SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
How to use graphs to identify credit
card thieves
SAS founded in 2013 in Paris | http://linkurio.us | @linkurious
WHAT IS A GRAPH?
Father Of
Father Of
Siblings
This is a graph
WHAT IS A GRAPH : NODES AND RELATIONSHIPS
Father Of
Father Of
Siblings
A graph is a set of nodes linked by
relationships
This is a node
This is a
relationship
People, objects, movies,
restaurants, music
Antennas, servers, phones,
people
Supplier, roads, warehouses,
products
Graphs can be used to model many domains
DIFFERENT DOMAINS WHERE GRAPHS ARE IMPORTANT
Supply chains Social networks Communications
But why can graphs can help identify credit card
thieves?
GRAPH AND FRAUD DETECTION
Get access to the numbers...and turn them into
cash
HOW CREDIT CARD THIEVES OPERATE
Steal the credit
card
Make online
purchases
Turn goods in
cash
Later on, the criminal uses
the credit card numbers to
make purchases online. He
chooses items that can be
sold back.
The criminal intercepts the
goods at the shipping
address. He sells back the
goods : now he has cash!
The criminal is an employee
in a store. During check-out
he copies the credit card
information of certain
customers.
The first step to detect card thieves is to turn
transaction history into a graph
A GRAPH DATA MODEL TO IDENTIFY CARD THIEVES
Paul
(Person)
Nicole
(Person)
(Merchant)
(Merchant)
(Merchant)(Merchant)
(Merchant)
HAS_BOUGHT_AT29$ (05/05/2014)
8$
(05/05/2014)
HAS_BO
UG
HT_AT
19.5$
(05/05/2014)
HAS_BO
UG
HT_AT
8$ (06/05/2014)
HAS_BOUGHT_AT
10.5$(05/05/2014)
HAS_BOUGHT_AT
199$
(08/05/2014)
HAS_BO
UG
HT_AT
78.9$ (08/05/2014)
HAS_BOUGHT_AT
The edges are transactions. In red two fraudulent transactions.
WHERE IS THE THIEF?
We are looking for
the common
connection between
the 2 victims….
The only place the theft could have happened is
at the coffee shop...
LOOKING AT THE COMMON CONNECTION
Paul
(Person)
Nicole
(Person)
(Merchant)
(Merchant)(Merchant)
(Merchant)
HAS_BOUGHT_AT29$ (05/05/2014)
8$
(05/05/2014)
HAS_BO
UG
HT_AT
19.5$
(05/05/2014)
HAS_BO
UG
HT_AT
8$ (06/05/2014)
HAS_BOUGHT_AT
10.5$(05/05/2014)
HAS_BOUGHT_AT
199$
(08/05/2014)
HAS_BO
UG
HT_AT
78.9$ (08/05/2014)
HAS_BOUGHT_AT
(Merchant)
WHAT IF WE NEED TO ANALYSE >100M TRANSACTIONS?
Doing it in real life involves querying a large
number of transactions to find connections
THE PAINS OF WORKING ON CONNECTED DATA WITH RELATIONAL TECHNOLOGIES
Relational databases are not good at handling...
relationships
Depth RDBMS execution time (s) Neo4j execution time (s) Records returned
2 0.016 0.01 ~2500
3 30.267 0.168 ~110 000
4 1543.505 1.359 ~600 000
5 Unfinished 2.132 ~800 000
Finding extended friends in a 1M people social network (from the book Graph Databases)
GRAPH DATABASES MAKE IT POSSIBLE TO QUERY LARGE GRAPHS
Graph databases makes it possible to identify
the fraud patterns in real-time
An event triggers
security checks
Customer complaint
Suspicious transaction
Merchant alert
A Neo4j Cypher query
runs to detect patterns
Identification of the
fraudsters
EXAMPLE : A GRAPH QUERY TO IDENTIFY CREDIT CARD THIEVES
MATCH (victim:person)-[r:HAS_BOUGHT_AT]->(merchant)
WHERE r.status = "Disputed"
MATCH victim-[t:HAS_BOUGHT_AT]->(othermerchants)
WHERE t.status = "Undisputed" AND t.time < r.time
WITH victim, othermerchants, t ORDER BY t.time DESC
RETURN DISTINCT othermerchants.name as suspicious_store, count(DISTINCT
t) as count, collect(DISTINCT victim.name) as victims
ORDER BY count DESC
EXAMPLE : A GRAPH QUERY TO IDENTIFY CREDIT CARD THIEVES
MATCH (victim:person)-[r:HAS_BOUGHT_AT]->(merchant)
WHERE r.status = "Disputed"
We select the victims, people involved in “disputed” transactions
MATCH victim-[t:HAS_BOUGHT_AT]->(othermerchants)
WHERE t.status = "Undisputed" AND t.time < r.time
We look at the transactions that happened before the fraudulent
transactions
WITH victim, othermerchants, t ORDER BY t.time DESC
RETURN DISTINCT othermerchants.name as suspicious_store, count(DISTINCT
t) as count, collect(DISTINCT victim.name) as victims
ORDER BY count DESC
We return the list of suspicious merchants, ordered by the number of
transactions they are involved in
Complete explanation and dataset here!
The fraud teams acts faster
and more fraud cases can be
avoided.
WHAT IS THE IMPACT OF LINKURIOUS
If something suspicious comes up, the analysts
can use Linkurious to quickly assess the
situation
Linkurious allows the fraud
teams to go deep in the data
and build cases against fraud
rings.
Treat false
positives
Investigate
serious cases
Save money
Linkurious allows you to
control the alerts and make
sure your customers are not
treated like criminals.
DEMO
Go to linkurio.us to try it!
TECHNOLOGY
Cloud ready and open-source based
OTHER USE CASES
Graphs are everywhere, learn to leverage them
CONCLUSION
Contact us to discuss your projects
at contact@linkurio.us
Article on credit card thieves identification
- the article : http://linkurio.us/stolen-credit-cards-and-fraud-detection-with-neo4j/
- the dataset : https://www.dropbox.com/s/4uij4gs2iyva5bd/credit%20card%20fraud.zip
GraphGist on credit card fraud :
- the article : http://gist.neo4j.org/?3ad4cb2e3187ab21416b
SOME ADDITIONAL RESOURCES TO CONSIDER

Mais conteúdo relacionado

Mais procurados

Mais procurados (6)

Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.Digital Risk: Protecting your Most Important Asset.
Digital Risk: Protecting your Most Important Asset.
 
Data Defeats Truman – SXSW Panelpicker Pitch
Data Defeats Truman – SXSW Panelpicker PitchData Defeats Truman – SXSW Panelpicker Pitch
Data Defeats Truman – SXSW Panelpicker Pitch
 
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
Know Your Fraudster: Leveraging everything you've got to prepare for post-EMV...
 
Forter - NOAH19 Tel Aviv
Forter - NOAH19 Tel AvivForter - NOAH19 Tel Aviv
Forter - NOAH19 Tel Aviv
 
Lead Tracking and Conversion - Todd Katler
Lead Tracking and Conversion - Todd KatlerLead Tracking and Conversion - Todd Katler
Lead Tracking and Conversion - Todd Katler
 
A Practical Guide to Post-EMV Card Not Present Fraud
A Practical Guide to Post-EMV Card Not Present FraudA Practical Guide to Post-EMV Card Not Present Fraud
A Practical Guide to Post-EMV Card Not Present Fraud
 

Destaque

GraphConnect Europe 2016 - Creating an Innovative Task Management Engine - Mi...
GraphConnect Europe 2016 - Creating an Innovative Task Management Engine - Mi...GraphConnect Europe 2016 - Creating an Innovative Task Management Engine - Mi...
GraphConnect Europe 2016 - Creating an Innovative Task Management Engine - Mi...
Neo4j
 
A Related Matter: Optimizing your webapp by using django-debug-toolbar, selec...
A Related Matter: Optimizing your webapp by using django-debug-toolbar, selec...A Related Matter: Optimizing your webapp by using django-debug-toolbar, selec...
A Related Matter: Optimizing your webapp by using django-debug-toolbar, selec...
Christopher Adams
 
