<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Distributed Infrastructure for Big Data Processing in the Transaction Monitoring Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>M U Sapozhnikova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>M M Gayanova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>A M Vulfin</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>A V Nikonov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>A V Chuykov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ufa State Aviation Technical University</institution>
          ,
          <addr-line>K. Marks St. 12, Ufa, Russia, 450077</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <fpage>228</fpage>
      <lpage>235</lpage>
      <abstract>
        <p>To increase the effectiveness of detecting fraudulent bank transactions, the structure of the system is proposed to analyze data of user environment in order to identify potential fraudulent activities. The system for collecting and analyzing information about the user environment allows to accumulate data about the user environment, to mark precedents in manual and automatic modes and build a database of images for classifiers training. It is necessary to implement data collection, storage and access interface for the application of data mining tools. Operation of significant amount of accumulated data requires the use of special tools (frameworks and hardware platforms) for processing large data. In this paper the analysis of the existing software and hardware tools for distributed processing of indefinitely structured data of bank transactions (frameworks: Hadoop, Apache Spark) is presented. The structure and recommendations for the deployment of a hardware and software stand for testing algorithms for detecting financial fraud on the basis of data mining analysis as part of a distributed data processing system for bank transactions based on the selected framework are developed.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The penetration of information technologies into all spheres of human life creates the basis for the
formation of new conditions for the functioning of the market. In these conditions it became possible
to develop the digital economy. The key factors of this economy are electronic technologies and
services and digital representation of large volume multi-branch data [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. E-commerce is a
significant institution in this branch of economy, penetrating into an increasing number of legal
relationships that are emerging in the field of trade in electronic form. There is a rapid growth in the
sphere of financial technologies: the introduction of artificial intelligence technologies, machine
learning, analysis of large data to improve the efficiency of interaction of all participants in legal
relations [
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3, 4, 5</xref>
        ].
      </p>
      <p>
        An important aspect of the functioning of the digital economy is the provision of information and
economic security of business, personal data protection. As a result of the rapid development of
financial technologies in the whole world, there has been an increase in fraudulent activities in the
electronic environment. According to the Central Bank of Russia for the year 2014, the share of
fraudulent transactions in Internet banking was 63%, and in the last 2 years – increased 5.5-fold and
accounted for 93% of all crimes related to embezzlement of funds from cardholders' accounts [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ].
Nowadays, the application of big data processing technologies and data mining methods (DM) is an
important element of the anti-fraud system. For example, introduction of Big Data by HSBC has
increased the efficiency of fraudulent incident detection by 10 times [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. VISA anti-fraud system helps
prevent fraudulent payments amounting to $ 2 billion annually [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
2. Analysis of user environment data as a part of anti-fraud system
The transaction monitoring system (TMS) or anti-fraud system (AFS) is specialized software or
hardware-software complex that monitors, detects fraudulent activities, and provides support for
decision-making on the detected illegal operation.
      </p>
      <p>
        The most promising solution for today is the use of technologies to define the user environment in
combination with the methods of machine learning. The use of machine learning is a necessary
metrics, since a large amount of information about the user environment is collected and the
application of rules to this data becomes impossible. Classic methods for detecting fraudulent actions
can not sufficiently accurately answer the question: was this action actually performed by the user?
There are many ways to obtain illegal access to a user's account: phishing, vishing, pharming, mobile
fraud, and other methods related to social engineering techniques [
        <xref ref-type="bibr" rid="ref10 ref11 ref12">10, 11, 12</xref>
        ].
      </p>
      <p>
        To analyze the large volumes of data collected about the user environment, it is advisable to use
approaches based on data mining. The application of the data mining algorithms for solving the
problem of fraudulent transaction recognition and analysis of the user environment data is given in
[
        <xref ref-type="bibr" rid="ref11 ref12 ref13 ref14">11, 12, 13, 14</xref>
        ]. The greatest efficiency is achieved using a combination of various algorithms
(stacking-bagging) and the use of large data technologies (Hadoop Processing) [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. This is explained
by the fact that in pure form these algorithms are no longer capable of solving existing problems in
view of the increasing volumes of processed data. There is a need to modify these algorithms, combine
them to obtain an acceptable result, and also apply technologies capable of processing huge amounts
of accumulated information.
