SlideShare a Scribd company logo
SAS founded in 2013 in Paris | http://linkurio.us | @linkurious
How to identify
reshipping scams
with Neo4j.
Introduction.
CMO
>5 years in consulting
MSc Political sciences
and Competitive
Intelligence
Jean
Villedieu
Sébastien
Heymann
CEO
Gephi Founder
Phd in Computer
Science and Complex
Systems
Linkurious is a French
startup founded in 2013.
Father Of
Father Of
Siblings
What is a graph ?
This is a graph.
Father Of
Father Of
Siblings
This is a node
This is a
relationship
What is a graph ? / Nodes & relationshipsWhat is a graph : nodes and relationships.
A graph is a set of nodes
linked by relationships.
Some of the domains in which
our customers use graphs.
People, objects, movies,
restaurants, music…
Suggest new contacts, help
discover new music
Antennas, servers, phones,
people…
Diminish network outages
Supplier, roads, warehouses,
products…
Diminish transportation cost,
optimize delivery
Supply chains Social networks Communications
Differents domains where graphs are important.
The accomplice reships the
goods to the fraudster. The
fraudster sells the goods for
$.
He uses the credit cards to
buy goods on a website. He
has the goods shipped to an
accomplice.
Reshipping is used to launder
money.
A scammer steals a few
credit cards and wants to
turn it into $.
Steal credit
cards
Order goods
online
Sell the
goods
What i s reshipping.
The accomplice is sometimes a victim too..
The accomplice may think he
is doing a normal job.
Reshipping protects the
criminals.
Why use reshipping.
It is worth taking time and efforts to setup a reshipping network if it helps
launder money without getting caught.
Online fraud cost $3.5 billion per year to e-retailers.
Source : http://www.internetretailer.com/2013/03/28/online-fraud-costs-e-retailers-35-billion-2012
$3.5 billion
The cost of fraud for ecommerce 1/2.
Merchants pay $3.10 in
costs (replacements and
fees) for each dollar of
fraud losses they incur.
The cost of fraud for ecommerce 2/2.
Source : http://www.trulioo.com/blog/2014/05/13/social-login-as-an-added-measure-for-e-commerce-fraud/
How to make sense of complex data.
Is it possible for e-
retailers to identify
reshipping scams?
What is a graph ? / Nodes & relationshipsA graph data model for the ecommerce orders.
date :
11/08/2014
items : Laptop,
gifcard
amount : $878
IS_USED_FOR
Main Street
(Street)
Address 1
(Address)
San
Francisco
(City)
USA
(Country)
Order 1
(Transaction)
214.77.224.225
(IP_Address)
Address 2
(Address)
Detroit
(City)
Folsom Street
(Street)
Lagos
(City)
Nigeria
(Country)
IS_BILLING_ADDRESS
IS_SHIPPING_ADDRESS
IS_LOCATED_IN IS_LOCATED_IN
IS_LOCATED_IN IS_LOCATED_IN
IS_LOCATED_IN IS_LOCATED_IN
IS_LOCATED_IN
IS_LOCATED_IN
I’m particularly interested in orders where the billing
address, the shipping address and the location of the
IP address point in different directions ! Can we find
these?
A fraud expert designs a fraud
detection pattern.
Designing a fraud detection pattern.
The pattern is translated in a
graph language.
Looking for the pattern.
MATCH (a:Transaction)-[r*2..3]-(b:City)
WITH a, COUNT(DISTINCT b) AS group_size, COLLECT(DISTINCT b) AS cities
WHERE group_size > 2
RETURN a, cities
A graph database handles the
data analysis at scale.
We use Neo4j to store and analyse the data.
ETL
Traditional
databases.
Graph
database.
The graph databases helps store the data from various sources and analyse it in real-time to
identify potential fraud cases.
Visualization helps analyse the results.
ETL API
Traditional
database.
Graph
database.
Graph
visualization.
Graph visualization is used to
investigate the suspicious
cases.
Graph visualization solutions like Linkurious help data analysts investigate graph data faster.
Visualizing suspicious fraud cases.
The countries are in dark green, the cities in blue, the IP address in red, the street in orange, the
orders (with their date) in light green and the addresses in asparagus.
It seems a Nigerian scammer is using stolen credit
cards on our website. He has enrolled the help of
someone from Boston. We should :
- stop the transactions they are involved in ;
- ban these users and their IP addresses ;
- warn the credit card holders ;
- contact the authorities ;
The analyst turns the alert into
actions to stop the fraud.
Turning data into action.
● This is an illustration of the potential of graphs. In the real world we’d use
more advanced techniques (ex : to handle proxies).
● Address analysis has to be combined with other fraud detection
mechanisms (ex : credit card verification).
● Only a subset of the fraudulent transactions can be inspected by a human.
● Graph-based fraud detection can be applied in other domains.
Graphs are great for fraud
detection.
Beyond that example.
You can do it too!
Try Linkurious.
Contact us to discuss your projects
at contact@linkurio.us
Conclusion
GraphGist : http://gist.neo4j.org/?6873cf244c0611533029
Blog post on reshipping : https://linkurio.us/reshipping-scams-and-network-
visualization
Sample dataset : https://www.dropbox.com/s/aca6rhmz7vx2hgp/reshipping%
20scam%20dataset.zip
Additional resources.