Samza at LinkedIn: Taking Stream Processing to the Next Level
Samza at LinkedIn: Taking Stream Processing to the Next LevelSamza at LinkedIn: Taking Stream Processing to the Next Level
Samza at LinkedIn: Taking Stream Processing to the Next Level
Martin Kleppmann
 

Destaque (20)

How to Search, Explore and Visualize Neo4j with Linkurious - Jean Villedieu @...
How to Search, Explore and Visualize Neo4j with Linkurious - Jean Villedieu @...How to Search, Explore and Visualize Neo4j with Linkurious - Jean Villedieu @...
How to Search, Explore and Visualize Neo4j with Linkurious - Jean Villedieu @...
 
How to establish a sustainable solution for data lineage
How to establish a sustainable solution for data lineageHow to establish a sustainable solution for data lineage
How to establish a sustainable solution for data lineage
 
Graphically understand and interactively explore your Data Lineage
Graphically understand and interactively explore your Data LineageGraphically understand and interactively explore your Data Lineage
Graphically understand and interactively explore your Data Lineage
 
GraphTalks Rome - Selecting the right Technology
GraphTalks Rome - Selecting the right TechnologyGraphTalks Rome - Selecting the right Technology
GraphTalks Rome - Selecting the right Technology
 
GraphTalks Rome - Introducing Neo4j
GraphTalks Rome - Introducing Neo4jGraphTalks Rome - Introducing Neo4j
GraphTalks Rome - Introducing Neo4j
 
GraphTalks Rome - The Italian Business Graph
GraphTalks Rome - The Italian Business GraphGraphTalks Rome - The Italian Business Graph
GraphTalks Rome - The Italian Business Graph
 
Detecting fraud with Python and machine learning
Detecting fraud with Python and machine learningDetecting fraud with Python and machine learning
Detecting fraud with Python and machine learning
 
A Crush on Design Thinking
A Crush on Design ThinkingA Crush on Design Thinking
A Crush on Design Thinking
 
Enterprise architectsview 2015-apr
Enterprise architectsview 2015-aprEnterprise architectsview 2015-apr
Enterprise architectsview 2015-apr
 
GraphConnect Europe 2016 - Creating an Innovative Task Management Engine - Mi...
GraphConnect Europe 2016 - Creating an Innovative Task Management Engine - Mi...GraphConnect Europe 2016 - Creating an Innovative Task Management Engine - Mi...
GraphConnect Europe 2016 - Creating an Innovative Task Management Engine - Mi...
 
A Related Matter: Optimizing your webapp by using django-debug-toolbar, selec...
A Related Matter: Optimizing your webapp by using django-debug-toolbar, selec...A Related Matter: Optimizing your webapp by using django-debug-toolbar, selec...
A Related Matter: Optimizing your webapp by using django-debug-toolbar, selec...
 
Exploring the Great Olympian Graph
Exploring the Great Olympian GraphExploring the Great Olympian Graph
Exploring the Great Olympian Graph
 
Presentation on Large Scale Data Management
Presentation on Large Scale Data ManagementPresentation on Large Scale Data Management
Presentation on Large Scale Data Management
 
Web valley talk - usability, visualization and mobile app development
Web valley talk - usability, visualization and mobile app developmentWeb valley talk - usability, visualization and mobile app development
Web valley talk - usability, visualization and mobile app development
 
CQRS & EVS with MongoDb
CQRS & EVS with MongoDbCQRS & EVS with MongoDb
CQRS & EVS with MongoDb
 
Km4City: how to make smart and resilient your city, beginner document
Km4City: how to make smart and resilient your city, beginner documentKm4City: how to make smart and resilient your city, beginner document
Km4City: how to make smart and resilient your city, beginner document
 
The Five Graphs of Government: How Federal Agencies can Utilize Graph Technology
The Five Graphs of Government: How Federal Agencies can Utilize Graph TechnologyThe Five Graphs of Government: How Federal Agencies can Utilize Graph Technology
The Five Graphs of Government: How Federal Agencies can Utilize Graph Technology
 
