The subject matter described herein relates to the use of advanced predictive models including neural networks to characterize Internet-based leads as potentially fraudulent and/or inaccurate.
Online marketing has become an integral part of the sales and marketing efforts of business. According to eMarketer; US online ad spending will grow from $37.5 billion in 2012 to over $55 billion in 2015. Online advertising is typically classified based on its objective into either branding, or direct response. Direct response advertising is forecast to grow from $22 billion in 2012 (58.7% of total ad spend) to $27.5 billion in 2015 (50.0%).
In some cases the goal of direct response advertising is not e-commerce; but rather identifying consumers with an interest in, or affinity for, a product. This process is called lead generation. In some cases, basic leads are captured that include name of the entity requesting more information, contact information, the source URL, IP address, and the time/date stamp. In other cases, the answers to additional advertiser-supplied questions are collected. According to eMarketer, more than $1.7 billion will be spent in the US on online lead generation in 2012. Lead generation programs are usually priced on a cost-per-lead basis.
Historically, lead generation has been plagued by poor data quality and fraud. Industry efforts to fight fraud started with simple data cleansing and evolved to data verification. In recent years, the sophistication of fraud has increased necessitating the need for new approaches to detection. Industry estimates of the incidence of fraud range from 20-70+%, based on the market segment and data elements collected.
In one aspect, data characterizing one or more leads is received. Thereafter, it is determined, for each of the one or more leads, whether the lead is likely to be fraudulent and/or inaccurate using at least one artificial neural network model having at least one classification feature empirically derived using a plurality of historical leads with known outcomes. Data can subsequently be provided (e.g., stored, loaded, displayed, transmitted, etc.) identifying those leads that are determined to be fraudulent and/or inaccurate.
The artificial neural network model can be used to generate a score for each lead. For such arrangements, scores above a pre-determined threshold are determined to be likely fraudulent or inaccurate.
The leads can be web-generated leads including, without limitation, user-generated subscriptions, account registrations on a website, and user-generated requests for products and/or services.
The at least one empirically derived classification feature can be based on a variety of attributes including, without limitation, a time of day calculation threshold, a number of prior moves as percentage of total lead volume, IP hostname binding percentages, IP address geolocation percentages, e-mail domain distribution for leads coming from each lead source, a comparison of a captured IP address with an IP address associated with a lead submission, a percentage of duplicate IP addresses within a plurality of leads, a number of IP addresses associated with a single consumer, a number of consumers associated with a single IP address, a number of e-mail addresses associated with a single consumer, a number of consumers associated with a single e-mail address, a number of individuals having different last names associated with a single physical place of residence, a frequency of use for a particular street address, a number of consumers associated with a single telephone number, a geographic distribution of a plurality of leads, and/or a percentage of names having a common ethnic origin as compared to population statistics characterizing ethnic origins of individuals within a geographic territory.
In an interrelated aspect, data characterizing one or more lead sources is received. Thereafter, it is determined, for each of the one or more lead sources, whether the lead source provides leads likely to be fraudulent and/or inaccurate using at least one artificial neural network model having at least one classification feature empirically derived using a plurality of historical leads with known outcomes. Data can then be provided that identifies those lead sources that are determined to provide fraudulent and/or inaccurate leads.
Computer program products are also described that comprise non-transitory computer readable media storing instructions, which when executed one or more data processors of one or more computing systems, causes at least one data processor to perform operations herein. Similarly, computer systems are also described that may include one or more data processors and a memory coupled to the one or more data processors. The memory may temporarily or permanently store instructions that cause at least one processor to perform one or more of the operations described herein. In addition, methods can be implemented by one or more data processors either within a single computing system or distributed among two or more computing systems. Such computing systems can be connected and can exchange data and/or commands or other instructions or the like via one or more connections, including but not limited to a connection over a network (e.g. the Internet, a wireless wide area network, a local area network, a wide area network, a wired network, or the like), via a direct connection between one or more of the multiple computing systems, etc.