More Related Content

PDF
Bringing graph technologies to data analysis : the case of Azerbaijan in th...
PDF
VAT fraud detection : the mysterious case of the missing trader
PDF
Using graph technologies to fight fraud
PDF
How to use graphs to identify credit card thieves?
PDF
Fraud detection, whiplash for cash scheme and Neo4j
PDF
Visualizing an anti-money laundering investigation
PDF
3 types of fraud graph analytics can help defeat
PDF
Gov.uk Verify - The Journey So Far
Bringing graph technologies to data analysis : the case of Azerbaijan in th...
VAT fraud detection : the mysterious case of the missing trader
Using graph technologies to fight fraud
How to use graphs to identify credit card thieves?
Fraud detection, whiplash for cash scheme and Neo4j
Visualizing an anti-money laundering investigation
3 types of fraud graph analytics can help defeat
Gov.uk Verify - The Journey So Far

Viewers also liked (17)

PDF
Cyber security and attack analysis : how Cisco uses graph analytics
PDF
How to apply graphs to network management
PDF
Sugar scam of Maharashtra
PDF
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
PDF
Enterprise Vulnerability Management - ZeroNights16
PPTX
Vulnerability Intelligence and Assessment with vulners.com
PDF
Online Scams and Frauds
PPTX
Big Data Analytics for Cyber Security: A Quick Overview
PPTX
Survey: Security Analytics and Intelligence
PPTX
Coal Scam
PPTX
Presentation on KETAN PAREKH Scam
PPTX
Corporate Scam,Chit fund(Saradha scam) & Corporate Governance
PPT
Info Security - Vulnerability Assessment
PPTX
2G spectrum scam
PPTX
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
PPTX
Graphs ppt
PPT
P H I S H I N G
Cyber security and attack analysis : how Cisco uses graph analytics
How to apply graphs to network management
Sugar scam of Maharashtra
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
Enterprise Vulnerability Management - ZeroNights16
Vulnerability Intelligence and Assessment with vulners.com
Online Scams and Frauds
Big Data Analytics for Cyber Security: A Quick Overview
Survey: Security Analytics and Intelligence
Coal Scam
Presentation on KETAN PAREKH Scam
Corporate Scam,Chit fund(Saradha scam) & Corporate Governance
Info Security - Vulnerability Assessment
2G spectrum scam
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
Graphs ppt
P H I S H I N G
Ad

Similar to How to identify reshipping scams with Neo4j (20)

