SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Hadoop – BIG Data
Fraud Detection with real-time Analysis
What is Fraud Detection?
Fraud Detection with real-time Analysis with Hadoop and Big Data Technologies
for different industries such as Banking, Finance, Insurance, Core Accounts
Receivable, Government, HealthCare, or Retail.
Fraud is a major concern across all industries. You name the industry (Banking,
Insurance, Government, Accounts Receivable, HealthCare, or Retail, for example)
and you’ll find fraud.
In today’s inter-connected world, the sheer volume and complexity of
transactions makes it harder than ever to find fraud.
Traditional approaches to fraud prevention aren’t particularly efficient. For
example, the management of improper payments is often managed by analysts
auditing what amounts to a very small sample of claims paired with requesting
medical documentation from targeted submitters. The industry term for this
model is pay and chase. Claims are accepted and paid out and processes look for
intentional or unintentional overpayments by way of post-payment review of
those claims.
Though the sheer volume of transactions makes it harder to spot fraud because
of the volume of data, ironically, this same challenge can help create better
fraud predictive models – an area where Hadoop and Big Data shines.
What is Fraud Detection?
How is Fraud detection done?
So how is fraud detection done now?
Because of the limitations of traditional technologies, fraud models are built by
sampling data and using the sample to build a set of fraud-prediction and
detection models. When you contrast this model with a Hadoop Big Data –
anchored fraud department that uses the full data set – No Sampling – to build
out the models, you can see the difference.
For creating fraud-detection models, Hadoop is well suited to
Handle Volume: That means processing the full data set - no data sampling.
Manage new varieties of data: Data coming from different sources and in
different formats.
Maintain an agile environment: Enable different kinds of analysis and changes
to existing models.
How is Fraud detection done?
The limitations of sampling
Faced with expensive hardware and a pretty high commitment in terms of time
and RAM, people tried to make the analytics workload a bit more reasonable by
analyzing only a sampling of the data.
While sampling is a good idea in theory, in practice this is often an unreliable
tactic. Finding a statistically significant sampling can be challenging for sparse
and/or skewed data sets, which are quite common. This leads to poorly judged
samplings, which can introduce outliers and anomalous data points, and can, in
turn, bias the results of analysis.
BEST PRACTICES IN FRAUD MANAGEMENT
A best-practice fraud management approach is integrated from end to end.
Figure 1: Fraud management approach Integrated End-End
BEST PRACTICES IN FRAUD MANAGEMENT
COMBATING FRAUD WITH THE TECHNOLOGY AVAILABLE TODAY – Big Data Hadoop
Step 1. Create an enterprise wide view of patterns and perpetrators.
Step 2. Prevent and detect fraud in enterprise wide context.
Step 3. Investigate and Resolve Fraud in an Integrated Environment.
Figure below shows how Hadoop can be integrated within an Enterprise and how it can be used in an enterprise
for building Fraud Patterns and Models and analytics on full data, rather going for sampling.
Figure 2: Hadoop in Enterprise
BEST PRACTICES IN FRAUD MANAGEMENT
A best-practice fraud management system is integrated from end to end, from data
management to analysis (using multiple analytical techniques), alert generation and
management, and case management.
Hadoop as a queryable archive in support of an enterprise data warehouse.
Hadoop can be used as a data transformation engine.
Hadoop as a data processing engine
Hadoop to add Discovery and Sandbox capabilities to a modern-day analytics ecosystem.
Fraud Models and Hadoop
Most Hadoop use cases is that it assists business in breaking through the glass ceiling on the
volume and variety of data that can be incorporated into decision analytics. The more data we
have, the better our models can be.
Mixing non-traditional forms of data with set of historical transactions can make fraud models even
more robust.
Organization can work to move away from market segment modelling and move toward at-
transaction or at-person level modelling. Quite simply, making a forecast based on a segment is
helpful, but making a decision based on particular information about an individual transaction is
better. To do this, we work up a larger set of data than is conventionally possible in the traditional
approach.
BEST PRACTICES IN FRAUD MANAGEMENT
If the data used to identify or bolster new fraud-detection models isn’t available at a moment’s
notice, by the time we discover these new patterns, it could be too late to prevent damage.
Evaluate the benefit to business of not only building out more comprehensive models with more
types of data but also being able to refresh and enhance those models faster than ever.
Traditional technologies aren’t as agile, either. Hadoop makes it easy to introduce new variables
into the model.
Traditional Statistical Analysis and Hadoop
Traditional statistical analysis applications come with powerful tools for generating workflows.
These applications utilize intuitive graphical user interfaces that allow for better data visualization.
Hadoop follow a similar pattern as these other tools for generating statistical analysis workflows.
See Figure 3, during the final data exploration and visualization step, users can export to human-
readable formats (JSON/CSV) or take advantage of visualization tools.
Figure 3: Generalized statistical analysis workflow with Hadoop
CLOSING THOUGHTS
Fraud is a major concern across all industries.
Many organisations spend lot of money and efforts in preventing fraud. With power of modern
technologies such as Big Data and Hadoop analysing, detecting and preventing fraud has gone to a
next level.
Organisations can continue using their existing IT infrastructure and leverage Big Data Hadoop
technologies for real-time fraud analysis.
Organisations can truly be agile while handing Data in Motion, Data at Rest & Data in Many Forms
with Big Data Hadoop Technologies.
Thank You
hkbhadraa@gmail.com

