sas forum forum transactional fraud ... mobile banking, online, etc. fraud management operation ......

31
Copyright © 2015, SAS Institute Inc. All right reserved. SAS Forum Transactional Fraud Filip Verbeke, Sales Manager Fraud Solutions South West Europe

Upload: ngonguyet

Post on 17-Jun-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Copyright © 2015, SAS Institute Inc. All right reserved.

SAS Forum

Transactional Fraud

Filip Verbeke, Sales Manager Fraud

Solutions ▪ South West Europe

Copyright © 2015, SAS Institute Inc. All right reserved.

Digital channels are under attack….

• A need for multi-layer, analytics-driven & real time detection

• Increase organisational efficiency

• Reduce fraud losses and false positives and improves value detection rates

• Tackling money mules

• Improve customer experience and bank’s reputation

Key Business drivers

Copyright © 2015, SAS Institute Inc. All right reserved.

CYBER THREAT LANDSCAPE FOR BANKS Cyber Security

Online

Phone

Fax

Payments

Payee setup

Account creation

Cards

MulesPre-pay Debit

cards

Business

Customers

Retail

Customers

Merchants

Account

teams

IT

Teams Phishing / social

engineering for

credentials

Man-in-the-

middle attack

Collect

CC data

Infect

machine /

execute TxSell CC dataWeak 3rd parties

with card dataCollect

CC data

Tamper with

payment files

Spear

phishing &

infection

Time-bombed

destructive

patchesAccount

take-over

False Tx

An ever-changing myriad

of attack vectors

Threat hits people or

IT, outcome is fraud or

denial of service

Stolen cards

Copyright © 2015, SAS Institute Inc. All right reserved.

CYBER FRAUD

End user services

Reporting / explore

& search data

Case Management

Data Integration /

Enhance data /

Networked data

IT activity

Business Tx

activity

Internet

activity

Analytics / Kill chain analysis

Detection and Alerting

Prioritised alerts

Hybrid Analytics

Model

Data Sources

Logs and

alerts

Firewalls /

IDS / SIEM

Anti-Virus

Machine logs

Web logs

External

“bad lists”

Cyber Security

Pre-filter

Pre-filter

Pre-filter

Bank

Business Tx

Copyright © 2015, SAS Institute Inc. All right reserved.

CYBER SECURITY

End user services

Reporting / explore

& search data

Case Management

Data Integration /

Enhance data /

Networked data

Tx

Entity

Network

Analytics / Fraud models

Detection and Alerting

Prioritised alerts

Hybrid Analytics

Model

Data Sources

Logs and

alerts

Financial Tx

Non-

financial Tx

Staff activity

Cyber alerts

External

“bad lists”

Cyber Security

Pre-filter

DQ

Aggregate

Accounts

Copyr i g ht © 2012, SAS Ins t i tu t e Inc . A l l r ights reser ve d .

CYBER CRIME IS A BIG DATA STORY

REAL-TIME & STREAMINGIN-MEMORYBATCH/

IN-DATABASE

SAS®

DEPLOYMENT ENVIRONMENTS

SAS®

LASR™

ANALYTIC SERVER

USER EXPERIENCE

& MANAGEMENT

Data Input Build Scenarios Simulation / Deployment (Simulation available in GA Release)

Monitor & ReportAlert Generation /

Case Management

The technology

response

Copyright © 2015, SAS Institute Inc. All right reserved.

Event Stream Processor

Copyr i g ht © 2012, SAS Ins t i tu t e Inc . A l l r ights reser ve d .

SAS

®

SECURITY

INTELLIGENCELAYERED APPROACH

“Companies are

reevaluating how they

tackle security since a

fragmented approach is

consistently leaving

organizations at greater

risks of attack. A more

holistic approach to

security ensures all

layers of protection

function together.”

Avivah Litan, VP

Distinguished

Gartner Analyst

Copyright © 2015, SAS Institute Inc. All right reserved.

ONLINE BANKING PAYMENTS FRAUD

Copyright © 2015, SAS Institute Inc. All right reserved.

SAS Fraud

Framework

POINTS OF VULNERABILITY FOR ONLINE FRAUD

Point of exit

• New beneficiaries

• Velocity of transactions

• Suspicious session

activity

Create alerts!

