Return to page

BLOG

5 Key Elements to Detecting Fraud Quicker With AI

 headshot

By Ashrith Barthur | minute read | October 13, 2020

Blog decorative banner image

The number of transactions using electronic financial instruments has been increasing by about 23% year over year. The global COVID-19 pandemic has only accelerated that process. Electronic means have become the primary vehicle of how people purchase their goods. With this sudden increase in transactions, fraud detection systems are stressed. They need to be much more accurate, much faster than they currently are. This can be done by optimized models using AI.

Here are the five key takeaways from a recent webinar I hosted on how AI can detect fraud quicker :

  1. Compact vs Comprehensive features. A compact feature that shows speed is better than a comprehensive feature that is slow.
  2. Balance. A balance between the number of features, the type of features, and the complexity of features is important to ensure the model is fast, accurate, and robust.
  3. Apply Zero-Prior Knowledge Features. Having features that have no or little prior knowledge lightens the load on the model and increases the speed of reaching a decision. Using this type of feature becomes imperative when it provides a value similar to a feature that uses prior information to detect fraud.
  4. Build a Simple Model. Keep the model simple and fast. Especially, if you handle transactions in volumes. You will reduce risk by volumes, not by value, which might be efficient.
  5. If GLM works, then use it. The problem tends to increase in complexity when you try to take a complex, comprehensive model to production. A 100+ feature, deep neural network might become complicated to productionize compared to a simple, fast, GLM model that might be equally effective.

Want more details on each key element? Watch the full webinar here  

 headshot

Ashrith Barthur

Ashrith is the security scientist designing anomalous detection algorithms at H2O. He recently graduated from the Center of Education and Research in Information Assurance and Security (CERIAS) at Purdue University with a PhD in Information security. He is specialized in anomaly detection on networks under the guidance of Dr. William S. Cleveland. He tries to break into anything that has an operating system, sometimes into things that don’t. He has been christened as “The Only Human Network Packet Sniffer” by his advisors. When he is not working he swims and bikes long distances.