The subject matter described herein provides many advantages. For example, the current subject matter enables leads and/or lead sources that are likely to be fraudulent to be earlier identified so that appropriate remedial measures can be undertaken.
The details of one or more variations of the subject matter described herein are set forth in the accompanying drawings and the description below. Other features and advantages of the subject matter described herein will be apparent from the description and drawings, and from the claims.
The current subject matter is based, in part, on research that utilized previously generated leads. In particular, 1,910,234 US leads were gathered from 45 lead sources/affiliates. Leads were collected from several large lead buyers in the consumer packaged goods (CPG), higher education and financial services industries. The research analyzed lead data elements commonly collected, including both contact information and lead metadata:
In addition, lead buyers were asked to label each source as good or fraudulent. Typically, lead buyers assess quality by affirmative measures such as response rate (e.g. opens/clicks on e-mail campaigns, sales conversions) or by negative indicators such as complaint rates on subsequent campaigns/contacts.
Feature Extraction.
Based on preliminary data, a series of features were derived from the data and evaluated for use in source classification. Candidate features evaluated included:
Name/Postal Address.
E-mail Address.
Telephone Number.
The fraction of valid area code and prefix combinations was computed.
IP Address
Time/Date Stamp.
The current subject matter can employ a wide variety of models in order to identify lead fraud. One example, is logistic regression which is a statistical technique used for predicting the outcome of a categorical dependent variable (a dependent variable that can take on a limited number of categories) based on one or more predictor variables. In the case of fraud detection, a binomial logistic regression with the dependent variable either “Good” (“0”) or “Fraud” (“1”).
One form of the equation for a logistic regression model is:
Where π(x) is the logistic function, {X1, X2, . . . Xn} is the feature vector to be classified, and A and {B1, B2, . . . Bn} are model coefficients.
A simple threshold rule can be employed for binomial classification:
A logistic regression model was built using the R programming language and development environment (R Version 2.15.2, The R Foundation for Statistical Computing). Independent variables included in the model were traditional data cleansing and verification attributes currently used to assess lead fraud:
1) Postal Address Quality, as measured by the delivery point validation database (DPV)
2) E-mail verification, as measured by ISP/ESP direct confirmation
3) Telephone area code+prefix validation
4) Consumer verification, using the name and postal address, at either an individual- or household-level.
Based upon preliminary data analysis, the aforementioned variables did not exhibit predictive power (see the charts included in the diagram 100 of
Artificial Neural Network with Enhanced Features.
The current subject matter can utilize artificial neural network (ANN) theory. An ANN comprises a series of nodes, “the neurons”, with interconnected weighted edges, “the synapses”, converging on an output. The mathematical equation determining the activation function, “action potential”, of each node is a nonlinear weighted sum of its inputs which is called the activation function and is typically a sigmoid function such as the hyperbolic tangent or logistic functions. The node signals to the next nodes in the network in a layered, feed-forward topology until an output is reached. In particular, the current subject matter can be implemented using a feedforward neural network comprised of an input layer, hidden neurons, and an output neuron. The neural network can be trained using backpropagation with a small decay term with neurons utilizing a sigmoid transfer function.
The number of inputs for the ANN can be determined by selecting classification features (in this example five classification features). The diagram 200 of
Various techniques can be used to govern the selection of the number of hidden neurons. A general rule of thumb is that the optimal size of the hidden layer is usually between the size of the input layer and the output layer. With the above example, given that five features were used in the input layer, and there is a single neuron in the output layer, the number of hidden neurons would be 2, 3 or 4. More hidden neurons generally results in better performance on the training data set. However, to promote good generalization performance, and avoid over-fitting, it can be generally desirable to use a neural network with the minimum number of hidden units compatible with good training performance.
Neural networks with varying number of hidden neurons can be created during design-time. For example, for a five features identified above, neural networks with 2, 3, and 4 hidden units were created. Each network can be trained, for example, 10 times, using randomly selected initial weights. The order of training samples can be randomly selected in each iteration.