Point of compromise

Score incoming transactions for:

• Anomalous behaviour

• Change of details

• Drain of funds from savings

account (me2me transfers)

Customer behaviour

Score customers over their lifetimes for:

• Possible mule accounts

• Victim propensity

• Appearance on a watch-list

• Unusual behaviour

OPEN BOX SOLUTION COVERING ALL AREAS

Copyright © 2015, SAS Institute Inc. All right reserved.

Real time, in memory

Copyright © 2015, SAS Institute Inc. All right reserved.

Anomaly detection

(example):

The client is

accessing their

account from a new

channel

Database Searches

(example): Looking for

matches across the

Black-lists

High performance

analytics

UNIQUE HYBRID APPROACH TO

ANALYTICS

Business rule (example):

Transaction above $xx to a

new beneficiary

Database Searches

(example): Looking

for matches across

the Black-lists

Predictive modelling (example): Model based on

variables such payment amount and balanceSNA (example): Links to mule account

such as a shared mobile number

Text mining

(example):

Transaction narrative

showing suspicious

payments

Copyright © 2015, SAS Institute Inc. All right reserved.

Real Time Decisioning

Copyright © 2015, SAS Institute Inc. All right reserved.

CASE STUDY

Copyright © 2015, SAS Institute Inc. All right reserved.

What was the problem?

Copyright © 2015, SAS Institute Inc. All right reserved.

FMF Project POTENTIAL PHASE I IMPACT

AS-IS

PHASE I*

Average 14000 alerts

per day50% detection rate

0,01% of alerts are

fraud

Average +-40 alerts

per day90% Detection rate

2,5% of alerts are

fraud

* Indicated by an analysis on historical data – no guarantees towards future performance

Copyright © 2015, SAS Institute Inc. All right reserved.

MULE SCORECARD

ASSESSMENT

ROC CHART

The ROC chart shows how well the model is able to

be specific (catch only “bads”) and sensitive

(catch all “bads” simultaneously). Sensitivity and

1-Specificity are displayed for various cutoff

values. The more the chart bends to the top left,

the better.

The ROC measures the area under the curve. The

bigger the area, the better the model. A perfect

model will have a ROC close from 1.

ROC >0.9 very good model

ROC > 0.8 good model

ROC > 0.7 ok model

ROC on Validation = 0.9550

Sensitivity = True Positive Rate = TP / (TP + FN)

Specificity = True Negative Rate = TN / (FP + TN)

Copyright © 2015, SAS Institute Inc. All right reserved.

SCORECARD

PAYMENTS

EXAMPLE TRANSACTION SCORED

Transaction Amount: 3499 eur

Beneficiary has a very high mule

probability

Benef is BNP Customer and Nationality

is Belgian

Preceding transaction is MetoMe

Preceding transaction is in last 15 min

Originator has more than 63 year old

Originator is french speaking

Transaction time is 4pm on friday

Communication Field is not blank

= 26+17+…-71 = 421 points > CUT-OFF Alert

Copyr igh t © 2013, SAS I nst i t u t e I nc . A l l r i gh t s reserved.

Analytical environment

Detection

Offline Detection

Near real-time

Fraud Treatment

Data Treatment

Real-time

Detection

Discovery

(Ad-Hoc)

Detection

DB

Real-Time

Recurrent

BatchAlert & Case

Management

Reporting

Analytics DB

Modelling &

Scorecards

Rule Authoring

Simulation

Performance

Monitoring

FRAUD

ARCHITECTURE

OVERVIEW

Copyright © 2015, SAS Institute Inc. All right reserved.

SAS Fraud

FrameworkSOLUTION BENEFITS

More suspicious cases identified

Including both previously undetected fraudulent networks and extensions to already

identified fraud

Reduction in false positive rates

Significant improvement in ‘quality’ of suspicious cases past for investigation

Improved investigation efficiency

Each referral taking 1/2 – 1/3 the time to investigate using SAS’ link analysis visualization

One consistent, end to end, underlying platform

Platform can also be leveraged for credit risk, card risk, AML and FATCA

Copyright © 2015, SAS Institute Inc. All right reserved.

CARD FRAUD

Copyright © 2015, SAS Institute Inc. All right reserved.

trends CARD FRAUD

“Unlimited Operation”

Targeted 2 Payments Processors

RAKBANK (United Arab

Emirates)

Bank of Muscat (Oman)

10 hours

24 countries

36,000 transactions

$40 million USD

Copyright © 2015, SAS Institute Inc. All right reserved.

Copyright © 2012, SAS Institute Inc. All rights reserved.

