Fraud prevention in the system of electronic payments on the basis of monitoring and analysis events in POS-networks

D.V. Kozlov, N.P. Sadovnikova, L.V. Druzhinina, D.V. Petrova


Fraud prevention in the banking sphere is a very important type of activity, which can cover a whole range of fraud schemes – both from employees and customers. The article studies the existing technologies for realization of the system of security control over functioning of POS networks in real time and analyzes them in detail. Besides, the concept of a security monitoring system in POS networks is presented, its architecture is proposed, as well as a method for analyzing the flow of events and detecting fraud.

Full Text:

PDF (Russian)


Manworren, N., Letwat, J., Daily, O., Why you should care about the Target data breach, Business Horizons, Volume 59, Issue 3, 1 May 2016.

Lodi, G., Aniello, L., Di Luna, G.A., Baldoni, R., An event-based platform for collaborative threats detection and monitoring, Information Systems, Volume 39, Issue 1, 2014.

The PCI Security Standards [Jelektronnyj resurs]. Rezhim dostupa: (data obrashhenija: 01.05.2017).

Aihua Shen, Rencheng Tong, Yaochen Deng, Application of Classification Models on Credit Card Fraud Detection, 2007 International Conference on Service Systems and Service Management, 2007, pp 1 – 4.

Martin Fowler, Event Sourcing: Capture all changes to an application state as a sequence of events. 12 December 2005

Buchmann, A. "Real Time Database Systems." Encyclopedia of Database Technologies and Applications. Ed. Laura C. Rivero, Jorge H. Doorn, and Viviana E. Ferraggine. Idea Group, 2005.

Kanitkar, Vinay & Alex Delis (1997). "A Case for Real-Time Client-Server Databases.". Brooklyn, New York: Polytechnic University. Retrieved 13 December 2006.

I. Hickson, The WebSocket protocol draft-hixie-thewebsocketprotocol-76. Google, Inc. May 6, 2010.

Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., & Stal, M. (1996). Pattern Oriented Software Architecture, Volume 1: A System of Patterns. John Wiley & Sons, 1996, pp. 339—343.

Kozlov D.V., Analiz metodov obnaruzhenija i predotvrashhenija ugroz moshennichestva v informacionnyh sistemah, Izvestija Volgogradskogo gosudarstvennogo tehnicheskogo universiteta. 2017. # 1 (196). S. 112-115.

Gianluca Tiepolo, “Getting Started with RethinkDB”. March 2016.


  • There are currently no refbacks.

Abava  Absolutech Convergent 2020

ISSN: 2307-8162