SlideShare a Scribd company logo
USE OF SOCIAL NETWORK
IN DETECTING
FINANCIAL FRAUDS
SARTHAK DASGUPTA
RAHUL KUMAR SHIRNET
ROHIT KUMAR SINGH
INTRODUCTION
➢ Financial fraud happens when someone misleads you into some malicious and deceptive scheme
and harms your financial well being by acquiring important details to take your money. Most
victims who loose their money are unable to recover it. That is why taking serious measures to
curb this kind of activities has become imperative.
➢ The impact of fraud on organizations is becoming increasingly costly. Every year financial
institutions lose millions of dollars in revenue to systematic fraud. The emergence of new
technologies and forms of payments, as well as sophistication in fraud, complicate the challenges
faced by organizations in creating effective fraud detection strategies.
CLASSICAL APPROACH
The ability to link multiple data sources, analyze large volumes of data, and apply newer algorithms on
the transactions, provide organizations an opportunity to capture, and sometimes predict, fraud in a
more efficient manner. This is called the classical approach. The classical approach to fraud
identification relies on creation of explicit rules (IF-THEN-ELSE IF-…) based on the recommendation
of experts. These rules are developed and modified through their collective field experiences..
SOCIAL NETWORK ANALYSIS METHOD
➢ The optimal way to stop such crimes is to discern them before it finds its next victim. To do so
FRAUD DETECTION and ANALYSIS comes into picture. It is imperative for the investigator to
draw out the network using such connections to get to the root of this fraud. Rarely does an
investigator look across product lines to identify fraudulent connections.
➢ However, with the introduction of social network analysis (SNA), investigators are now able to
detect data patterns. Social Network Analysis is a technique which represents the entities as nodes
and relationships between the entities as links. Representing the relationships reveals a lot more
information than simply listing out the properties of the entities.
SOCIAL NETWORK ANALYSIS METHOD
At a basic level, a social network consists of nodes (vertices) that are connected to other related
nodes by links (relationships). The connection between two nodes is called an edge. If all the nodes
in a social network are connected to each other, it is called a fully-connected network. A path refers
to a collection of nodes that are connected by a link. The diagrams below show three simple
variations of a financial fraud social network
SOCIAL NETWORK ANALYSIS METHOD
Density and Centrality
● Density is the general level of linkage among the social network nodes. It is defined as the
number of edges in a portion of a social network to the maximum number of edges that
theoretically make up the social network.
Density= C/(n (n-1)/2)
● The following formula is used to calculate the relative density of a portion of a social network.
C is the number of observed edges and n the total number of nodes in the social network. n(n-
1)/2 gives us the theoretical maximum number of edges that are possible in a given social
network.
Density measures can take any value between [0,1], with 0 representing the least
density and 1 the maximum density.
SOCIAL NETWORK ANALYSIS METHOD
Centrality
Centrality is the measure of closeness of a node to the center(s) of high
activity in a network and implies the structural importance of the node in the
network. Centrality can be measured by degree, closeness and betweenness
❖ Degree is the direct count of the number of connections a node has to
other nodes. A higher degree value compared to peers denotes higher
influence in the network.
❖ Closeness focuses on the overall closeness of a node to all other nodes
in the network. The closeness of a node gives it quicker access to all
other nodes in the network.
❖ Betweenness measures the extent of a node’s placement on the shortest
path between other pairs of nodes in the network.
HOW SNA IS IMPLEMENTED
A Bank specializes in financing vehicle dealers and charges an interest whose
rate progresses from 3, 6, 12, 24 and 36 months for each financed account
Bank Observations:
● The bank identified that most dealers closed their accounts between 3rd and
the 6th month.
● Further investigation showed that the cars associated with the closed
accounts appeared again in new accounts opened by other dealers following
a short time gap.
● It became obvious that there was an elaborate system of collaboration
between the dealers to avoid paying higher interest rates
HOW SNA IS IMPLEMENTED
1. Nodes: These are the suspect dealers which are selected based on the criteria
mentioned.
1. Linkages: This was recursively expanded using the snowball method to include all their
accounts and the cars involved.
1. Clusters: After diffusing the account and car nodes, the fraudulent relationships between
dealers were identified as clusters.
HOW SNA IS IMPLEMENTED
How SNA was used here
1. Density measures were applied to the network component to identify the clusters with
high fraudulent activity.
1. The identified clusters were subjected to centrality measures to identify key actors
within each cluster.
1. As a mitigating measure the bank took a proactive step to confront the involved
dealers and break up the identified fraud clusters.
1. A new dealer can now be easily placed in a cluster depending on his fraudulent
nature
NEO4J GRAPH ALGORITHM
NEO4J Graph algorithms provide one of the most potent approaches to analyzing
connected data because their mathematical calculations are specifically built to operate
on relationships. Its Data science library consists implementation of:
● Path Finding - these algorithms help find the shortest path or evaluate the availability and
quality of routes
● Centrality - these algorithms determine the importance of distinct nodes in a network
● Community Detection - these algorithms evaluate how a group is clustered or
partitioned, as well as its tendency to strengthen or break apart
● Similarity - these algorithms help calculate the similarity of nodes
● Link Prediction - these algorithms determine the closeness of pairs of nodes
● Node Embeddings - these algorithms compute vector representations of nodes in a
graph.
● Node Classification - this algorithm uses machine learning to predict the classification of
nodes.
THANK YOU