Design Patterns
Design PatternsDesign Patterns
Design Patterns
 
Decompose that WAR? A pattern language for microservices (@QCON @QCONSP)
Decompose that WAR? A pattern language for microservices (@QCON @QCONSP)Decompose that WAR? A pattern language for microservices (@QCON @QCONSP)
Decompose that WAR? A pattern language for microservices (@QCON @QCONSP)
 
Samza at LinkedIn: Taking Stream Processing to the Next Level
Samza at LinkedIn: Taking Stream Processing to the Next LevelSamza at LinkedIn: Taking Stream Processing to the Next Level
Samza at LinkedIn: Taking Stream Processing to the Next Level
 

Semelhante a How to use graphs to identify credit card thieves?

Semelhante a How to use graphs to identify credit card thieves? (20)

How to apply graph analytics for bank loan fraud detection?
How to apply graph analytics for bank loan fraud detection?How to apply graph analytics for bank loan fraud detection?
How to apply graph analytics for bank loan fraud detection?
 
Getting information from the field, fast
Getting information from the field, fastGetting information from the field, fast
Getting information from the field, fast
 
Hoover And Fdr Essay
Hoover And Fdr EssayHoover And Fdr Essay
Hoover And Fdr Essay
 
Using graph technologies to fight fraud
Using graph technologies to fight fraudUsing graph technologies to fight fraud
Using graph technologies to fight fraud
 
Healthy Lifestyle Essay Speech. The Importance O
Healthy Lifestyle Essay Speech. The Importance OHealthy Lifestyle Essay Speech. The Importance O
Healthy Lifestyle Essay Speech. The Importance O
 
How To Write A Thematic Essay - Structure And Examples - Peac
How To Write A Thematic Essay - Structure And Examples - PeacHow To Write A Thematic Essay - Structure And Examples - Peac
How To Write A Thematic Essay - Structure And Examples - Peac
 
Broad market 2015
Broad market 2015Broad market 2015
Broad market 2015
 
2007 12 12 Lesweb3
2007 12 12 Lesweb32007 12 12 Lesweb3
2007 12 12 Lesweb3
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4jNeo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
 
Fighting Fraud with Neo4j, Kees Vegter
Fighting Fraud with Neo4j, Kees VegterFighting Fraud with Neo4j, Kees Vegter
Fighting Fraud with Neo4j, Kees Vegter
 
Write An Essay About We Are Destroying Our Planet
Write An Essay About We Are Destroying Our PlanetWrite An Essay About We Are Destroying Our Planet
Write An Essay About We Are Destroying Our Planet
 
A Compare-And-Contrast Essay About Two Places You Have Lived In Or Visited
A Compare-And-Contrast Essay About Two Places You Have Lived In Or VisitedA Compare-And-Contrast Essay About Two Places You Have Lived In Or Visited
A Compare-And-Contrast Essay About Two Places You Have Lived In Or Visited
 
Thesis Statement For American Dream Essay
Thesis Statement For American Dream EssayThesis Statement For American Dream Essay
Thesis Statement For American Dream Essay
 
#HRTF16 Talent Tech Labs Presentation
#HRTF16 Talent Tech Labs Presentation#HRTF16 Talent Tech Labs Presentation
#HRTF16 Talent Tech Labs Presentation
 
Jumps Racing Should Be Banned Essay
Jumps Racing Should Be Banned EssayJumps Racing Should Be Banned Essay
Jumps Racing Should Be Banned Essay
 
Staton Essay Prize Competition. Online assignment writing service.
Staton Essay Prize Competition. Online assignment writing service.Staton Essay Prize Competition. Online assignment writing service.
Staton Essay Prize Competition. Online assignment writing service.
 
Forum Oxford April 2009
Forum Oxford April 2009Forum Oxford April 2009
Forum Oxford April 2009
 
Tort Essay Sample Answer
Tort Essay Sample AnswerTort Essay Sample Answer
Tort Essay Sample Answer
 
If I Were A Bird Essay Writing. Online assignment writing service.
If I Were A Bird Essay Writing. Online assignment writing service.If I Were A Bird Essay Writing. Online assignment writing service.
If I Were A Bird Essay Writing. Online assignment writing service.
 

