Upgrade to Pro — share decks privately, control downloads, hide ads and more …

UPDATE Fraud Detection: The Journey To Make E-commerce More Secure

UPDATE Fraud Detection: The Journey To Make E-commerce More Secure

Akihiro Daigo (Yahoo! JAPAN / Commerce Infrastructure Division, Commerce CTO, Commerce Group / Engineer)

https://tech-verse.me/ja/sessions/184
https://tech-verse.me/en/sessions/184
https://tech-verse.me/ko/sessions/184

Tech-Verse2022

November 17, 2022
Tweet

More Decks by Tech-Verse2022

Other Decks in Technology

Transcript

  1. Agenda - The Need for Fraud Detection - Fraud Detection

    System in Yahoo Japan - UPDATE Fraud Detection
  2. 1. Enter the number of your credit card. To buy

    something on E-commerce 3. Press the "Order" button. 2. Enter the security code (CVV) of your credit card.
  3. 1. Enter the number of your credit card. To buy

    something on E-commerce 3. Press the "Order" button. 2. Enter the security code (CVV) of your credit card.
  4. 1. Enter the number of your credit card. What you

    did some time ago 3. Press the "Order" button. 2. Enter the security code (CVV) of your credit card.
  5. 1. Steal credit card data. How fraudsters use stolen data

    3. Sell what they have bought. 2. Buy something with the stolen credit card data.
  6. The amount of damage from the theft of credit card

    numbers in Japan 39 19.5 31.1 22.3 22.2 0 10 20 30 40 50 2022? 2022 (half) 2021 2020 2019 Data: JAPAN CONSUMER CREDIT ASSOCIATION(2022), クレジットカード不正利用被害額の発生状況, https://www.j-credit.or.jp/information/statistics/download/toukei_03_g.pdf UNIT: billion yen
  7. 1. Digitization is progressing. Summary of the need for Fraud

    Detection 3. Threat of credit card fraud in E-commerce is increasing. 2. Digitization of fraud is also under way.
  8. Account Takeover • Credential Cracking • Credential Stuffing • Phishing

    • Token Theft E-commerce Fraud • Scalping • Sniping Payment Fraud • Carding • Card Cracking • Cashing Out • Promotion Abuse Threat models for E-commerce Data: W3C Anti-Fraud Community Group, Use Cases & Threat Models https://github.com/antifraudcg/use-cases/blob/main/USE-CASES.md
  9. • Client-Server model denylisting system The First Step of Fraud

    Detection System System Overview • ML model specialized for specific tasks is built-in • With embedded logic and learning function.
  10. Pros • Separation of logic from service. • Service-based logic

    tuning. • Learning function. • Extremely fast. (2ms / 1 transaction) Cons • Some logics still hard-coded. • Cost for replace embedded model is too large. • Becomes confusing due to various subsystems and various notification methods. The First Step of Fraud Detection System Pros & Cons
  11. Pros • Separation of logic from service. • Service-based logic

    tuning. • Learning function. • Extremely fast. (2ms / 1 transaction) Cons • Some logics still hard-coded. • Cost for replace embedded model is too large. • Becomes confusing due to various subsystems and various notification methods. The First Step of Fraud Detection System Pros & Cons
  12. Restructuring as Web API Analysts Rule management tool Reports Rules

    Fraud Detection System Judges DWH Client Feedback System Overview
  13. Restructuring as Web API Rule Structure Condition A Condition C

    Condition B Condition X Condition Z Condition Y AND AND AND AND OR param [operator] value
  14. Pros • Improved usability. • Real-time logic updates. • Aggregation

    of fraud detection logics and notifications. Cons • Logics are managed manually. Restructuring as Web API Pros & Cons
  15. • Manual management itself is complicated. • The more sophisticated

    the rule, the more tacit knowledge an individual derives. • Combinatorial Explosion of parameters occurs. Manual rule management has limits.
  16. Core Pillars 1. Machine Learning Machine Learning API Fraud Detection

    System Machine Learning API Model A (GBDT) Model B (GBDT) Models Config
  17. Core Pillars 1. Machine Learning Machine Learning API Fraud Detection

    System Machine Learning API Model A (GBDT) Model B (GBDT) Models Config
  18. Core Pillars 1. Machine Learning Model Serving Platform Fraud Detection

    System CuttySark : Model Serving Platform Model C (TensorFlow) Model D (TensorFlow) Models
  19. • Manual management itself is complicated. • The more sophisticated

    the rule, the more tacit knowledge an individual derives. • Combinatorial Explosion of parameters occurs. Manual rule management has limits.
  20. • Manual management itself is complicated. • The more sophisticated

    the rule, the more tacit knowledge an individual derives. • Combinatorial Explosion of parameters occurs. Manual rule management has limits.
  21. Core Pillars 2. Data Driven Company-wide Database Fraud Detection System

    Company-wide DataBase Platforms Other Services Anonymized User Data Abusive Data
  22. Overview of Credit Card Fraud in Yahoo Japan on Shopping

    business ( Yahoo! JAPAN Shopping , PayPay Mall ) 2017 2018 2019 2020 2021 Amount of Damage Amount of Prevention
  23. Overview of Credit Card Fraud in Yahoo Japan on Reuse

    business ( YAHUOKU! , PayPay Flea Market ) 2017 2018 2019 2020 2021 Amount of Damage Amount of Prevention