SlideShare a Scribd company logo
1 of 45
How to build Next Generation Fraud
Solutions with Neo4j
Stefan Kolmar, VP Field Engineering
May 2018
Agenda
● Solutions using Neo4j
● Fraud
● The challenge
● How to benefit from Graph Technology
● How to build the Solution
● Conclusions
Solutions: new mindset required?
Solutions: new mindset
Yesterday:
- Static Applications
- Designed to fulfill current
requirements
- Performance Constraints
- Domain experts versus IT
experts
Tomorrow:
- Flexible Applications
- Designed to fulfill tomorrows
requirements
- Performance is not limiting
- Domain experts work hand in
hand with IT experts
Evolution using Neo4j
Neo4j Platform
Graph Transactions Graph Analytics
Data Integration
Development &
Admin
Analytics Tooling
Drivers & APIs Discovery & Visualization
Developers
Admins
Applications Business Users
Data Analysts
Data Scientists
3rd Party Tools
“The Graph Advantage”
Domain know-how Professional Services PS Packages
Graph Based Solution
Neo4j based Solutions
Neo4j Graph Based Solutions
- Neo4j DB / Platform
- Data Integration Platform
- Blueprint Datamodel
- Blueprint Architecture
- Domain know how
- Professional Services
Evolution using Neo4j
Neo4j enables Graph Based
Solutions with a need for:
- Agility
- Intuitiveness
- High Performance to support
connected data scenarios
- Scalable on traversing through
connected data
Speed: Real time query
enabled
Graph Based Solutions
Enables Up-Sell / Cross-sell
Key Features Added Value
360 degree view on data
Using data Connections as a value
Intuitive: Supports Business Needs
Flexible: enabled for
additional requirements
Finding patterns within the data
Detect anomalies
Prevent rather than detect
Enables conversation across Functions
Comply to regulations
What-if Analysis
Telco
OSS
GDPR
Fraud
Telco BSS
Recomm
endations
MDM
Resource efficient
Fraud Detection
Building Powerful Solutions to prevent Fraud Based on Neo4j
The Impact of Fraud
The payment card fraud alone, constitutes
for over 16 billion dollar in losses for the
bank-sector in the US.
$16Bpayment card fraud in 2014*
Banking
$32Byearly e-commerce fraud**
Fraud in E-commerce is estimated
to cost over 32 billion dollars
annually is the US..
E-commerce
The impact of fraud on the insurance
industry is estimated to be $80 billion
annually in the US.
Insurance
$80Bestimated yearly impact***
*) Business Wire: http://www.businesswire.com/news/home/20150804007054/en/Global-Card-Fraud-Losses-Reach-16.31-Billion#.VcJZlvlVhBc
**) E-commerce expert Andreas Thim, Klarna, 2015
***) Coalition against insurance fraud: http://www.insurancefraud.org/article.htm?RecID=3274#.UnWuZ5E7ROA
Who Are Today’s Fraudsters?
Organized in groups Synthetic Identities Stolen Identities
Who Are Today’s Fraudsters?
Hijacked Devices
Types of Fraud
• Credit Card Fraud
• Rogue Merchants
• Fraud Rings
• Insurance Fraud
• eCommerce Fraud
• Fraud we don’t know about yet…
Digitized and Analog
World of Fraud
Constantly Evolving Few and Many Players
“One Step Ahead”
Simple and Complex
Fraud Detection
(From a data-modeling perspective)
Raw Data
Anomalies
Patterns
Patterns
1) Detect 2) Respond
Fraud Prevention is About Reacting to Patterns
(And doing it fast!)
Relational
Database
Choosing Underlying
Technology
Data Modelled as a Graph!
Graph
Database
“Don’t consider traditional
technology adequate to keep up
with criminal trends”
Market Guide for Online Fraud Detection, April 27, 2015
Endpoint-Centric
Analysis of users and
their end-points
1.
Navigation
Centric
Analysis of navigation
behavior and suspect
patterns
2.
Account-Centric
Analysis of anomaly
behavior by channel
3.
PC:s
Mobile Phones
IP-addresses
User ID:s
Comparing Transaction
Identity Vetting
Traditional Fraud Detection Methods
Unable to detect
• Fraud rings
• Fake IP-adresses
• Hijacked devices
• Synthetic Identities
• Stolen Identities
• And more…
Weaknesses
DISCRETE ANALYSIS
Endpoint-Centric
Analysis of users and
their end-points
1.
Navigation
Centric
Analysis of navigation
behavior and suspect
patterns
2.
Account-Centric
Analysis of anomaly
behavior by channel
3.
Traditional Fraud Detection Methods
INVESTIGATE
Revolving Debt
Number of Accounts
INVESTIGATE
Normal behavior
Fraud Detection With Discrete Analysis
Revolving Debt
Number of Accounts
Normal behavior
Fraud Detection With Connected Analysis
Fraudulent pattern
CONNECTED ANALYSIS
Augmented Fraud Detection
Endpoint-Centric
Analysis of users and
their end-points
Navigation
Centric
Analysis of navigation
behavior and suspect
patterns
Account-Centric
Analysis of anomaly
behavior by channel
DISCRETE ANALYSIS
1. 2. 3.
Cross Channel
Analysis of anomaly
behavior correlated
across channels
4.
Entity Linking
Analysis of relationships
to detect organized
crime and collusion
5.
Preventing Fraud
Networks of People Processes and Transactions Ownership
E.g. e-commerce Fraud,
AML
E.g. detecting fraud rings,
finding connections and
shortest paths
E.g. AML, tax fraud, legal
entities
Data connections assist the business by identifying patterns
The Power of Cypher
Fraud Ring:
MATCH ring = (suspect:AccountHolder)-[*]->(contactInformation)<-[*..5]-(:AccountHolder)-[*]->(suspect)
RETURN ring
Top Tier Electronic
Payment Services
Case studyApply to AML regulations
