Michalis Agathocleous DEPARTMENT OF COMPUTER SCIENCE Department of Computer Science Fraud Prediction Intelligent Systems In Business David Barber.

Slides:



Advertisements
Similar presentations
M-PAYMENT SYSTEM (e–WALLET ).
Advertisements

The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Data Mining Glen Shih CS157B Section 1 Dr. Sin-Min Lee April 4, 2006.
1. Abstract 2 Introduction Related Work Conclusion References.
The Decision-Making Process IT Brainpower
Data Mining Knowledge Discovery in Databases Data 31.
An electronic machine that bank customers and credit union members can use to withdraw cash and make other financial transactions.
Data Mining By Archana Ketkar.
Learning Programs Danielle and Joseph Bennett (and Lorelei) 4 December 2007.
DataMining By Guan Hang Su CS157A section 2 fall 2005.
Data Mining: A Closer Look
Introduction to Data Mining Engineering Group in ACL.
Statistical Natural Language Processing. What is NLP?  Natural Language Processing (NLP), or Computational Linguistics, is concerned with theoretical.
Data Mining By Andrie Suherman. Agenda Introduction Major Elements Steps/ Processes Tools used for data mining Advantages and Disadvantages.
1 The Role of the Finance Department Higher Grade Business Management 2009.
Comparison of Classification Methods for Customer Attrition Analysis Xiaohua Hu, Ph.D. Drexel University Philadelphia, PA, 19104
Bucharest, 10-February-2004 Neural Risk Management S.A. Scoring solutions Making full use of your data.
1 © Goharian & Grossman 2003 Introduction to Data Mining (CS 422) Fall 2010.
Dr. Awad Khalil Computer Science Department AUC
Knowledge Discovery & Data Mining process of extracting previously unknown, valid, and actionable (understandable) information from large databases Data.
Data Mining By Jason Baltazar, Phil Cademas, Jillian Latham, Rachel Peeler & Kamila Singh.
Oklahoma’s Personal Financial Literacy Passport
Data Mining. 2 Models Created by Data Mining Linear Equations Rules Clusters Graphs Tree Structures Recurrent Patterns.
Data Mining Dr. Chang Liu. What is Data Mining Data mining has been known by many different terms Data mining has been known by many different terms Knowledge.
CS490D: Introduction to Data Mining Prof. Chris Clifton April 14, 2004 Fraud and Misuse Detection.
Data Mining Techniques As Tools for Analysis of Customer Behavior
MACHINE LEARNING 張銘軒 譚恆力 1. OUTLINE OVERVIEW HOW DOSE THE MACHINE “ LEARN ” ? ADVANTAGE OF MACHINE LEARNING ALGORITHM TYPES  SUPERVISED.
Anomaly detection with Bayesian networks Website: John Sandiford.
Using Neural Networks in Database Mining Tino Jimenez CS157B MW 9-10:15 February 19, 2009.
Artificial Neural Nets and AI Connectionism Sub symbolic reasoning.
91 st Annual Meeting & Exposition April 1 – 4, 2012 Anaheim, California Commercial Payments Overview Visa, Inc. NAEP April 2012.
FRAUD Prevention & Detection. Group Members Raven Smith Tommy Harville Kedron Hilario.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
Banking on Analytics Dr A S Ramasastri Director, IDRBT.
Data Mining Knowledge on rough set theory SUSHIL KUMAR SAHU.
P-1 © 2005 NeuralWare. All rights reserved. Using Neural Networks in Decision Support Systems Introduction Core Technology Building and Deploying Neural.
Amer Kanj Data Mining For Business Professionals.
Identity Theft Project Erin L. Caraway Jacob Locke.
1. The efficient management of finance is important to the success of an organisation. 2.
1 Introduction to Neural Networks And Their Applications.
Zoran Bohaček Croatian Quants Day 22. II Business reasons to analyse a credit registry database.
1 Pattern Recognition Pattern recognition is: 1. A research area in which patterns in data are found, recognized, discovered, …whatever. 2. A catchall.
Artificial Intelligence is the field of computer science that studies how machines can be made to act intelligently. The benefit of using The benefit of.
Feature Vector Selection and Use With Hidden Markov Models to Identify Frequency-Modulated Bioacoustic Signals Amidst Noise T. Scott Brandes IEEE Transactions.
© Oklahoma State Department of Education, All rights reserved. 1 Standard 3. Finding Financial Services.
LESSONS ENTREPRENEURSHIP: Ideas in Action© SOUTH-WESTERN PUBLISHING Chapter 7 FINANCE, PROTECT, AND INSURE YOUR BUSINESS Put Together a Financial.
Artificial Intelligence, Expert Systems, and Neural Networks Group 10 Cameron Kinard Leaundre Zeno Heath Carley Megan Wiedmaier.
Real-time Intelligence that Matters 1. © 2015, Brighterion Inc. (all rights reserved) Keeping an eye on your business 53% of consumers who experienced.
Agribusiness Library LESSON L060020: EVALUATING SOURCES OF CREDIT.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Neural Network and Deep Learning 王强昌 MLA lab.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition Objectives: Reestimation Equations Continuous Distributions.
Financial Data mining and Tools CSCI 4333 Presentation Group 6 Date10th November 2003.
Miloš Kotlar 2012/115 Single Layer Perceptron Linear Classifier.
Monday, February 22,  The term analytics is often used interchangeably with:  Data science  Data mining  Knowledge discovery  Extracting useful.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
A Hybrid Model of HMM and RBFN Model of Speech Recognition 길이만, 김수연, 김성호, 원윤정, 윤아림 한국과학기술원 응용수학전공.
Technology and Banking Banking and Financial Services 1.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
INTRODUCTION TO INFORMATION SYSTEMS LECTURE 9: DATABASE FEATURES, FUNCTIONS AND ARCHITECTURES PART (2) أ/ غدير عاشور 1.
The Application of Data Mining in Telecommunication by Wang Lina February 2003.
Prepared by Fayes Salma.  Introduction: Financial Tasks  Data Mining process  Methods in Financial Data mining o Neural Network o Decision Tree  Trading.
Big data classification using neural network
Business Analytics Applications in Budget Modelling
Fraud Risk Management at Digital Insurance Market
The Role of the Finance Department
Self organizing networks
Advantages and Disadvantages of Credit
Integrating Deep Learning with Cyber Forensics
Presentation transcript:

Michalis Agathocleous DEPARTMENT OF COMPUTER SCIENCE Department of Computer Science Fraud Prediction Intelligent Systems In Business David Barber

 What is Fraud?  How Fraud can arise?  Machine Learning in Fraud Prediction  History of Fraud Prediction  Application Area  Credit card Fraud Prediction  Credit card Fraud Prediction using Artificial Neural Networks  Credit card Fraud Prediction using Hidden Markov Models  Telecommunication Fraud Prediction using Support Vector Machines  Strengths and weaknesses of those techniques  Conclusion Department of Computer Science Fraud Prediction

 Fraud in the broadest sense is the deception made for personal gain or to damage another individual  Economic crime - civil law violation  Bank fraud arise at 10 billion dollars each year (the bank robberies are “just” 65 million dollars)  30% of the 3000 companies in 54 countries had fallen victims of fraud  Fraud nationwide is estimated to the amount of 400 billion dollars a year Department of Computer Science Fraud Prediction

 Check fraud  New account fraud  Identity fraud  Credit/debit card fraud  ATM transaction fraud  Wire fraud  Loan fraud  Internet transaction/ e-cash fraud  Insurance fraud and health care fraud  Money laundering  Intrusion into computers or computer networks  Telecommunications fraud  Voice over IP fraud  Subscription/Identity fraud  Committing fraud to get government benefits  False advertising  False billing  Tax fraud and so on Department of Computer Science Fraud Prediction

 Sharply evolution of technology with huge flow of information(extremely huge and unexplored)  Databases give patterns and information  Can help Companies and Banks to predict fraud (decrease their loss)  Statistical models and Machine Learning Algorithms can identify useful information (pattern recognition, classification, association, forecasting, clustering) Department of Computer Science Fraud Prediction

 Statistical Models (for auditors) ◦ Triangular approach (1980) ◦ Red Flag (1989) ◦ Eclectic fraud detection model-ROP(2001)  Credit Card fraud prediction using Neural Networks(1994)  Utilized the information in financial statements as fraudulent signals in neural network models (1997), Neural Networks for credit approval, bankruptcy prediction, stock selection and automated trading.  Telecommunication industry fraud detection was using Support Vector Machines (2001)  Credit Card fraud prediction: ◦ CARDWATCH (1997) ◦ Naive Bayesian method with Back Propagation neural networks (2004) ◦ Hidden Markov Models (2008) Department of Computer Science Fraud Prediction