      </p>
      <p>The goal of this research is development of the infrastructure for collection and analysis of user
environment as a part of anti-fraud system on the basis of big data processing technologies.</p>
      <p>
        To achieve this goal, the following tasks were formulated:
 Development of the structure of the system for collecting and analyzing information about the
user environment based on DM techniques.
 Development of a structural and functional scheme of processing user environment data for
testing algorithms of detecting financial fraud on the basis of DM as a part of the system of
distributed processing of banking transaction data.
3. System structure for collecting and analyzing user environment information
Technologies of remote banking service (internet banking) for accessing accounts and operations
through a web browser do not require installation of the client part software and have become very
widespread [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ]. The user makes certain manipulations in a web browser that interacts with the
Frontend server interface. Frontend server generates a set of data about the user environment and
transfers data about the user's actions about transaction initializing to the Backend server of remote
banking system (RB) and then to the automated banking system (ABS) for the calculations [
        <xref ref-type="bibr" rid="ref15 ref16 ref17">15, 16,
17</xref>
        ]. Backend server transfers transaction data and collected data about the user's environment for
analysis to the anti-fraud system. If the legitimacy of the transaction is recognized, data is transferred
to the ABS server, otherwise the Backend server refuses user to perform the transaction.
      </p>
      <p>
        Anti-fraud system evaluates risk of the current transaction and, in case of exceeding a certain
threshold value, triggers additional mechanisms for verifying the legitimacy of the transaction [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]:
 automated ways of additional transaction authentication
 SMS / push-notification;
 request to answer the test questions;
 manual ways of additional transaction authentication
      </p>
      <p> a phone call from a security specialist to the user.</p>
      <p>
        In this architecture, user session management module (USMM) is the main element of the
antifraud system. The module analyzes the transaction data and the user environment data (UED)
collected by the client-side script. The implemented script forms a set of data about the user
environment [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. The generalized structure of collected UEDs is the following:
 Color depth;
 Document size;
 Screen size;
 Time zone offset;
 Fonts;
 Plugins;
 IP-address;
 Number of processor cores;
 UserAgent.
      </p>
      <p>The module’s main task is to classify the current session and its transaction (legitimate transaction
or fraudulent actions) based on the composition of the analysis methods: signature and automatic. If
the module's estimated legitimacy of the transaction is below the threshold, an additional mechanism
for authenticating the user is triggered.</p>
      <p>The signature analysis module allows the use an expert knowledge and their formalization in the
form of a system of production rules ”IF-TO”. The main task of this module is to classify UED and/or
existing data about banking transaction in order to detect fraudulent activities. A special feature of the
module is the use of a unified signature database based on the system of production rules, which
allows to integrate mechanism for explaining the decision in an understandable form for security
expert into the system. Initially, the database of the signature analysis module contains typical
templates of fraudulent and legitimate transactions and UEDs in appropriate cases. Replenishment of
the signature database is possible both in manual mode through the interface of the manual analysis
module, and with the help of the automatic analysis modules which detects signatures in the new data
processing mode. Analysis of the accumulated data under control of the analyst makes it possible to
identify new production rules in an automatic mode based on the DM technologies.</p>
      <p>
        Task of the automatic analysis module is automatic data classification based on the DM methods,
for example, using a neural network classifier trained on a database of committed transactions marked
by an expert [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. At the stage of data preparation for DM algorithms application, the following tasks
must be solved:
 features selection – selection of the most significant features for the adoption of a classification
decision.
 features transformation – filling gaps in data, removing emissions and filtering noise
components.
 features extraction – transformation of the selected features into a new feature space for feeding
to the classifier input;
      </p>
      <p>
        In the previous works [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ] the original feature space included 40 parameters. After evaluating
available parameter values and its distributions, 12 parameters were deleted from the original data. As
a result of expert analysis of the feature space transformation results, new nonlinear features were
added – combinations of the initial features, characterizing possible combinations of some available
parameters.
