+ All Categories
Home > Documents > Rake Antifraud Detection

Rake Antifraud Detection

Date post: 02-Nov-2014
Category:
Upload: fabrizio-malfanti
View: 1,048 times
Download: 1 times
Share this document with a friend
Description:
RAKE is a Fraud Detection Software dedicated to Web-Banking Apllications
Popular Tags:
38
The intelligent software that The intelligent software that protects consumers and banks protects consumers and banks from the most sophisticated from the most sophisticated hacker attacks hacker attacks The The e-banking antifraud solution e-banking antifraud solution
Transcript
Page 1: Rake Antifraud Detection

The intelligent software that protects The intelligent software that protects consumers and banks from the most consumers and banks from the most sophisticated hacker attacks sophisticated hacker attacks

TheThe e-banking antifraud solutione-banking antifraud solution

Page 2: Rake Antifraud Detection

SCENARIO

The increase in online banking transactions and the resulting movement of cash via the Net have shifted the focus of organised crime from bank robberies to online fraud, which is just as lucrative but far less risky.

Online fraud

1

Page 3: Rake Antifraud Detection

SCENARIO

The following mechanisms are used to perpetrate online fraud:

Unauthorised access to online current accounts via:

Theft and subsequent use of Credentials Web-in-the-Middle

And subsequent transfer of money by three different means:

– The money is transferred through a chain of decoy accounts and finally credited to a foreign bank (often by recruiting current account holders online, not always in good faith).

– The money is used to buy multiple phone top-ups and the resulting credit immediately spent using premium phone numbers.

– The money is used to load prepaid Credit Cards and immediately use to buy easily resellable goods (such as jewellery or electronic goods).

Fraud mechanisms

2

Page 4: Rake Antifraud Detection

SCENARIO

Data theft by cracking Bank DatabasesThis is the most brutal but often the most effective mechanism, allowing thousands of authentication details to be obtained in one go.(Latest known event, 12 December 2008, 450,000 Accounts, Germany)

E-mail phishing The most commonly used method for spying and collecting authentication credentials in online banking.

Banking TrojansThese incorporate various different mechanisms for capturing and sending access data: from keyloggers to generating films of mouse movements on the screen.They began to spread four years ago and have recently reached a critical level of penetration. (According to an empirical assessment carried out in November 2008, approximately 1% of end-user PCs are affected )

Theft and subsequent use of Credentials

3

Page 5: Rake Antifraud Detection

SCENARIO

Trojans act by transferring Usernames, Passwords and Digital Signature Certificates, as well as screenshots and all the characters typed, to pirate sites created to gather this kind of information.

The list of these Trojans is long and well documented, although they are fairly unknown to the vast majority of Internet users and antivirus tools often fail to pick them up.

Their operating principle is not too dissimilar from the one introduced by Bancos.NL, the first of the documented Trojans.

The most widespread forms remain in standby mode until the browser connects to one of the addresses listed in the code. At this point, when the user browses an Internet banking site, the Trojans activate by sending his or her Username and Password, plus any other confidential information, to the pirate sites that collect them.

Banking Trojans

4

Page 6: Rake Antifraud Detection

SCENARIO

Trojan.Silentbanker, and its subsequent variants, affect innocent users of online banking services by intercepting client current account information before it is coded and sending it to a central attack database.

They have the ability to intercept online banking transactions which are normally well protected by two level authentication procedures.

During a banking transaction, Silentbanker replaces the user account with the hacker's account, while the user continues to perceive a perfectly normal banking transaction.

Since they have no inkling that their details have been hacked, users unknowingly send money to the hacker's account after having accessed the second level of authentication.

Web-in-the-middle

5

Page 7: Rake Antifraud Detection

SCENARIO

Banks lack the means to combat this phenomenon.This is because the infection affects their customers' computers, without any anomaly being picked up on the Internet Banking server.

Only occasionally will the bank perceive the presence of malware on a customer's computer in a log file. This happens when the Trojan modifies website pages to request additional information, and consequently the web server receives POST fields which do not appear in "clean" transactions. Analysing these POST fields allows customers with infected PCs to be identified, although it may be difficult to determine how to proceed:

a) Notify the user: there is a risk that this operation will be perceived by users as an attack on their privacy. They may think that the bank has hacked into their PC in order to get hold of this information.

b) Manually monitor the relevant account to identify any fraudulent activity.

Countermeasures

6

Page 8: Rake Antifraud Detection

ANALYSIS

Identifying the presence of these additional POST fields allows the percentage of infected computers between customers and banks to be estimated.

Between September and November 2008, by analysing the log files of some of our client banks, we estimated that:

Approximately 0.5% of users are infected withTrojan.silentbanker.0.5% of transactions may potentially become fraudulent.A further 0.5% appear to be infected by other Trojans that modify access pages but which we were unable to identify.