Weitere ähnliche Inhalte

Was ist angesagt?

Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsMayank Chaudhari
 
What Happens When You Press that Button?
What Happens When You Press that Button?What Happens When You Press that Button?
What Happens When You Press that Button?Cellebrite
 
What Are The Latest Trends in Data Science?
What Are The Latest Trends in Data Science?What Are The Latest Trends in Data Science?
What Are The Latest Trends in Data Science?Bernard Marr
 
Stock market trend prediction using k nearest neighbor(knn) algorithm
Stock market trend prediction using k nearest neighbor(knn) algorithmStock market trend prediction using k nearest neighbor(knn) algorithm
Stock market trend prediction using k nearest neighbor(knn) algorithmVenkat Projects
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx9905234521
 
ML-Ops how to bring your data science to production
ML-Ops  how to bring your data science to productionML-Ops  how to bring your data science to production
ML-Ops how to bring your data science to productionHerman Wu
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learningshivani saluja
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Principles of I/O Hardware and Software
Principles of I/O Hardware and SoftwarePrinciples of I/O Hardware and Software
Principles of I/O Hardware and SoftwareKarandeep Singh Sehgal
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System ForensicsArunJS5
 
The Future of Data Science
The Future of Data ScienceThe Future of Data Science
The Future of Data ScienceDataWorks Summit
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learningSecurity Bootcamp
 
Data mining - Process, Techniques and Research Topics
Data mining - Process, Techniques and Research TopicsData mining - Process, Techniques and Research Topics
Data mining - Process, Techniques and Research TopicsTechsparks
 

Was ist angesagt? (20)

Complete Operating System notes
Complete Operating System notesComplete Operating System notes
Complete Operating System notes
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Chapter 22 - Windows XP
Chapter 22 - Windows XPChapter 22 - Windows XP
Chapter 22 - Windows XP
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Introduction to filesystems and computer forensics
Introduction to filesystems and computer forensicsIntroduction to filesystems and computer forensics
Introduction to filesystems and computer forensics
 
What Happens When You Press that Button?
What Happens When You Press that Button?What Happens When You Press that Button?
What Happens When You Press that Button?
 
What Are The Latest Trends in Data Science?
What Are The Latest Trends in Data Science?What Are The Latest Trends in Data Science?
What Are The Latest Trends in Data Science?
 
Data mining
Data mining Data mining
Data mining
 
Stock market trend prediction using k nearest neighbor(knn) algorithm
Stock market trend prediction using k nearest neighbor(knn) algorithmStock market trend prediction using k nearest neighbor(knn) algorithm
Stock market trend prediction using k nearest neighbor(knn) algorithm
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 
ML-Ops how to bring your data science to production
ML-Ops  how to bring your data science to productionML-Ops  how to bring your data science to production
ML-Ops how to bring your data science to production
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Principles of I/O Hardware and Software
Principles of I/O Hardware and SoftwarePrinciples of I/O Hardware and Software
Principles of I/O Hardware and Software
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System Forensics
 
The Future of Data Science
The Future of Data ScienceThe Future of Data Science
The Future of Data Science
 
Malware detection-using-machine-learning
Malware detection-using-machine-learningMalware detection-using-machine-learning
Malware detection-using-machine-learning
 