More Related Content

PPTX
Financial Network Analysis - Seminar at IBM Watson Labs 7 April 2011
PPT
5 Structural Holes
PPTX
Clickstream ppt copy
PDF
Crime Data Analysis, Visualization and Prediction using Data Mining
PPTX
Network Modeling 101 - Applications to the banking industry
PDF
F0352033038
PDF
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
PDF
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
Financial Network Analysis - Seminar at IBM Watson Labs 7 April 2011
5 Structural Holes
Clickstream ppt copy
Crime Data Analysis, Visualization and Prediction using Data Mining
Network Modeling 101 - Applications to the banking industry
F0352033038
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS

Similar to Use of social network in detecting financial frauds (20)

PDF
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
PDF
H030101043047
PDF
An updated look at social network extraction system a personal data analysis ...
PDF
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
PDF
Meta Classification Technique for Improving Credit Card Fraud Detection
PDF
IRJET- Credit Card Fraud Detection Analysis
PDF
Detecting Suspicious Accounts in Money Laundering
PDF
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
PPTX
Social Network Analysis (SNA) 2018
PDF
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
PDF
Trust based security in manet
PDF
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
PDF
LNAI 3191 Multi agent Systems and Distributed Data Mining 1st Edition by Chri...
PDF
LNAI 3191 Multi agent Systems and Distributed Data Mining 1st Edition by Chri...
PDF
Graph Data Science DEMO for fraud analysis
PDF
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
PPTX
credit card fraud detection using machine learning.pptx
PDF
Agent basedqos
PDF
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
PDF
Cyber bullying detection and analysis.ppt.pdf
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
H030101043047
An updated look at social network extraction system a personal data analysis ...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Meta Classification Technique for Improving Credit Card Fraud Detection
IRJET- Credit Card Fraud Detection Analysis
Detecting Suspicious Accounts in Money Laundering
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
Social Network Analysis (SNA) 2018
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
Trust based security in manet
Tanvi_Sharma_Shruti_Garg_pre.pdf.pdf
LNAI 3191 Multi agent Systems and Distributed Data Mining 1st Edition by Chri...
LNAI 3191 Multi agent Systems and Distributed Data Mining 1st Edition by Chri...
Graph Data Science DEMO for fraud analysis
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
credit card fraud detection using machine learning.pptx
Agent basedqos
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Cyber bullying detection and analysis.ppt.pdf
Ad

Recently uploaded (20)

PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPTX
Computer network topology notes for revision
PPTX
Supervised vs unsupervised machine learning algorithms
PDF
Fluorescence-microscope_Botany_detailed content
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PDF
Foundation of Data Science unit number two notes
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
Introduction to machine learning and Linear Models
PPT
Reliability_Chapter_ presentation 1221.5784
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
IB Computer Science - Internal Assessment.pptx
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PDF
Lecture1 pattern recognition............
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
climate analysis of Dhaka ,Banglades.pptx
Business Ppt On Nestle.pptx huunnnhhgfvu
Computer network topology notes for revision
Supervised vs unsupervised machine learning algorithms
Fluorescence-microscope_Botany_detailed content
Miokarditis (Inflamasi pada Otot Jantung)
Foundation of Data Science unit number two notes
STUDY DESIGN details- Lt Col Maksud (21).pptx
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
Introduction to machine learning and Linear Models
Reliability_Chapter_ presentation 1221.5784
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
Introduction-to-Cloud-ComputingFinal.pptx
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
IB Computer Science - Internal Assessment.pptx
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Lecture1 pattern recognition............
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
climate analysis of Dhaka ,Banglades.pptx
Ad