Mais de Linkurious

Mais de Linkurious (20)

Using graph technology for multi-INT investigations
Using graph technology for multi-INT investigationsUsing graph technology for multi-INT investigations
Using graph technology for multi-INT investigations
 
Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8
 
Graph-based intelligence analysis
Graph-based intelligence analysis Graph-based intelligence analysis
Graph-based intelligence analysis
 
What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7
 
How to visualize Cosmos DB graph data
How to visualize Cosmos DB graph dataHow to visualize Cosmos DB graph data
How to visualize Cosmos DB graph data
 
GraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph VisualizationGraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph Visualization
 
Getting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious EnterpriseGetting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious Enterprise
 
GraphTech Ecosystem - part 2: Graph Analytics
 GraphTech Ecosystem - part 2: Graph Analytics GraphTech Ecosystem - part 2: Graph Analytics
GraphTech Ecosystem - part 2: Graph Analytics
 
GraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph DatabasesGraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph Databases
 
Graph analytics in Linkurious Enterprise
Graph analytics in Linkurious EnterpriseGraph analytics in Linkurious Enterprise
Graph analytics in Linkurious Enterprise
 
Graph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise PapersGraph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise Papers
 
Visualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your DataVisualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your Data
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle Management
 
Fraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et DétectionFraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et Détection
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
 
Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.
 
Graph-powered data lineage in Finance
Graph-powered data lineage in FinanceGraph-powered data lineage in Finance
Graph-powered data lineage in Finance
 
Using Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projectsUsing Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projects
 
Linkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications fasterLinkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications faster
 
Fighting financial crime with graph analysis at BIWA Summit 2017
Fighting financial crime with graph analysis at BIWA Summit 2017Fighting financial crime with graph analysis at BIWA Summit 2017
Fighting financial crime with graph analysis at BIWA Summit 2017
 

Último

AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
VishalKumarJha10
 

Último (20)

The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 

How to use graphs to identify credit card thieves?