Data mining - Process, Techniques and Research Topics
Data mining - Process, Techniques and Research TopicsData mining - Process, Techniques and Research Topics
Data mining - Process, Techniques and Research Topics
 

Ähnlich wie Hadoop BIG Data - Fraud Detection with Real-Time Analytics

Hadoop® Accelerates Earnings Growth in Banking and Insurance
Hadoop® Accelerates Earnings Growth in Banking and InsuranceHadoop® Accelerates Earnings Growth in Banking and Insurance
Hadoop® Accelerates Earnings Growth in Banking and InsuranceMelissa Luongo
 
Big Data: Are you ready for it? Can you handle it?
Big Data: Are you ready for it? Can you handle it? Big Data: Are you ready for it? Can you handle it?
Big Data: Are you ready for it? Can you handle it? ScaleFocus
 
Hortonworks.HadoopPatternsOfUse.201304
Hortonworks.HadoopPatternsOfUse.201304Hortonworks.HadoopPatternsOfUse.201304
Hortonworks.HadoopPatternsOfUse.201304James Kenney
 
Data mining techniques and dss
Data mining techniques and dssData mining techniques and dss
Data mining techniques and dssNiyitegekabilly
 
How Analytics Has Changed in the Last 10 Years (and How It’s Staye.docx
How Analytics Has Changed in the Last 10 Years (and How It’s Staye.docxHow Analytics Has Changed in the Last 10 Years (and How It’s Staye.docx
How Analytics Has Changed in the Last 10 Years (and How It’s Staye.docxpooleavelina
 
Snowball Group Whitepaper - Spotlight on Big Data
Snowball Group Whitepaper - Spotlight on Big DataSnowball Group Whitepaper - Spotlight on Big Data
Snowball Group Whitepaper - Spotlight on Big DataSnowball Group
 
Hadoop: Data Storage Locker or Agile Analytics Platform? It’s Up to You.
Hadoop: Data Storage Locker or Agile Analytics Platform? It’s Up to You.Hadoop: Data Storage Locker or Agile Analytics Platform? It’s Up to You.
Hadoop: Data Storage Locker or Agile Analytics Platform? It’s Up to You.Jennifer Walker
 
The book of elephant tattoo
The book of elephant tattooThe book of elephant tattoo
The book of elephant tattooMohamed Magdy
 
Guide to big data analytics
Guide to big data analyticsGuide to big data analytics
Guide to big data analyticsGahya Pandian
 
Implementing Data Mesh WP LTIMindtree White Paper
Implementing Data Mesh WP LTIMindtree White PaperImplementing Data Mesh WP LTIMindtree White Paper
Implementing Data Mesh WP LTIMindtree White Papershashanksalunkhe12
 
Big data analytics and large-scale computers
Big data analytics and large-scale computersBig data analytics and large-scale computers
Big data analytics and large-scale computersShubhamKhurana20
 
BIG DATA & BUSINESS ANALYTICS
BIG DATA & BUSINESS ANALYTICSBIG DATA & BUSINESS ANALYTICS
BIG DATA & BUSINESS ANALYTICSVikram Joshi
 
The New Data Dynamics How to turn data into a competitive advantage
The New Data Dynamics How to turn data into a competitive advantageThe New Data Dynamics How to turn data into a competitive advantage
The New Data Dynamics How to turn data into a competitive advantageFiona Lew
 
How to tackle big data from a security
How to tackle big data from a securityHow to tackle big data from a security
How to tackle big data from a securityTyrone Systems
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...IT Support Engineer
 
Applications of Big Data & Hadoop
Applications of Big Data & HadoopApplications of Big Data & Hadoop
Applications of Big Data & HadoopSeo Gyansha
 

Ähnlich wie Hadoop BIG Data - Fraud Detection with Real-Time Analytics (20)

Big Data
Big DataBig Data
Big Data
 
Mighty Guides- Data Disruption
Mighty Guides- Data DisruptionMighty Guides- Data Disruption
Mighty Guides- Data Disruption
 
Hadoop® Accelerates Earnings Growth in Banking and Insurance
Hadoop® Accelerates Earnings Growth in Banking and InsuranceHadoop® Accelerates Earnings Growth in Banking and Insurance
Hadoop® Accelerates Earnings Growth in Banking and Insurance
 
Big Data: Are you ready for it? Can you handle it?
Big Data: Are you ready for it? Can you handle it? Big Data: Are you ready for it? Can you handle it?
Big Data: Are you ready for it? Can you handle it?
 