Challenge
• Needed to apply to AML regulation
• Unability to provide reports out of RDBMS leading
systems
Transactions fragmented and transfered „from rings
to rings“
• Neo4j is used to store and report on transaction
over previous 24 months
• Business Users / Fraud Analysts are enabled to
investigate data and detect patters
Use of Neo4j
• Complies to Regulations
• Neo4j also enabled the company to detect potential
AML usage early and act against them
“We have been unable to detect
AML fraud patterns in the SQL
based operational systems.
Graphs and Graph visualisation
is a key enabler technology.”
– Top Tier Payment Service
Result/Outcome
What about Machine Learning?
What about Machine Learning?
Neo4j is an enabler technology:
• Automized detection of Fraud patterns via Cypher
• Detecting Paths
• Graph Algorithms (eg Centrality, Community)
• Algorithms as background tasks -> mark
corresponding nodes
• Automatically cancel Business Transactions
• Score identified patterns and weigh
• ….
Why Graph is Superior for Fraud
DetectionFraud Requirement Traditional Approaches Neo4j Approach
Find connected data patterns over
unlimited amount of „hops“
Complex queries with hundreds of join
tables
Simple single query traverses all
enterprise systems
Real-time acting on incoming events in
ever changing formats for potential fraud
Limitations inherited from SQL Database
Schema
Schema free database enables to
connect any nodes with each other
Effort required to add new data and
systems
Days to weeks to rewrite schema and
queries
Draw new data connections on the spot
Time to deployment Months to years Weeks to months
Response time to Fraud requests Minutes to hours per query Milliseconds per query
Form of Fraud Incidents / Investigations Text reports that are not visual and
prove very little
Visuals patterns and the path to follow
through your system
Bottom line Long, ineffective and expensive Easy, fast and affordable
How Neo4j fits into your environment
Money
Transferring
Purchases Bank
Services Relational
database
Develop Patterns
Data Science-team
+ Good for Discrete Analysis
– No Holistic View of Data-Relationships
– Slow query speed for connections
Money
Transferring
Purchases Bank
Services Relational
database
Data Lake
+ Good for Map Reduce
+ Good for Analytical Workloads
– No holistic view
– Non-operational workloads
– Weeks-to-months processes Develop Patterns
Data Science-team
Merchant
Data
Credit
Score
Data
Other 3rd
Party
Data
Money
Transferring
Purchases Bank
Services
Neo4j powers
360° view of
transactions in
real-time
Neo4j
Cluster
SENSE
Transaction
stream
RESPOND
Alerts &
notification
LOAD RELEVANT DATA
Relational
database
Data Lake
Visualization UI
Fine Tune Patterns
Develop Patterns
Data Science-team
Merchant
Data
Credit
Score
Data
Other 3rd
Party
Data
Money
Transferring
Purchases Bank
Services
Neo4j powers
360° view of
transactions in
real-time
Neo4j
Cluster
SENSE
Transaction
stream
RESPOND
Alerts &
notification
LOAD RELEVANT DATA
Relational
database
Data Lake
Visualization UI
Fine Tune Patterns
Develop Patterns
Data Science-team
Merchant
Data
Credit
Score
Data
Other 3rd
Party
Data
Data-set used
to explore
new insights
Example Fraud Solution Architecture
Neo4j Database Cluster
Data Visualization
Neo4j APOC Fraud
Detection
Algorithms
Management
Dashboard
Neo4j Bolt Driver
Data Ingest
Mgmt.
…
Customer Data Sources / Systems / Applications
Legend:
Neo4j Provided Components
Custom built Neo4j/Customer
Customer/SI
Fraud Reports
Real Time Alerts
Batch
Data Buffering
(Queue)
Real-Time
Neo4j BrowserAdmin UI
UI for Fraud
Analysis
System Specific Adapters / Scripts / Connecters
Fraud Analysts Admin / SuperuserFraud Analysts Fraud Analysts
Neo4j powered Fraud Solution
Characteristic Benefit for Fraud Solution
• Agility • Constant catch up with fraudster techniques supported
• Enabled for Future Requirements
• Solution can be built iteratively
• Fast implementation cycles
• Schema free DB supports “connect anything”
• Intuitiveness • Enable Fraud Analysts to use Technology
• Using visualization to detect pattern
• Drilling into suspicious patterns
• Speed • Unlimited number of traversals to detect complex connections within the
data
• Response time enables fraud prevention
• Leverage Data Connections • 360 degree customer view enabled / provided
• Scalability • Hardware efficiency with real-time patterns
• TCO/ROI • Adding on top of existing infrastructure protects investments
Conclusion
(graphs)-[:ARE]-> (everywhere)
and
(Solutions)-[:NEED]-> (graphs)
Who can help?
Neo4j Platform
Graph Transactions Graph Analytics
Data Integration
Development &
Admin
Analytics Tooling
Drivers & APIs Discovery & Visualization
Developers
Admins
Applications Business Users
Data Analysts
Data Scientists
3rd Party Tools
“The Graph Advantage”
Domain know-how Professional Services PS Packages
Graph Based Solution
Professional Services:
- Extend and leverage Domain Expertise
- Best Practices
- Using Building Blocks
- Don’t “re-invent the wheel”
- Speed up development and deployment
- Access to Neo4j infrastructure
(Development, Support, Product
management)
How to build Next Generation Solutions
with Neo4j
Stefan Kolmar, VP Field Engineering
May 2018

