SlideShare a Scribd company logo
LEVERAGING GRAPH-TECHNOLOGY
TO FIGHT FINANCIAL FRAUD
AGENDA
• Meet today’s fraudsters
• Traditional fraud detection methods
• Using connected analysis for real-time fraud detection
• Demo
• Summary
Leveraging graph technology to fight financial fraud
The Impact of Fraud
The payment card fraud alone,
constitutes for over 16 billion dollar in
losses for the bank-sector in the US.
$16Bpayment card fraud in 2014*
Banking
$32Byearly e-commerce fraud**
Fraud in E-commerce is estimated
to cost over 32 billion dollars
annually is the US..
E-commerce
The impact of fraud on the insurance
industry is estimated to be $80
billion annually in the US.
Insurance
$80Bestimated yearly impact***
*) Business Wire: http://www.businesswire.com/news/home/20150804007054/en/Global-Card-Fraud-Losses-Reach-16.31-Billion#.VcJZlvlVhBc
**) E-commerce expert Andreas Thim, Klarna, 2015
***) Coalition against insurance fraud: http://www.insurancefraud.org/article.htm?RecID=3274#.UnWuZ5E7ROA
Leveraging graph technology to fight financial fraud
Who Are Today’s Fraudsters?
Organized in groups Synthetic Identities Stolen Identities
Who Are Today’s Fraudsters?
Hijacked Devices
“Don’t consider traditional
technology adequate to keep
up with criminal trends”
Market Guide for Online Fraud Detection, April 27, 2015
Endpoint-Centric
Analysis of users and
their end-points
1.
Navigation Centric
Analysis of
navigation behavior
and suspect
patterns
2.
Account-Centric
Analysis of anomaly
behavior by channel
3.
PC:s
Mobile Phones
IP-addresses
User ID:s
Comparing Transaction
Identity Vetting
Traditional Fraud Detection Methods
Unable to detect
• Fraud rings
• Fake IP-adresses
• Hijacked devices
• Synthetic Identities
• Stolen Identities
• And more…
Weaknesses
DISCRETE ANALYSIS
Endpoint-Centric
Analysis of users and
their end-points
1.
Navigation Centric
Analysis of
navigation behavior
and suspect
patterns
2.
Account-Centric
Analysis of anomaly
behavior by channel
3.
Traditional Fraud Detection Methods
INVESTIGATE
Revolving Debt
Number of Accounts
INVESTIGATE
Normal behavior
Fraud Detection With Discrete Analysis
Revolving Debt
Number of Accounts
Normal behavior
Fraud Detection With Connected Analysis
Fraudulent pattern
CONNECTED ANALYSIS
Augmented Fraud Detection
Endpoint-Centric
Analysis of users and
their end-points
Navigation Centric
Analysis of
navigation behavior
and suspect
patterns
Account-Centric
Analysis of anomaly
behavior by channel
DISCRETE ANALYSIS
1. 2. 3.
Cross Channel
Analysis of anomaly
behavior correlated
across channels
4.
Entity Linking
Analysis of
relationships to detect
organized crime and
collusion
5.
ACCOUNT
HOLDER 2
Modeling a fraud ring as a graph
ACCOUNT
HOLDER 1
ACCOUNT
HOLDER 3
ACCOUNT
HOLDER 2
Modeling a fraud ring as a graph
ACCOUNT
HOLDER 1
ACCOUNT
HOLDER 3
CREDIT
CARD
BANK
ACCOUNT
BANK
ACCOUNT
BANK
ACCOUNT
PHONE
NUMBER
UNSECURED
LOAN
SSN 2
UNSECURED
LOAN
ACCOUNT
HOLDER 2
Modeling a fraud ring as a graph
ACCOUNT
HOLDER 1
ACCOUNT
HOLDER 3
CREDIT
CARD
BANK
ACCOUNT
BANK
ACCOUNT
BANK
ACCOUNT
ADDRESS
PHONE
NUMBER
PHONE
NUMBER
SSN 2
UNSECURED
LOAN
SSN 2
UNSECURED
LOAN
ACCOUNT
HOLDER 2
Modeling a fraud ring as a graph
ACCOUNT
HOLDER 1
ACCOUNT
HOLDER 3
CREDIT
CARD
BANK
ACCOUNT
BANK
ACCOUNT
BANK
ACCOUNT
ADDRESS
PHONE
NUMBER
PHONE
NUMBER
SSN 2
UNSECURED
LOAN
SSN 2
UNSECURED
LOAN
SYNTETIC
PERSON 2
SYNTHETIC
PERSON 1
FRAUD DEMO
USING NEO4j FOR REAL-TIME
CONNECTED ANALYSIS
Account-Centric
Analysis of anomaly
behavior correlated
across channels
4.
Entity Linking
Analysis of
relationships to detect
organized crime and
collusion
5.
CONNECTED ANALYSIS
Endpoint-Centric
Analysis of users and
their end-points
Navigation Centric
Analysis of
navigation behavior
and suspect
patterns
Account-Centric
Analysis of anomaly
behavior by channel
DISCRETE ANALYSIS
1. 2. 3.
Augment Fraud Detection with Neo4j
Traditional Vendors
ACCEPT / DECLINE
MANUAL
User/Transaction
CONNECTED ANALYSIS
User/Transaction
ACCEPT / DECLINE(DISCRETE ANALYSIS) +
User/Transaction (sub-second performance to
any data size and connection)
ACCEPT / DECLINE
REAL TIME
TRADITIONAL VENDORS (DISCRETE ANALYSIS)
(DISCRETE ANALYSIS)
ACCEPT / DECLINE
How Neo4j fits in
Detect & prevent fraud in real-time
Faster credit risk analysis and transactions
Reduce chargebacks
Quickly adapt to new methods of fraud
Why Neo4j? Who’s using it?
Financial institutions use Neo4j to:
FINANCE Government Online Retail
• Today’s fraudsters are organized and highly sophisticated
• Legacy technology does not detect fraud sufficiently and in real-time
• Graph-databases enable you to discover fraudulent patterns in real-
time
• Augment your current fraud detection infrastructure with connected
analysis
KEY TAKE AWAYS
THANK YOU!