Integration

Enterprise Platform

• Single Platform processing for

all Products & Channels;

Deposit, ACH, Wire, Cards,

Payments, Acquirer, Mobile

Banking, Online, etc.

Fraud Management Operation

Multi-Org structure to manage multi-

client (Processor) or ‘Silo’

environment. Separation of data,

cases and rules control per business

requirements

ADVANCED ANALYTICS

• Advanced patent analytics to detect risk

exposure and fraud with less customer

inconvenience.

• Multi-entity Statures

• Hybrid Model Technology (Custom)

• Enhanced API

100% Real-Time

Decision

Ability to score and decision 100% of all

transaction types in real-time, all LOBs.

SAS Fraud

Management

Solution

Integration with other fraud/risk solutions

(Link Analysis, AML, etc.)

Copyright © 2015, SAS Institute Inc. All right reserved.

Input

NEURAL NETWORK MODEL COMPONENTS

Neural Network Model

Signatures

Transaction

Geographic data

Score with Reason Codes

OUTPUT

Copyright © 2015, SAS Institute Inc. All right reserved.

HSBC Case Study – Enterprise Fraud Detection

Highlights

• Ability to decision 100% of ALL transactions in real-time

• Enhanced signature approach that incorporates cross-product / cross channel data

• Ability to leverage additional data in fraud decision process (expanded API to include non-monetary, e-banking, mobile channel, etc…)

• Incremental fraud detection over incumbent – SAS detects 47% more fraud at 20:1 AFPR.

• Enterprise Solution – Establish platform for transaction decisioning across all bank products and channels

Copyright © 2015, SAS Institute Inc. All right reserved.

CLIENT EXAMPLE ONE OF AMERICA’S LARGEST BANKS

Challenges

• Source data once and use across many different business purposes

• Modernize analytics approach for banks largest credit cad portfolio

• Generate more revenue from enhanced risk based approach to credit & fraud decisioning

• Enterprise analytical approach: s

• Striking balance between customer experience and fraud losses

Real time credit & fraud decisions

• Replacing home grown system

• ROI: 100 million $ in Y1, of which 60 million $ from new revenue and 40 million $ from fraud

loss reduction.

• Operational cost reduction: from 3000 rules to 100 rules and a single model

• Credit and fraud : credit decisioning + fraud decisioning – single data source

Copyright © 2015, SAS Institute Inc. All right reserved.

CYBER SECURITY

Copyright © 2015, SAS Institute Inc. All right reserved.

MANY POTENTIAL DATA SOURCES

192.168.10.4477.110.65.38

ACTIVE

DIRECTORY

FIREWALL

ROUTER

ENTERPRISE

STORAGE

APPLICATON

SERVER

DATABASE

WORKSTATION

SIEM

Cisco CheckPoint

Palo Alto Networks Fortinet

Cisco Juniper Networks

Tipping Point SourceFire

IPS/IDS

McAfee

SemantecTrend Micro

Kapersky Labs

INTERNET

Splunk

IBM Q1 Labs

Quest Software

HP ArcSight

Cyber Security

MS SCOM

VMWARESNMP

SAP ERM

Netflow /

IP traffic

Door

swipe

Web

Proxy

Business

Tx

External

hotlist

Copyr i g ht © 2014, SAS Ins t i tu t e Inc . A l l r ights reser ve d .

SAS solution

• Hundreds/Thousands of alerts per day

• Ad-hoc and reactive

• Rules & Signature based

• High Performance Analytics + Real Time Decisioning

• Hybrid Analytics to derive contextual awareness & risk prioritization

• Identify patterns of behaviors, compromised accounts & high risk activity

• Ability to identify the threat before the data loss

Current

Environment:

Future State:

SAS Advanced

Analytics

Copyright © 2015, SAS Institute Inc. All right reserved.

New release NETFLOW ANALYTICS FEATURES

• Contextual data enrichment. Augments network flow with business information and

external threat data to detect cyberrisks based on your specific business workflows

• "Right-timed," multilayered analytics. Optimizes the speed and complexity of analytics

across the real-time, near-time and "any-time" continuum for faster and deeper situational

awareness

• Visual data exploration. Enables risk exploration without requiring previous analytics

knowledge or expertise

• Continuously updated intelligence. Behavioral analytics automatically evolve cyberanalytic

models based on new events, new data and new context.

• Cost-efficient, optimized data storage. Reduces your storage footprint by saving only the

relevant data for analysis on commodity hardware.

Copyright © 2015, SAS Institute Inc. All right reserved.

SAS Forum