SlideShare a Scribd company logo
Using graph
technologies to fight
fraud.
SAS founded in 2013 in Paris | http://linkurio.us | @linkurious
French startup specialized in graph-visualization.
CTO
Web-scale archiving
Université de
Technologie de
Compiègne
CMO
>5 years in consulting
Sciences Po + Ecole
de Guerre
Economique
Jean
Villedieu
Sébastien
Heymann
David
Rapin
CEO
Created Gephi
Phd in CS and
complex systems
from UPMC
What is a graph?
Father Of
Father Of
Siblings
A graph is a set of nodes and relationships.
This is a node
This is a
relationship
Father Of
Father Of
Siblings
Why graphs are important?
Rise of complex and connected data.
Increase in
volume
New processes, more
transactions, more social
devices, more devices, etc.
Increase in
connectedness
Customers, products,
processes and devices
interact with each other.
Relational DBS are not
good at relationships.
● Cannot model data and relationships without
complexity;
● Performance degrades with number and levels
of relationships, and database size;
● Adding new types of data and relationships
requires schema redesign.
Graph DBs unlock
connected data.
● Store graphs of billions of nodes and edges;
● Query the graph to find interesting patterns;
● Popularity of graph databases has increased
500% in the last 2 years;
● Recommendation, fraud detection, network
management, cybersecurity, health...
Why does it work well for
fraud?
Layer 1 Layer 2 Layer 3 Layer 4 Layer 5
Endpoint-
centric
Navigation-
centric
Analysis of users
and their
endpoints
Account-
centric
Cross-
channels
Entity link
analysis
Analysis of
navigation
behavior and
suspect patterns
Analysis of
anomaly
behavior on a
per-channel
basis
Analysis of
anomaly
behavior
correlated on a
cross-channel
basis
Analysis of
relationships to
detect organized
collusion
Network analysis offers a unique opportunity to identify the sophisticated fraudsters who work under the radar
but in a coordinated fashion.
AML.
Normal customer #1
Normal customer #2
In business with
Suspicious individual Known criminal
In business with
In business with
Are my customers in contact
with criminals?
Conflict of interest.
Are my vendors linked to my
employees?
New vendor
Address
Employee
Registered address
Phone number
Registered phone Registered phone
Registered address
Synthetic identity.
Customer #1
Address
Customer #2
Phone number
Bank loan Bank loan
Am I loaning money to
people who don’t exist?
Swiss Leaks.
Finding the real owners of
$100 billion.
Real owner Pseudo owner Offshore entity Swiss bank account
Controls ControlsMarried
Stolen credit cards.
Customer #1
Merchant #3
Customer #2
Merchant #2
Merchant #1 Merchant #4
Who is stealing credit cards?
Normal TX
Contested TX Contested TX
Normal TX
Contested TX Contested TX
First enterprise-ready graph visualization platform.
Improve your fraud detection system.
Detect new
fraud cases.
Graph databases like Neo4j
provides the ability to identify
fraud patterns at scale.
Faster fraud
investigations.
Linkurious provides a simple
interface to investigate
suspicious patterns.
How it works.
Legacy DB
DB
On-premise server Web-browser
Pricing.
Starter Enterprise Toolkit
Search and explore your
data
Enterprise-ready security
and collaboration
Build or improve an
existing web application
Desktop Server Code
Single user Mature organization Mature organization
€990/user/year €1,990/user/year €30,000/product/year
Conclusion.
Question?
Want to know more?
● Insider trading: https://linkurio.us/using-graphs-to-uncover-insider-trading-schemes/
● Conflict of interest: https://linkurio.us/fraud-detection-identifying-conflicts-of-interest-with-graphs/
● Synthetic identify: https://linkurio.us/how-to-detect-bank-loan-fraud-with-graphs-part-1/ and
https://linkurio.us/how-to-detect-bank-loan-fraud-with-graphs-part-2/
● Ecommerce fraud: https://linkurio.us/reshipping-scams-and-network-visualization/
● Swiss Leaks: https://linkurio.us/how-the-icij-used-linkurious-to-reveal-the-secrets-hidden-in-the-
swiss-leaks-data/
● Fraud detection in retail: https://linkurio.us/fraud-detection-in-retail/
● Credit card fraud: https://linkurio.us/stolen-credit-cards-and-fraud-detection-with-neo4j/

