SlideShare a Scribd company logo
Fraud Detection System
Bala Dutt / June 2021
Agenda
Context - From/To
PAIR
FDS Architecture & FDSP language
MASSES & Simulation Language
Demo
Design
Technology/Conclusion/Future Work
From To
Large delay txns, online txns by privileged
few, a small percentage of fraud
Instant txns, sophisticated attacks (OTP stealing), adversarial
attacks and ultra-scale, online txns by non-tech savvy people
“Write off approach”, after the fact, actor
focussed approach
Realtime, streaming, online learning
Human In the Loop
Single algorithm Multiple algorithms, Cold start, Unseen situations, high accuracy
Work in silos, difficult to change and
integrate
Modular, Integrative, easy to experiment & change
Information
Fusion
Effective
Fraud
Detection
System
Actionable
Pluggable
Processing
Responsive
Time to Detect Time to improve
Easy to understand &
Change
Online Simulate
Transactional
Reference
Approval
Notification
Feedback
Channels
Stream processing
Ensemble
Online+offline Classifiers Outliers Rule-based Point Sequence
History
Patterns
Features Samples
Scope
Enrichment
Fraud detector
Delivery
pipeline
ML algo - outlier
detectors
ML Algo -
classifiers
Delivery 1
Delivery 2
Delivery ...
Flink
Kafka
Ref 1 Ref 2
SMS - info/alert
SMS - otp
Push notification
Email
Block transaction
Block user
Resource Server 1
Resource Server 2
Resource Server ...
Resource
Access Event
pipeline
AccessEvent
Resource access
Subject
Subject
Resource details
Alerts/Infos
Reference
Data pipeline
Reference Data 1
Reference Data 2
Reference Data ...
User Configuration
Offline
ML
Feedback loop
Monitoring
Grafana.net,
Prometheus
History
Feedback loop
Kafka
Kafka
Rule Based
Intuit Confidential and Proprietary 6
Stream Processing
Trigger Enrich Analyze PostProcess Deliver
Enrichment
Specification
Ensemble and
pipeline
specification
Enrichment
and
presentation
specification
Stream processing specification
Tensorify
Feature
selection
Security
(Anonymization etc.)
Events
processed
by
swimlanes
Intuit Confidential and Proprietary 7
GitOps Multi-StreamProcessing deployment system
StreamProcessing...
StreamProcessing
Selector
SecurityProcessing
Enrichment
ML
PreDeliveryEnrichment
...
StreamProcessing 2
StreamProcessing 1
Build process
StreamProcessing
…
Monitoring view
StreamProcessing 2
Monitoring view
StreamProcessing 1
Monitoring view
Virtual view
Stream processing language
Pool
Simulation - MASSES
Subject
Subject
Pool
Resource
Resource
Actor
ActorInstance
AI1 AI2 AI3
AI...
State
Transition
Spec
Paired
is
AccessEvent
Resource
Access
Event
pipeline
ripting language to model scenario
Demo
Multiple Stream Processing
Scenarios
Random
Sr Citizen
Deny User
User moved
https://www.youtube.com/watch?v=qvt7pgCnSHU
Implementation
https://github.com/fraud-detection-system/Fraud-Detection-System
Artifacts
Simulator with a DSL (Domain Specific Language) to specify scenarios
including feedback
Fraud Detection Server - Kafka, Flink based stream processing pipeline
Multiple online ML algorithms - classifiers (5) and outlier detectors (5)
Multiple Reference data
Monitoring
Design
Intuit Confidential and Proprietary 12
Domain model
Types of
Resources
Resource Server
Subject
User App
Performs
Action
Actions
Resource
supports
Device
is a
Attributes Attributes
Attributes
Entity
AccessEvent
Environment
Actor
(good)
Txn
Amount
Payee
Description
IPAddress
Time
Browser/Machine Details
Type - physical, online
Series of
Actor
(bad)
Series of
Intuit Confidential and Proprietary 14
Canonical Data Model
Common minimalistic
vocabulary
Flat attribute model
k,v as Strings
Values can be keys
Logic part of enrichment
Type of attribute value
Link to reference data
Subject
Id: 1234
PhysicalLocation: 5678
VirtualLocation: 172.19.21.12
DeviceId: xsfde
Resource
Id: account
AccountId: 5678
BankName: ICICI
User
Id: 1234
EmailId: a@b.com
PhoneNo: 9876
HomeLocation: 5678
HomeCity: Bengaluru
PhoneLocation: 23232
Account
Id: 5678
Balance:100000
LastTxnTime:
Status: Locked|Active
RiskScoredEntities
Id: 3434
Type: User|Location|PhoneNo
Score: Low| Med| High
Configuration
Id: 1234
Type: User|Account
MaxAutoAmount: 1000
Approver: 34345
Subject
Id: account
PhoneNo: 5678
Action
Id: sendSMS
text: “alert ...”
History
Circular buffer
Configuration
Size
Attributes
Save
Key Attributes
Size
Enrichment by diff
Attributes to diff
Diff mechanism
Diff attribute name
Scenario
Series of txns from Bengaluru
One txn from Las Vegas
Solution
Diff on location
Thank you

