SAT-BO: Verification Rule Learning and Optimization for FraudTransaction Detection

πŸ“… 2025-07-03
πŸ“ˆ Citations: 0
✨ Influential: 0
πŸ“„ PDF
πŸ€– AI Summary
Electronic payment platforms rely on manually crafted validation rules to detect anomalous transactions; however, such rules lack systematic robustness guarantees and are vulnerable to adversarial evasion, posing significant financial risks. This paper proposes the first automated framework integrating SAT solving with Bayesian optimization to formally model validation rules, uncover logical vulnerabilities, and iteratively enhance their attack resilience. Our approach synergizes formal verification, rule learning, and black-box optimization to enable defect-driven rule refinement. Evaluated on real-world payment data, the framework substantially improves rule coverage (+32.7%) and anomaly detection accuracy (+28.4%), while successfully identifying and patching multiple classes of stealthy evasion vulnerabilities. This work establishes a novel paradigm for provably secure risk-control rule design.

Technology Category

Application Category

πŸ“ Abstract
Electronic payment platforms are estimated to process billions oftransactions daily, with the cumulative value of these transactionspotentially reaching into the trillions. Even a minor error within thishigh-volume environment could precipitate substantial financiallosses. To mitigate this risk, manually constructed verification rules,developed by domain experts, are typically employed to identifyand scrutinize transactions in production environments. However,due to the absence of a systematic approach to ensure the robust-ness of these verification rules against vulnerabilities, they remainsusceptible to exploitation.To mitigate this risk, manually constructed verification rules, de-veloped by domain experts, are typically employed to identify andscrutinize transactions in production environments. However, dueto the absence of a systematic approach to ensure the robustness ofthese verification rules against vulnerabilities, they remain suscep-tible to exploitation. To ensure data security, database maintainersusually compose complex verification rules to check whether aquery/update request is valid. However, the rules written by ex-perts are usually imperfect, and malicious requests may bypassthese rules. As a result, the demand for identifying the defects ofthe rules systematically emerges.
Problem

Research questions and friction points this paper is trying to address.

Detect fraud transactions in high-volume electronic payments
Improve robustness of manually crafted verification rules
Systematically identify defects in expert-written security rules
Innovation

Methods, ideas, or system contributions that make the work stand out.

Automated verification rule learning for fraud detection
Optimization of rules to prevent vulnerabilities
Systematic defect identification in transaction rules
πŸ”Ž Similar Papers
No similar papers found.
M
Mao Luo
Hubei University of Technology Huazhong University of Science and Technology
Z
Zhi Wang
Ant Group
Yiwen Huang
Yiwen Huang
XPENG Motors
Autonomous Driving
Q
Qingyun Zhang
Huazhong University of Science and Technology
Z
Zhouxing Su
Huazhong University of Science and Technology
Z
Zhipeng LΓΌ
Huazhong University of Science and Technology
W
Wen Hu
Ant Group
Jianguo Li
Jianguo Li
Director, Ant Group
deep learningcomputer visionmachine learningsystem