Note that there are some explanatory texts on larger screens.

plurals
  1. PO
    primarykey
    data
    text
    <p>At least in substantial part, this is my day job. From your Question, it seems you are thinking of the discipline of <em>Machine Learning</em> (rather than the broader rubric, <em>AI</em>). And i think your instincts are correct--an ML algorithm is ideally suited to fraud prediction/detection because it can <em>generalize</em> over a highly non-linear domain and it can <em>adapt</em> (as new data is fed to it). So because of these two primary characteristics, it is far more difficult for fraudsters to discern the algorithms' "rules" for prediction--because these rules are in fact a complexly reticulated set of soft-constraints and which change over time as the algorithm learns against new data. (I might suggest though setting aside A* unless you have a particular reason to believe pathfinding is a useful heuristic for your problem--i am reluctant to say there is no connection, but if there is, it's certainly an unorthodox one--i have never seen pathfinding applied to this sort of problem).</p> <p>The only fact you mentioned about the type of online fraud you are interested in identifying is multiple accounts by a single user. No doubt a variety of techniques could be applied here, but i'll mention one analytical technique in particular because: <em>(i)</em> i have actually used it in the scenario you mentioned; and <em>(ii)</em> it is outside the scope of the other Answers, so far.</p> <p>The technique is based in <strong><em>graph theory</em></strong>. </p> <p>The premise: accounts which are owned by the <em>same</em> user are often best identified not by their individual behavior (clickstream) but by their <em>relationship</em> to one another--in other words by their <em>network behavior</em>.</p> <p>An example: <a href="http://pokerterms.com/chip-dumping.html" rel="nofollow noreferrer"><em>chip-dumping</em></a> in online poker. Here, an individual opens <em>multiple</em> new accounts on a poker site (using bogus information) and then claims the advertised bonus for <em>each</em> account (e..g, deposit of $100 is matched by a $100 bonus). Of course, the bonus has highly restrictive "cash-out rules, generally a threshold number of hands played before the bonus becomes like cash and can be withdrawn from the player's accounts as cash.</p> <p>So the goal of chip dumping is to turn those bonus dollars in to real cash. One person opens five separate accounts (as five different people) then opens one more "legitimate" account (using their genuine identity). These six players--again actually just a single player--will play at <em>one</em> table against each other and the five sham accounts will quickly lose their stacks to the legitimate account, which quickly cashes out their winnings because of course the cash-out restrictions on bonuses apply only to the account to which they were originally given; hence the cash-out restrictions are completely circumvented.</p> <p>What's difficult about this type of scheme is that the illegal conduct is virtually impossible to detect on an individual account basis--*the bad behavior, <em>collusion</em>, arises from the <strong>interaction</strong> of a group of commonly-owned accounts*--in other words, the behavior of interest needs to be studied at the <em>network level</em>. </p> <p>And therefore, <em>Graph Theory</em> is a natural framework for analysis.</p> <p>The technique i have applied was based on an academic paper by Chau et al. at Carnegie Mellon, titled <em><a href="http://www.cs.cmu.edu/~dchau/papers/auction_fraud_pkdd06.pdf" rel="nofollow noreferrer">Detecting Fraudulent Personalities in Networks of Online Auctioneers</a></em> (PDF).</p> <p>The fraud scenario at the heart of this paper is this: a seller on eBay wishes to sell a very expensive item (which they likely don't even own, but in any event, have no intention of ever shipping to the buyer) to a willing buyer. In order to induce the innocent buyer to willingly engage in the transaction, the fraudulent seller first acquires a very high (artificially high) <em>reputation</em> by engaging in a number of "successful" sales of items to a group of buyers; these buyers are often sham accounts controlled by the buyer.</p> <p>More specifically, the authors of this Paper combine data across <em>two</em> levels (<em>account</em> level and <em>network</em> level) using a <em>Belief Propagation</em> algorithm over a <strong><em>Markov Random Field.</em></strong> </p> <p>The signature graph structure, by the way, is known as a <strong><em>bipartite core</em></strong>, arising from a group of accounts which have a very high number of transactions among the members of this group, but very few outside of this group (i.e., with the rest of the eBay community).</p>
    singulars
    1. This table or related slice is empty.
    plurals
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. This table or related slice is empty.
    1. VO
      singulars
      1. This table or related slice is empty.
    2. VO
      singulars
      1. This table or related slice is empty.
    3. VO
      singulars
      1. This table or related slice is empty.
 

Querying!

 
Guidance

SQuiL has stopped working due to an internal error.

If you are curious you may find further information in the browser console, which is accessible through the devtools (F12).

Reload