Module 6: Transaction Pattern Detection

Overview

Fraud is rarely isolated. It often follows patterns that can be detected with:

Cross-card analytics

Time-based behavior tracking

Velocity monitoring (how fast and how often)

Correlation across float, card usage, and merchant types

Graph-based clustering (same device, same IP, same MCC)

This module will show your risk, engineering, and operations teams how to recognize these patterns early — and act before damage scales.

What is Velocity Monitoring?

Velocity rules detect how fast or how frequently certain actions are taken. It is a key strategy in detecting abuse.

Examples of Effective Velocity Checks:

MetricSample Rule
Cards per userNo more than 2 cards per user per 24 hours
Refunds per userMax 2 refunds in 1 hour per user
Spend frequencyNo more than 5 authorizations in 30 minutes
Float movementMax $500 moved via refund → withdrawal in 1 hour
DeclinesFreeze card if 3 consecutive declines in < 15 minutes

These rules are low cost, fast, and can prevent more expensive post-fraud reconciliation.

Float Flow Analysis

Visualizing how float moves can uncover laundering or abuse patterns.

Watch for:

Top-up → spend → refund → withdrawal loops

Float landing in same merchant or MCC across different users

Refund amounts matching prior spend from another account

Terminated card receives refund → wallet receives payout

Best Practice: Build a graph where each node is a float transaction and trace directionality.

Device & IP Clustering

Fraud often comes from reused infrastructure — same device, same VPN, same IP.

Techniques:

Device fingerprinting (user agent + entropy + browser config)

Shared IP detection

Behavior signatures (e.g. card create + terminate in 5 mins)

MAC address or mobile device ID if mobile SDKs are used

Actionable Rules:

If 5+ accounts use same device → lock all and trigger review

Block IPs known for fraud or linked to previous abuse

Tag devices with historical fraud score

Merchant Behavior Mapping

Patterns:

One merchant receiving refunds from many users

Same user spending at many MCCs in a short window

MCC not matching card BIN usage

Refund patterns aligned to merchant time zones

Risk Action: Flag merchants with refund rate > 20% of their successful charge volume over 7 days.

Transaction Graphs

Mapping user → card → merchant → action chains reveals high-risk behaviors.

Graph NodeConnects To
Card IDTop-up, spend, refund, withdrawal
User IDCards, devices, IPs, wallets
Merchant IDMCCs, dispute history
DeviceMultiple users, common IPs

These graphs become the basis of automated risk scoring.

Pattern-Triggered Actions

PatternAction
3 cards created, declined, and terminated in 1 hourLock account and IP
Refund issued from high-risk MCC without matching spendFreeze refund and alert treasury
Shared device fingerprint across 4 accountsBlock new card issuance
User receives 2 reversals followed by a large withdrawalFlag for laundering

Audit and Alerting Layer

All flagged patterns must be logged with timestamp and user context

Tag alerts with category: refund-abuse, velocity-spike, mcc-mismatch, etc.

Alert routing:

Treasury if float exposed

Engineering if webhook anomaly

Compliance if BIN/MCC conflict

Module 6 Quick Check

1. Why are velocity rules useful in fraud prevention?

A. They reduce the number of card declines

B. They make cards faster to use

C. They catch behavior anomalies early

D. They fix webhook failures

Answer: C

2. What’s suspicious about multiple users receiving refunds from one merchant?

A. Indicates high user volume

B. May be a refund marketing promo

C. Could signal merchant collusion or laundering

D. It’s always allowed

Answer: C

3. What’s a graph useful for in fraud detection?

A. Showing user interface behavior

B. Mapping relationships across users, devices, and merchants

C. Measuring float velocity

D. Tracking FX fees

Answer: B