Hortonworks.HadoopPatternsOfUse.201304
Hortonworks.HadoopPatternsOfUse.201304Hortonworks.HadoopPatternsOfUse.201304
Hortonworks.HadoopPatternsOfUse.201304
 
Data mining techniques and dss
Data mining techniques and dssData mining techniques and dss
Data mining techniques and dss
 
How Analytics Has Changed in the Last 10 Years (and How It’s Staye.docx
How Analytics Has Changed in the Last 10 Years (and How It’s Staye.docxHow Analytics Has Changed in the Last 10 Years (and How It’s Staye.docx
How Analytics Has Changed in the Last 10 Years (and How It’s Staye.docx
 
Snowball Group Whitepaper - Spotlight on Big Data
Snowball Group Whitepaper - Spotlight on Big DataSnowball Group Whitepaper - Spotlight on Big Data
Snowball Group Whitepaper - Spotlight on Big Data
 
Hadoop: Data Storage Locker or Agile Analytics Platform? It’s Up to You.
Hadoop: Data Storage Locker or Agile Analytics Platform? It’s Up to You.Hadoop: Data Storage Locker or Agile Analytics Platform? It’s Up to You.
Hadoop: Data Storage Locker or Agile Analytics Platform? It’s Up to You.
 
The book of elephant tattoo
The book of elephant tattooThe book of elephant tattoo
The book of elephant tattoo
 
Guide to big data analytics
Guide to big data analyticsGuide to big data analytics
Guide to big data analytics
 
Unlocking big data
Unlocking big dataUnlocking big data
Unlocking big data
 
Implementing Data Mesh WP LTIMindtree White Paper
Implementing Data Mesh WP LTIMindtree White PaperImplementing Data Mesh WP LTIMindtree White Paper
Implementing Data Mesh WP LTIMindtree White Paper
 
Big data analytics and large-scale computers
Big data analytics and large-scale computersBig data analytics and large-scale computers
Big data analytics and large-scale computers
 
BIG DATA & BUSINESS ANALYTICS
BIG DATA & BUSINESS ANALYTICSBIG DATA & BUSINESS ANALYTICS
BIG DATA & BUSINESS ANALYTICS
 
The New Data Dynamics How to turn data into a competitive advantage
The New Data Dynamics How to turn data into a competitive advantageThe New Data Dynamics How to turn data into a competitive advantage
The New Data Dynamics How to turn data into a competitive advantage
 
How to tackle big data from a security
How to tackle big data from a securityHow to tackle big data from a security
How to tackle big data from a security
 
Data mining-basic
Data mining-basicData mining-basic
Data mining-basic
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
 
Applications of Big Data & Hadoop
Applications of Big Data & HadoopApplications of Big Data & Hadoop
Applications of Big Data & Hadoop
 

Mehr von hkbhadraa

Big data and hadoop training - Session 5
Big data and hadoop training - Session 5Big data and hadoop training - Session 5
Big data and hadoop training - Session 5hkbhadraa
 
Big data and hadoop training - Session 3
Big data and hadoop training - Session 3Big data and hadoop training - Session 3
Big data and hadoop training - Session 3hkbhadraa
 
Big data and hadoop training - Session 2
Big data and hadoop training  - Session 2Big data and hadoop training  - Session 2
Big data and hadoop training - Session 2hkbhadraa
 
Retail products - machine learning recommendation engine
Retail products   - machine learning recommendation engineRetail products   - machine learning recommendation engine
Retail products - machine learning recommendation enginehkbhadraa
 
Big data lambda architecture - Streaming Layer Hands On
Big data lambda architecture - Streaming Layer Hands OnBig data lambda architecture - Streaming Layer Hands On
Big data lambda architecture - Streaming Layer Hands Onhkbhadraa
 
Setup 3 Node Kafka Cluster on AWS - Hands On
Setup 3 Node Kafka Cluster on AWS - Hands OnSetup 3 Node Kafka Cluster on AWS - Hands On
Setup 3 Node Kafka Cluster on AWS - Hands Onhkbhadraa
 