Considering the country as a whole, we can calculate the following:

• Since there are between 5 and 10 million online banking accounts in Italy, 50,000 computers could potentially be infected.

• Fraud is normally committed by ordering three or more bank transfers for variable amounts of between 2,000 and 5,000 €.

• The turnover of this kind of fraud is 300,000,000 €.

Analysis of real cases

7

Page 9: Rake Antifraud Detection

RAKE

Rake allows unusual behaviour by users to be identified by using clustering and classification techniques that are specific to Data Mining; the same ones that are employed by the fraud detection products implemented by major credit card operators

Automatic monitoring of current accounts and reporting of all unusual movements based on data mining procedures aimed at identifying the behavioural profile of each individual userAutomatic clustering of user behaviour: allows habitual behaviour to be identified and anything that deviates from this to be recognised;Historical analysis of typical user parameters, in order to reduce the presence of false positives and increase the effectiveness of the tool itself.

This method is successful even in dealing with new kinds of misappropriation, specifically because it is based on analysing user behaviour rather than knowing the procedure by which fraud is committed.

Fraud which has already taken place and has known behavioural patterns can be incorporated into a second assessment step for further verification.

The winning solution

8

Page 10: Rake Antifraud Detection

RAKE

Data collection stage

Loading and storage of transactions carried out over a number of weeks, in order to provide a minimum number of transactions.

How it works

Data collectionData collection Clustering ProcessesClustering Processes

Clusters are calculated by using only the movements that relate to the last 6 months, so that only "recent" behaviour is taken into account.

Using these movements, statistical clusters are examined using the E.M. (Expectation Maximisation) algorithm, after excluding any Outliers (events that fall outside the clusters) using other clustering algorithms (OPTICS LOF or DENCLUE).

The clustering process is carried out every day, after the logs have been obtained and processed, and the results are saved on a second DB to improve the performance of the system.

The clustering results are entered in a DB so that comparisons can easily be drawn between new transaction orders and pre-calculated clusters and a weighting can therefore be assigned to the transactions.

9

Page 11: Rake Antifraud Detection

RAKE

Pattern Recognition MechanismsIn order to identify successions of events which have previously led to misappropriations

A series of misappropriations have taken place by means of a series of bank transfers, carried out on consecutive days, for amounts that increase steadily by 1,000 € a time. This can be incorporated in the fraud detection mechanisms, but a search has to be carried out first to find any events of the same nature in the previous history, in order to determine whether they are truly "dangerous".In fact, if the previous succession proved to be a very widespread event that is not connected with attempted fraud, it would be pointless to search for it among new transactions.

IP Georeferencing MechanismsIn order to identify sudden changes in Internet Banking access locations (or providers)

This feature is incorporated in the analysis of beneficiaries (and possibly userAgents) in order to select false positives.The system allows the user's IP address to be checked against a blacklist containing addresses used by the TOR anonymising service (other anonymisers are due to be added at a later date).

How it works

10

Page 12: Rake Antifraud Detection

RAKE

Anonymiser search mechanisms

In order to identify transactions originating from IP address concealment services

Intelligrate collects the IP addresses of the leading anonymisation services, such as TOR, updating RAKE on a daily basis. This allows the origin of various transactions to be analysed, blocking or blacklisting any that originate from the aforesaid services.

How it works

11

Whitelists and Blacklists

In order to allow the separate management of specific current accounts if necessary

RAKE allows specific accounts to be added to whitelists if they are to be completely excluded from any checks, while allowing any particularly suspicious bank details, telephone numbers or the numbers of reloadable cards to be added to blacklists...

Page 13: Rake Antifraud Detection

RAKE

Various different mechanisms are used to assess the "deviation" between an individual movement and normal behaviour:

How it works

Cluster EM

(Expectation Maximization)

Cluster EM

(Expectation Maximization)Cluster 2D-GridClusteringCluster 2D-GridClustering OPTICS Local Outlier

DetectionOPTICS Local Outlier

Detection

Assessment of whether the movement comes within the combination of normal distributions identified by E.M. clustering (with different weightings depending on the degree of deviation from the cluster average and edges).

This assessment is made without any reassessment of the clusters.

Geometric assessment of the deviation from existing clusters using a two-dimensional version of GridClustering algorithms.

This assessment is also carried out without recalculating the clusters.

Calculation of the deviations from the clusters using OPTICS to determine whether the individual event comes within the cluster or can be identified as an Outlier.

By applying the three mechanisms, a "Minority Report" policy can be adopted to report the anomaly and call the user, if necessary, only when three positives occur.

12

Page 14: Rake Antifraud Detection

RAKE

Rake is available in two different application modes which can be chosen with the bank based on the technical features of the e-banking service, the way in which customers interact with it and the need to ensure the promptness of transactions.

