AI-Driven Fraud: Velocity, Behavior Analytics, and Graph Signals
How modern fraud detection systems use machine learning, behavioral analysis, and network graphs to stop sophisticated attacks in real-time.
Uzzam Ahmed Malik
Head of Product – Cards Business

AI-Driven Fraud: Velocity, Behavior Analytics, and Graph Signals
Traditional fraud rules—"decline if transaction exceeds $5,000" or "flag if more than 3 transactions in 10 minutes"—are breaking under the weight of modern attack sophistication. Today's fraud prevention requires machine learning models that adapt in real-time, behavioral fingerprinting, and graph-based network analysis.
The Evolution of Fraud Detection
Rule-Based Systems (Generation 1)
Static thresholds and simple logic:
- Amount limits by merchant category
- Geographic restrictions
- Simple velocity checks
Problem: Attackers easily reverse-engineer and evade fixed rules.
Machine Learning Models (Generation 2)
Supervised learning on historical fraud labels:
- Gradient-boosted decision trees
- Neural networks for pattern recognition
- Feature engineering: time-of-day, merchant metadata, card-not-present flags
Problem: Models lag reality. Yesterday's fraud patterns don't predict tomorrow's attacks.
Behavioral + Network Analytics (Generation 3)
This is where we are today. Systems that:
- Build baseline behavioral profiles per cardholder
- Detect anomalies from expected patterns
- Analyze transaction networks to spot coordinated attacks
Velocity Checks 2.0
Simple velocity—"3 transactions in 10 minutes"—is too blunt. Modern systems track:
- Multi-dimensional velocity: Cards, devices, IP addresses, merchants
- Contextual windows: Faster spending on Friday night vs Tuesday morning
- Cross-entity patterns: Same shipping address used across 50 different cards
Example: A card used at 10 gas stations in 2 hours might be normal for a fleet manager, catastrophic for a consumer card. Behavioral context matters.
Behavior Analytics
Every cardholder develops patterns. ML models learn:
- Merchant preferences: Coffee shops daily, luxury retailers quarterly
- Geographic zones: Home, office, commute route, vacation destinations
- Transaction timing: Lunch purchases at noon, not 3 AM
- Spend magnitude: $200/transaction is normal for one user, alarming for another
When a transaction deviates significantly from learned behavior, the system:
- Scores the anomaly (how far outside normal?)
- Weighs risk factors (card-present vs CNP, high-risk merchant category)
- Decides: approve, decline, or step-up authentication (3DS challenge)
Graph-Based Fraud Detection
Fraudsters operate in networks. Graph analysis reveals:
Device Fingerprinting Networks
Track relationships between:
- Cards → linked by shared device IDs
- Devices → linked by IP addresses or browser fingerprints
- Merchants → linked by suspicious refund patterns
When one card in a cluster is confirmed fraud, the entire network gets elevated scrutiny.
Shipping Address Graphs
Map addresses to:
- Number of unique cards shipping there
- Frequency of returns or chargebacks
- Geographic proximity to known fraud rings
An address receiving shipments from 100+ different cards over 2 weeks is a reshipping mule location—a logistics hub for stolen goods.
Velocity Cascade Detection
Track how compromised credentials move:
- Card A makes 5 small test transactions (checking if card is active)
- Same device immediately switches to Card B, C, D with similar patterns
- Graph analysis spots the cascade before individual cards hit velocity limits
Real-Time Decisioning
All of this must happen in under 100 milliseconds—the SLA for payment authorization. Architecture:
- Pre-computed features: Behavioral profiles updated hourly, not at transaction time
- Model serving infrastructure: ONNX or TensorFlow Serving for low-latency inference
- Feature stores: Redis or similar for real-time lookups (device history, IP reputation)
- Fallback rules: If ML model times out, hard rules apply
The False Positive Challenge
Fraud models balance two costs:
- False negatives: Approving fraud (direct financial loss)
- False positives: Declining legitimate transactions (customer friction, lost revenue)
A 1% false positive rate sounds acceptable until you realize it means declining 1 in 100 legitimate customers. At scale, that's thousands of angry users daily.
Modern systems use:
- Confidence scores: High-confidence fraud declines immediately; borderline cases get step-up auth
- Adaptive thresholds: Tighten rules during known attack periods, relax during low-risk hours
- Feedback loops: Chargeback data retrains models weekly
What's Next
The frontier is:
- Federated learning: Train models across institutions without sharing customer data
- Generative AI for attack simulation: Red-team models that invent new fraud patterns
- Real-time behavioral biometrics: Typing cadence, mouse movements as fraud signals
- Cross-border network analysis: Spot international carding rings across payment systems
Fraud prevention is an arms race. Static defenses lose. Adaptive, intelligent systems that learn from every transaction are the only path forward.