PDF
Detecting eCommerce Fraud with Neo4j and Linkurious
PDF
Graphs in Action
PPTX
Applying Network Analytics in KYC
PDF
Neo4j im Einsatz gegen Geldwäsche und Finanzbetrug - Teil 2
PDF
Neo4j Top Casi d’Uso
PDF
The Case for Graphs in AML
PDF
GraphDay Stockholm - Graphs in the Real World: Top Use Cases for Graph Databases
PDF
Webinar: Stop Complex Fraud in its Tracks with Neo4j
PDF
A visual approach to fraud detection and investigation - Giuseppe Francavilla
PDF
Kick start graph visualization projects
PDF
Build Intelligent Fraud Prevention with Machine Learning and Graphs
PPTX
GraphTalk München - Einführung in Graphdatenbanken
PDF
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
PDF
Fighting Fraud with Neo4j, Kees Vegter
PDF
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
PDF
Understanding the impact of your fraud strategy
PDF
The Case for Graphs in Supply Chains
PPTX
Easily Identify Sources of Supply Chain Gridlock
PDF
Leveraging Graph Analytics for Fraud Detection in PaySim Data
PPTX
NYC Meetup - Riskified
Detecting eCommerce Fraud with Neo4j and Linkurious
Graphs in Action
Applying Network Analytics in KYC
Neo4j im Einsatz gegen Geldwäsche und Finanzbetrug - Teil 2
Neo4j Top Casi d’Uso
The Case for Graphs in AML
GraphDay Stockholm - Graphs in the Real World: Top Use Cases for Graph Databases
Webinar: Stop Complex Fraud in its Tracks with Neo4j
A visual approach to fraud detection and investigation - Giuseppe Francavilla
Kick start graph visualization projects
Build Intelligent Fraud Prevention with Machine Learning and Graphs
GraphTalk München - Einführung in Graphdatenbanken
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Fighting Fraud with Neo4j, Kees Vegter
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
Understanding the impact of your fraud strategy
The Case for Graphs in Supply Chains
Easily Identify Sources of Supply Chain Gridlock
Leveraging Graph Analytics for Fraud Detection in PaySim Data
NYC Meetup - Riskified
Ad

More from Linkurious (20)

PDF
Using graph technology for multi-INT investigations
PPTX
Webinar: What's new in Linkurious Enterprise 2.8
PDF
Graph-based intelligence analysis
PDF
What's new in Linkurious Enterprise 2.7
PDF
How to visualize Cosmos DB graph data
PDF
GraphTech Ecosystem - part 3: Graph Visualization
PDF
Getting started with Cosmos DB + Linkurious Enterprise
PDF
GraphTech Ecosystem - part 2: Graph Analytics
PDF
GraphTech Ecosystem - part 1: Graph Databases
PDF
Graph analytics in Linkurious Enterprise
PDF
Graph technology and data-journalism: the case of the Paradise Papers
PDF
Visualize the Knowledge Graph and Unleash Your Data
PDF
Graph-based Product Lifecycle Management
PDF
Fraudes Financières: Méthodes de Prévention et Détection
PDF
Detecting eCommerce Fraud with Neo4j and Linkurious
PDF
Graph-based Network & IT Management.
PDF
Graph-powered data lineage in Finance
PDF
Using Linkurious in your Enterprise Architecture projects
PDF
Linkurious SDK: Build enterprise-ready graph applications faster
PDF
Fighting financial crime with graph analysis at BIWA Summit 2017
Using graph technology for multi-INT investigations
Webinar: What's new in Linkurious Enterprise 2.8
Graph-based intelligence analysis
What's new in Linkurious Enterprise 2.7
How to visualize Cosmos DB graph data
GraphTech Ecosystem - part 3: Graph Visualization
Getting started with Cosmos DB + Linkurious Enterprise
GraphTech Ecosystem - part 2: Graph Analytics
GraphTech Ecosystem - part 1: Graph Databases
Graph analytics in Linkurious Enterprise
Graph technology and data-journalism: the case of the Paradise Papers
Visualize the Knowledge Graph and Unleash Your Data
Graph-based Product Lifecycle Management
Fraudes Financières: Méthodes de Prévention et Détection
Detecting eCommerce Fraud with Neo4j and Linkurious
Graph-based Network & IT Management.
Graph-powered data lineage in Finance
Using Linkurious in your Enterprise Architecture projects
Linkurious SDK: Build enterprise-ready graph applications faster
Fighting financial crime with graph analysis at BIWA Summit 2017