More Related Content

PPTX
Introduction to Google Cloud Services / Platforms
PPSX
Apache Flink, AWS Kinesis, Analytics
PDF
Apache Spark Introduction
PPTX
ADF Demo_ppt.pptx
PPTX
Intro to Azure Data Factory v1
PPTX
Introduction to GCP (Google Cloud Platform)
PDF
Snowflake for Data Engineering
PDF
IaaS, SaaS, PasS : Cloud Computing
Introduction to Google Cloud Services / Platforms
Apache Flink, AWS Kinesis, Analytics
Apache Spark Introduction
ADF Demo_ppt.pptx
Intro to Azure Data Factory v1
Introduction to GCP (Google Cloud Platform)
Snowflake for Data Engineering
IaaS, SaaS, PasS : Cloud Computing

What's hot (20)

PPTX
Snowflake Datawarehouse Architecturing
PPTX
Azure automation
PPTX
AWS Cloud trail
PPTX
Introduction to AWS API Gateway Presentation
PDF
Data Catalog in Denodo Platform 7.0: Creating a Data Marketplace with Data Vi...
PDF
Introduction to Azure Data Factory
PPTX
Cloud computing risks
PPTX
Keeping a Secret with HashiCorp Vault
PDF
Building an open data platform with apache iceberg
PDF
A Tour of Google Cloud Platform
PPTX
Introduction to Azure Databricks
PPTX
Databricks Platform.pptx
PDF
Microservices for Application Modernisation
PDF
End-to-End Spark/TensorFlow/PyTorch Pipelines with Databricks Delta
PPTX
Cloud security and security architecture
PDF
Confluent REST Proxy and Schema Registry (Concepts, Architecture, Features)
PPTX
Aws overview (Amazon Web Services)
PPT
Application Security
PPTX
Designing modern dw and data lake
PDF
Designing ETL Pipelines with Structured Streaming and Delta Lake—How to Archi...
Snowflake Datawarehouse Architecturing
Azure automation
AWS Cloud trail
Introduction to AWS API Gateway Presentation
Data Catalog in Denodo Platform 7.0: Creating a Data Marketplace with Data Vi...
Introduction to Azure Data Factory
Cloud computing risks
Keeping a Secret with HashiCorp Vault
Building an open data platform with apache iceberg
A Tour of Google Cloud Platform
Introduction to Azure Databricks
Databricks Platform.pptx
Microservices for Application Modernisation
End-to-End Spark/TensorFlow/PyTorch Pipelines with Databricks Delta
Cloud security and security architecture
Confluent REST Proxy and Schema Registry (Concepts, Architecture, Features)
Aws overview (Amazon Web Services)
Application Security
Designing modern dw and data lake
Designing ETL Pipelines with Structured Streaming and Delta Lake—How to Archi...
Ad

Similar to Fraud detection system (20)

PPT
The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architect...
PDF
Apache Kafka vs. Integration Middleware (MQ, ETL, ESB)
PDF
Apache Kafka vs. Integration Middleware (MQ, ETL, ESB) - Friends, Enemies or ...
PDF
Apache Kafka vs. Traditional Middleware (Kai Waehner, Confluent) Frankfurt 20...
PDF
Confluent Cloud for Apache Kafka® | Google Cloud Next ’19
PPTX
Realtime Detection of DDOS attacks using Apache Spark and MLLib
PPTX
A Decentralised Platform for Provenance Management of Machine Learning Softwa...
PDF
Io t data streaming
PPTX
SOA patterns
ODP
Cartographer, or Building A Next Generation Management Framework
PDF
Apache Kafka as Event Streaming Platform for Microservice Architectures
PPTX
Corporate Security Issues and countering them using Unified Threat Management...
PDF
Web application security - Course overview
PDF
Fluturas presentation @ Big Data Conclave
PPTX
Event mesh api meetup AsyncAPI Singapore
PPTX
Containerless in the Cloud with AWS Lambda
PDF
Apidays Paris 2023 - API Security Challenges for Cloud-native Software Archit...
PDF
MLOps journey at Swisscom: AI Use Cases, Architecture and Future Vision
PDF
Stream Processing – Concepts and Frameworks
PPTX
What's new in​ CEHv11?
The “Predictive” Battlespace: Leveraging the Power of Event-Driven Architect...
Apache Kafka vs. Integration Middleware (MQ, ETL, ESB)
Apache Kafka vs. Integration Middleware (MQ, ETL, ESB) - Friends, Enemies or ...
Apache Kafka vs. Traditional Middleware (Kai Waehner, Confluent) Frankfurt 20...
Confluent Cloud for Apache Kafka® | Google Cloud Next ’19
Realtime Detection of DDOS attacks using Apache Spark and MLLib
A Decentralised Platform for Provenance Management of Machine Learning Softwa...
Io t data streaming
SOA patterns
Cartographer, or Building A Next Generation Management Framework
Apache Kafka as Event Streaming Platform for Microservice Architectures
Corporate Security Issues and countering them using Unified Threat Management...
Web application security - Course overview
Fluturas presentation @ Big Data Conclave
Event mesh api meetup AsyncAPI Singapore
Containerless in the Cloud with AWS Lambda
Apidays Paris 2023 - API Security Challenges for Cloud-native Software Archit...
MLOps journey at Swisscom: AI Use Cases, Architecture and Future Vision
Stream Processing – Concepts and Frameworks
What's new in​ CEHv11?
Ad

Recently uploaded (20)

PDF
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
PDF
Autodesk AutoCAD Crack Free Download 2025
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
PDF
Download FL Studio Crack Latest version 2025 ?
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
Digital Systems & Binary Numbers (comprehensive )
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
history of c programming in notes for students .pptx
PDF
17 Powerful Integrations Your Next-Gen MLM Software Needs
PDF
Complete Guide to Website Development in Malaysia for SMEs
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
Transform Your Business with a Software ERP System
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
Design an Analysis of Algorithms I-SECS-1021-03
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
Autodesk AutoCAD Crack Free Download 2025
Computer Software and OS of computer science of grade 11.pptx
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Why Generative AI is the Future of Content, Code & Creativity?
wealthsignaloriginal-com-DS-text-... (1).pdf
Navsoft: AI-Powered Business Solutions & Custom Software Development
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
Download FL Studio Crack Latest version 2025 ?
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Digital Systems & Binary Numbers (comprehensive )
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
history of c programming in notes for students .pptx
17 Powerful Integrations Your Next-Gen MLM Software Needs
Complete Guide to Website Development in Malaysia for SMEs
Operating system designcfffgfgggggggvggggggggg
Transform Your Business with a Software ERP System
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf

Fraud detection system

  • 1. Fraud Detection System Bala Dutt / June 2021
  • 2. Agenda Context - From/To PAIR FDS Architecture & FDSP language MASSES & Simulation Language Demo Design Technology/Conclusion/Future Work
  • 3. From To Large delay txns, online txns by privileged few, a small percentage of fraud Instant txns, sophisticated attacks (OTP stealing), adversarial attacks and ultra-scale, online txns by non-tech savvy people “Write off approach”, after the fact, actor focussed approach Realtime, streaming, online learning Human In the Loop Single algorithm Multiple algorithms, Cold start, Unseen situations, high accuracy Work in silos, difficult to change and integrate Modular, Integrative, easy to experiment & change
  • 4. Information Fusion Effective Fraud Detection System Actionable Pluggable Processing Responsive Time to Detect Time to improve Easy to understand & Change Online Simulate Transactional Reference Approval Notification Feedback Channels Stream processing Ensemble Online+offline Classifiers Outliers Rule-based Point Sequence History Patterns Features Samples Scope Enrichment
  • 5. Fraud detector Delivery pipeline ML algo - outlier detectors ML Algo - classifiers Delivery 1 Delivery 2 Delivery ... Flink Kafka Ref 1 Ref 2 SMS - info/alert SMS - otp Push notification Email Block transaction Block user Resource Server 1 Resource Server 2 Resource Server ... Resource Access Event pipeline AccessEvent Resource access Subject Subject Resource details Alerts/Infos Reference Data pipeline Reference Data 1 Reference Data 2 Reference Data ... User Configuration Offline ML Feedback loop Monitoring Grafana.net, Prometheus History Feedback loop Kafka Kafka Rule Based
  • 6. Intuit Confidential and Proprietary 6 Stream Processing Trigger Enrich Analyze PostProcess Deliver Enrichment Specification Ensemble and pipeline specification Enrichment and presentation specification Stream processing specification Tensorify Feature selection Security (Anonymization etc.) Events processed by swimlanes
  • 7. Intuit Confidential and Proprietary 7 GitOps Multi-StreamProcessing deployment system StreamProcessing... StreamProcessing Selector SecurityProcessing Enrichment ML PreDeliveryEnrichment ... StreamProcessing 2 StreamProcessing 1 Build process StreamProcessing … Monitoring view StreamProcessing 2 Monitoring view StreamProcessing 1 Monitoring view Virtual view Stream processing language
  • 8. Pool Simulation - MASSES Subject Subject Pool Resource Resource Actor ActorInstance AI1 AI2 AI3 AI... State Transition Spec Paired is AccessEvent Resource Access Event pipeline ripting language to model scenario
  • 9. Demo Multiple Stream Processing Scenarios Random Sr Citizen Deny User User moved https://www.youtube.com/watch?v=qvt7pgCnSHU
  • 10. Implementation https://github.com/fraud-detection-system/Fraud-Detection-System Artifacts Simulator with a DSL (Domain Specific Language) to specify scenarios including feedback Fraud Detection Server - Kafka, Flink based stream processing pipeline Multiple online ML algorithms - classifiers (5) and outlier detectors (5) Multiple Reference data Monitoring
  • 12. Intuit Confidential and Proprietary 12 Domain model Types of Resources Resource Server Subject User App Performs Action Actions Resource supports Device is a Attributes Attributes Attributes Entity AccessEvent Environment
  • 14. Intuit Confidential and Proprietary 14 Canonical Data Model Common minimalistic vocabulary Flat attribute model k,v as Strings Values can be keys Logic part of enrichment Type of attribute value Link to reference data Subject Id: 1234 PhysicalLocation: 5678 VirtualLocation: 172.19.21.12 DeviceId: xsfde Resource Id: account AccountId: 5678 BankName: ICICI User Id: 1234 EmailId: [email protected] PhoneNo: 9876 HomeLocation: 5678 HomeCity: Bengaluru PhoneLocation: 23232 Account Id: 5678 Balance:100000 LastTxnTime: Status: Locked|Active RiskScoredEntities Id: 3434 Type: User|Location|PhoneNo Score: Low| Med| High Configuration Id: 1234 Type: User|Account MaxAutoAmount: 1000 Approver: 34345 Subject Id: account PhoneNo: 5678 Action Id: sendSMS text: “alert ...”
  • 15. History Circular buffer Configuration Size Attributes Save Key Attributes Size Enrichment by diff Attributes to diff Diff mechanism Diff attribute name Scenario Series of txns from Bengaluru One txn from Las Vegas Solution Diff on location