Introduction
gu1βs transaction monitoring enables you to detect and prevent fraud in real-time. This guide covers the most common fraud patterns and provides production-ready rules you can implement immediately.Detectable Fraud Types
Card Testing
Detection of stolen card validation attempts
Account Takeover
Identification of compromised accounts
Transaction Velocity
Unusual transaction frequency patterns
Impossible Travel
Transactions from impossible geographic locations
First Transaction Fraud
High-risk first purchases
Friendly Fraud
Legitimate purchases followed by chargebacks
Risk Indicators
High Risk
- Multiple failed transactions in short time
- Transaction from sanctioned country
- Impossible geographic travel
- New user with high amount
- Mismatch between billing and shipping
Medium Risk
- Unusual transaction frequency
- Transaction outside normal hours
- New device or IP
- High-risk merchant category
- Multiple cards from same device
Low Risk
- Transaction within normal patterns
- Verified user and device
- Low amount
- Domestic transaction
- Standard merchant category
Production-Ready Rules
1. Card Testing Detection
Blocks automated stolen card validation attempts.- Card has 3+ failed attempts in last hour
- Transaction amount is less than $10
- Payment method is card
2. First Transaction High Amount
Requires additional verification for high first transactions.- Userβs first transaction
- Amount greater than $500
- User not fully verified
3. Impossible Travel Detection
Detects transactions from geographically impossible locations.- Transaction from different country than previous
- Less than 1 hour since last transaction
- More than 1000km distance
4. Transaction Velocity - High Risk
Monitors unusual transaction frequency.- More than 10 transactions in 1 hour with amount > $100, OR
- More than 50 transactions in 24h when average is < 10/day
5. High-Risk IP Detection
Blocks transactions from known fraud IPs.- IP risk score > 80, OR
- IP is Tor exit node, OR
- IP is proxy/VPN
6. Friendly Fraud Pattern
Detects patterns of legitimate purchases followed by chargebacks.- User has 2+ chargebacks in 90 days
- Chargeback rate > 10%
- New payment transaction > $200
Layered Protection Strategy
Configuration by Industry
E-commerce
Fintech/Payments
KPIs and Metrics
Fraud Prevention Metrics
Rule Effectiveness
Chargeback Monitoring
Best Practices
β DO
-
Start with HOLD instead of REJECT
- Allows manual review
- Reduces customer friction
- Improves false positive handling
-
Use layered approach
- Multiple rules at different thresholds
- Combine SYNC and ASYNC rules
- Progressive authentication
-
Monitor and adjust
- Track false positive rate
- Adjust thresholds based on data
- Seasonal adjustments
-
Collect device data
- IP address and geolocation
- Device fingerprinting
- Browser/app information
-
Implement 3DS for high-risk
- New cards
- High amounts
- Suspicious patterns
- Shifts liability to issuer
β Common Mistakes
-
Over-blocking legitimate customers
- Start conservative
- Monitor customer complaints
- Provide clear feedback
-
Ignoring false positives
- Track all blocks
- Review rejected transactions
- Adjust rules regularly
-
Static thresholds
- Use dynamic limits
- Adapt to user behavior
- Consider context
-
Not collecting evidence
- Save device data
- Store IP information
- Document decisions
- Required for chargeback disputes
Integration with Intelligence Dashboard
All fraud alerts automatically flow into Intelligence:- Consolidated View: All alerts for an entity in one place
- Risk Timeline: Chronological view of suspicious activity
- Collaboration: Teams can work together on complex cases
- Actions: Accept, escalate, block user, mark false positive
- Audit Trail: Complete history of decisions