      </p>
      <p>The core of automatic analysis module is the neural network – the “black box” – which allows to
assign the current vector of features extracted from the data collected about the user environment to
one of the previously defined classes. The following classes are proposed:
 User system is under remote control;
 The user system uses action anonymization mechanisms;
 User system does not contain any suspicious elements.</p>
      <p>Results of the signature and automatic analysis modules are comparing. If the verdicts do not
coincide, then an anti-fraud system expert can be brought in for manual analysis of the precedent.
While the accumulation of data on transactions and UED occurs, the neural network classifier is
aftertrained. While group of use cases, the parameters of which do not fit into the current scheme of
“IFTO” signature rules, are being formed, new rules are being extracted, replenishing the existing
signature database. If new signatures are added by the expert, then the current base of marked use
cases is analyzed in order to update the class labels and retrain the neural network classifier.</p>
      <p>Manual analysis module is designed to correct the markup of the existing database of the user
environment and transactions in order to form a training sample for the neural network classifier. The
module allows expert to analyze the system solution for each of the use cases and correct it in case of
erroneous operations.</p>
      <p>The AFS control modules allow to monitor the basic performance of AFS, analyze the log of the
system and debug the interaction of the signature and automatic modules.</p>
      <p>
        Thus, structure of the system for collection and analysis of user environment as a part of anti-fraud
system is presented in figure 1. The key element of the system is data mining module. Analysis
algorithms should be applicable in the context of “Big Data” (a set of approaches, tools and methods
for processing structured and unstructured data of huge volumes and significant diversity for obtaining
human-readable results that are effective under conditions of continuous growth, distribution over
multiple nodes of the computer network) [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
4. Designing a structural and functional scheme for processing “big data” of the user
environment as a part of a distributed data processing system for bank transactions
The implementation of algorithms for detecting financial fraud based on data mining techniques of
banking transactions as part of a distributed processing system of banking transactions requires the
solution of a few tasks related to the design and deployment of an appropriate infrastructure for storing
and processing accumulated data.
      </p>
      <p>
        To date, there are many tools for the distributed processing of banking transaction data
(frameworks: Hadoop, Apache Spark, ClickHouse, ElasticSearch, Splunk Free) [
        <xref ref-type="bibr" rid="ref21 ref22 ref23 ref24 ref25">21, 22, 23, 24, 25</xref>
        ].
The proposed structure of the distributed processing system of banking transaction data is presented in
the figure 2.
      </p>
      <p>
        Main element of the distributed processing system of banking transaction data is a distributed file
system. Nowadays the most popular distributed file system is HDFS [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
      <p>
        Next element of the big data processing system is the distributed programming and machine
learning infrastructure. The core of this element is Spark, a cluster computing infrastructure similar in
MapReduce [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. The structure of this infrastructure includes the machine learning tool MLLib, which
allows to implement the DM tools of the accumulated data.
      </p>
      <p>
        To directly store the accumulated data, it is proposed to use solutions from the New-SQL family
[
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
      <p>A detailed description of the additional elements and their functions in the distributed data
processing system for bank transactions is presented in the table 1.