More Related Content

What's hot

Ml conference slides
Ml conference slidesMl conference slides
Ml conference slides
QuantUniversity
 
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
DataWorks Summit
 

What's hot (20)

Predictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detectionPredictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detection
 
Credit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In DatabricksCredit Card Fraud Detection Using ML In Databricks
Credit Card Fraud Detection Using ML In Databricks
 
Correspondent Banking Networks
Correspondent Banking NetworksCorrespondent Banking Networks
Correspondent Banking Networks
 
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
 
Hadoop BIG Data - Fraud Detection with Real-Time Analytics
Hadoop BIG Data - Fraud Detection with Real-Time AnalyticsHadoop BIG Data - Fraud Detection with Real-Time Analytics
Hadoop BIG Data - Fraud Detection with Real-Time Analytics
 
IBM Software Day 2013. Smarter analytics and big data. building the next gene...
IBM Software Day 2013. Smarter analytics and big data. building the next gene...IBM Software Day 2013. Smarter analytics and big data. building the next gene...
IBM Software Day 2013. Smarter analytics and big data. building the next gene...
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
 
Data Mining
Data MiningData Mining
Data Mining
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)
 
20181129 keynote augmented intelligence and artificial intelligence
20181129 keynote augmented intelligence and artificial intelligence20181129 keynote augmented intelligence and artificial intelligence
20181129 keynote augmented intelligence and artificial intelligence
 
Ml conference slides
Ml conference slidesMl conference slides
Ml conference slides
 
CVtesting
CVtestingCVtesting
CVtesting
 
Analytics in banking preview deck - june 2013
Analytics in banking   preview deck - june 2013Analytics in banking   preview deck - june 2013
Analytics in banking preview deck - june 2013
 
How advanced analytics is impacting the banking sector
How advanced analytics is impacting the banking sectorHow advanced analytics is impacting the banking sector
How advanced analytics is impacting the banking sector
 
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
 
Fraud Analytics with Machine Learning and Big Data Engineering for Telecom
Fraud Analytics with Machine Learning and Big Data Engineering for TelecomFraud Analytics with Machine Learning and Big Data Engineering for Telecom
Fraud Analytics with Machine Learning and Big Data Engineering for Telecom
 
Big data in fintech ecosystem
Big data in fintech ecosystemBig data in fintech ecosystem
Big data in fintech ecosystem
 
DLT, Blockchain Analytics and AI Workshop at NYU, Dec 10, 2018
DLT, Blockchain Analytics and AI Workshop at NYU, Dec 10, 2018DLT, Blockchain Analytics and AI Workshop at NYU, Dec 10, 2018
DLT, Blockchain Analytics and AI Workshop at NYU, Dec 10, 2018
 
IBM Solutions Connect 2013 - Getting started with Big Data
IBM Solutions Connect 2013 - Getting started with Big DataIBM Solutions Connect 2013 - Getting started with Big Data
IBM Solutions Connect 2013 - Getting started with Big Data
 
Artificial Intelligence in Banking
Artificial Intelligence in BankingArtificial Intelligence in Banking
Artificial Intelligence in Banking
 

Similar to Next Generation Fraud Solutions using Neo4j

The Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent ApplicationsThe Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent Applications
Neo4j
 
Five Trends in Real Time Applications
Five Trends in Real Time ApplicationsFive Trends in Real Time Applications
Five Trends in Real Time Applications
confluent
 
