-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal for Fraud Detection Capabilities #4
Comments
Interesting. I think we might also want to include something like 'know whether the same device is seen repeatedly in the context of multiple identities' - essentially velocity features for device. Another one that comes to mind is knowing the tenure of a device on a given network or in association with an identifier such as email. |
I like all of these suggestions, but the geolocation one is tricky. Since GPS-based or wifi-based information is effectively self-reported from untrusted sensors that can be manipulated, I don't think we could ever rely on it for antifraud purposes. I could see deriving coarse geo information based on ping from trusted servers in known locations, possibly. |
Yea, location today is pretty fickle, but when it works, it works well. IP location is more useful than self-reported device location. Today there is a lot of commercially available metadata available regarding IP addresses that enables orgs to cut through the noise (for example, a known residential IP will have a lot more value in terms of location than an MNO NAT IP). Still, it is probably reliable < 50% of the time. That's true of many browser signals, and one of the reasons why ML is so essential for fraud prevention - hundreds of features go into models, and that breadth of information leads to resilient predictions that would not otherwise be viable. In general I am concerned that if we replace the breadth of information that current supports these use cases with a few well-defined, official/sanctioned methods, it will not be nearly as effective. |
This proposal lists capabilities identified as useful for a number of agreed upon fraud-related use cases.
Recognize whether the same device is seen again in the context of the same identity
This applies to both within the same domain or across domains. Detecting a same device returning would traditionally happen through storing IDs persistently in the browser and reusing them when a device is seen again. The lifespan of detection needs to be at a minimum 7 days.
Use cases
Recognize whether the same device is seen again in the context of multiple identities
Similar to the above, but recognizing the usage of the same device with different identities
Use cases
Retrieve a device’s IP address
Knowledge of the IP address offers many benefits in the fight against identity fraud:
Know the geographic location of the device
This refers to geolocation information through GPS / Wi-Fi triangulation, as this offers additional confidence over only IP-based geolocation, particularly when proxies are being used.
Use cases
Know that the device is a real device and its type
This includes detecting the device’s type and whether or not it is running in a simulator.
Knowledge of the device types used improves accuracy of fraud detection:
Know that a human user is interacting with the device
This comes down to having the capabilities required to detect bots/headless browsers/scripts.
Use Cases
The text was updated successfully, but these errors were encountered: