SlideShare a Scribd company logo
3 types of fraud graph
analytics can help defeat
1. Insurance fraud
2. Credit card fraud
3. VAT fraud
Detecting fraud is about connecting the dots
But today’s applications fall short on more complex analysis that would imply
several levels of relationships or data types
RELATIONAL
DATABASE
❌
In graph databases, connections are stored as 1st-class citizens, making it an
interesting model for investigations.
GRAPH
DATABASE
✔
1) Insurance fraud
In insurance fraud, people team up to put together a fake road traffic accident
claim reporting light personal injuries.
Insurance
companyInjury
claim
Injury
claim
Injury
claim
Staged
accident
Staged
accident
Staged
accident
Fraudster
ring
The graph approach brings data from various sources under a common model.
Investigators look at all the data together, instead of isolated data silos.
Graph visualization of two customers (blue nodes)
file three claims (green nodes). We identify a
network of three customers connected through
personal information such as phone (brown nodes),
email (pink nodes) with the same lawyer (green
node) involved every time. It is likely they are
recycling stolen or fake identity to file fraudulent
claims.
2) Credit card fraud
Payment card fraud takes the form of criminals getting ahold of credit card
information and proceeding to create unauthorized transactions.
Compromised
ATM
Counterfeit
card
Counterfeit
card
Fraudster
Counterfeit
card
Shop
Shop
Graphs help identify the common point of compromise by highlighting the
common links, no matter how large the dataset is.
Graph visualization to identify a common point of
compromise ATM: Clients (blue nodes), report
fraudulent purchases (orange nodes). We can
identify through connections the common ATM
(purple) where they made a withdrawal before the
card fraud.
3) VAT fraud
Carousel fraud, or VAT fraud, is the theft of VAT collected on the sale of goods
initially bought VAT-free in another jurisdiction.
Company A Company B
Disappear
Company C
VAT refund
€ €
€
Sell goods
VAT free
Sell goods,
charges VAT
Graphs help identify the common point of compromise by highlighting the
common links, no matter how large the dataset is.
Graph visualization to identify chains of transactions
in VAT fraud: Companies (blue nodes) and their
parent organizations (flags nodes) sell goods
VAT-free and collect back VAT through complex
layers of sales between EU and non-EU countries.
Organizations use Linkurious Enterprise to
fight fraud across activity sectors:
insurance, banking, law enforcement or
financial administrations.
www.linkurio.us
contact@linkurio.us

More Related Content

PPTX
Fraud Prevention in International Commerce
PPT
Ian Broadbent: Crime on the increase as the recession takes hold
PDF
Marco Konopacki talks about Mudamos at TICTeC 2018
PDF
VAT fraud detection : the mysterious case of the missing trader
PDF
Using graph technologies to fight fraud
PDF
How to apply graph analytics for bank loan fraud detection?
PDF
Transform Your Financial Crime Detection with Advanced Graph Analytics
PPTX
Webinar: Fighting Fraud with Graph Databases
Fraud Prevention in International Commerce
Ian Broadbent: Crime on the increase as the recession takes hold
Marco Konopacki talks about Mudamos at TICTeC 2018
VAT fraud detection : the mysterious case of the missing trader
Using graph technologies to fight fraud
How to apply graph analytics for bank loan fraud detection?
Transform Your Financial Crime Detection with Advanced Graph Analytics
Webinar: Fighting Fraud with Graph Databases

Similar to 3 types of fraud graph analytics can help defeat (20)

PDF
How to use graphs to identify credit card thieves?
PDF
A visual approach to fraud detection and investigation - Giuseppe Francavilla
PPTX
Follow the wizard to select the database schema you want to diagram
PPTX
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
PDF
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
PDF
Build Intelligent Fraud Prevention with Machine Learning and Graphs
PDF
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
PDF
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
PDF
Deloitte - Relationship Analysis as Key to Financial Crime Prevention
PPTX
Smarter Fraud Detection With Graph Data Science
PDF
Webinar: Stop Complex Fraud in its Tracks with Neo4j
PDF
Graph+AI for Fin. Services
PDF
Kick start graph visualization projects
PDF
Credit Fraud Prevention with Spark and Graph Analysis
PDF
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
PDF
GraphTalks Italy - Using graphs to fight financial fraud
PDF
10 Pro Fraud Detection Strategies for Business in 2024 | Insider Market Research
PDF
201411203 goto night on graphs for fraud detection
PDF
Detecting eCommerce Fraud with Neo4j and Linkurious
PDF
Fraud detection, whiplash for cash scheme and Neo4j
How to use graphs to identify credit card thieves?
A visual approach to fraud detection and investigation - Giuseppe Francavilla
Follow the wizard to select the database schema you want to diagram
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Build Intelligent Fraud Prevention with Machine Learning and Graphs
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Deloitte - Relationship Analysis as Key to Financial Crime Prevention
Smarter Fraud Detection With Graph Data Science
Webinar: Stop Complex Fraud in its Tracks with Neo4j
Graph+AI for Fin. Services
Kick start graph visualization projects
Credit Fraud Prevention with Spark and Graph Analysis
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
GraphTalks Italy - Using graphs to fight financial fraud
10 Pro Fraud Detection Strategies for Business in 2024 | Insider Market Research
201411203 goto night on graphs for fraud detection
Detecting eCommerce Fraud with Neo4j and Linkurious
Fraud detection, whiplash for cash scheme and Neo4j
Ad

More from Linkurious (20)

PDF
Using graph technology for multi-INT investigations
PPTX
Webinar: What's new in Linkurious Enterprise 2.8
PDF
Graph-based intelligence analysis
PDF
What's new in Linkurious Enterprise 2.7
PDF
How to visualize Cosmos DB graph data
PDF
GraphTech Ecosystem - part 3: Graph Visualization
PDF
Getting started with Cosmos DB + Linkurious Enterprise
PDF
GraphTech Ecosystem - part 2: Graph Analytics
PDF
GraphTech Ecosystem - part 1: Graph Databases
PDF
Graph analytics in Linkurious Enterprise
PDF
Graph technology and data-journalism: the case of the Paradise Papers
PDF
Visualize the Knowledge Graph and Unleash Your Data
PDF
Graph-based Product Lifecycle Management
PDF
Fraudes Financières: Méthodes de Prévention et Détection
PDF
Detecting eCommerce Fraud with Neo4j and Linkurious
PDF
Graph-based Network & IT Management.
PDF
Graph-powered data lineage in Finance
PDF
Using Linkurious in your Enterprise Architecture projects
PDF
Linkurious SDK: Build enterprise-ready graph applications faster
PDF
Fighting financial crime with graph analysis at BIWA Summit 2017
Using graph technology for multi-INT investigations
Webinar: What's new in Linkurious Enterprise 2.8
Graph-based intelligence analysis
What's new in Linkurious Enterprise 2.7
How to visualize Cosmos DB graph data
GraphTech Ecosystem - part 3: Graph Visualization
Getting started with Cosmos DB + Linkurious Enterprise
GraphTech Ecosystem - part 2: Graph Analytics
GraphTech Ecosystem - part 1: Graph Databases
Graph analytics in Linkurious Enterprise
Graph technology and data-journalism: the case of the Paradise Papers
Visualize the Knowledge Graph and Unleash Your Data
Graph-based Product Lifecycle Management
Fraudes Financières: Méthodes de Prévention et Détection
Detecting eCommerce Fraud with Neo4j and Linkurious
Graph-based Network & IT Management.
Graph-powered data lineage in Finance
Using Linkurious in your Enterprise Architecture projects
Linkurious SDK: Build enterprise-ready graph applications faster
Fighting financial crime with graph analysis at BIWA Summit 2017
Ad

Recently uploaded (20)

PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PPTX
Computer network topology notes for revision
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPT
Quality review (1)_presentation of this 21
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
1_Introduction to advance data techniques.pptx
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PDF
Fluorescence-microscope_Botany_detailed content
PPTX
IB Computer Science - Internal Assessment.pptx
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PDF
.pdf is not working space design for the following data for the following dat...
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
Introduction to Knowledge Engineering Part 1
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
Computer network topology notes for revision
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
Clinical guidelines as a resource for EBP(1).pdf
Quality review (1)_presentation of this 21
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
1_Introduction to advance data techniques.pptx
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
climate analysis of Dhaka ,Banglades.pptx
Qualitative Qantitative and Mixed Methods.pptx
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Fluorescence-microscope_Botany_detailed content
IB Computer Science - Internal Assessment.pptx
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
Data_Analytics_and_PowerBI_Presentation.pptx
.pdf is not working space design for the following data for the following dat...
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Introduction to Knowledge Engineering Part 1
STUDY DESIGN details- Lt Col Maksud (21).pptx
Business Ppt On Nestle.pptx huunnnhhgfvu

3 types of fraud graph analytics can help defeat

  • 1. 3 types of fraud graph analytics can help defeat
  • 2. 1. Insurance fraud 2. Credit card fraud 3. VAT fraud
  • 3. Detecting fraud is about connecting the dots
  • 4. But today’s applications fall short on more complex analysis that would imply several levels of relationships or data types RELATIONAL DATABASE ❌
  • 5. In graph databases, connections are stored as 1st-class citizens, making it an interesting model for investigations. GRAPH DATABASE ✔
  • 7. In insurance fraud, people team up to put together a fake road traffic accident claim reporting light personal injuries. Insurance companyInjury claim Injury claim Injury claim Staged accident Staged accident Staged accident Fraudster ring
  • 8. The graph approach brings data from various sources under a common model. Investigators look at all the data together, instead of isolated data silos. Graph visualization of two customers (blue nodes) file three claims (green nodes). We identify a network of three customers connected through personal information such as phone (brown nodes), email (pink nodes) with the same lawyer (green node) involved every time. It is likely they are recycling stolen or fake identity to file fraudulent claims.
  • 10. Payment card fraud takes the form of criminals getting ahold of credit card information and proceeding to create unauthorized transactions. Compromised ATM Counterfeit card Counterfeit card Fraudster Counterfeit card Shop Shop
  • 11. Graphs help identify the common point of compromise by highlighting the common links, no matter how large the dataset is. Graph visualization to identify a common point of compromise ATM: Clients (blue nodes), report fraudulent purchases (orange nodes). We can identify through connections the common ATM (purple) where they made a withdrawal before the card fraud.
  • 13. Carousel fraud, or VAT fraud, is the theft of VAT collected on the sale of goods initially bought VAT-free in another jurisdiction. Company A Company B Disappear Company C VAT refund € € € Sell goods VAT free Sell goods, charges VAT
  • 14. Graphs help identify the common point of compromise by highlighting the common links, no matter how large the dataset is. Graph visualization to identify chains of transactions in VAT fraud: Companies (blue nodes) and their parent organizations (flags nodes) sell goods VAT-free and collect back VAT through complex layers of sales between EU and non-EU countries.
  • 15. Organizations use Linkurious Enterprise to fight fraud across activity sectors: insurance, banking, law enforcement or financial administrations.