Linkurious Enterprise: graph visualization platform neo4j
Linkurious Enterprise: graph visualization platform neo4jLinkurious Enterprise: graph visualization platform neo4j
Linkurious Enterprise: graph visualization platform neo4j
Linkurious
 

Similar to Next Generation Fraud Solutions using Neo4j (20)

Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
 
GraphTour - Next generation solutions using Neo4j
GraphTour - Next generation solutions using Neo4jGraphTour - Next generation solutions using Neo4j
GraphTour - Next generation solutions using Neo4j
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
 
Neo4j the Anti Crime Database
Neo4j the Anti Crime DatabaseNeo4j the Anti Crime Database
Neo4j the Anti Crime Database
 
GraphTalk Helsinki - Introduction to Graphs and Neo4j
GraphTalk Helsinki - Introduction to Graphs and Neo4jGraphTalk Helsinki - Introduction to Graphs and Neo4j
GraphTalk Helsinki - Introduction to Graphs and Neo4j
 
Taming Big Data With Modern Software Architecture
Taming Big Data  With Modern Software ArchitectureTaming Big Data  With Modern Software Architecture
Taming Big Data With Modern Software Architecture
 
The Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent ApplicationsThe Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent Applications
 
Analytics in Your Enterprise
Analytics in Your EnterpriseAnalytics in Your Enterprise
Analytics in Your Enterprise
 
Big Data Monetisation
Big Data MonetisationBig Data Monetisation
Big Data Monetisation
 
Big Data in FinTech
Big Data in FinTechBig Data in FinTech
Big Data in FinTech
 
Introduction to Neo4j
Introduction to Neo4jIntroduction to Neo4j
Introduction to Neo4j
 
Five Trends in Real Time Applications
Five Trends in Real Time ApplicationsFive Trends in Real Time Applications
Five Trends in Real Time Applications
 
GraphTour - Keynote
GraphTour - KeynoteGraphTour - Keynote
GraphTour - Keynote
 
Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise Deteo. Data science, Big Data expertise
Deteo. Data science, Big Data expertise
 
EVOLVING PATTERNS IN BIG DATA - NEIL AVERY
EVOLVING PATTERNS IN BIG DATA - NEIL AVERYEVOLVING PATTERNS IN BIG DATA - NEIL AVERY
EVOLVING PATTERNS IN BIG DATA - NEIL AVERY
 
Netvibes for Financial Services
Netvibes for Financial ServicesNetvibes for Financial Services
Netvibes for Financial Services
 
Operationalizing Data Science: The Right Architecture and Tools
Operationalizing Data Science: The Right Architecture and ToolsOperationalizing Data Science: The Right Architecture and Tools
Operationalizing Data Science: The Right Architecture and Tools
 
EY + Neo4j: Why graph technology makes sense for fraud detection and customer...
EY + Neo4j: Why graph technology makes sense for fraud detection and customer...EY + Neo4j: Why graph technology makes sense for fraud detection and customer...
EY + Neo4j: Why graph technology makes sense for fraud detection and customer...
 
Linkurious Enterprise: graph visualization platform neo4j
Linkurious Enterprise: graph visualization platform neo4jLinkurious Enterprise: graph visualization platform neo4j
Linkurious Enterprise: graph visualization platform neo4j
 

More from Neo4j

More from Neo4j (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansQIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
 
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafosBBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
 
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
 
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdfRabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
 
Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG time
 
Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)
 
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdfNeo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
 
Enabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge GraphsEnabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge Graphs
 
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdfNeo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
 
Neo4j Jesus Barrasa The Art of the Possible with Graph
Neo4j Jesus Barrasa The Art of the Possible with GraphNeo4j Jesus Barrasa The Art of the Possible with Graph
Neo4j Jesus Barrasa The Art of the Possible with Graph
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Next Generation Fraud Solutions using Neo4j

