Advanced Real-Time Fraud Detection Using RAG-Based LLMs
- URL: http://arxiv.org/abs/2501.15290v1
- Date: Sat, 25 Jan 2025 17:58:05 GMT
- Title: Advanced Real-Time Fraud Detection Using RAG-Based LLMs
- Authors: Gurjot Singh, Prabhjot Singh, Maninder Singh,
- Abstract summary: We introduce a novel real time fraud detection mechanism using Retrieval Augmented Generation technology.
Key innovation of our system is the ability to update policies without retraining the entire model.
This robust and flexible fraud detection system is well suited for real world deployment.
- Score: 0.990597034655156
- License:
- Abstract: Artificial Intelligence has become a double edged sword in modern society being both a boon and a bane. While it empowers individuals it also enables malicious actors to perpetrate scams such as fraudulent phone calls and user impersonations. This growing threat necessitates a robust system to protect individuals In this paper we introduce a novel real time fraud detection mechanism using Retrieval Augmented Generation technology to address this challenge on two fronts. First our system incorporates a continuously updating policy checking feature that transcribes phone calls in real time and uses RAG based models to verify that the caller is not soliciting private information thus ensuring transparency and the authenticity of the conversation. Second we implement a real time user impersonation check with a two step verification process to confirm the callers identity ensuring accountability. A key innovation of our system is the ability to update policies without retraining the entire model enhancing its adaptability. We validated our RAG based approach using synthetic call recordings achieving an accuracy of 97.98 percent and an F1score of 97.44 percent with 100 calls outperforming state of the art methods. This robust and flexible fraud detection system is well suited for real world deployment.
Related papers
- Time-Aware Face Anti-Spoofing with Rotation Invariant Local Binary Patterns and Deep Learning [50.79277723970418]
imitation attacks can lead to erroneous identification and subsequent authentication of attackers.
Similar to face recognition, imitation attacks can also be detected with Machine Learning.
We propose a novel approach that promises high classification accuracy by combining previously unused features with time-aware deep learning strategies.
arXiv Detail & Related papers (2024-08-27T07:26:10Z) - How to Train Your Fact Verifier: Knowledge Transfer with Multimodal Open Models [95.44559524735308]
Large language or multimodal model based verification has been proposed to scale up online policing mechanisms for mitigating spread of false and harmful content.
We test the limits of improving foundation model performance without continual updating through an initial study of knowledge transfer.
Our results on two recent multi-modal fact-checking benchmarks, Mocheg and Fakeddit, indicate that knowledge transfer strategies can improve Fakeddit performance over the state-of-the-art by up to 1.7% and Mocheg performance by up to 2.9%.
arXiv Detail & Related papers (2024-06-29T08:39:07Z) - PITCH: AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response [14.604998731837595]
PITCH is a robust challenge-response method to detect and tag interactive deepfake audio calls.
We developed a comprehensive taxonomy of audio challenges based on the human auditory system, linguistics, and environmental factors.
Our solution gave users maximum control and boosted detection accuracy to 84.5%.
arXiv Detail & Related papers (2024-02-28T06:17:55Z) - Securing Transactions: A Hybrid Dependable Ensemble Machine Learning
Model using IHT-LR and Grid Search [2.4374097382908477]
We introduce a state-of-the-art hybrid ensemble (ENS) Machine learning (ML) model that intelligently combines multiple algorithms to enhance fraud identification.
Our experiments are conducted on a publicly available credit card dataset comprising 284,807 transactions.
The proposed model achieves impressive accuracy rates of 99.66%, 99.73%, 98.56%, and 99.79%, and a perfect 100% for the DT, RF, KNN, and ENS models, respectively.
arXiv Detail & Related papers (2024-02-22T09:01:42Z) - When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems [53.2306792009435]
We develop two lightweight driver authentication systems based on Random Forest and Recurrent Neural Network architectures.
We are the first to propose attacks against these systems by developing two novel evasion attacks, SMARTCAN and GANCAN.
Through our contributions, we aid practitioners in safely adopting these systems, help reduce car thefts, and enhance driver security.
arXiv Detail & Related papers (2023-06-09T14:33:26Z) - Privacy-Preserving Credit Card Fraud Detection using Homomorphic
Encryption [0.0]
This paper proposes a system for private fraud detection on encrypted transactions using homomorphic encryption.
Two models, XGBoost and a feedforward neural network, are trained as fraud detectors on data.
XGBoost model has better performance, with an inference as low as 6ms, compared to 296ms for the neural network.
arXiv Detail & Related papers (2022-11-12T14:28:17Z) - Synthetic Disinformation Attacks on Automated Fact Verification Systems [53.011635547834025]
We explore the sensitivity of automated fact-checkers to synthetic adversarial evidence in two simulated settings.
We show that these systems suffer significant performance drops against these attacks.
We discuss the growing threat of modern NLG systems as generators of disinformation.
arXiv Detail & Related papers (2022-02-18T19:01:01Z) - Application of Deep Reinforcement Learning to Payment Fraud [0.0]
A typical fraud detection system employs standard supervised learning methods where the focus is on maximizing the fraud recall rate.
We argue that such a formulation can lead to suboptimal solutions.
We formulate fraud detection as a sequential decision-making problem by including the utility within the model in the form of the reward function.
arXiv Detail & Related papers (2021-12-08T11:30:53Z) - Aurora Guard: Reliable Face Anti-Spoofing via Mobile Lighting System [103.5604680001633]
Anti-spoofing against high-resolution rendering replay of paper photos or digital videos remains an open problem.
We propose a simple yet effective face anti-spoofing system, termed Aurora Guard (AG)
arXiv Detail & Related papers (2021-02-01T09:17:18Z) - Deep Q-Network-based Adaptive Alert Threshold Selection Policy for
Payment Fraud Systems in Retail Banking [9.13755431537592]
We propose an enhanced threshold selection policy for fraud alert systems.
The proposed approach formulates the threshold selection as a sequential decision making problem and uses Deep Q-Network based reinforcement learning.
Experimental results show that this adaptive approach outperforms the current static solutions by reducing the fraud losses as well as improving the operational efficiency of the alert system.
arXiv Detail & Related papers (2020-10-21T15:10:57Z) - Adversarial vs behavioural-based defensive AI with joint, continual and
active learning: automated evaluation of robustness to deception, poisoning
and concept drift [62.997667081978825]
Recent advancements in Artificial Intelligence (AI) have brought new capabilities to behavioural analysis (UEBA) for cyber-security.
In this paper, we present a solution to effectively mitigate this attack by improving the detection process and efficiently leveraging human expertise.
arXiv Detail & Related papers (2020-01-13T13:54:36Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.