{"id":22602,"date":"2026-02-09T18:43:38","date_gmt":"2026-02-09T18:43:38","guid":{"rendered":"https:\/\/diyhaven858.wasmer.app\/index.php\/what-ai-builders-can-learn-from-fraud-models-that-run-in-300-milliseconds\/"},"modified":"2026-02-09T18:43:38","modified_gmt":"2026-02-09T18:43:38","slug":"what-ai-builders-can-learn-from-fraud-models-that-run-in-300-milliseconds","status":"publish","type":"post","link":"https:\/\/diyhaven858.wasmer.app\/index.php\/what-ai-builders-can-learn-from-fraud-models-that-run-in-300-milliseconds\/","title":{"rendered":"What AI builders can learn from fraud models that run in 300 milliseconds"},"content":{"rendered":"<p> <br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/images.ctfassets.net\/jdtwqhzvc2n1\/1kewgFGr47cn9lpS05X3s9\/bd168f6b74179ec18e667dcc83b9ad38\/Stopping_fraud.png?w=300&amp;q=30\" \/><\/p>\n<p>Fraud protection is a race against scale.\u00a0<\/p>\n<p>For instance, Mastercard\u2019s network processes roughly 160 billion transactions a year, and experiences surges of 70,000 transactions a second during peak periods (like the December holiday rush). Finding the fraudulent purchases among those \u2014 without chasing false alarms \u2014 is an incredible task, which is why fraudsters have been able to game the system.\u00a0<\/p>\n<p>But now, sophisticated AI models can probe down to individual transactions, pinpointing the ones that seem suspicious \u2014 in milliseconds\u2019 time. This is the heart of Mastercard\u2019s flagship fraud platform, Decision Intelligence Pro (DI Pro).\u00a0<\/p>\n<p>\u201cDI Pro is specifically looking at each transaction and the risk associated with it,\u201d Johan Gerber, Mastercard\u2019s EVP of security solutions, said in a recent VB Beyond the Pilot podcast. \u201cThe fundamental problem we&#x27;re trying to solve here is assessing in real time.\u201d<\/p>\n<div><\/div>\n<h2><b>How DI Pro works<\/b><\/h2>\n<p>Mastercard\u2019s DI Pro was built for latency and speed. From the moment a consumer taps a card or clicks \u201cbuy,\u201d that transaction flows through Mastercard\u2019s orchestration layer, back onto the network, and then on to the issuing bank. Typically, this occurs in less than 300 milliseconds.\u00a0<\/p>\n<p>Ultimately, the bank makes the approve-or-decline decision, but the quality of that decision depends on Mastercard\u2019s ability to deliver a precise, contextualized risk score based on whether the transaction could be fraudulent. Complicating this whole process is the fact that they\u2019re not looking for anomalies, per se; they\u2019re looking for transactions that, by design, are similar to consumer behavior.\u00a0<\/p>\n<p>At the core of DI Pro is a recurrent neural network (RNN) that Mastercard refers to as an &quot;inverse recommender&quot; architecture. This treats fraud detection as a recommendation problem; the RNN performs a pattern completion exercise to identify how merchants relate to one another.\u00a0<\/p>\n<p>As Gerber explained: \u201cHere&#x27;s where they&#x27;ve been before, here&#x27;s where they are right now. Does this make sense for them? Would we have recommended this merchant to them?\u201d\u00a0<\/p>\n<p>Chris Merz, SVP of data science at MasterCard, explained that the fraud problem can be broken down into two sub components: A user\u2019s pattern behavior and a fraudster\u2019s pattern behavior. \u201cAnd we&#x27;re trying to tease those two things out,\u201d he said.\u00a0<\/p>\n<p>Another \u201cneat technique,\u201d he said, is how Mastercard approaches data sovereignty, or when data is subject to the laws and governance structures in the region where it is collected, processed, or stored. To keep data \u201con soil,\u201d the company\u2019s fraud team relies on aggregated, \u201ccompletely anonymized\u201d data that is not sensitive to any privacy concerns and thus can be shared with models globally.\u00a0<\/p>\n<p>\u201cSo you still can have the global patterns influencing every local decision,\u201d said Gerber. \u201cWe take a year&#x27;s worth of knowledge and squeeze it into a single transaction in 50 milliseconds to say yes or no, this is good or this is bad.\u201d<\/p>\n<h2><b>Scamming the scammers<\/b><\/h2>\n<p>While AI is helping financial companies like Mastercard, it\u2019s helping fraudsters, too; now, they\u2019re able to rapidly develop new techniques and identify new avenues to exploit.\u00a0\u00a0<\/p>\n<p>Mastercard is fighting back by engaging cyber criminals on their turf. One way they\u2019re doing so is by using &quot;honeypots,&quot; or artificial environments meant to essentially &quot;trap&quot; cyber criminals. When threat actors think they\u2019ve got a legitimate mark, AI agents engage with them in the hopes of accessing mule accounts used to funnel money. That becomes \u201cextremely powerful,\u201d Gerber said, because defenders can apply graph techniques to determine how and where mule accounts are connected to legitimate accounts.\u00a0<\/p>\n<p>Because in the end, to get their payout, scammers need a legitimate account somewhere, linked to mule accounts, even if it\u2019s cloaked 10 layers down. When defenders can identify these, they can map global fraud networks.<\/p>\n<p>\u201cIt\u2019s a wonderful thing when we take the fight to them, because they cause us enough pain as it is,\u201d Gerber said.\u00a0<\/p>\n<p>Listen to the podcast to learn more about:\u00a0<\/p>\n<ul>\n<li>\n<p>How Mastercard created a &quot;malware sandbox&quot; with Recorded Future;\u00a0<\/p>\n<\/li>\n<li>\n<p>Why a data science engineering requirements document (DSERD) was essential to align four separate engineering teams;<\/p>\n<\/li>\n<li>\n<p>The importance of &quot;relentless prioritization&quot; and tough decision-making to move beyond &quot;a thousand flowers blooming&quot; to projects that actually have a strong business impact;<\/p>\n<\/li>\n<li>\n<p>Why successful AI deployment should incorporate three phases: ideation, activation, and implementation \u2014 but many enterprises skip the second step.\u00a0<\/p>\n<\/li>\n<\/ul>\n<p><b>Listen and subscribe to <\/b><b>Beyond the Pilot<\/b><b> on <\/b><b>Spotify<\/b><b>, <\/b><b>Apple<\/b><b> or wherever you get your podcasts.<\/b><\/p>\n<p><br \/>\n<br \/><a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fraud protection is a race against scale.\u00a0 For instance, Mastercard\u2019s network processes roughly 160 billion transactions a year, and experiences surges of 70,000 transactions a second during peak periods (like the December holiday rush). Finding the fraudulent purchases among those \u2014 without chasing false alarms \u2014 is an incredible task, which is why fraudsters have [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":22603,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_daextam_enable_autolinks":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11],"tags":[],"class_list":["post-22602","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-news"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/diyhaven858.wasmer.app\/wp-content\/uploads\/2026\/02\/Stopping_fraud.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/posts\/22602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/comments?post=22602"}],"version-history":[{"count":0,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/posts\/22602\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/media\/22603"}],"wp:attachment":[{"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/media?parent=22602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/categories?post=22602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/diyhaven858.wasmer.app\/index.php\/wp-json\/wp\/v2\/tags?post=22602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}