Operating system for big data application</p>
      <p>Engine for big data processing
Scikit-learn python library integrated in Apache</p>
      <p>Spark for exploratory data analysis
H2O library integrated in Apache Spark for</p>
      <p>machine learning in Hadoop system
TensorFlow library integrated in Apache Spark for</p>
      <p>deep learning in Hadoop system
Application for maintaining configuration</p>
      <p>information, naming and etc
Application for data summarization, SQL-like</p>
      <p>query, and analysis
Application for transferring data between relational</p>
      <p>WorkFlow
Monitoring</p>
      <p>
        Flume [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]
Oozie [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]
Hue [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ]
      </p>
      <p>databases and Hadoop
Application for transferring data between relational</p>
      <p>databases and Hadoop
Application for collecting, aggregating, and</p>
      <p>moving of unstructured data
Web interface to monitor Hadoop system</p>
      <p>The use of three machine learning libraries is due to the need of rapid prototyping of the developed
algorithms, debugging on small amounts of data and the possibility of importing the developed
models.</p>
      <p>
        The hardware-software stand structure for testing the algorithms of detecting financial fraud based
on DM techniques in the distributed data processing system for bank transactions based on the
selected big data processing stack is shown on figure 3.
The data collection and analysis module consists of:
• Sentry software suite [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ] for collection client-side script logs;
• Gitlab service [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ] for organization joint work on the implemented analysis algorithms source
code;
• DVWA (Damn Vulnerable Web Application) for testing the script of user environment data
collection.
      </p>
      <p>The load testing module is designed to automate collection of the user environment database.
For distributed processing of bank transaction data, the Hadoop cluster is used, on which the software
is deployed from Table 1. Typical configuration of the used server machine pool is shown in Table 2.
ID
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16</p>
      <p>Sector
Collection and analysis user environment data
Load testing software
Hadoop Cluster</p>
    </sec>
    <sec id="sec-2">
      <title>5. Conclusion</title>
      <p>The main problem of improving the TMS efficiency is the insufficient amount of registered
parameters transferred from an online banking client side to a processing center, and the imperfection
of signature analysis methods and algorithms because of low adaptability and configuration flexibility.</p>
      <p>Nowadays the most promising solution is the use of technologies for determining user environment
in combination with the methods of machine learning within TMS. The use of machine learning is an
indispensable criterion, because big amount of user environment information being collected and
application of the rules to this data becomes difficult. Algorithms for analysis should be applicable in
the context of “big data”.</p>
      <p>In the paper the infrastructure for collection and analysis of user environment as a part of anti-fraud
system on the basis of big data processing technologies is proposed.
Acknowledgments
Work was supported by the Russian Foundation for Basic Research, research № 17–48–020095.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Teoh</surname>
            <given-names>C S</given-names>
          </string-name>
          and
          <string-name>
            <surname>Mahmood</surname>
            <given-names>A K</given-names>
          </string-name>
          <year>2017</year>
          <article-title>National cyber security strategies for digital economy Int</article-title>
          .
          <source>Conf. on Research and Innovation in Information Systems 1-6</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Crabtree</surname>
          </string-name>
          <article-title>A 2016 Enabling the new economic actor: Personal data regulation and the digital economy Proc</article-title>
          .
          <source>IEEE Int. Conf. on Cloud Engineering Workshops 124-129</source>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Tung H H</surname>
            , Cheng
            <given-names>C C</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen Y Y and Chen Y F 2016 Binary</surname>
          </string-name>
          <article-title>Classification and Data Analysisfor Modeling Calendar Anomalies in Financial Markets 7th Int</article-title>
          .
          <source>Conf. on Cloud Computing and Big Data 116-121</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Trelewicz</surname>
            <given-names>J Q</given-names>
          </string-name>
          <year>2017</year>
          <article-title>Big Data and Big Money: The Role of Data in the Financial Sector IT Prof</article-title>
          .
          <volume>19</volume>
          (
          <issue>3</issue>
          )
          <fpage>8</fpage>
          -
          <lpage>10</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Luvizan</surname>
            <given-names>S S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nascimento P T and Yu</surname>
          </string-name>
          <article-title>A 2017 Big Data for innovation: The case of credit evaluation using mobile data analyzed by innovation ecosystem lens Proc</article-title>
          .
          <source>Portland Int. Conf. on Management of Engineering and Technology: Technology Management For Social Innovation 925-936</source>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Sapozhnikova</surname>
            <given-names>M U</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gayanova M M</surname>
            , Nikonov
            <given-names>A V</given-names>
          </string-name>
          and
          <string-name>
            <surname>Vulfin A M 2017</surname>
          </string-name>
          <article-title>Data mining algorithms of bank transaction as a part of antifraud system Proc</article-title>
          .
          <source>Conf. Information Technologies for Intelligent Decision Making Support</source>
          <volume>2</volume>
          <fpage>143</fpage>
          -
          <lpage>149</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Lopez-Rojas</surname>
            <given-names>E A</given-names>
          </string-name>
          and
          <string-name>
            <surname>Axelsson</surname>
            <given-names>S 2016</given-names>
          </string-name>
          <article-title>A review of computer simulation for fraud detection research in financial datasets Proc</article-title>
          .
          <source>of Future Technologies Conf</source>
          .
          <fpage>932</fpage>
          -
          <lpage>935</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Dodds</surname>
            <given-names>L S</given-names>
          </string-name>
          <year>2014</year>
          <article-title>Big ideas are coming from using big data (Access mode: https://www.raconteur.net/technology/big-ideas-are-coming-from-using-big-data)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Rosenbush</surname>
            <given-names>S 2014</given-names>
          </string-name>
          <string-name>
            <surname>Visa Says</surname>
          </string-name>
          <article-title>Big Data Identifies Billions of Dollars in Fraud CIO J. (Access mode: https://blogs</article-title>
          .wsj.com/cio/2013/03/11/visa-says
          <article-title>-big-data-identifies-billions-of-dollars-infraud)</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Piskunov</surname>
            <given-names>I 2017</given-names>
          </string-name>
          <article-title>Anti-fraud systems and how it works</article-title>
          J.
          <string-name>
            <surname>Securitylab</surname>
          </string-name>
          (Access mode: https://www.securitylab.ru/blog/personal/Informacionnaya_bezopasnost_v_detalyah/ 339929)
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Sapozhnikova</surname>
            <given-names>M U</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gayanova M M</surname>
            , Nikonov
            <given-names>A V</given-names>
          </string-name>
          and
          <string-name>
            <surname>Vulfin A M 2017</surname>
          </string-name>
          <article-title>Data mining technologies in the problem of designing the bank transaction monitoring system ComputerScience</article-title>
          and
          <source>Information Technologies</source>
          <volume>45</volume>
          -56
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Sapozhnikova</surname>
            <given-names>M U</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gayanova M M</surname>
            , Nikonov
            <given-names>A V</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vulfin A M and Kurrenov D V 2017</surname>
          </string-name>
          <article-title>Antifraud system on the basis of data mining technologies Int</article-title>
          .
          <source>Symp. on Signal Processing and Information Technology 1-5</source>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Vizilter</surname>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            <given-names>V</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gorbatsevich</surname>
            <given-names>V S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vorotnikov</surname>
            <given-names>A V</given-names>
          </string-name>
          and
          <string-name>
            <surname>Kostromov</surname>
            <given-names>N A</given-names>
          </string-name>
          <year>2017</year>
          <article-title>Real-time face identification via CNN and boosted hashing forest</article-title>
          <source>Computer Optics</source>
          <volume>41</volume>
          (
          <issue>2</issue>
          )
          <fpage>254</fpage>
          -
          <lpage>265</lpage>
          DOI: 10.18287/
          <fpage>2412</fpage>
          -6179-2017-41-2-
          <fpage>254</fpage>
          -265
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Ivanov</surname>
            <given-names>A I</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lozhnikov P S and Sulavko</surname>
            <given-names>A E</given-names>
          </string-name>
          <year>2017</year>
          <article-title>Evaluation of signature verification reliability based on artificial neural networks</article-title>
          ,
          <source>Bayesian multivariate functional and quadratic forms Computer Optics</source>
          <volume>41</volume>
          (
          <issue>5</issue>
          )
          <fpage>765</fpage>
          -
          <lpage>774</lpage>
          DOI: 10.18287/
          <fpage>2412</fpage>
          -6179-2017-41-5-
          <fpage>765</fpage>
          -774
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Abbad</surname>
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abed J M and Abbad M 2012</surname>
          </string-name>
          <article-title>The Development of E-Banking in Developing Countries in the Middle East</article-title>
          .
