Module 6: Transaction Pattern Detection

Overview

Fraud is rarely isolated. It often follows patterns that can be detected with:

Cross-card analytics

Time-based behavior tracking

Velocity monitoring (how fast and how often)

Correlation across float, card usage, and merchant types

Graph-based clustering (same device, same IP, same MCC)

This module will show your risk, engineering, and operations teams how to recognize these patterns early — and act before damage scales.


What is Velocity Monitoring?

Velocity rules detect how fast or how frequently certain actions are taken. It is a key strategy in detecting abuse.

Examples of Effective Velocity Checks:

metric
sample rule
Cards per user
No more than 2 cards per user per 24 hours
Refunds per user
Max 2 refunds in 1 hour per user
Spend frequency
No more than 5 authorizations in 30 minutes
Float movement
Max $500 moved via refund → withdrawal in 1 hour
Declines
Freeze card if 3 consecutive declines in < 15 minutes

These rules are low cost, fast, and can prevent more expensive post-fraud reconciliation.


Float Flow Analysis

Visualizing how float moves can uncover laundering or abuse patterns.

Watch for:

Top-up → spend → refund → withdrawal loops

Float landing in same merchant or MCC across different users

Refund amounts matching prior spend from another account

Terminated card receives refund → wallet receives payout

Best Practice: Build a graph where each node is a float transaction and trace directionality.


Device & IP Clustering

Fraud often comes from reused infrastructure — same device, same VPN, same IP.

Techniques:

Device fingerprinting (user agent + entropy + browser config)

Shared IP detection

Behavior signatures (e.g. card create + terminate in 5 mins)

MAC address or mobile device ID if mobile SDKs are used

Actionable Rules:

If 5+ accounts use same device → lock all and trigger review

Block IPs known for fraud or linked to previous abuse

Tag devices with historical fraud score


Merchant Behavior Mapping

Patterns:

One merchant receiving refunds from many users

Same user spending at many MCCs in a short window

MCC not matching card BIN usage

Refund patterns aligned to merchant time zones

Risk Action: Flag merchants with refund rate > 20% of their successful charge volume over 7 days.

Transaction Graphs

Mapping user → card → merchant → action chains reveals high-risk behaviors.

graph node
connects to
Card ID
Top-up, spend, refund, withdrawal
User ID
Cards, devices, IPs, wallets
Merchant ID
MCCs, dispute history
Device
Multiple users, common IPs

These graphs become the basis of automated risk scoring.

Pattern-Triggered Actions

pattern
action
3 cards created, declined, and terminated in 1 hour
Lock account and IP
Refund issued from high-risk MCC without matching spend
Freeze refund and alert treasury
Shared device fingerprint across 4 accounts
Block new card issuance
User receives 2 reversals followed by a large withdrawal
Flag for laundering

Audit and Alerting Layer

All flagged patterns must be logged with timestamp and user context

Tag alerts with category: refund-abuse, velocity-spike, mcc-mismatch, etc.

Alert routing:

Treasury if float exposed

Engineering if webhook anomaly

Compliance if BIN/MCC conflict


Module 6 Quick Check

1. Why are velocity rules useful in fraud prevention?

A. They reduce the number of card declines

B. They make cards faster to use

C. They catch behavior anomalies early

D. They fix webhook failures

Answer: C

2. What’s suspicious about multiple users receiving refunds from one merchant?

A. Indicates high user volume

B. May be a refund marketing promo

C. Could signal merchant collusion or laundering

D. It’s always allowed

Answer: C

3. What’s a graph useful for in fraud detection?

A. Showing user interface behavior

B. Mapping relationships across users, devices, and merchants

C. Measuring float velocity

D. Tracking FX fees

Answer: B


Share on
Share on FacebookShare on XShare on LinkedIn
Did you find this page useful?