Training can be conducted in batches, for example batches of 10 iterations, at the end of which the sum of squared errors (SSE) for the training set can be computed. Training continued until either the SSE converged (change less than 0.000001) or 500 iterations was reached. An average training curve can be computed for each of the cases, 2, 3, and 4 hidden neurons (see diagram 600 of
Various numbers of output neurons can be used including a single output neuron. With the current example, for the test data, a threshold function of 0.5 was used to generate a classification decision. More specifically, when the output neuron's sigmoid function output is greater than 0.5, the classification is “1” indicating fraud.
Results.
With the current example, of the 45 available lead sources, 30 had complete data needed for construction and evaluation of both the traditional and artificial neural network (ANN) classifiers. 50% of lead sources were randomly selected and use to train each classification feature. The remaining 50% was used to test classification performance on previously unseen data.
The performance of the traditional and ANN classifiers was compared along three dimensions: accuracy, sensitivity and specificity (see diagram 700 of
Poor performance of the traditional approach which relies on postal/e-mail/telephone data cleansing and verification features was noted by the inventors during their research. In particular, many of the fraudulent sources exhibited pristine lead data. Fraudulent sources, aware of the data quality and consumer verification checks used by traditional techniques, have adopted effective countermeasures. By contrast, the ANN as described herein with enhanced features makes use of measures not yet compromised.
One example of data that can be used to derive one or more classification features for use with an ANN are e-mail domain distributions. As indicated on the diagram 1200 of
Fraudulent e-mail opens/clicks are another type of data that can be utilized to derive one or more classification features. For example, the IP address of a consumer's device used to open or click a link within an e-mail may be captured and compared with the IP address contained in the original lead submission. Although there are certainly legitimate use cases in which these IPs may be different, in aggregate good sources should exhibit a higher degree of similarity than fraudulent sources. It can also be useful to identify IP addresses on opens/clicks associated with data centers (which in turn can be indicative of a fraudulent form bot).
Data characterizing IP duplication percentages can also be used to derive one or more classification features. Large sample sets of historical lead/fraud data may exhibit greater duplication rates than small ones. As such, measures can be implemented to normalize and classify inter and intra-source duplicates.
Data characterizing multiple IP addresses for the same consumer can also be used to derive one or more classification features. There can be legitimate cases where a single consumer might have records with different IPs (such as leads submitted from a home or work network, or while traveling). But if the practice is widespread across consumers supplied by a given lead source, or occurs at very high levels for a given consumer, it is likely indicative of fraud.
Data characterizing multiple consumers for the same IP address can also be used to derive one or more classification features. If multiple consumers share the same IP address (where statically assigned), and they are not members of the same household, it would likely be indicative of fraud. Various comparisons such as comparing the first letters of first name for those sharing an IP address can alone be helpful in identifying potential fraud.
Data characterizing a number of e-mails per consumer can also be used to derive one or more classification features. Third party e-mail append services from companies often have more than one e-mail address on file for a given consumer. While many consumers have more than one e-mail address (such as a personal and work address), there is probably no legitimate reason to have more than 5 or 10. In one example using historical data, cases existed where consumers had more than 200 e-mails associated with various leads.
Data characterizing a number of consumers per e-mail can also be used to derive one or more classification features. Although there are legitimate cases where an e-mail address might be shared (by a husband and wife in the same household, for example), the presence of a significant number of consumers (or with disparate surnames and addresses) likely indicates fraud.
Data characterizing excessive roommate levels can also be used to derive one or more classification features. An analysis of lead data revealed excessive number of individuals purporting to live at the same address. In one particularly egregious example, 179 different individuals purported to live at 80 ruland avenue, Melville, N.Y. Examples of such data can be found in diagram 1300 of
Data characterizing address line duplication can also be used to derive one or more classification features. For example, the repeated use of the same generic street address (“10 Main Street”) across different cities and states can be indicative of fraud. In many cases this may pass DPV but still be fraudulent.
