Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireAccess ManagementIdentity Management

Using Machine Learning to Fight Fraud, Redirect Security Strategies and Protect Users

By Kevin Lee
Email, Spymail, Cybersecurity, Cyber espionage
May 7, 2018

By now, everyone has heard of fake news, aka, misinformation, or propaganda. While false or misleading news precedes the internet, fake news has now become a singular part of a much larger problem in the digital world called content abuse. This includes any form of user generated content that is malicious in nature--trolling, bullying, harassment, fake reviews and social engineering scams that play on our emotions to trick us into handing over money, data, or in the case of the recent 2016 presidential election scandal involving Facebook and consulting firm Cambridge Analytica, our votes.

Digital identities are rapidly growing, and with more and more users online - we have a reported 3.8 billion users online as of 2017 - criminals, armed with machine learning technologies, are gaining access to an increasing amount of information they can use to identify and exploit our vulnerabilities. On the flip side of this, machine learning has proven a powerful force in fighting back against fraudsters, malicious content, abuse and more. Without it, businesses are running on antiquated methods for identifying fraud, fraudsters stay a step ahead, and the cost to businesses can be very high.

Although harder to quantify than direct losses such as chargebacks or fraudulent purchases, for businesses on the receiving end, abusive content is arguably more costly because it attacks a company’s  top line-- the user. Losing user trust means customer acquisition costs go up, and lifetime value of a customer goes down.

The fallout from the Facebook-Cambridge Analytica scandal shows these costs quite clearly: A recent poll found that just 41 percent of Americans trust Facebook to protect their privacy. Facebook’s market value dropped $60 billion dollars in a 48 hour span, as the hashtag #DeleteFacebook went viral.

What abusive content looks like

Combating fraud and abuse online is becoming more and more difficult because there’s no clear definition of what this looks like due to the volume and varying types of fraud. Catfishing and cyberbullying have gained traction in the mainstream in recent years, as users who have fallen victim to these malicious activities seek to expose them to the broader population of digital users.

Marketplace scams are also common - for example, Amazon’s recent troubles with things like hackers stealing account credentials from legitimate merchants and selling non-existent or fake goods. In this case, buyers don’t realize until the fake goods are received, or in many cases no goods are received, that a scam has taken place. By then the “seller” is long gone - with the buyer’s money.

Often, users turn their anger at being scammed, catfished, or having their user data shared without their consent or knowledge towards the platform they’ve been using. The expectation is that these companies are putting the necessary technology in place to protect their users, and when they don’t, the users lose trust in that company’s ability to protect them from fraud. This ultimately affects a company's top line - it’s users - and bottom line - its profits - and rebuilding user trust is no easy feat. These businesses need to find the best and most effective way to protect themselves and their users or risk falling prey continuously to fraudsters, scammers, and malicious and abusive content.

Machine learning to the rescue

Fraudsters have found their way around the basic protections most sites have in place. The way sites often deal with content abuse is to hire a team of content moderators whose job it is to comb through ratings and reviews or watch videos. They’re usually supported by rules-based systems and blacklists that look at each piece of content for rules violations, and either block offending content or flag it for moderators to review.

Professional scammers know this, so rules-based systems have become a never-ending game of whack a mole. They are not agile enough to respond to new words or slang terms, and they are very difficult to scale. Additionally, they are not designed to be able to consider user behavior at all. That can result in “false positives” where legitimate users are actually turned away, while fraudulent users skate under the radar.

Machine learning-based technology can analyze far more signals than what rules-based systems can handle, and look at them all simultaneously to form a more complete picture. This is a far more effective approach, because fraudsters can alter text to avoid triggering the rules, but it’s harder to alter signals such as what device they’re using, or the speed at which they’re posting. For example, if someone signs up for 15 accounts and starts posting to each of them within two minutes of signing up, the machine compares that to the behavior of an average user and flags it as an anomaly.

More and more companies are realizing the power machine learning has to keep hackers and fraudsters from scamming legitimate users. For example, Zoosk uses machine learning to streamline their fraud management workflow, helping analysts review content more efficiently. That way, they can quickly identify what is and isn’t fraudulent on the platform. Machine learning models enable companies that rely on user-generated content to access the most accurate data faster, so they can make more informed decisions in real time, such as blocking users and investigating suspicious content.

Considering all the factors

As machine learning systems gather more data, they generate new insights that can make the picture ever sharper. One insight we’ve uncovered with machine learning is that users with iPhone 5s are seven times more likely to commit fraud than iPhone 8 users. Why? If you want to get around the rules by using a lot of different devices, you don't need the latest and greatest iPhone. Used iPhone 5s will do just fine, so hackers and fraudsters will choose older tech to carry out these various forms of malicious activity.

As machine learning becomes more accessible, fraudsters are creating their own machine learning models to perpetrate content abuse schemes. Fortunately, machine learning tools are more accessible than they’ve ever been to businesses of all types and sizes, not just the Googles and Amazons of the world. These tools can effectively use an ever-growing body of data to detect fraud patterns and block threats before they strike.  The ability of this technology to learn continuously also keeps it one step ahead of malicious and abusive schemes, protecting users from things we haven’t even thought of yet.

KEYWORDS: Artificial Intelligence (AI) Security digital identity fraud detection machine learning

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin lee
Kevin Lee, Trust and Safety Architect at Sift Science, builds high performing teams and systems to combat malicious behavior. He has led various risk, chargeback, collections, spam and trust and safety initiatives for organizations including Facebook, Square and Google.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • AI

    Using AI, machine learning and advanced analytics to protect and optimize business

    See More
  • artificial intelligence

    Context Matters: Using Machine Learning for Adaptive Authentication

    See More
  • machine learning will be used for DHS and airport security for weapons and explosive detection

    DHS to fund research into machine learning for airport security

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing