SlideShare a Scribd company logo
1 of 35
Download to read offline
LEVERAGING GRAPH-TECHNOLOGY
TO FIGHT FINANCIAL FRAUD
November 2017
Stefan Kolmar
VP Field Engineering
AGENDA
•  Meet today’s fraudsters
•  Traditional fraud detection methods
•  Using connected analysis for real-time fraud detection
•  Demo
•  Summary
The Impact of Fraud
The payment card fraud alone,
constitutes for over 16 billion dollar in
losses for the bank-sector in the US.
$16Bpayment card fraud in 2014*
Banking
$32Byearly e-commerce fraud**
Fraud in E-commerce is estimated
to cost over 32 billion dollars
annually is the US..
E-commerce
The impact of fraud on the insurance
industry is estimated to be $80
billion annually in the US.
Insurance
$80Bestimated yearly impact***
*) Business Wire: http://www.businesswire.com/news/home/20150804007054/en/Global-Card-Fraud-Losses-Reach-16.31-Billion#.VcJZlvlVhBc
**) E-commerce expert Andreas Thim, Klarna, 2015
***) Coalition against insurance fraud: http://www.insurancefraud.org/article.htm?RecID=3274#.UnWuZ5E7ROA
Who Are Today’s Fraudsters?
Organized in groups
 Synthetic Identities
 Stolen Identities
Who Are Today’s Fraudsters?
Hijacked Devices
“Don’t consider traditional
technology adequate to keep
up with criminal trends”
Market Guide for Online Fraud Detection, April 27, 2015!
Endpoint-Centric
Analysis of users and
their end-points!
1.
Navigation Centric
Analysis of
navigation behavior
and suspect
patterns!
2.
Account-Centric
Analysis of anomaly
behavior by channel!
3.
PC:s
Mobile Phones
IP-addresses
User ID:s
Comparing Transaction
Identity Vetting
Traditional Fraud Detection Methods
!
Unable to detect!
•  Fraud rings!
•  Fake IP-adresses!
•  Hijacked devices!
•  Synthetic Identities!
•  Stolen Identities!
•  And more…!
Weaknesses
DISCRETE ANALYSIS
Endpoint-Centric
Analysis of users and
their end-points!
1.
Navigation Centric
Analysis of
navigation behavior
and suspect
patterns!
2.
Account-Centric
Analysis of anomaly
behavior by channel!
3.
Traditional Fraud Detection Methods
INVESTIGATE
Revolving Debt!
Number of Accounts!
INVESTIGATE
Normal behavior
Fraud Detection With Discrete Analysis
Revolving Debt!
Number of Accounts!
Normal behavior
Fraud Detection With Connected Analysis
Fraudulent pattern
CONNECTED ANALYSIS
Augmented Fraud Detection
Endpoint-Centric
Analysis of users and
their end-points!
Navigation Centric
Analysis of
navigation behavior
and suspect
patterns!
Account-Centric
Analysis of anomaly
behavior by channel!
DISCRETE ANALYSIS
1.
 2.
 3.
Cross Channel
Analysis of anomaly
behavior correlated
across channels!
4.
Entity Linking
Analysis of relationships
to detect organized
crime and collusion!
5.
ACCOUNT
HOLDER 2
Modeling a fraud ring as a graph
ACCOUNT
HOLDER 1
ACCOUNT
HOLDER 3
ACCOUNT
HOLDER 2
Modeling a fraud ring as a graph
ACCOUNT
HOLDER 1
ACCOUNT
HOLDER 3
CREDIT
CARD
BANK
ACCOUNT
BANK
ACCOUNT
BANK
ACCOUNT
PHONE
NUMBER
UNSECURED
LOAN
SSN 2
UNSECURED
LOAN
ACCOUNT
HOLDER 2
Modeling a fraud ring as a graph
ACCOUNT
HOLDER 1
ACCOUNT
HOLDER 3
CREDIT
CARD
BANK
ACCOUNT
BANK
ACCOUNT
BANK
ACCOUNT
ADDRESS
PHONE
NUMBER
PHONE
NUMBER
SSN 2
UNSECURED
LOAN
SSN 2
UNSECURED
LOAN
ACCOUNT
HOLDER 2
Modeling a fraud ring as a graph
ACCOUNT
HOLDER 1
ACCOUNT
HOLDER 3
CREDIT
CARD
BANK
ACCOUNT
BANK
ACCOUNT
BANK
ACCOUNT
ADDRESS
PHONE
NUMBER
PHONE
NUMBER
SSN 2
UNSECURED
LOAN
SSN 2
UNSECURED
LOAN
SYNTETIC
PERSON 2
SYNTHETIC
PERSON 1
FRAUD DEMO
USING NEO4j FOR REAL-TIME
CONNECTED ANALYSIS
Account-Centric
Analysis of anomaly
behavior correlated
across channels!
4.
Entity Linking
Analysis of relationships
to detect organized
crime and collusion!
5.
CONNECTED ANALYSIS
Endpoint-Centric
Analysis of users and
their end-points!
Navigation Centric
Analysis of
navigation behavior
and suspect
patterns!
Account-Centric
Analysis of anomaly
behavior by channel!
DISCRETE ANALYSIS
1.
 2.
 3.
Augment Fraud Detection with Neo4j
Traditional Vendors
ACCEPT / DECLINE
MANUAL
User/Transaction!
CONNECTED ANALYSIS
User/Transaction!
ACCEPT / DECLINE(DISCRETE ANALYSIS)
 +
User/Transaction! (sub-second performance to
any data size and connection)!
ACCEPT / DECLINE
REAL TIME
TRADITIONAL VENDORS (DISCRETE ANALYSIS)
(DISCRETE ANALYSIS)
ACCEPT / DECLINE
How Neo4j fits in
  Detect & prevent fraud in real-time!
  Faster credit risk analysis and transactions!
  Reduce chargebacks!
  Quickly adapt to new methods of fraud!
Why Neo4j?! Who’s using it?!
Financial institutions use Neo4j to:
FINANCE
 Government Online Retail
•  Today’s fraudsters are organized and highly sophisticated
•  Legacy technology does not detect fraud sufficiently and in real-time
•  Graph-databases enable you to discover fraudulent patterns in real-
time
•  Augment your current fraud detection infrastructure with connected
analysis
KEY TAKE AWAYS
Using Neo to detect Fraud
Retail Banking First-Party Fraud!
Opening many lines of credit with no intention of !
paying them back!
Causing	High	Impact	
•  Tens	of	billions	of	dollars	lost	every	year	
by	
U.S.	Banks.(1)	
•  25%	of	total	consumer	credit	charge-offs	
in	the	United	States.(2)	
•  10%	to	20%	of	unsecured	bad	debt	at	
leading		
U.S.	and	European	banks	is	misclassified,	
and		
is	actually	first-party	fraud.(3)	
	
(1) Experian: http://www.experian.com/assets/decision-analytics/white-papers/first-partyfraud-wp.pdf!
(2)  Experian: http://www.experian.com/assets/decision-analytics/white-papers/first-partyfraud-wp.pdf!
(3) Business Insider: http://www.businessinsider.com/how-to-use-social-networks-in-the-fight-against-first-party-fraud-2011-3!
Detec%ng	Fraud	Rings	
SSN1!
123 NW 1st
Street!
San
Francisco,
CA!
555-555-
5555!
123 NW 1st
Street!
San
Francisco,
CA!555-555-
5555!
Skimming	
Person A! Person B!
Location A! Location B!
Phone	Number	Duplicate	Use	
555-555-5
555!
Person A!
Person B!
Suspect	eCommerce	
Person A!
Person B!
Location C!
IP address!
Fraud Demo – Part I (generic)!
•  Fraud scenario covering Retail Fraud use cases!
•  Data set contains operational data!
•  Constant data load –> injecting fraud cases -> generate alerts!
•  Capability to export data of detected fraud for further investigation!
Neo4j!
App Server!
Fraud
Detection!
Web App!
Fraud App!
Browser!
UX:
TestDataG
en!
Alert generated!
Demo!
Why using GraphDB / Neo4j for Fraud Detection?!
•  Graphs are intuitive to understand!
•  Schema free - > Flexibility!
•  Nodes can vary depending on time / usage / semantic!
•  Adopt dynamic changes!
•  Agile Development!
•  High productivity and rapid implementation !
•  No “RDBMS-waterfall-high-investment-trap” !
•  Taking advantage of the full value of connected data and data relationships!
•  Traversing the graph compared to self joins in RDBMS!
•  Near real time response times!
•  Preventing fraud rather than detecting after the fact!
•  Usage scenario Fraud Analyst: !
•  Potential fraud case detected!
•  Enriched with data from various sources containing data on fraud suspect!
•  Trigger human and/or automated reactions!
Fraud	Demo	–	Part	II	
Neo4j!
Web App!
RDBMS!
(Oracle, MySQL,
DB2, HANA …)!
Management Console!
(E.g BI Tools such as !
Tableau, Qlik, BO,
MicroStrategy etc)!
Fraud	
Analyst	
Machine2Machine !
generated actions!
Alert!
Incoming Events!
CRM System!
!
!
!
!
!
Operational System!
!
!
Data!
Integration!
External Data!
Using Neo as the foundation of a fraud solution in
your architecture!
Step 1: Set up Data Integration!
Step 2: Visualize Data in BI Tool!
Conclusions!
•  Fraud as one use case to provide full value of connected data within the
entire organization!
•  Neo4j as the foundation to do 360 degree fraud detection and
prevention!
•  Neo4j to extend your existing environment while protecting your
investments!
•  Neo4j provides best value integrated in the entire environment!
•  Neo4j as the foundation for generating real time alerts to trigger
automated or manual interventions!
!
A deeper look into
the database!
A brief look into the data model ….!
Fraud Demo!
Solutions powered with Neo4j !
2017!
!
Stefan.Kolmar@neo4j.com!
THANK YOU!

More Related Content

What's hot

DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
Ed Alcantara
 
Ksn report ransomware-and-malicious-cryptominers
Ksn report ransomware-and-malicious-cryptominersKsn report ransomware-and-malicious-cryptominers
Ksn report ransomware-and-malicious-cryptominers
malvvv
 

What's hot (8)

DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
Analisi dati per software anti frode. Roberto Marmo, Università di Pavia
Analisi dati per software anti frode. Roberto Marmo, Università di PaviaAnalisi dati per software anti frode. Roberto Marmo, Università di Pavia
Analisi dati per software anti frode. Roberto Marmo, Università di Pavia
 
IBM X-Force Threat Intelligence
IBM X-Force Threat Intelligence IBM X-Force Threat Intelligence
IBM X-Force Threat Intelligence
 
Ksn report ransomware-and-malicious-cryptominers
Ksn report ransomware-and-malicious-cryptominersKsn report ransomware-and-malicious-cryptominers
Ksn report ransomware-and-malicious-cryptominers
 
Apwg trends report_q1-q3_2015
Apwg trends report_q1-q3_2015Apwg trends report_q1-q3_2015
Apwg trends report_q1-q3_2015
 
Ransomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacksRansomware-as-a-Service: The business of distributing cyber attacks
Ransomware-as-a-Service: The business of distributing cyber attacks
 
IRJET- Phishing and Anti-Phishing Techniques
IRJET-  	  Phishing and Anti-Phishing TechniquesIRJET-  	  Phishing and Anti-Phishing Techniques
IRJET- Phishing and Anti-Phishing Techniques
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013
 

Similar to GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud

Leveraging graph technology to fight financial fraud
Leveraging graph technology to fight financial fraudLeveraging graph technology to fight financial fraud
Leveraging graph technology to fight financial fraud
Neo4j
 
How to Build a Fraud Detection Solution with Neo4j
How to Build a Fraud Detection Solution with Neo4jHow to Build a Fraud Detection Solution with Neo4j
How to Build a Fraud Detection Solution with Neo4j
Neo4j
 

Similar to GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud (20)

Leveraging graph technology to fight financial fraud
Leveraging graph technology to fight financial fraudLeveraging graph technology to fight financial fraud
Leveraging graph technology to fight financial fraud
 
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial FraudGraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
 
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4jNeo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
 
Vol 17 No 2 - July-December 2017
Vol 17 No 2 - July-December 2017Vol 17 No 2 - July-December 2017
Vol 17 No 2 - July-December 2017
 
Connections Drive Digital Transformation
Connections Drive Digital TransformationConnections Drive Digital Transformation
Connections Drive Digital Transformation
 
Digital Transformation and the Journey to a Highly Connected Enterprise
Digital Transformation and the Journey to a Highly Connected EnterpriseDigital Transformation and the Journey to a Highly Connected Enterprise
Digital Transformation and the Journey to a Highly Connected Enterprise
 
How to Build a Fraud Detection Solution with Neo4j
How to Build a Fraud Detection Solution with Neo4jHow to Build a Fraud Detection Solution with Neo4j
How to Build a Fraud Detection Solution with Neo4j
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
 
Graphs in Government
Graphs in GovernmentGraphs in Government
Graphs in Government
 
IRJET- Credit Card Fraud Detection using Random Forest
IRJET-  	  Credit Card Fraud Detection using Random ForestIRJET-  	  Credit Card Fraud Detection using Random Forest
IRJET- Credit Card Fraud Detection using Random Forest
 
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
 
Build Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and GraphsBuild Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and Graphs
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
 
Next Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4jNext Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4j
 
A Practical Guide to Post-EMV Card Not Present Fraud
A Practical Guide to Post-EMV Card Not Present FraudA Practical Guide to Post-EMV Card Not Present Fraud
A Practical Guide to Post-EMV Card Not Present Fraud
 
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
 
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present FraudKnow your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
 
Online Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningOnline Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine Learning
 

More from Neo4j

More from Neo4j (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansQIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
 
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafosBBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
 
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
 
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdfRabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
 
Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG time
 
Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)
 
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdfNeo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
 
Enabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge GraphsEnabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge Graphs
 
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdfNeo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
 
Neo4j Jesus Barrasa The Art of the Possible with Graph
Neo4j Jesus Barrasa The Art of the Possible with GraphNeo4j Jesus Barrasa The Art of the Possible with Graph
Neo4j Jesus Barrasa The Art of the Possible with Graph
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud

  • 1. LEVERAGING GRAPH-TECHNOLOGY TO FIGHT FINANCIAL FRAUD November 2017 Stefan Kolmar VP Field Engineering
  • 2. AGENDA •  Meet today’s fraudsters •  Traditional fraud detection methods •  Using connected analysis for real-time fraud detection •  Demo •  Summary
  • 3.
  • 4. The Impact of Fraud The payment card fraud alone, constitutes for over 16 billion dollar in losses for the bank-sector in the US. $16Bpayment card fraud in 2014* Banking $32Byearly e-commerce fraud** Fraud in E-commerce is estimated to cost over 32 billion dollars annually is the US.. E-commerce The impact of fraud on the insurance industry is estimated to be $80 billion annually in the US. Insurance $80Bestimated yearly impact*** *) Business Wire: http://www.businesswire.com/news/home/20150804007054/en/Global-Card-Fraud-Losses-Reach-16.31-Billion#.VcJZlvlVhBc **) E-commerce expert Andreas Thim, Klarna, 2015 ***) Coalition against insurance fraud: http://www.insurancefraud.org/article.htm?RecID=3274#.UnWuZ5E7ROA
  • 5. Who Are Today’s Fraudsters?
  • 6. Organized in groups Synthetic Identities Stolen Identities Who Are Today’s Fraudsters? Hijacked Devices
  • 7. “Don’t consider traditional technology adequate to keep up with criminal trends” Market Guide for Online Fraud Detection, April 27, 2015!
  • 8. Endpoint-Centric Analysis of users and their end-points! 1. Navigation Centric Analysis of navigation behavior and suspect patterns! 2. Account-Centric Analysis of anomaly behavior by channel! 3. PC:s Mobile Phones IP-addresses User ID:s Comparing Transaction Identity Vetting Traditional Fraud Detection Methods
  • 9. ! Unable to detect! •  Fraud rings! •  Fake IP-adresses! •  Hijacked devices! •  Synthetic Identities! •  Stolen Identities! •  And more…! Weaknesses DISCRETE ANALYSIS Endpoint-Centric Analysis of users and their end-points! 1. Navigation Centric Analysis of navigation behavior and suspect patterns! 2. Account-Centric Analysis of anomaly behavior by channel! 3. Traditional Fraud Detection Methods
  • 10. INVESTIGATE Revolving Debt! Number of Accounts! INVESTIGATE Normal behavior Fraud Detection With Discrete Analysis
  • 11. Revolving Debt! Number of Accounts! Normal behavior Fraud Detection With Connected Analysis Fraudulent pattern
  • 12. CONNECTED ANALYSIS Augmented Fraud Detection Endpoint-Centric Analysis of users and their end-points! Navigation Centric Analysis of navigation behavior and suspect patterns! Account-Centric Analysis of anomaly behavior by channel! DISCRETE ANALYSIS 1. 2. 3. Cross Channel Analysis of anomaly behavior correlated across channels! 4. Entity Linking Analysis of relationships to detect organized crime and collusion! 5.
  • 13. ACCOUNT HOLDER 2 Modeling a fraud ring as a graph ACCOUNT HOLDER 1 ACCOUNT HOLDER 3
  • 14. ACCOUNT HOLDER 2 Modeling a fraud ring as a graph ACCOUNT HOLDER 1 ACCOUNT HOLDER 3 CREDIT CARD BANK ACCOUNT BANK ACCOUNT BANK ACCOUNT PHONE NUMBER UNSECURED LOAN SSN 2 UNSECURED LOAN
  • 15. ACCOUNT HOLDER 2 Modeling a fraud ring as a graph ACCOUNT HOLDER 1 ACCOUNT HOLDER 3 CREDIT CARD BANK ACCOUNT BANK ACCOUNT BANK ACCOUNT ADDRESS PHONE NUMBER PHONE NUMBER SSN 2 UNSECURED LOAN SSN 2 UNSECURED LOAN
  • 16. ACCOUNT HOLDER 2 Modeling a fraud ring as a graph ACCOUNT HOLDER 1 ACCOUNT HOLDER 3 CREDIT CARD BANK ACCOUNT BANK ACCOUNT BANK ACCOUNT ADDRESS PHONE NUMBER PHONE NUMBER SSN 2 UNSECURED LOAN SSN 2 UNSECURED LOAN SYNTETIC PERSON 2 SYNTHETIC PERSON 1
  • 18. USING NEO4j FOR REAL-TIME CONNECTED ANALYSIS
  • 19. Account-Centric Analysis of anomaly behavior correlated across channels! 4. Entity Linking Analysis of relationships to detect organized crime and collusion! 5. CONNECTED ANALYSIS Endpoint-Centric Analysis of users and their end-points! Navigation Centric Analysis of navigation behavior and suspect patterns! Account-Centric Analysis of anomaly behavior by channel! DISCRETE ANALYSIS 1. 2. 3. Augment Fraud Detection with Neo4j Traditional Vendors