  • 1. How to build Next Generation Fraud Solutions with Neo4j Stefan Kolmar, VP Field Engineering May 2018
  • 2. Agenda ● Solutions using Neo4j ● Fraud ● The challenge ● How to benefit from Graph Technology ● How to build the Solution ● Conclusions
  • 4. Solutions: new mindset Yesterday: - Static Applications - Designed to fulfill current requirements - Performance Constraints - Domain experts versus IT experts Tomorrow: - Flexible Applications - Designed to fulfill tomorrows requirements - Performance is not limiting - Domain experts work hand in hand with IT experts
  • 5. Evolution using Neo4j Neo4j Platform Graph Transactions Graph Analytics Data Integration Development & Admin Analytics Tooling Drivers & APIs Discovery & Visualization Developers Admins Applications Business Users Data Analysts Data Scientists 3rd Party Tools “The Graph Advantage” Domain know-how Professional Services PS Packages Graph Based Solution
  • 6. Neo4j based Solutions Neo4j Graph Based Solutions - Neo4j DB / Platform - Data Integration Platform - Blueprint Datamodel - Blueprint Architecture - Domain know how - Professional Services
  • 7. Evolution using Neo4j Neo4j enables Graph Based Solutions with a need for: - Agility - Intuitiveness - High Performance to support connected data scenarios - Scalable on traversing through connected data
  • 8. Speed: Real time query enabled Graph Based Solutions Enables Up-Sell / Cross-sell Key Features Added Value 360 degree view on data Using data Connections as a value Intuitive: Supports Business Needs Flexible: enabled for additional requirements Finding patterns within the data Detect anomalies Prevent rather than detect Enables conversation across Functions Comply to regulations What-if Analysis Telco OSS GDPR Fraud Telco BSS Recomm endations MDM Resource efficient
  • 9. Fraud Detection Building Powerful Solutions to prevent Fraud Based on Neo4j
  • 10. The Impact of Fraud The payment card fraud alone, constitutes for over 16 billion dollar in losses for the bank-sector in the US. $16Bpayment card fraud in 2014* Banking $32Byearly e-commerce fraud** Fraud in E-commerce is estimated to cost over 32 billion dollars annually is the US.. E-commerce The impact of fraud on the insurance industry is estimated to be $80 billion annually in the US. Insurance $80Bestimated yearly impact*** *) Business Wire: http://www.businesswire.com/news/home/20150804007054/en/Global-Card-Fraud-Losses-Reach-16.31-Billion#.VcJZlvlVhBc **) E-commerce expert Andreas Thim, Klarna, 2015 ***) Coalition against insurance fraud: http://www.insurancefraud.org/article.htm?RecID=3274#.UnWuZ5E7ROA
  • 11. Who Are Today’s Fraudsters?
  • 12. Organized in groups Synthetic Identities Stolen Identities Who Are Today’s Fraudsters? Hijacked Devices
  • 13. Types of Fraud • Credit Card Fraud • Rogue Merchants • Fraud Rings • Insurance Fraud • eCommerce Fraud • Fraud we don’t know about yet…
  • 14. Digitized and Analog World of Fraud Constantly Evolving Few and Many Players “One Step Ahead” Simple and Complex
  • 15. Fraud Detection (From a data-modeling perspective)
  • 20. 1) Detect 2) Respond Fraud Prevention is About Reacting to Patterns (And doing it fast!)
  • 22. Data Modelled as a Graph! Graph Database
  • 23. “Don’t consider traditional technology adequate to keep up with criminal trends” Market Guide for Online Fraud Detection, April 27, 2015
  • 24. Endpoint-Centric Analysis of users and their end-points 1. Navigation Centric Analysis of navigation behavior and suspect patterns 2. Account-Centric Analysis of anomaly behavior by channel 3. PC:s Mobile Phones IP-addresses User ID:s Comparing Transaction Identity Vetting Traditional Fraud Detection Methods
  • 25. Unable to detect • Fraud rings • Fake IP-adresses • Hijacked devices • Synthetic Identities • Stolen Identities • And more… Weaknesses DISCRETE ANALYSIS Endpoint-Centric Analysis of users and their end-points 1. Navigation Centric Analysis of navigation behavior and suspect patterns 2. Account-Centric Analysis of anomaly behavior by channel 3. Traditional Fraud Detection Methods
  • 26. INVESTIGATE Revolving Debt Number of Accounts INVESTIGATE Normal behavior Fraud Detection With Discrete Analysis
  • 27. Revolving Debt Number of Accounts Normal behavior Fraud Detection With Connected Analysis Fraudulent pattern
  • 28. CONNECTED ANALYSIS Augmented Fraud Detection Endpoint-Centric Analysis of users and their end-points Navigation Centric Analysis of navigation behavior and suspect patterns Account-Centric Analysis of anomaly behavior by channel DISCRETE ANALYSIS 1. 2. 3. Cross Channel Analysis of anomaly behavior correlated across channels 4. Entity Linking Analysis of relationships to detect organized crime and collusion 5.
  • 29. Preventing Fraud Networks of People Processes and Transactions Ownership E.g. e-commerce Fraud, AML E.g. detecting fraud rings, finding connections and shortest paths E.g. AML, tax fraud, legal entities Data connections assist the business by identifying patterns
  • 30. The Power of Cypher Fraud Ring: MATCH ring = (suspect:AccountHolder)-[*]->(contactInformation)<-[*..5]-(:AccountHolder)-[*]->(suspect) RETURN ring