          <source>J. Financ. Account. Manag</source>
          .
          <volume>3</volume>
          <fpage>107</fpage>
          -
          <lpage>123</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Jarrett J E 2016 Internet Banking Development J. Entrep</surname>
          </string-name>
          . Organ. Manag.
          <volume>5</volume>
          <fpage>2</fpage>
          -
          <lpage>5</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Global</given-names>
            <surname>Mass</surname>
          </string-name>
          <string-name>
            <surname>Payments</surname>
          </string-name>
          , AP Software,
          <article-title>B2B Payments (Access mode: https://tipalti</article-title>
          .com/)
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Fedotenko</surname>
            <given-names>M 2017</given-names>
          </string-name>
          <article-title>How banks are protected: explaining the structure and the principles of a bank antifraud system J. Hacker (Access mode: https://xakep</article-title>
          .ru/
          <year>2017</year>
          /04/21/antifrod-1/)
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Cao</surname>
            <given-names>Y</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            <given-names>S</given-names>
          </string-name>
          and
          <string-name>
            <surname>Wijmans</surname>
            <given-names>E 2017</given-names>
          </string-name>
          (
          <article-title>Cross-</article-title>
          )
          <source>Browser Fingerprinting via OS and Hardware Level Features Proc. Network and Distributed System Security Symp</source>
          .
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Big</surname>
          </string-name>
          <article-title>Data (Access mode: https://en</article-title>
          .wikipedia.org/wiki/Big_data/)
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Apache</given-names>
            <surname>Hadoop</surname>
          </string-name>
          (Access mode: http://hadoop.apache.org/)
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>Apache</given-names>
            <surname>Spark</surname>
          </string-name>
          (Access mode: https://spark.apache.org/)
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Click</given-names>
            <surname>House</surname>
          </string-name>
          (Access mode: https://clickhouse.yandex/)
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <article-title>Elastic search (Access mode: https://www</article-title>
          .elastic.co/products/elasticsearch/)
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Splunk</surname>
          </string-name>
          (Access mode: https://www.splunk.com/)
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>Apache</given-names>
            <surname>Cassandra</surname>
          </string-name>
          (Access mode: http://cassandra.apache.org/)
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <article-title>Spark-sklearn (Access mode: https://github</article-title>
          .com/databricks/spark-sklearn/)
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>Sparkling</given-names>
            <surname>Water</surname>
          </string-name>
          (Access mode: https://www.h2o.ai/sparkling-water/)
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>Tensor</given-names>
            <surname>Flow On</surname>
          </string-name>
          <article-title>Spark (Access mode: github</article-title>
          .com/yahoo/TensorFlowOnSpark/)
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>Apache</given-names>
            <surname>Zookeeper</surname>
          </string-name>
          (Access mode: https://zookeeper.apache.org/)
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>Apache</given-names>
            <surname>Hive</surname>
          </string-name>
          (Access mode: https://hive.apache.org/)
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>Apache</given-names>
            <surname>Sqoop</surname>
          </string-name>
          (Access mode: http://sqoop.apache.org/)
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>Apache</given-names>
            <surname>Flume</surname>
          </string-name>
          (Access mode: https://flume.apache.org/)
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>Apache</given-names>
            <surname>Oozie</surname>
          </string-name>
          (Access mode: http://oozie.apache.org/)
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>Cloudera</given-names>
            <surname>Hue</surname>
          </string-name>
          (Access mode: https://github.com/cloudera/hue/)
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <surname>Sentry</surname>
          </string-name>
          (Access mode: https://sentry.io/welcome/)
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <surname>GitLab</surname>
          </string-name>
          (Access mode: https://about.gitlab.com/)
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>