How to identify reshipping scams with Neo4j

  • 1. SAS founded in 2013 in Paris | http://linkurio.us | @linkurious How to identify reshipping scams with Neo4j.
  • 2. Introduction. CMO >5 years in consulting MSc Political sciences and Competitive Intelligence Jean Villedieu Sébastien Heymann CEO Gephi Founder Phd in Computer Science and Complex Systems Linkurious is a French startup founded in 2013.
  • 3. Father Of Father Of Siblings What is a graph ? This is a graph.
  • 4. Father Of Father Of Siblings This is a node This is a relationship What is a graph ? / Nodes & relationshipsWhat is a graph : nodes and relationships. A graph is a set of nodes linked by relationships.
  • 5. Some of the domains in which our customers use graphs. People, objects, movies, restaurants, music… Suggest new contacts, help discover new music Antennas, servers, phones, people… Diminish network outages Supplier, roads, warehouses, products… Diminish transportation cost, optimize delivery Supply chains Social networks Communications Differents domains where graphs are important.
  • 6. The accomplice reships the goods to the fraudster. The fraudster sells the goods for $. He uses the credit cards to buy goods on a website. He has the goods shipped to an accomplice. Reshipping is used to launder money. A scammer steals a few credit cards and wants to turn it into $. Steal credit cards Order goods online Sell the goods What i s reshipping.
  • 7. The accomplice is sometimes a victim too.. The accomplice may think he is doing a normal job.
  • 8. Reshipping protects the criminals. Why use reshipping. It is worth taking time and efforts to setup a reshipping network if it helps launder money without getting caught.
  • 9. Online fraud cost $3.5 billion per year to e-retailers. Source : http://www.internetretailer.com/2013/03/28/online-fraud-costs-e-retailers-35-billion-2012 $3.5 billion The cost of fraud for ecommerce 1/2.
  • 10. Merchants pay $3.10 in costs (replacements and fees) for each dollar of fraud losses they incur. The cost of fraud for ecommerce 2/2. Source : http://www.trulioo.com/blog/2014/05/13/social-login-as-an-added-measure-for-e-commerce-fraud/
  • 11. How to make sense of complex data. Is it possible for e- retailers to identify reshipping scams?
  • 12. What is a graph ? / Nodes & relationshipsA graph data model for the ecommerce orders. date : 11/08/2014 items : Laptop, gifcard amount : $878 IS_USED_FOR Main Street (Street) Address 1 (Address) San Francisco (City) USA (Country) Order 1 (Transaction) 214.77.224.225 (IP_Address) Address 2 (Address) Detroit (City) Folsom Street (Street) Lagos (City) Nigeria (Country) IS_BILLING_ADDRESS IS_SHIPPING_ADDRESS IS_LOCATED_IN IS_LOCATED_IN IS_LOCATED_IN IS_LOCATED_IN IS_LOCATED_IN IS_LOCATED_IN IS_LOCATED_IN IS_LOCATED_IN
  • 13. I’m particularly interested in orders where the billing address, the shipping address and the location of the IP address point in different directions ! Can we find these? A fraud expert designs a fraud detection pattern. Designing a fraud detection pattern.
  • 14. The pattern is translated in a graph language. Looking for the pattern. MATCH (a:Transaction)-[r*2..3]-(b:City) WITH a, COUNT(DISTINCT b) AS group_size, COLLECT(DISTINCT b) AS cities WHERE group_size > 2 RETURN a, cities
  • 15. A graph database handles the data analysis at scale. We use Neo4j to store and analyse the data. ETL Traditional databases. Graph database. The graph databases helps store the data from various sources and analyse it in real-time to identify potential fraud cases.
  • 16. Visualization helps analyse the results. ETL API Traditional database. Graph database. Graph visualization. Graph visualization is used to investigate the suspicious cases. Graph visualization solutions like Linkurious help data analysts investigate graph data faster.
  • 17. Visualizing suspicious fraud cases. The countries are in dark green, the cities in blue, the IP address in red, the street in orange, the orders (with their date) in light green and the addresses in asparagus.
  • 18. It seems a Nigerian scammer is using stolen credit cards on our website. He has enrolled the help of someone from Boston. We should : - stop the transactions they are involved in ; - ban these users and their IP addresses ; - warn the credit card holders ; - contact the authorities ; The analyst turns the alert into actions to stop the fraud. Turning data into action.
  • 19. ● This is an illustration of the potential of graphs. In the real world we’d use more advanced techniques (ex : to handle proxies). ● Address analysis has to be combined with other fraud detection mechanisms (ex : credit card verification). ● Only a subset of the fraudulent transactions can be inspected by a human. ● Graph-based fraud detection can be applied in other domains. Graphs are great for fraud detection. Beyond that example.
  • 20. You can do it too! Try Linkurious.
  • 21. Contact us to discuss your projects at contact@linkurio.us Conclusion
  • 22. GraphGist : http://gist.neo4j.org/?6873cf244c0611533029 Blog post on reshipping : https://linkurio.us/reshipping-scams-and-network- visualization Sample dataset : https://www.dropbox.com/s/aca6rhmz7vx2hgp/reshipping% 20scam%20dataset.zip Additional resources.