMS Crispin Yuen, CAMS Copyright © 2012 by the Association of Certified Anti-Money Laundering Specialists (ACAMS). Miami, USA. All rights reserved. No part of this publication may be reproduced or distributed, and may not be made available in any electronic format, without the prior written permission of ACAMS. ISBN: 978-0-9777495-2-2 Table of Contents Table of Contents Study and Test-Taking Tips and Techniques.....................................XIII Understanding How You...

Words: 105184 - Pages: 421

Premium Essay

Information Technology

...issues related to information technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security incidents to the U.S. Homeland Security Department during fiscal year 2008, triple the number from two...

Words: 25389 - Pages: 102

Premium Essay

Accounting

...the different stakeholders, and in practice, the target of the manipulation appears generally to be the earnings per share and the debt/equity ratio. The paper also describes the different actors involved and their potential gains and losses. We review the literature on the various techniques of accounts manipulation: earnings management, income smoothing, big bath accounting, creative accounting, and window-dressing. The various definitions of all these, the main motivations behind their application and the research methodologies used are all examined. This study reveals that all the above techniques have common elements, but there are also important differences between them. I. Introduction Finns have been manipulating accounts for a long time, and this practice, well known in the literature, has been given various names: earnings management, income smoothing, big bath accounting, creative accounting, and window dressing. This paper aims to provide a comprehensive review of the literature and propose a conceptual framework for accounts...

Words: 21102 - Pages: 85