Big data Lambda Architecture - Batch Layer Hands On
Big data Lambda Architecture - Batch Layer Hands OnBig data Lambda Architecture - Batch Layer Hands On
Big data Lambda Architecture - Batch Layer Hands Onhkbhadraa
 
Project management part 5
Project management part 5Project management part 5
Project management part 5hkbhadraa
 
Project management part 4
Project management part 4Project management part 4
Project management part 4hkbhadraa
 
Project management part 3
Project management part 3Project management part 3
Project management part 3hkbhadraa
 
Project management part 2
Project management part 2Project management part 2
Project management part 2hkbhadraa
 
Project management part 1
Project management part 1Project management part 1
Project management part 1hkbhadraa
 
Gamification
GamificationGamification
Gamificationhkbhadraa
 
Internet of things
Internet of thingsInternet of things
Internet of thingshkbhadraa
 
IBM Bluemix Cloud Platform Application Development with Eclipse IDE
IBM Bluemix Cloud Platform Application Development with Eclipse IDEIBM Bluemix Cloud Platform Application Development with Eclipse IDE
IBM Bluemix Cloud Platform Application Development with Eclipse IDEhkbhadraa
 

Mehr von hkbhadraa (15)

Big data and hadoop training - Session 5
Big data and hadoop training - Session 5Big data and hadoop training - Session 5
Big data and hadoop training - Session 5
 
Big data and hadoop training - Session 3
Big data and hadoop training - Session 3Big data and hadoop training - Session 3
Big data and hadoop training - Session 3
 
Big data and hadoop training - Session 2
Big data and hadoop training  - Session 2Big data and hadoop training  - Session 2
Big data and hadoop training - Session 2
 
Retail products - machine learning recommendation engine
Retail products   - machine learning recommendation engineRetail products   - machine learning recommendation engine
Retail products - machine learning recommendation engine
 
Big data lambda architecture - Streaming Layer Hands On
Big data lambda architecture - Streaming Layer Hands OnBig data lambda architecture - Streaming Layer Hands On
Big data lambda architecture - Streaming Layer Hands On
 
Setup 3 Node Kafka Cluster on AWS - Hands On
Setup 3 Node Kafka Cluster on AWS - Hands OnSetup 3 Node Kafka Cluster on AWS - Hands On
Setup 3 Node Kafka Cluster on AWS - Hands On
 
Big data Lambda Architecture - Batch Layer Hands On
Big data Lambda Architecture - Batch Layer Hands OnBig data Lambda Architecture - Batch Layer Hands On
Big data Lambda Architecture - Batch Layer Hands On
 
Project management part 5
Project management part 5Project management part 5
Project management part 5
 
Project management part 4
Project management part 4Project management part 4
Project management part 4
 
Project management part 3
Project management part 3Project management part 3
Project management part 3
 
Project management part 2
Project management part 2Project management part 2
Project management part 2
 
Project management part 1
Project management part 1Project management part 1
Project management part 1
 
Gamification
GamificationGamification
Gamification
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IBM Bluemix Cloud Platform Application Development with Eclipse IDE
IBM Bluemix Cloud Platform Application Development with Eclipse IDEIBM Bluemix Cloud Platform Application Development with Eclipse IDE
IBM Bluemix Cloud Platform Application Development with Eclipse IDE
 