More Related Content

PDF
GraphTalks Italy - Using graphs to fight financial fraud
PDF
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
PDF
Fraud detection, whiplash for cash scheme and Neo4j
PDF
Apwg trends report_q3_2016
PDF
How to use graphs to identify credit card thieves?
PDF
PhishingandPharming
DOC
Cyber Fraud
PPTX
Cyber Crime
GraphTalks Italy - Using graphs to fight financial fraud
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
Fraud detection, whiplash for cash scheme and Neo4j
Apwg trends report_q3_2016
How to use graphs to identify credit card thieves?
PhishingandPharming
Cyber Fraud
Cyber Crime

Similar to Leveraging graph technology to fight financial fraud (20)

PDF
How to Build a Fraud Detection Solution with Neo4j
PPTX
Big data analytical driven fraud detection for finance; banks and insurance
PDF
Sas wp enterrprise fraud management
PDF
Build Intelligent Fraud Prevention with Machine Learning and Graphs
PDF
ATM Fraud Prevention Management White Paper from ESQ
PDF
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
PDF
Card Payment Fraud
PPTX
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
DOCX
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
PDF
Balancing Security and Customer Experience
PDF
Webinar: Stop Complex Fraud in its Tracks with Neo4j
PPTX
ATM Skimming in the Caribbean
PDF
A Practical Guide to Post-EMV Card Not Present Fraud
PDF
Review on Fraud Detection in Electronic Payment Gateway
DOCX
credit card fraud analysis using predictive modeling python project abstract
PDF
Enterprise Fraud Management
PPTX
Eight Months of EMV: Early Fraud Shifts and Trajectory
DOC
Atm theft
PDF
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
PPTX
cyber crime ppt Dr sandip kumar faculty, department of education, coleege of ...
How to Build a Fraud Detection Solution with Neo4j
Big data analytical driven fraud detection for finance; banks and insurance
Sas wp enterrprise fraud management
Build Intelligent Fraud Prevention with Machine Learning and Graphs
ATM Fraud Prevention Management White Paper from ESQ
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Card Payment Fraud
Know your Fraudster: Preparing for the Post EMV Card-Not-Present Fraud
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Balancing Security and Customer Experience
Webinar: Stop Complex Fraud in its Tracks with Neo4j
ATM Skimming in the Caribbean
A Practical Guide to Post-EMV Card Not Present Fraud
Review on Fraud Detection in Electronic Payment Gateway
credit card fraud analysis using predictive modeling python project abstract
Enterprise Fraud Management
Eight Months of EMV: Early Fraud Shifts and Trajectory
Atm theft
TestTestTestTestTestTestTestTestTestTestTestTestTestTestTestTest
cyber crime ppt Dr sandip kumar faculty, department of education, coleege of ...
Ad

More from Neo4j (20)

PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
PDF
Jin Foo - Prospa GraphSummit Sydney Presentation.pdf
PDF
GraphSummit Singapore Master Deck - May 20, 2025
PPTX
Graphs & GraphRAG - Essential Ingredients for GenAI
PPTX
Neo4j Knowledge for Customer Experience.pptx
PPTX
GraphTalk New Zealand - The Art of The Possible.pptx
PDF
Neo4j: The Art of the Possible with Graph
PDF
Smarter Knowledge Graphs For Public Sector
PDF
GraphRAG and Knowledge Graphs Exploring AI's Future
PDF
Matinée GenAI & GraphRAG Paris - Décembre 24
PDF
ANZ Presentation: GraphSummit Melbourne 2024
PDF
Google Cloud Presentation GraphSummit Melbourne 2024: Building Generative AI ...
PDF
Telstra Presentation GraphSummit Melbourne: Optimising Business Outcomes with...
PDF
Hands-On GraphRAG Workshop: GraphSummit Melbourne 2024
PDF
Démonstration Digital Twin Building Wire Management
PDF
Swiss Life - Les graphes au service de la détection de fraude dans le domaine...
PDF
Démonstration Supply Chain - GraphTalk Paris
PDF
The Art of Possible - GraphTalk Paris Opening Session
PPTX
How Siemens bolstered supply chain resilience with graph-powered AI insights ...
PDF
Knowledge Graphs for AI-Ready Data and Enterprise Deployment - Gartner IT Sym...
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Jin Foo - Prospa GraphSummit Sydney Presentation.pdf
GraphSummit Singapore Master Deck - May 20, 2025
Graphs & GraphRAG - Essential Ingredients for GenAI
Neo4j Knowledge for Customer Experience.pptx
GraphTalk New Zealand - The Art of The Possible.pptx
Neo4j: The Art of the Possible with Graph
Smarter Knowledge Graphs For Public Sector
GraphRAG and Knowledge Graphs Exploring AI's Future
Matinée GenAI & GraphRAG Paris - Décembre 24
ANZ Presentation: GraphSummit Melbourne 2024
Google Cloud Presentation GraphSummit Melbourne 2024: Building Generative AI ...
Telstra Presentation GraphSummit Melbourne: Optimising Business Outcomes with...
Hands-On GraphRAG Workshop: GraphSummit Melbourne 2024
Démonstration Digital Twin Building Wire Management
Swiss Life - Les graphes au service de la détection de fraude dans le domaine...
Démonstration Supply Chain - GraphTalk Paris
The Art of Possible - GraphTalk Paris Opening Session
How Siemens bolstered supply chain resilience with graph-powered AI insights ...
Knowledge Graphs for AI-Ready Data and Enterprise Deployment - Gartner IT Sym...
Ad

Recently uploaded (20)

PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PDF
Salesforce Agentforce AI Implementation.pdf
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
Designing Intelligence for the Shop Floor.pdf
PDF
medical staffing services at VALiNTRY
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
PPTX
history of c programming in notes for students .pptx
PDF
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
Salesforce Agentforce AI Implementation.pdf
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Designing Intelligence for the Shop Floor.pdf
medical staffing services at VALiNTRY
CHAPTER 2 - PM Management and IT Context
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Design an Analysis of Algorithms II-SECS-1021-03
Computer Software and OS of computer science of grade 11.pptx
wealthsignaloriginal-com-DS-text-... (1).pdf
Monitoring Stack: Grafana, Loki & Promtail
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Odoo Companies in India – Driving Business Transformation.pdf
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Tally Prime Crack Download New Version 5.1 [2025] (License Key Free
history of c programming in notes for students .pptx
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025

Leveraging graph technology to fight financial fraud

  • 2. AGENDA • Meet today’s fraudsters • Traditional fraud detection methods • Using connected analysis for real-time fraud detection • Demo • Summary
  • 4. The Impact of Fraud The payment card fraud alone, constitutes for over 16 billion dollar in losses for the bank-sector in the US. $16Bpayment card fraud in 2014* Banking $32Byearly e-commerce fraud** Fraud in E-commerce is estimated to cost over 32 billion dollars annually is the US.. E-commerce The impact of fraud on the insurance industry is estimated to be $80 billion annually in the US. Insurance $80Bestimated yearly impact*** *) Business Wire: http://www.businesswire.com/news/home/20150804007054/en/Global-Card-Fraud-Losses-Reach-16.31-Billion#.VcJZlvlVhBc **) E-commerce expert Andreas Thim, Klarna, 2015 ***) Coalition against insurance fraud: http://www.insurancefraud.org/article.htm?RecID=3274#.UnWuZ5E7ROA
  • 6. Who Are Today’s Fraudsters?
  • 7. Organized in groups Synthetic Identities Stolen Identities Who Are Today’s Fraudsters? Hijacked Devices
  • 8. “Don’t consider traditional technology adequate to keep up with criminal trends” Market Guide for Online Fraud Detection, April 27, 2015
  • 9. Endpoint-Centric Analysis of users and their end-points 1. Navigation Centric Analysis of navigation behavior and suspect patterns 2. Account-Centric Analysis of anomaly behavior by channel 3. PC:s Mobile Phones IP-addresses User ID:s Comparing Transaction Identity Vetting Traditional Fraud Detection Methods
  • 10. Unable to detect • Fraud rings • Fake IP-adresses • Hijacked devices • Synthetic Identities • Stolen Identities • And more… Weaknesses DISCRETE ANALYSIS Endpoint-Centric Analysis of users and their end-points 1. Navigation Centric Analysis of navigation behavior and suspect patterns 2. Account-Centric Analysis of anomaly behavior by channel 3. Traditional Fraud Detection Methods
  • 11. INVESTIGATE Revolving Debt Number of Accounts INVESTIGATE Normal behavior Fraud Detection With Discrete Analysis
  • 12. Revolving Debt Number of Accounts Normal behavior Fraud Detection With Connected Analysis Fraudulent pattern
  • 13. CONNECTED ANALYSIS Augmented Fraud Detection Endpoint-Centric Analysis of users and their end-points Navigation Centric Analysis of navigation behavior and suspect patterns Account-Centric Analysis of anomaly behavior by channel DISCRETE ANALYSIS 1. 2. 3. Cross Channel Analysis of anomaly behavior correlated across channels 4. Entity Linking Analysis of relationships to detect organized crime and collusion 5.
  • 14. ACCOUNT HOLDER 2 Modeling a fraud ring as a graph ACCOUNT HOLDER 1 ACCOUNT HOLDER 3
  • 15. ACCOUNT HOLDER 2 Modeling a fraud ring as a graph ACCOUNT HOLDER 1 ACCOUNT HOLDER 3 CREDIT CARD BANK ACCOUNT BANK ACCOUNT BANK ACCOUNT PHONE NUMBER UNSECURED LOAN SSN 2 UNSECURED LOAN
  • 16. ACCOUNT HOLDER 2 Modeling a fraud ring as a graph ACCOUNT HOLDER 1 ACCOUNT HOLDER 3 CREDIT CARD BANK ACCOUNT BANK ACCOUNT BANK ACCOUNT ADDRESS PHONE NUMBER PHONE NUMBER SSN 2 UNSECURED LOAN SSN 2 UNSECURED LOAN
  • 17. ACCOUNT HOLDER 2 Modeling a fraud ring as a graph ACCOUNT HOLDER 1 ACCOUNT HOLDER 3 CREDIT CARD BANK ACCOUNT BANK ACCOUNT BANK ACCOUNT ADDRESS PHONE NUMBER PHONE NUMBER SSN 2 UNSECURED LOAN SSN 2 UNSECURED LOAN SYNTETIC PERSON 2 SYNTHETIC PERSON 1
  • 19. USING NEO4j FOR REAL-TIME CONNECTED ANALYSIS
  • 20. Account-Centric Analysis of anomaly behavior correlated across channels 4. Entity Linking Analysis of relationships to detect organized crime and collusion 5. CONNECTED ANALYSIS Endpoint-Centric Analysis of users and their end-points Navigation Centric Analysis of navigation behavior and suspect patterns Account-Centric Analysis of anomaly behavior by channel DISCRETE ANALYSIS 1. 2. 3. Augment Fraud Detection with Neo4j Traditional Vendors
  • 21. ACCEPT / DECLINE MANUAL User/Transaction CONNECTED ANALYSIS User/Transaction ACCEPT / DECLINE(DISCRETE ANALYSIS) + User/Transaction (sub-second performance to any data size and connection) ACCEPT / DECLINE REAL TIME TRADITIONAL VENDORS (DISCRETE ANALYSIS) (DISCRETE ANALYSIS) ACCEPT / DECLINE How Neo4j fits in
  • 22. Detect & prevent fraud in real-time Faster credit risk analysis and transactions Reduce chargebacks Quickly adapt to new methods of fraud Why Neo4j? Who’s using it? Financial institutions use Neo4j to: FINANCE Government Online Retail
  • 23. • Today’s fraudsters are organized and highly sophisticated • Legacy technology does not detect fraud sufficiently and in real-time • Graph-databases enable you to discover fraudulent patterns in real- time • Augment your current fraud detection infrastructure with connected analysis KEY TAKE AWAYS