More Related Content

PDF
VAT fraud detection : the mysterious case of the missing trader
PDF
How to identify reshipping scams with Neo4j
PDF
How to apply graph analytics for bank loan fraud detection?
PDF
Bringing graph technologies to data analysis : the case of Azerbaijan in th...
PPTX
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
PDF
How to apply graphs to network management
PDF
The 8 most common graph visualization mistakes
PDF
Graph analysis of the European public tenders
VAT fraud detection : the mysterious case of the missing trader
How to identify reshipping scams with Neo4j
How to apply graph analytics for bank loan fraud detection?
Bringing graph technologies to data analysis : the case of Azerbaijan in th...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
How to apply graphs to network management
The 8 most common graph visualization mistakes
Graph analysis of the European public tenders

What's hot (20)

PDF
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
PDF
Finding answers through visualization (GraphDay Barcelona Feb 2016)
PDF
Big Data is Dead, Long Live Big Data
PDF
The top 7 technology trends for 2018
PDF
CWIN17 New-York / adopting a cloud first strategy to fuel growth
PPTX
Atranstechnologypresentation
PDF
BDW16 London - Mark van Rijmenam, Datafloq - Big Data is Dead, Long Live Big ...
PDF
How to Win Customers with Predictive Analytics
PDF
Software Industry Trends 2020
PDF
InsideView Clean Data
PDF
Gov.uk Verify - The Journey So Far
PDF
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
PDF
What Does 2018 Have In Store For The Big Data Industry
PPTX
Big data
RTF
Data article
PDF
Big data Keynote Africa's Payment Banking Retail Show 2015
PPTX
Ppt3 copy
PDF
UX STRAT 2013: Aarron Walter, Connected UX
PDF
Sources of data collection for business applications
PDF
Why should I give RP Data my data
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
Finding answers through visualization (GraphDay Barcelona Feb 2016)
Big Data is Dead, Long Live Big Data
The top 7 technology trends for 2018
CWIN17 New-York / adopting a cloud first strategy to fuel growth
Atranstechnologypresentation
BDW16 London - Mark van Rijmenam, Datafloq - Big Data is Dead, Long Live Big ...
How to Win Customers with Predictive Analytics
Software Industry Trends 2020
InsideView Clean Data
Gov.uk Verify - The Journey So Far
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
What Does 2018 Have In Store For The Big Data Industry
Big data
Data article
Big data Keynote Africa's Payment Banking Retail Show 2015
Ppt3 copy
UX STRAT 2013: Aarron Walter, Connected UX
Sources of data collection for business applications
Why should I give RP Data my data
Ad

Viewers also liked (20)

PDF
Visualizing an anti-money laundering investigation
PDF
Graph visualization options and latest developments
PDF
Cyber security and attack analysis : how Cisco uses graph analytics
PDF
Introduction to the graph technologies landscape
PDF
Reinforcing AML systems with graph technologies.
PPTX
Aerospike Architecture
PPTX
Content curation
PPTX
An overview of mobile html + java script frameworks
PPTX
Qr codes + ipads
ODP
Cell Phone Jammer , Intro
PPS
Serious Games + Computer Science = Serious CS
PPTX
NoSQL Application Development with JSON and MapR-DB
PDF
Dossier presentation bmr_associés
PPTX
Introduction to OpenCV
PDF
Navigating large graphs like a breeze with Linkurious
PDF
La visualisation au service de la lutte contre la fraude
PDF
Teaching ML with scikit-learn at Telecom ParisTech
DOCX
12th CBSE Computer Science Project
PDF
Anomaly/Novelty detection with scikit-learn
PDF
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
Visualizing an anti-money laundering investigation
Graph visualization options and latest developments
Cyber security and attack analysis : how Cisco uses graph analytics
Introduction to the graph technologies landscape
Reinforcing AML systems with graph technologies.
Aerospike Architecture
Content curation
An overview of mobile html + java script frameworks
Qr codes + ipads
Cell Phone Jammer , Intro
Serious Games + Computer Science = Serious CS
NoSQL Application Development with JSON and MapR-DB
Dossier presentation bmr_associés
Introduction to OpenCV
Navigating large graphs like a breeze with Linkurious
La visualisation au service de la lutte contre la fraude
Teaching ML with scikit-learn at Telecom ParisTech
12th CBSE Computer Science Project
Anomaly/Novelty detection with scikit-learn
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
Ad