  • 1. How to use graphs to identify credit card thieves SAS founded in 2013 in Paris | http://linkurio.us | @linkurious
  • 2. WHAT IS A GRAPH? Father Of Father Of Siblings This is a graph
  • 3. WHAT IS A GRAPH : NODES AND RELATIONSHIPS Father Of Father Of Siblings A graph is a set of nodes linked by relationships This is a node This is a relationship
  • 4. People, objects, movies, restaurants, music Antennas, servers, phones, people Supplier, roads, warehouses, products Graphs can be used to model many domains DIFFERENT DOMAINS WHERE GRAPHS ARE IMPORTANT Supply chains Social networks Communications
  • 5. But why can graphs can help identify credit card thieves? GRAPH AND FRAUD DETECTION
  • 6. Get access to the numbers...and turn them into cash HOW CREDIT CARD THIEVES OPERATE Steal the credit card Make online purchases Turn goods in cash Later on, the criminal uses the credit card numbers to make purchases online. He chooses items that can be sold back. The criminal intercepts the goods at the shipping address. He sells back the goods : now he has cash! The criminal is an employee in a store. During check-out he copies the credit card information of certain customers.
  • 7. The first step to detect card thieves is to turn transaction history into a graph A GRAPH DATA MODEL TO IDENTIFY CARD THIEVES Paul (Person) Nicole (Person) (Merchant) (Merchant) (Merchant)(Merchant) (Merchant) HAS_BOUGHT_AT29$ (05/05/2014) 8$ (05/05/2014) HAS_BO UG HT_AT 19.5$ (05/05/2014) HAS_BO UG HT_AT 8$ (06/05/2014) HAS_BOUGHT_AT 10.5$(05/05/2014) HAS_BOUGHT_AT 199$ (08/05/2014) HAS_BO UG HT_AT 78.9$ (08/05/2014) HAS_BOUGHT_AT The edges are transactions. In red two fraudulent transactions.
  • 8. WHERE IS THE THIEF? We are looking for the common connection between the 2 victims….
  • 9. The only place the theft could have happened is at the coffee shop... LOOKING AT THE COMMON CONNECTION Paul (Person) Nicole (Person) (Merchant) (Merchant)(Merchant) (Merchant) HAS_BOUGHT_AT29$ (05/05/2014) 8$ (05/05/2014) HAS_BO UG HT_AT 19.5$ (05/05/2014) HAS_BO UG HT_AT 8$ (06/05/2014) HAS_BOUGHT_AT 10.5$(05/05/2014) HAS_BOUGHT_AT 199$ (08/05/2014) HAS_BO UG HT_AT 78.9$ (08/05/2014) HAS_BOUGHT_AT (Merchant)
  • 10. WHAT IF WE NEED TO ANALYSE >100M TRANSACTIONS? Doing it in real life involves querying a large number of transactions to find connections
  • 11. THE PAINS OF WORKING ON CONNECTED DATA WITH RELATIONAL TECHNOLOGIES Relational databases are not good at handling... relationships Depth RDBMS execution time (s) Neo4j execution time (s) Records returned 2 0.016 0.01 ~2500 3 30.267 0.168 ~110 000 4 1543.505 1.359 ~600 000 5 Unfinished 2.132 ~800 000 Finding extended friends in a 1M people social network (from the book Graph Databases)
  • 12. GRAPH DATABASES MAKE IT POSSIBLE TO QUERY LARGE GRAPHS Graph databases makes it possible to identify the fraud patterns in real-time An event triggers security checks Customer complaint Suspicious transaction Merchant alert A Neo4j Cypher query runs to detect patterns Identification of the fraudsters
  • 13. EXAMPLE : A GRAPH QUERY TO IDENTIFY CREDIT CARD THIEVES MATCH (victim:person)-[r:HAS_BOUGHT_AT]->(merchant) WHERE r.status = "Disputed" MATCH victim-[t:HAS_BOUGHT_AT]->(othermerchants) WHERE t.status = "Undisputed" AND t.time < r.time WITH victim, othermerchants, t ORDER BY t.time DESC RETURN DISTINCT othermerchants.name as suspicious_store, count(DISTINCT t) as count, collect(DISTINCT victim.name) as victims ORDER BY count DESC
  • 14. EXAMPLE : A GRAPH QUERY TO IDENTIFY CREDIT CARD THIEVES MATCH (victim:person)-[r:HAS_BOUGHT_AT]->(merchant) WHERE r.status = "Disputed" We select the victims, people involved in “disputed” transactions MATCH victim-[t:HAS_BOUGHT_AT]->(othermerchants) WHERE t.status = "Undisputed" AND t.time < r.time We look at the transactions that happened before the fraudulent transactions WITH victim, othermerchants, t ORDER BY t.time DESC RETURN DISTINCT othermerchants.name as suspicious_store, count(DISTINCT t) as count, collect(DISTINCT victim.name) as victims ORDER BY count DESC We return the list of suspicious merchants, ordered by the number of transactions they are involved in Complete explanation and dataset here!
  • 15. The fraud teams acts faster and more fraud cases can be avoided. WHAT IS THE IMPACT OF LINKURIOUS If something suspicious comes up, the analysts can use Linkurious to quickly assess the situation Linkurious allows the fraud teams to go deep in the data and build cases against fraud rings. Treat false positives Investigate serious cases Save money Linkurious allows you to control the alerts and make sure your customers are not treated like criminals.
  • 17. TECHNOLOGY Cloud ready and open-source based
  • 18. OTHER USE CASES Graphs are everywhere, learn to leverage them
  • 19. CONCLUSION Contact us to discuss your projects at contact@linkurio.us
  • 20. Article on credit card thieves identification - the article : http://linkurio.us/stolen-credit-cards-and-fraud-detection-with-neo4j/ - the dataset : https://www.dropbox.com/s/4uij4gs2iyva5bd/credit%20card%20fraud.zip GraphGist on credit card fraud : - the article : http://gist.neo4j.org/?3ad4cb2e3187ab21416b SOME ADDITIONAL RESOURCES TO CONSIDER