Device Fingerprinting and Online Fraud Protection Whitepaper
Device Fingerprinting and Online Fraud Protection Whitepaper
Device Fingerprinting and Online Fraud Protection Whitepaper
Whitepaper
1 of 6
www.devicefingerprinting.com www.threatmetrix.com
Table Of Contents
1 Overview ............................................................................................. 3
8 Conclusion........................................................................................... 6
2 of 6
www.devicefingerprinting.com www.threatmetrix.com
1 Overview
Device Fingerprinting is a new way of differentiating between a valuable customer and a
professional fraudster online.
Today, the prevalence of identity theft and hackers has meant that it is much harder to verify
that the person you are doing business with is who they say they are. That new customer
could be a compromised computer transacting on behalf of a sophisticated eastern European
crime gang or an opportunistic thief that has lifted personal details from Facebook. It’s clear
that online identity verification is a significant challenge and concern to all business owners.
Depending on the business, typically four main strategies are used to leverage Device
Fingerprinting to combat fraud.
1. Anomaly Detection – detecting anomalies related to the device fingerprint is a
powerful way of providing first time fraud detection. An example of anomaly detection
would be determining that a device was connecting through a proxy to hide its real
location, or determining that a device is currently under the control of a botnet.
2. Device Velocity – when fraudsters find a hole in your defenses they will try to extract
the maximum value as fast as they can. Creating velocity filters based on a Device
Fingerprint will enable you to minimize fraud costs even when names, credit card
details and IP Addresses are changed.
3. Transaction linking – a Device Fingerprint is a powerful tool for finding related
transactions either as an identifier in itself or as a means of finding transactions with
related characteristics e.g. finding related transactions performed from the same ISP
and location.
4. Account linking - a Device Fingerprint is a valuable tool to be able to detect when
accounts or subscriptions are being accessed or shared illegally.
3 of 6
www.devicefingerprinting.com www.threatmetrix.com
5. Device Reputation – if a device has been involved with fraud, adding that device to a
a blacklist will enable you to protect customers that share the same device reputation
network.
Look for a Device Fingerprinting solution that strikes an optimal balance for your business.
4 of 6
www.devicefingerprinting.com www.threatmetrix.com
and understands how to interpret anomalies detected across each of these levels described
below.
5 of 6
www.devicefingerprinting.com www.threatmetrix.com
Device Fingerprint is generated. Look for a Device Fingerprinting solution that uses a fuzzy
matching technique to provide a more accurate and persistent Device Fingerprint.
8 Conclusion
As ecommerce revenues grow, fraud inevitably follows. The absence of a physical customer at
the time of the transaction or login combined with a new era of technology-driven identity theft
means that there is a need for a new alternative to online identity verification. Device
Fingerprinting, while not a panacea, is a valuable Device Intelligence tool capable of detecting
and stopping fraud that currently flies under the radar of outdated and outmatched fraud detection
systems. Lastly, understanding the different approaches, and choosing a Device Fingerprinting
solution that fits within your business and technology requirements will yield the best results.
6 of 6
www.devicefingerprinting.com www.threatmetrix.com