  • 20. ACCEPT / DECLINE MANUAL User/Transaction! CONNECTED ANALYSIS User/Transaction! ACCEPT / DECLINE(DISCRETE ANALYSIS) + User/Transaction! (sub-second performance to any data size and connection)! ACCEPT / DECLINE REAL TIME TRADITIONAL VENDORS (DISCRETE ANALYSIS) (DISCRETE ANALYSIS) ACCEPT / DECLINE How Neo4j fits in
  • 21.   Detect & prevent fraud in real-time!   Faster credit risk analysis and transactions!   Reduce chargebacks!   Quickly adapt to new methods of fraud! Why Neo4j?! Who’s using it?! Financial institutions use Neo4j to: FINANCE Government Online Retail
  • 22. •  Today’s fraudsters are organized and highly sophisticated •  Legacy technology does not detect fraud sufficiently and in real-time •  Graph-databases enable you to discover fraudulent patterns in real- time •  Augment your current fraud detection infrastructure with connected analysis KEY TAKE AWAYS
  • 23. Using Neo to detect Fraud
  • 24. Retail Banking First-Party Fraud! Opening many lines of credit with no intention of ! paying them back! Causing High Impact •  Tens of billions of dollars lost every year by U.S. Banks.(1) •  25% of total consumer credit charge-offs in the United States.(2) •  10% to 20% of unsecured bad debt at leading U.S. and European banks is misclassified, and is actually first-party fraud.(3) (1) Experian: http://www.experian.com/assets/decision-analytics/white-papers/first-partyfraud-wp.pdf! (2)  Experian: http://www.experian.com/assets/decision-analytics/white-papers/first-partyfraud-wp.pdf! (3) Business Insider: http://www.businessinsider.com/how-to-use-social-networks-in-the-fight-against-first-party-fraud-2011-3!
  • 25. Detec%ng Fraud Rings SSN1! 123 NW 1st Street! San Francisco, CA! 555-555- 5555! 123 NW 1st Street! San Francisco, CA!555-555- 5555! Skimming Person A! Person B! Location A! Location B! Phone Number Duplicate Use 555-555-5 555! Person A! Person B! Suspect eCommerce Person A! Person B! Location C! IP address!
  • 26. Fraud Demo – Part I (generic)! •  Fraud scenario covering Retail Fraud use cases! •  Data set contains operational data! •  Constant data load –> injecting fraud cases -> generate alerts! •  Capability to export data of detected fraud for further investigation! Neo4j! App Server! Fraud Detection! Web App! Fraud App! Browser! UX: TestDataG en! Alert generated!
  • 27. Demo!
  • 28. Why using GraphDB / Neo4j for Fraud Detection?! •  Graphs are intuitive to understand! •  Schema free - > Flexibility! •  Nodes can vary depending on time / usage / semantic! •  Adopt dynamic changes! •  Agile Development! •  High productivity and rapid implementation ! •  No “RDBMS-waterfall-high-investment-trap” ! •  Taking advantage of the full value of connected data and data relationships! •  Traversing the graph compared to self joins in RDBMS! •  Near real time response times! •  Preventing fraud rather than detecting after the fact!
  • 29. •  Usage scenario Fraud Analyst: ! •  Potential fraud case detected! •  Enriched with data from various sources containing data on fraud suspect! •  Trigger human and/or automated reactions! Fraud Demo – Part II Neo4j! Web App! RDBMS! (Oracle, MySQL, DB2, HANA …)! Management Console! (E.g BI Tools such as ! Tableau, Qlik, BO, MicroStrategy etc)! Fraud Analyst Machine2Machine ! generated actions! Alert! Incoming Events! CRM System! ! ! ! ! ! Operational System! ! ! Data! Integration! External Data!
  • 30. Using Neo as the foundation of a fraud solution in your architecture! Step 1: Set up Data Integration! Step 2: Visualize Data in BI Tool!
  • 31. Conclusions! •  Fraud as one use case to provide full value of connected data within the entire organization! •  Neo4j as the foundation to do 360 degree fraud detection and prevention! •  Neo4j to extend your existing environment while protecting your investments! •  Neo4j provides best value integrated in the entire environment! •  Neo4j as the foundation for generating real time alerts to trigger automated or manual interventions! !
  • 32. A deeper look into the database!
  • 33. A brief look into the data model ….!
  • 34. Fraud Demo! Solutions powered with Neo4j ! 2017! ! Stefan.Kolmar@neo4j.com!