Use of social network in detecting financial frauds

  • 1. USE OF SOCIAL NETWORK IN DETECTING FINANCIAL FRAUDS SARTHAK DASGUPTA RAHUL KUMAR SHIRNET ROHIT KUMAR SINGH
  • 2. INTRODUCTION ➢ Financial fraud happens when someone misleads you into some malicious and deceptive scheme and harms your financial well being by acquiring important details to take your money. Most victims who loose their money are unable to recover it. That is why taking serious measures to curb this kind of activities has become imperative. ➢ The impact of fraud on organizations is becoming increasingly costly. Every year financial institutions lose millions of dollars in revenue to systematic fraud. The emergence of new technologies and forms of payments, as well as sophistication in fraud, complicate the challenges faced by organizations in creating effective fraud detection strategies.
  • 3. CLASSICAL APPROACH The ability to link multiple data sources, analyze large volumes of data, and apply newer algorithms on the transactions, provide organizations an opportunity to capture, and sometimes predict, fraud in a more efficient manner. This is called the classical approach. The classical approach to fraud identification relies on creation of explicit rules (IF-THEN-ELSE IF-…) based on the recommendation of experts. These rules are developed and modified through their collective field experiences..
  • 4. SOCIAL NETWORK ANALYSIS METHOD ➢ The optimal way to stop such crimes is to discern them before it finds its next victim. To do so FRAUD DETECTION and ANALYSIS comes into picture. It is imperative for the investigator to draw out the network using such connections to get to the root of this fraud. Rarely does an investigator look across product lines to identify fraudulent connections. ➢ However, with the introduction of social network analysis (SNA), investigators are now able to detect data patterns. Social Network Analysis is a technique which represents the entities as nodes and relationships between the entities as links. Representing the relationships reveals a lot more information than simply listing out the properties of the entities.
  • 5. SOCIAL NETWORK ANALYSIS METHOD At a basic level, a social network consists of nodes (vertices) that are connected to other related nodes by links (relationships). The connection between two nodes is called an edge. If all the nodes in a social network are connected to each other, it is called a fully-connected network. A path refers to a collection of nodes that are connected by a link. The diagrams below show three simple variations of a financial fraud social network
  • 6. SOCIAL NETWORK ANALYSIS METHOD Density and Centrality ● Density is the general level of linkage among the social network nodes. It is defined as the number of edges in a portion of a social network to the maximum number of edges that theoretically make up the social network. Density= C/(n (n-1)/2) ● The following formula is used to calculate the relative density of a portion of a social network. C is the number of observed edges and n the total number of nodes in the social network. n(n- 1)/2 gives us the theoretical maximum number of edges that are possible in a given social network. Density measures can take any value between [0,1], with 0 representing the least density and 1 the maximum density.
  • 7. SOCIAL NETWORK ANALYSIS METHOD Centrality Centrality is the measure of closeness of a node to the center(s) of high activity in a network and implies the structural importance of the node in the network. Centrality can be measured by degree, closeness and betweenness ❖ Degree is the direct count of the number of connections a node has to other nodes. A higher degree value compared to peers denotes higher influence in the network. ❖ Closeness focuses on the overall closeness of a node to all other nodes in the network. The closeness of a node gives it quicker access to all other nodes in the network. ❖ Betweenness measures the extent of a node’s placement on the shortest path between other pairs of nodes in the network.
  • 8. HOW SNA IS IMPLEMENTED A Bank specializes in financing vehicle dealers and charges an interest whose rate progresses from 3, 6, 12, 24 and 36 months for each financed account Bank Observations: ● The bank identified that most dealers closed their accounts between 3rd and the 6th month. ● Further investigation showed that the cars associated with the closed accounts appeared again in new accounts opened by other dealers following a short time gap. ● It became obvious that there was an elaborate system of collaboration between the dealers to avoid paying higher interest rates
  • 9. HOW SNA IS IMPLEMENTED 1. Nodes: These are the suspect dealers which are selected based on the criteria mentioned. 1. Linkages: This was recursively expanded using the snowball method to include all their accounts and the cars involved. 1. Clusters: After diffusing the account and car nodes, the fraudulent relationships between dealers were identified as clusters.
  • 10. HOW SNA IS IMPLEMENTED How SNA was used here 1. Density measures were applied to the network component to identify the clusters with high fraudulent activity. 1. The identified clusters were subjected to centrality measures to identify key actors within each cluster. 1. As a mitigating measure the bank took a proactive step to confront the involved dealers and break up the identified fraud clusters. 1. A new dealer can now be easily placed in a cluster depending on his fraudulent nature
  • 11. NEO4J GRAPH ALGORITHM NEO4J Graph algorithms provide one of the most potent approaches to analyzing connected data because their mathematical calculations are specifically built to operate on relationships. Its Data science library consists implementation of: ● Path Finding - these algorithms help find the shortest path or evaluate the availability and quality of routes ● Centrality - these algorithms determine the importance of distinct nodes in a network ● Community Detection - these algorithms evaluate how a group is clustered or partitioned, as well as its tendency to strengthen or break apart ● Similarity - these algorithms help calculate the similarity of nodes ● Link Prediction - these algorithms determine the closeness of pairs of nodes ● Node Embeddings - these algorithms compute vector representations of nodes in a graph. ● Node Classification - this algorithm uses machine learning to predict the classification of nodes.