Kürzlich hochgeladen

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

Hadoop BIG Data - Fraud Detection with Real-Time Analytics

  • 1. Hadoop – BIG Data Fraud Detection with real-time Analysis
  • 2. What is Fraud Detection? Fraud Detection with real-time Analysis with Hadoop and Big Data Technologies for different industries such as Banking, Finance, Insurance, Core Accounts Receivable, Government, HealthCare, or Retail. Fraud is a major concern across all industries. You name the industry (Banking, Insurance, Government, Accounts Receivable, HealthCare, or Retail, for example) and you’ll find fraud. In today’s inter-connected world, the sheer volume and complexity of transactions makes it harder than ever to find fraud. Traditional approaches to fraud prevention aren’t particularly efficient. For example, the management of improper payments is often managed by analysts auditing what amounts to a very small sample of claims paired with requesting medical documentation from targeted submitters. The industry term for this model is pay and chase. Claims are accepted and paid out and processes look for intentional or unintentional overpayments by way of post-payment review of those claims.
  • 3. Though the sheer volume of transactions makes it harder to spot fraud because of the volume of data, ironically, this same challenge can help create better fraud predictive models – an area where Hadoop and Big Data shines. What is Fraud Detection?
  • 4. How is Fraud detection done? So how is fraud detection done now? Because of the limitations of traditional technologies, fraud models are built by sampling data and using the sample to build a set of fraud-prediction and detection models. When you contrast this model with a Hadoop Big Data – anchored fraud department that uses the full data set – No Sampling – to build out the models, you can see the difference. For creating fraud-detection models, Hadoop is well suited to Handle Volume: That means processing the full data set - no data sampling. Manage new varieties of data: Data coming from different sources and in different formats. Maintain an agile environment: Enable different kinds of analysis and changes to existing models.
  • 5. How is Fraud detection done? The limitations of sampling Faced with expensive hardware and a pretty high commitment in terms of time and RAM, people tried to make the analytics workload a bit more reasonable by analyzing only a sampling of the data. While sampling is a good idea in theory, in practice this is often an unreliable tactic. Finding a statistically significant sampling can be challenging for sparse and/or skewed data sets, which are quite common. This leads to poorly judged samplings, which can introduce outliers and anomalous data points, and can, in turn, bias the results of analysis.
  • 6. BEST PRACTICES IN FRAUD MANAGEMENT A best-practice fraud management approach is integrated from end to end. Figure 1: Fraud management approach Integrated End-End
  • 7. BEST PRACTICES IN FRAUD MANAGEMENT COMBATING FRAUD WITH THE TECHNOLOGY AVAILABLE TODAY – Big Data Hadoop Step 1. Create an enterprise wide view of patterns and perpetrators. Step 2. Prevent and detect fraud in enterprise wide context. Step 3. Investigate and Resolve Fraud in an Integrated Environment. Figure below shows how Hadoop can be integrated within an Enterprise and how it can be used in an enterprise for building Fraud Patterns and Models and analytics on full data, rather going for sampling. Figure 2: Hadoop in Enterprise
  • 8. BEST PRACTICES IN FRAUD MANAGEMENT A best-practice fraud management system is integrated from end to end, from data management to analysis (using multiple analytical techniques), alert generation and management, and case management. Hadoop as a queryable archive in support of an enterprise data warehouse. Hadoop can be used as a data transformation engine. Hadoop as a data processing engine Hadoop to add Discovery and Sandbox capabilities to a modern-day analytics ecosystem. Fraud Models and Hadoop Most Hadoop use cases is that it assists business in breaking through the glass ceiling on the volume and variety of data that can be incorporated into decision analytics. The more data we have, the better our models can be. Mixing non-traditional forms of data with set of historical transactions can make fraud models even more robust. Organization can work to move away from market segment modelling and move toward at- transaction or at-person level modelling. Quite simply, making a forecast based on a segment is helpful, but making a decision based on particular information about an individual transaction is better. To do this, we work up a larger set of data than is conventionally possible in the traditional approach.
  • 9. BEST PRACTICES IN FRAUD MANAGEMENT If the data used to identify or bolster new fraud-detection models isn’t available at a moment’s notice, by the time we discover these new patterns, it could be too late to prevent damage. Evaluate the benefit to business of not only building out more comprehensive models with more types of data but also being able to refresh and enhance those models faster than ever. Traditional technologies aren’t as agile, either. Hadoop makes it easy to introduce new variables into the model.
  • 10. Traditional Statistical Analysis and Hadoop Traditional statistical analysis applications come with powerful tools for generating workflows. These applications utilize intuitive graphical user interfaces that allow for better data visualization. Hadoop follow a similar pattern as these other tools for generating statistical analysis workflows. See Figure 3, during the final data exploration and visualization step, users can export to human- readable formats (JSON/CSV) or take advantage of visualization tools. Figure 3: Generalized statistical analysis workflow with Hadoop
  • 11. CLOSING THOUGHTS Fraud is a major concern across all industries. Many organisations spend lot of money and efforts in preventing fraud. With power of modern technologies such as Big Data and Hadoop analysing, detecting and preventing fraud has gone to a next level. Organisations can continue using their existing IT infrastructure and leverage Big Data Hadoop technologies for real-time fraud analysis. Organisations can truly be agile while handing Data in Motion, Data at Rest & Data in Many Forms with Big Data Hadoop Technologies.