 Big companies and banks have their own fraud prediction systems (Nat West, Barclays, HSBC, Google, Yahoo, Microsoft)  Coopers and Deloitte use fraud prediction systems – Accounting companies  Smaller companies are installing commercial programs  Companies like Neural Technologies, ISACA, Conectys and Norkom Technologies can offer variety of service like: Department of Computer Science Fraud Prediction Services of fraud Prediction Companies Assessing customers for bad debt/fraud at application stage Managing credit risk throughout the customer lifetime Identifying and reducing fraud from customers, outsiders and employees Streamlining collections procedures Locating debtors quickly and efficiently Managing customer attrition/churn Optimising marketing efforts Ensuring all revenue generated is correctly billed or accounted for

Department of Computer Science Fraud Prediction  Credit card fraud is a huge problem for banks (because of electronic commerce technology)  Two types of Credit card Fraud ◦ Stolen physical card ◦ Stolen card number  Cardholders’ Spending Patterns ◦ Typical purchase category ◦ The time since the last purchase ◦ The typical amount of money spent for each purchase

Department of Computer Science Fraud Prediction  CARDWATCH is a database mining system ◦ provides information about cardholders’ purchase patterns  The user can choose ◦ the type of data (training and testing) ◦ the structure of Neural Network ◦ the values of a variety of parameter  The Neural Network can be trained with ◦ Backpropagation Algorithm ◦ Batch Backpropagation algorithm with momentum ◦ Conjugate Gradient Algorithm  Input data : category of the purchase, the amount spent and time passed since the last purchase  The Neural Network try to reproduce legal patterns  100% correct prediction of legal movements and 85% correct prediction of fraudulent movements

 HMM can represent sequential processes like cardholder's spending pattern  HMMs have ◦ A set of states ◦ A set of observation symbols for each state (use the K-means algorithm) ◦ Transition matrix probability distribution ◦ observation symbol probability distribution ◦ Initial state probability distribution  HMM is trained with Baum-Welch algorithm (Expectation-Maximization algorithm)  Fully Connected HMM with: ◦ dataset sizes 100 ◦ sequence lengths 15 ◦ fraud threshold 50% ◦ number of states 10  Accuracy of 80% Department of Computer Science Fraud Prediction

 Mobile telecommunication customer payment fraud detection  User profiling method: suspicious changes in customer behaviour  One year’s action history on 53,696 people: delay period, total delayed fees, delay time, delay frequency, credit degree measurement  Two layered structure  The first layer ◦ Had behaviour monitor (10 Support Vector Machine each) ◦ Different groups of features indicating fraud behaviours ◦ Polynomial kernel with equation degree two  The second layer ◦ Was used as a Decision Support Machine (counting the number of fraudulent results) ◦ Threshold of 0.5  Accuracy: 98.52% to 99.44% of correct predictions Department of Computer Science Fraud Prediction

 The algorithm must be chosen according to the kind of the data and problem  Advantages of HMM: ◦ As an unsupervised techniques have an advantage that no labelling is needed (difficult task to label a transaction as fraudulent or not) ◦ take in account hidden parameters  Disadvantage of CARWATCH: ◦ Reproduce patterns ◦ Only one hidden Layer (in contrast with kolmogorov theorem )  The creators of the telecommunication fraud prediction system could make more experiments with different kernels (Gaussian and RBF)  In general the above systems: ◦ Advantage: very good results with high accuracy ◦ Disadvantage: one trained model is needed for every person Department of Computer Science Fraud Prediction

Department of Computer Science Fraud Prediction  Machine Learning techniques can find really good solutions for the fraud prediction problem  Applications can be very good tool for businesses, banks and auditors (Increase their profits by reducing the unexpected fraudulent losses)  Due to the technology evolution, more and more fraudulent transactions will take place, so all the companies should use Fraud Prediction Application  In my opinion ◦ more work should be done on the data feature extraction processes ◦ A well trained model with the right data can save a lot of billions of fraudulent money

Department of Computer Science Fraud Prediction