  • 31. Top Tier Electronic Payment Services Case studyApply to AML regulations Challenge • Needed to apply to AML regulation • Unability to provide reports out of RDBMS leading systems Transactions fragmented and transfered „from rings to rings“ • Neo4j is used to store and report on transaction over previous 24 months • Business Users / Fraud Analysts are enabled to investigate data and detect patters Use of Neo4j • Complies to Regulations • Neo4j also enabled the company to detect potential AML usage early and act against them “We have been unable to detect AML fraud patterns in the SQL based operational systems. Graphs and Graph visualisation is a key enabler technology.” – Top Tier Payment Service Result/Outcome
  • 32. What about Machine Learning?
  • 33. What about Machine Learning? Neo4j is an enabler technology: • Automized detection of Fraud patterns via Cypher • Detecting Paths • Graph Algorithms (eg Centrality, Community) • Algorithms as background tasks -> mark corresponding nodes • Automatically cancel Business Transactions • Score identified patterns and weigh • ….
  • 34. Why Graph is Superior for Fraud DetectionFraud Requirement Traditional Approaches Neo4j Approach Find connected data patterns over unlimited amount of „hops“ Complex queries with hundreds of join tables Simple single query traverses all enterprise systems Real-time acting on incoming events in ever changing formats for potential fraud Limitations inherited from SQL Database Schema Schema free database enables to connect any nodes with each other Effort required to add new data and systems Days to weeks to rewrite schema and queries Draw new data connections on the spot Time to deployment Months to years Weeks to months Response time to Fraud requests Minutes to hours per query Milliseconds per query Form of Fraud Incidents / Investigations Text reports that are not visual and prove very little Visuals patterns and the path to follow through your system Bottom line Long, ineffective and expensive Easy, fast and affordable
  • 35. How Neo4j fits into your environment
  • 36. Money Transferring Purchases Bank Services Relational database Develop Patterns Data Science-team + Good for Discrete Analysis – No Holistic View of Data-Relationships – Slow query speed for connections
  • 37. Money Transferring Purchases Bank Services Relational database Data Lake + Good for Map Reduce + Good for Analytical Workloads – No holistic view – Non-operational workloads – Weeks-to-months processes Develop Patterns Data Science-team Merchant Data Credit Score Data Other 3rd Party Data
  • 38. Money Transferring Purchases Bank Services Neo4j powers 360° view of transactions in real-time Neo4j Cluster SENSE Transaction stream RESPOND Alerts & notification LOAD RELEVANT DATA Relational database Data Lake Visualization UI Fine Tune Patterns Develop Patterns Data Science-team Merchant Data Credit Score Data Other 3rd Party Data
  • 39. Money Transferring Purchases Bank Services Neo4j powers 360° view of transactions in real-time Neo4j Cluster SENSE Transaction stream RESPOND Alerts & notification LOAD RELEVANT DATA Relational database Data Lake Visualization UI Fine Tune Patterns Develop Patterns Data Science-team Merchant Data Credit Score Data Other 3rd Party Data Data-set used to explore new insights
  • 40. Example Fraud Solution Architecture
  • 41. Neo4j Database Cluster Data Visualization Neo4j APOC Fraud Detection Algorithms Management Dashboard Neo4j Bolt Driver Data Ingest Mgmt. … Customer Data Sources / Systems / Applications Legend: Neo4j Provided Components Custom built Neo4j/Customer Customer/SI Fraud Reports Real Time Alerts Batch Data Buffering (Queue) Real-Time Neo4j BrowserAdmin UI UI for Fraud Analysis System Specific Adapters / Scripts / Connecters Fraud Analysts Admin / SuperuserFraud Analysts Fraud Analysts
  • 42. Neo4j powered Fraud Solution Characteristic Benefit for Fraud Solution • Agility • Constant catch up with fraudster techniques supported • Enabled for Future Requirements • Solution can be built iteratively • Fast implementation cycles • Schema free DB supports “connect anything” • Intuitiveness • Enable Fraud Analysts to use Technology • Using visualization to detect pattern • Drilling into suspicious patterns • Speed • Unlimited number of traversals to detect complex connections within the data • Response time enables fraud prevention • Leverage Data Connections • 360 degree customer view enabled / provided • Scalability • Hardware efficiency with real-time patterns • TCO/ROI • Adding on top of existing infrastructure protects investments
  • 44. Who can help? Neo4j Platform Graph Transactions Graph Analytics Data Integration Development & Admin Analytics Tooling Drivers & APIs Discovery & Visualization Developers Admins Applications Business Users Data Analysts Data Scientists 3rd Party Tools “The Graph Advantage” Domain know-how Professional Services PS Packages Graph Based Solution Professional Services: - Extend and leverage Domain Expertise - Best Practices - Using Building Blocks - Don’t “re-invent the wheel” - Speed up development and deployment - Access to Neo4j infrastructure (Development, Support, Product management)
  • 45. How to build Next Generation Solutions with Neo4j Stefan Kolmar, VP Field Engineering May 2018

Editor's Notes

  1. Good afternoon, Welcome to the talk “Next Generation Solutions built on Neo4j” where I would like to show you some possibilities how to take advantage of Graphs building Solutions. My name is Stefan Kolmar and I’m running the Field Engineering for Neo4j in EMEA and APAC
  2. For the agenda I would like to start with some general remarks how Neo4j fits building next generation solutions. Then I would like to get a bit more specific on the advantages for Fraud and Recommendations And end with conclusions
  3. Question is: with all changes in technology, new abilities to work with data and the ever increasind amount of data: is a new thinking required?
  4. I would say: „Yes“ Yestredays application have been quite often static and have been designed to fulfill the current requirements. Performance access the data was a limiting factor – quite often there was a diconnect between domain experts and the ones who implement it afterwards: the IT experts Click what we need tomorrow is flexible applications, designed to fulfill ever changing requirements. If you use the right technology and you use it accordingly, performance is not a limiting factor any more. Thhe goal is that domain experts work hand in hand with IT experts.
  5. How can we get to those solutions? Let me first highlight the evolution using Neo4: With Neo4j as the graph database, we are building the Graph Platform as an entire infrastructure. Together with 3rd party tools you can build what I would call the graph advantage – an ecosystem based on graph to be used. If you know use this Ecosystem with the Donain know how skillset, use Professional Services and potential Professional Services Packages, you can build up a graph based solution
  6. Neo4j enables Graph Based Solutions with a need for: Agility -- constantly changing requirements Intuitiveness – so thhat everybody in your organsation can understand and influence the soluton High Performance to support connected data scenarios Scalable on traversing through connected data rather than building ad-hoc sql queries
  7. Neo4j enables Graph Based Solutions with a need for: Agility -- constantly changing requirements Intuitiveness – so thhat everybody in your organsation can understand and influence the soluton High Performance to support connected data scenarios Scalable on traversing through connected data rather than building ad-hoc sql queries
  8. Some categories of solutions we have seen and we have worked on with customers are in Telco OSS and BSS GDPR architectures as foundations for solutions, Recommendations, Fraud And MDM Key features of these solutions are
  9. Just to set the stage… We’re not going to give you the complete market analysis on Fraud, you guys probably know this better than us. But what you can say, is that it’s a significant cost of business, and it’s getting increasingly complex.
  10. Who are today’s fraudsters? Well, I’m sorry to say, but often they are more sophisticated than most systems one would have to prevent them. The biggest fraudsters don’t operate as lone anomalies today….
  11. Who are today’s fraudsters? Instead of an individual, fraudsters are typically organized in groups - also called Fraud rings Instead of using their own identify, they manufacture identities - also called synthetic identities They also perpetrate fraud using stolen identities and hijacked devices
  12. Of course, there are many different types of fraud — and all with their own sets of complexity. It can be Credit Card (which we will adress a little later) The merchants themselves can be fraudulent Fraud rings are a huge problem, and very hard to detect and stop with traditional systems. Insurance fraud is of course very wide spread, as well as ecommerce fraud But perhaps the most important fraud, is the fraud we don’t know about yet…
  13. The challenge with fraud — especially from a data-perspective, is that it is so many things at the same time. First, it’s constantly evolving. It can appear both simple and complex at the same time. Sometimes a scheme involves few or many players, it appears both digitized and in analog forms, and there’s always that sensation that fraud is always “one step ahead”.
  14. So let’s talk briefly about Fraud from a data-modeling perspective.
  15. Because of the complex and varied nature of Fraud, all the detection efforts we have in place stores enormous amounts of data — For example — you think about it it terms of storing every transaction being made over a period of time. For example.
  16. And finding clear anomalies, is one, sort of traditional way to go about detecting fraud. — A credit card couldn’t be in two different locations at the same time. For example
  17. These patterns can occur in many different ways and complexity — however, the job of the fraud prevention-team is basically to react to patterns, by first 1) detecting them, and then 2) respond — and doing all this as fast as possible.
  18. The key to achieve this is very much a question of the underlying technology. If you store your data like this, as you would in a relational database store — you will probably have pretty good success with your discrete analysis — finding the anomalies we talked about earlier. However, if you’re a looking to detect and respond to patterns, this structure wont be anywhere near sufficient. Instead what you need to do is re-imagine your data in the way it’s connected.
  19. …which of course is data modelled as a graph. And this is how data i stored and queried in a graph database like Neo4j
  20. Its obvious that traditional technologies which were aimed at individuals and their behavior are inadequate to detect and prevent sophisticated fraud rings. So why is that?
  21. Let’s look at what traditional Fraud Detection looks like. Endpoint-centric solution that analyzes the characteristics of the PC, mobile or telephony device used to access the enterprise system. 2) Navigation- and network-centric solution that analyzes the navigation of a session. - usually by IP address and user ID, to see if it looks anomalous relative to normal user or peer group behavior 3) — User- or entity-centric solution, in which transactions are compared to what is expected of the user or entity. To support identity prong, this layer also includes integration of external and internal data to help vet an identity, especially in a risky transaction (such as a new account application), or verify a suspect authentication or high-risk transaction.