Data characterizing telephone number sharing can also be used to derive one or more classification features. The presence of different households or addresses associated with a telephone number can indicate fraud. For example, in a recent analysis 66 records, as shown in the diagram 1400 of
Geographic distribution data can also be used to derive one or more classification features. For a nationally-sourced lead campaign, excessive geographic concentration may be indicative of fraud. The expected lead distribution (by state, or even MSA/city/zip) can be compared to the actual distribution. Significant deviations (as measured with a Chi Square test) might suggest a likelihood of fraud.
Data characterizing given and surname analytics can also be used to derive one or more classification features. Although the US is a diverse country, the distribution of given and surnames should roughly follow the distribution in the country. One interesting example found in the data showed a high concentration of Turkish names as shown in diagram 1500 of
The current subject matter can be used with connection with the methods, techniques, and articles described and illustrated in U.S. patent application Ser. No. 13/588,900 entitled “Online Lead Fraud Detection”, filed on Aug. 17, 2012, the contents of which are hereby fully incorporated by reference.
One or more aspects or features of the subject matter described herein may be realized in digital electronic circuitry, integrated circuitry, specially designed ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various implementations may include implementation in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, coupled to receive data and instructions from, and to transmit data and instructions to, a storage system, at least one input device (e.g., mouse, touch screen, etc.), and at least one output device.
These computer programs, which can also be referred to as programs, software, software applications, applications, components, or code, include machine instructions for a programmable processor, and can be implemented in a high-level procedural language, an object-oriented programming language, a functional programming language, a logical programming language, and/or in assembly/machine language. As used herein, the term “machine-readable medium” refers to any computer program product, apparatus and/or device, such as for example magnetic discs, optical disks, memory, and Programmable Logic Devices (PLDs), used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term “machine-readable signal” refers to any signal used to provide machine instructions and/or data to a programmable processor. The machine-readable medium can store such machine instructions non-transitorily, such as for example as would a non-transient solid state memory or a magnetic hard drive or any equivalent storage medium. The machine-readable medium can alternatively or additionally store such machine instructions in a transient manner, such as for example as would a processor cache or other random access memory associated with one or more physical processor cores.
To provide for interaction with a user, the subject matter described herein can be implemented on a computer having a display device, such as for example a cathode ray tube (CRT) or a liquid crystal display (LCD) monitor for displaying information to the user and a keyboard and a pointing device, such as for example a mouse or a trackball, by which the user may provide input to the computer. Other kinds of devices can be used to provide for interaction with a user as well. For example, feedback provided to the user can be any form of sensory feedback, such as for example visual feedback, auditory feedback, or tactile feedback; and input from the user may be received in any form, including, but not limited to, acoustic, speech, or tactile input. Other possible input devices include, but are not limited to, touch screens or other touch-sensitive devices such as single or multi-point resistive or capacitive trackpads, voice recognition hardware and software, optical scanners, optical pointers, digital image capture devices and associated interpretation software, and the like.
The subject matter described herein may be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a client computer having a graphical user interface or a Web browser through which a user may interact with an implementation of the subject matter described herein), or any combination of such back-end, middleware, or front-end components. The components of the system may be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network (“LAN”), a wide area network (“WAN”), and the Internet.
The computing system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
The subject matter described herein can be embodied in systems, apparatus, methods, and/or articles depending on the desired configuration. The implementations set forth in the foregoing description do not represent all implementations consistent with the subject matter described herein. Instead, they are merely some examples consistent with aspects related to the described subject matter.
Although a few variations have been described in detail above, other modifications or additions are possible. For example, while the current subject matter is largely directed to identifying fraud, the current techniques are also applicable to identifying inaccuracies and/or errors on behalf of a user. In particular, a user may make a typographic error or the like which, while not fraudulent, makes such lead unusable. In particular, further features and/or variations can be provided in addition to those set forth herein. Further, the implementations described above can be directed to various combinations and subcombinations of the disclosed features and/or combinations and subcombinations of several further features disclosed above. In addition, the logic flow(s) depicted in the accompanying figures and/or described herein do not necessarily require the particular order shown, or sequential order, to achieve desirable results. Other implementations may be within the scope of the following claims.