{"id":2132,"date":"2014-06-25T17:51:52","date_gmt":"2014-06-25T17:51:52","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2132"},"modified":"2020-02-26T10:52:13","modified_gmt":"2020-02-26T15:52:13","slug":"big-data-vs-big-fraud","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/big-data-vs-big-fraud\/2132\/","title":{"rendered":"Big Data vs. Big Fraud"},"content":{"rendered":"<p><em>We continue our Big Data Week on Kaspersky Business. The first two posts of the series are available via the links below:\u00a0<\/em><\/p>\n<ol>\n<li><a href=\"https:\/\/business.kaspersky.com\/whats-so-big-about-big-data\/\" target=\"_blank\" rel=\"noopener nofollow\">What\u2019s So Big About Big Data<\/a><\/li>\n<li><a href=\"https:\/\/business.kaspersky.com\/big-deal-when-machines-know-better\/\" target=\"_blank\" rel=\"noopener nofollow\">Big Deal: When Machines Know Better<\/a><\/li>\n<\/ol>\n<p>World of finance loses big on fraud of all kinds \u2013 by some estimates they lose up to dozens, or even hundreds of billion of dollars annually on fraudulent transactions alone. No surprise that it wanted to do something about this. First antifraud measures were implemented by Visa, for instance, decades ago, but up until rather recently, Visa has acknowledged its antifraud analytic potence was limited: older analytic engines could only study 40 aspects of a transaction at once, attempting to detect patterns associated with frauds. Earlier analytic models studied as little as 2% of transaction data. Given that a typical statistical error is 3-4%, it doesn\u2019t look good enough.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>A bigger stick for fighting bigger fraud. Is victory there? \u2013 Nope<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fdz7r&amp;text=A+bigger+stick+for+fighting+bigger+fraud.+Is+victory+there%3F+%26%238211%3B+Nope\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p style=\"text-align: center\">\n<\/p><p>\u00a0<\/p>\n<p>So Visa turned to Big Data \u2013 \u00a0to the systems capable of finely grinding all those huge amounts of data \u00a0\u2013 namely, Apache Hadoop, derived basically from Google\u2019s technologies such as MapReduce. Currently its analytic engine is capable of studying as many as 500 aspects of a transaction at once, and uses as many as 16 models of possible fraud patterns at once.<\/p>\n<p>According to WSJ\u2019s Steve Rosenbush, the <a href=\"http:\/\/blogs.wsj.com\/cio\/2013\/03\/11\/visa-says-big-data-identifies-billions-of-dollars-in-fraud\/\" target=\"_blank\" rel=\"noopener nofollow\">company estimates that the model has identified $2 billion in potential annual incremental fraud opportunities<\/a>, and gave it the chance to address those vulnerabilities before that money was lost.<\/p>\n<p>Does it mean, though, that the fraud is beaten? There are lots of publications and proclamations on how Big Data <a href=\"https:\/\/www.google.ru\/webhp?sourceid=chrome-instant&amp;ion=1&amp;espv=2&amp;ie=UTF-8#q=big+data+fraud&amp;safe=off\" target=\"_blank\" rel=\"noopener nofollow\">revolutionizes fraud prevention<\/a>, but none speak of total victory. One can combat fraud with more powerful weapons, but it\u2019s not eradicated, and probably won\u2019t be.\u00a0<\/p><blockquote class=\"twitter-pullquote\"><p>Fraudsters read the same books as Big Data white-hat experts.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fdz7r&amp;text=Fraudsters+read+the+same+books+as+Big+Data+white-hat+experts.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Experts acknowledge that the cyberfraudsters aren\u2019t standing still either: As John Kunze, CEO of a digital money transfer company Xoom Corporation <a href=\"http:\/\/www.economist.com\/node\/21554740\" target=\"_blank\" rel=\"noopener nofollow\">puts <\/a>it, \u201c<em>The \u00a0fraudsters are reading all the books we are. They are PhDs themselves.<\/em>\u201d And if these bad guys see the <em>big <\/em>protective wall built around the payment services from the Big Data grinding material, they are looking for the ways to climb over or walk around wherever possible.<\/p>\n<p>And they are clever enough to succeed at least occasionally.<\/p>\n<p style=\"text-align: center\"><strong>Big Data Week<\/strong><\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/business.kaspersky.com\/big-deal-when-machines-know-better\/\" target=\"_blank\" rel=\"noopener nofollow\"><em>&lt;&lt; Previous Post<\/em><\/a><em> | <a href=\"https:\/\/business.kaspersky.com\/big-security-the-larger-canvas\/\" target=\"_blank\" rel=\"noopener nofollow\">Next Post\u00a0&gt;&gt;<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Big Data allowed to beat cyberfraudsters over the extended frontage. Unfortunately, they read the very same books as the security and Big Data experts.<\/p>\n","protected":false},"author":209,"featured_media":16095,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1042,93,189,2120],"class_list":{"0":"post-2132","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-big-data","10":"tag-cybercriminals","11":"tag-data-security","12":"tag-information-security"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/big-data-vs-big-fraud\/2132\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/big-data-vs-big-fraud\/2132\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/big-data-vs-big-fraud\/2132\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/big-data\/","name":"big data"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2132"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2132\/revisions"}],"predecessor-version":[{"id":33198,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2132\/revisions\/33198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16095"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}