  22. What all these methods are examples of is discrete analysis, which is very effective if you know what to look for. The weaknesses though, are that discrete analysis do a poor job when you want to detect Fraud rings, when someone is using fake IP-adresses,… the list… The challenge with systems that focus on discrete analysis for fraud detection is their inability to detect fraud rings or synthetic identities as this requires additional context. Let’s take an example
  23. [In this simple fraud detection approach to detect credit card fraud, it is relatively easy to spot outliers. But what if the fraudster commits fraud while still exhibiting normal behavior. Well - this is exactly how fraud rings operate]
  24. [A fraud ring rarely strays outside the normal behavior band. Instead they operate within normal limits and commit widespread fraud. This is very hard to detect by systems that are looking for outliers or activities outside the normal band.]
  25. Today, financial services firms need to augment their discrete analysis capability with connected analysis. Whether it is a fraud ring or a stolen/synthetic identities, its is powerful to use a graph database
  26. So if you want to avoid Fraud to happen, you have a good chance to use the connections within the data, Such as for a network of People -> detecting Fraud Rings Or Detect connections within processes and transactions Or Detecting connections within ownerships To identify patterns for money laudry, tax fraud and legal entities
  27. Cypher is your friend: with Cypher you get the abilities to traverse and use within your connections to easily identify connections/relationships
  28. Who is using neo4j to identify fraud: The first customer I wanted to highlight is a top tier payment service: They were basically forced by reagulations to put systems in place to identify potential ant money laundry. Their SQL based system were unable to handle the requirements and therefore they have built up a system based on graphs Neo4j As a result they are able to group on one side several accounts connect as „senders“ of money and on the othher side thhe group of receivers. If then as an example thousands of transactions are done from a group of people in lets say tel Aviv are sending to a group of people in Columbia, it is detected and can be investigated....
  29. Can Neo4j also be used to support machine learning?
  30. Neo4j is an enabler technology: Automized detection of Fraud patterns via Cypher queries Automized detection of Fraud Rings Shortest Paths / Paths existing Using Graph Algorithms as the foundation (eg Centrality, Community) Run Pattern detecting Algorithms as background tasks and mark corresponding nodes Automatically cancel Business Transactions (eg CC) ….
  31. If we now compare using Neo4j with traditional approaches, we see that Neo4j supports fnding connected patterns over unlimited amounts of hops … versus traditional approaches are limited by sql join limitations Neo4j helps to support the ever changing needs of fraudsters changing the way they commit fraud by allowing to connect anything with anything versus SQL to rely on a schema with schema changes to be hard at best New data systems can be rapidly integrated With the Neo4j agility, deployment time can be greatly reduced As a bootom line: Neo4j helps you to build an easy, fast and affordable solution.
  32. If you see existing environments, you most often see relational databases assisting data science teams to support investigations. This is good for dicrete analysis, but does not provide a holistic view of data relationships.
  33. To integrate the data, this data sources are then often pushed into a data lake. This is good for Map reduce algorithms, and it is good for analytical workloads. Still provides no holistic vies and is not good for operational workloads. Typically you talk here about processes to detect fraud which takes several days, if now more.
  34. Now if you load the relevant data into Neo4j, you can provide a 360 degree view on the data in real-time. With appropriate visualisation you give data scientists the ability to access the data in real-time. Ecisting transactional system will be connected in a way that the transaction stream is loaded to get sense out of the transactions in conjunction with the existing connected data, and you can respond in real time with alerts and notifications.
  35. The data set can be used to explore new insights and find and detect patterns.
  36. So this is an example architecture with the building blocks you need to build a Fraud Solution based on Neo4j. In the center of this architecture you see Neo4j database as a cluster. Fraud detection algorithms can work automatically directly on the database to detect fraud patterns and derive connection. Applications on top designed for Fraud Analysts or Managers with dashboards could access the database via the Bolt driver. The Neo4j database is directly connected in batch and/or realtime with all other source databases to import the relevant data intially, and, feed detetctions from fraud investigations into othher systems. With that a CRM system can get relevant information so that as an example in a CRM system a suspicious pattern/customer is marked, or, a transaction such as a credit card transaction can be cancelled.
  37. So if we summarize the characteristics of a Neo4j powered Fraud Solution, we can conclude that this adds value with agility: you can constantly catch up with fraudster activities and you are enabled for future reuirements Intuitiveness: Fraud analsysts are enabled to use the technology and can use visualisation techniques to detetct patterns Speed: traversals are cheap and provide performance so thhat you can detect complex connections You can Lvereage data connections to get a 360 degeree view on customers Hardware is eficiently used with real time patterns
  38. Who can help –> additional help? Move to conclusions
  39. Good afternoon, Welcome to the talk “Next Generation Solutions built on Neo4j” where I would like to show you some possibilities how to take advantage of Graphs building Solutions. My name is Stefan Kolmar and I’m running the Field Engineering for Neo4j in EMEA and APAC