Online ModeRAKE is connected directly to the e-banking application. For each transaction, RAKE is sent a string containing all the transaction data and returns a weighting of between 0 (transaction OK) and 10 (transaction with a very high probability of being fraudulent). The e-banking application can ask the customer an additional question to verify authenticity or send a confirmation text message.

Offline Mode Every evening, the day's transactions are assessed and a report is produced

containing reports of any events that are probably fraudulent. This can be sent to the helpdesk for telephone verification of the most suspicious ones.

Application Modes

13

Page 15: Rake Antifraud Detection

RAKE

The Online Mode requires the transaction weighting to be returned within a maximum of 1 second.

This requirement makes it impossible to carry out clustering using all the available tools and therefore requires the use of EM clusters, which provide a geometric representation of the result, and GridBased clusters, which allow one to determine quickly whether each new event comes within a cluster.

With EM clustering, new transaction orders are therefore compared to the elipses representing the clusters and are given an increasingly negative weighting the further they are from the centre of the clusters.

2D-GC clustering determines whether new transaction orders fall within cells that already belong to a cluster or if their presence turns groups of transactions into clusters that were not previously clusters.

Online Application Mode

14

Page 16: Rake Antifraud Detection

RAKE

EM Clustering – Before the Outlier Search

15

Page 17: Rake Antifraud Detection

RAKE

EM Clustering excluding Outliers

16

Page 18: Rake Antifraud Detection

RAKE

2D-GC Clustering with 2 points per cluster

17

Page 19: Rake Antifraud Detection

RAKE

2D-GC Clustering with 3 points per cluster

18

Page 20: Rake Antifraud Detection

RAKE

EM Clustering – Before the Outlier Search

19

Page 21: Rake Antifraud Detection

RAKE

EM Clustering excluding Outliers

20

Page 22: Rake Antifraud Detection

RAKE

2D-GC Clustering with 2 points per cluster

21

Page 23: Rake Antifraud Detection

RAKE

2D-GC Clustering with 3 points per cluster

22

Page 24: Rake Antifraud Detection

RAKE

The Offline Mode does not require short calculation times to be respected.

A complete analysis can therefore be carried out using the three methods previously described, returning more accurate "probability of fraudulent event" scores.

The result is a daily report that allows the relevant departments to investigate any particularly suspicious events.

OFFLINE Application Mode

23

Page 25: Rake Antifraud Detection

RAKE

Search for Outliers

24

Page 26: Rake Antifraud Detection

RAKE

Identified Outliers

25

Page 27: Rake Antifraud Detection

RAKE

Search for Outliers

26

Page 28: Rake Antifraud Detection

RAKE

Identified Outliers

27

Page 29: Rake Antifraud Detection

RAKE

Rake consists of three modules:

The clusteriser, which takes into account the history of each account and the list of movements, the beneficiaries, the user-agents and the IP/connection providersThe Database which, in addition to storing movements and clusters, uses Stored Procedures to produce a daily report on suspected misappropriationsThe client, which provides real time responses on the degree of reliability of each transaction.

The three modules can be implemented on a single machine or split between different machines to improve performance. The client component can be replicated and integrated with load sharing equipment.

The DB component is implemented in MySQL or Oracle 11g and can be intetgrated into DBs supplied by the customer.

Installation and configuration

28

Page 30: Rake Antifraud Detection

RAKE

Rake is supplied either as an application to be installed on Unix machines, whether Solaris or Linux RedHat, or as a Virtual Appliance for VMware:

CentOS + MySQL

CentOS + Oracle

Solaris 10 + Oracle

Solaris 10 + MySQL

Rake can be integrated with customer applications and supplied with ad hoc communication modules if adaptation to specific Internet Banking environments is required.

Installation and configuration

29

Page 31: Rake Antifraud Detection

RAKE

Rake can easily be administered via a Web interface.

The reports can be displayed via the Web or downloaded in CSV or XLS format.

If requested by the customer, the reports can be displayed by a Web Service.

Screenshots of the administration and reporting displays are shown below.

Installation and configuration

30

Page 32: Rake Antifraud Detection

RAKE

Configuration

31

Page 33: Rake Antifraud Detection

RAKE

Configuration

32

Page 34: Rake Antifraud Detection

RAKE

Configuration

33

Page 35: Rake Antifraud Detection

RAKE

Configuration

34

Page 36: Rake Antifraud Detection

RAKE

Reports

35

Page 37: Rake Antifraud Detection

RAKE

Reports

36

Page 38: Rake Antifraud Detection

RAKE

THANK YOU!

INTELLIGRATE srlINTELLIGRATE srl

Via XII OTTOBRE 2/9216121 GENOVAITALYTel.: +39 0105954161Fax: +39 010586753

Email: [email protected]

Web: www.intelligrate.it

37


Recommended