Similar to Using graph technologies to fight fraud (20)

PDF
Detecting eCommerce Fraud with Neo4j and Linkurious
PDF
How to use graphs to identify credit card thieves?
PDF
3 types of fraud graph analytics can help defeat
PDF
Build Intelligent Fraud Prevention with Machine Learning and Graphs
PDF
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
PDF
GraphTalks Italy - Using graphs to fight financial fraud
PPTX
Webinar: Fighting Fraud with Graph Databases
PDF
Webinar: Stop Complex Fraud in its Tracks with Neo4j
PDF
Transform Your Financial Crime Detection with Advanced Graph Analytics
PDF
Leveraging graph technology to fight financial fraud
PDF
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
PDF
Fighting Fraud with Neo4j, Kees Vegter
PDF
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
PDF
GraphTalks Copenhagen - Analyzing Fraud with Graph Databases
PDF
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
PDF
A visual approach to fraud detection and investigation - Giuseppe Francavilla
PPTX
Your Enemies Use GenAI Too! Staying Ahead of Fraud with Neo4j Knowledge Graph...
PDF
Kick start graph visualization projects
PDF
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
PPTX
Smarter Fraud Detection With Graph Data Science
Detecting eCommerce Fraud with Neo4j and Linkurious
How to use graphs to identify credit card thieves?
3 types of fraud graph analytics can help defeat
Build Intelligent Fraud Prevention with Machine Learning and Graphs
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
GraphTalks Italy - Using graphs to fight financial fraud
Webinar: Fighting Fraud with Graph Databases
Webinar: Stop Complex Fraud in its Tracks with Neo4j
Transform Your Financial Crime Detection with Advanced Graph Analytics
Leveraging graph technology to fight financial fraud
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Fighting Fraud with Neo4j, Kees Vegter
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
GraphTalks Copenhagen - Analyzing Fraud with Graph Databases
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
A visual approach to fraud detection and investigation - Giuseppe Francavilla
Your Enemies Use GenAI Too! Staying Ahead of Fraud with Neo4j Knowledge Graph...
Kick start graph visualization projects
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Smarter Fraud Detection With Graph Data Science

More from Linkurious (20)

PDF
Using graph technology for multi-INT investigations
PPTX
Webinar: What's new in Linkurious Enterprise 2.8
PDF
Graph-based intelligence analysis
PDF
What's new in Linkurious Enterprise 2.7
PDF
How to visualize Cosmos DB graph data
PDF
GraphTech Ecosystem - part 3: Graph Visualization
PDF
Getting started with Cosmos DB + Linkurious Enterprise
PDF
GraphTech Ecosystem - part 2: Graph Analytics
PDF
GraphTech Ecosystem - part 1: Graph Databases
PDF
Graph analytics in Linkurious Enterprise
PDF
Graph technology and data-journalism: the case of the Paradise Papers
PDF
Visualize the Knowledge Graph and Unleash Your Data
PDF
Graph-based Product Lifecycle Management
PDF
Fraudes Financières: Méthodes de Prévention et Détection
PDF
Detecting eCommerce Fraud with Neo4j and Linkurious
PDF
Graph-based Network & IT Management.
PDF
Graph-powered data lineage in Finance
PDF
Using Linkurious in your Enterprise Architecture projects
PDF
Linkurious SDK: Build enterprise-ready graph applications faster
PDF
Fighting financial crime with graph analysis at BIWA Summit 2017
Using graph technology for multi-INT investigations
Webinar: What's new in Linkurious Enterprise 2.8
Graph-based intelligence analysis
What's new in Linkurious Enterprise 2.7
How to visualize Cosmos DB graph data
GraphTech Ecosystem - part 3: Graph Visualization
Getting started with Cosmos DB + Linkurious Enterprise
GraphTech Ecosystem - part 2: Graph Analytics
GraphTech Ecosystem - part 1: Graph Databases
Graph analytics in Linkurious Enterprise
Graph technology and data-journalism: the case of the Paradise Papers
Visualize the Knowledge Graph and Unleash Your Data
Graph-based Product Lifecycle Management
Fraudes Financières: Méthodes de Prévention et Détection
Detecting eCommerce Fraud with Neo4j and Linkurious
Graph-based Network & IT Management.
Graph-powered data lineage in Finance
Using Linkurious in your Enterprise Architecture projects
Linkurious SDK: Build enterprise-ready graph applications faster
Fighting financial crime with graph analysis at BIWA Summit 2017

