Financial Fraud Detection

by | Jun 17, 2024

The Problem

Financial fraud detection requires monitoring billions of transactions, devices and users in real-time for suspect behaviors without false positives that alienate customers when service is denied in the middle of a foreign vacation or late night business event.

The Solution

What is needed is a system that do four things:

  1. detect complex patterns of behavior
  2. combine multiple sources and scale up to millions of events/sec
  3. take the appropriate, user-specified action when patterns are detected
  4. do all of this in real time

Quine can monitor device and user behavior over extended time periods to detect expected exploit behaviors and new, novel, threat actions. By including categorical data such as store names, item types or sizes, geo locations, device versions, and day of the week, Quine understands the full context of behavior, eliminating false-positives. Additionally, Quine alerts provide a comprehensive view of past and current behavior for a device or user as supporting data for investigations.

Key Value Take Away

  • Behavior modeling for billions/trillions of users, devices and transactions
  • High-confidence risk scoring by leveraging the rich behavior context provided by categorical data analysis
  • Human-understandable alert information to support analysts investigations
  • Cost effective at scale with on premise licensing
  • Integrates with existing Apache Kafka, AWS Kinesis, data lake, and API event sources.

Use Cases

Want to read more news and other posts? Visit the resource center for all things thatDot.

Read more

Streaming Graph ETL

Streaming Graph ETL

The Problem Most ETL tools use the batch processing paradigm to find high-value patterns in large volumes of data. Whether the specific business...

read more
Authentication Fraud

Authentication Fraud

The Problem Metered attacks that generate low volume log-in attempts, from diverse IPs and across extended time frames, are designed to avoid the "3...

read more
Log Analysis

Log Analysis

The Problem Monitoring systems comprised of multiple services is typically done by monitoring each service individually using it's logs, or on an...

read more
Graph AI

Graph AI

The Problem Pick One. Recent AI research is generating a growing number of graph AI techniques that take advantage of graph data relationships, and...

read more