Recently uploaded (20)

PPT
Reliability_Chapter_ presentation 1221.5784
PDF
Transcultural that can help you someday.
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PPTX
SAP 2 completion done . PRESENTATION.pptx
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PDF
[EN] Industrial Machine Downtime Prediction
PDF
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
PDF
Optimise Shopper Experiences with a Strong Data Estate.pdf
PPTX
IB Computer Science - Internal Assessment.pptx
PDF
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
PDF
Lecture1 pattern recognition............
PDF
Mega Projects Data Mega Projects Data
PPTX
Database Infoormation System (DBIS).pptx
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPT
Predictive modeling basics in data cleaning process
Reliability_Chapter_ presentation 1221.5784
Transcultural that can help you someday.
Data_Analytics_and_PowerBI_Presentation.pptx
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
Miokarditis (Inflamasi pada Otot Jantung)
SAP 2 completion done . PRESENTATION.pptx
Galatica Smart Energy Infrastructure Startup Pitch Deck
Introduction-to-Cloud-ComputingFinal.pptx
Qualitative Qantitative and Mixed Methods.pptx
[EN] Industrial Machine Downtime Prediction
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
Optimise Shopper Experiences with a Strong Data Estate.pdf
IB Computer Science - Internal Assessment.pptx
168300704-gasification-ppt.pdfhghhhsjsjhsuxush
Lecture1 pattern recognition............
Mega Projects Data Mega Projects Data
Database Infoormation System (DBIS).pptx
STUDY DESIGN details- Lt Col Maksud (21).pptx
Predictive modeling basics in data cleaning process

Using graph technologies to fight fraud

  • 1. Using graph technologies to fight fraud. SAS founded in 2013 in Paris | http://linkurio.us | @linkurious
  • 2. French startup specialized in graph-visualization. CTO Web-scale archiving Université de Technologie de Compiègne CMO >5 years in consulting Sciences Po + Ecole de Guerre Economique Jean Villedieu Sébastien Heymann David Rapin CEO Created Gephi Phd in CS and complex systems from UPMC
  • 3. What is a graph? Father Of Father Of Siblings
  • 4. A graph is a set of nodes and relationships. This is a node This is a relationship Father Of Father Of Siblings
  • 5. Why graphs are important?
  • 6. Rise of complex and connected data. Increase in volume New processes, more transactions, more social devices, more devices, etc. Increase in connectedness Customers, products, processes and devices interact with each other.
  • 7. Relational DBS are not good at relationships. ● Cannot model data and relationships without complexity; ● Performance degrades with number and levels of relationships, and database size; ● Adding new types of data and relationships requires schema redesign.
  • 8. Graph DBs unlock connected data. ● Store graphs of billions of nodes and edges; ● Query the graph to find interesting patterns; ● Popularity of graph databases has increased 500% in the last 2 years; ● Recommendation, fraud detection, network management, cybersecurity, health...
  • 9. Why does it work well for fraud?
  • 10. Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Endpoint- centric Navigation- centric Analysis of users and their endpoints Account- centric Cross- channels Entity link analysis Analysis of navigation behavior and suspect patterns Analysis of anomaly behavior on a per-channel basis Analysis of anomaly behavior correlated on a cross-channel basis Analysis of relationships to detect organized collusion Network analysis offers a unique opportunity to identify the sophisticated fraudsters who work under the radar but in a coordinated fashion.
  • 11. AML. Normal customer #1 Normal customer #2 In business with Suspicious individual Known criminal In business with In business with Are my customers in contact with criminals?
  • 12. Conflict of interest. Are my vendors linked to my employees? New vendor Address Employee Registered address Phone number Registered phone Registered phone Registered address
  • 13. Synthetic identity. Customer #1 Address Customer #2 Phone number Bank loan Bank loan Am I loaning money to people who don’t exist?
  • 14. Swiss Leaks. Finding the real owners of $100 billion. Real owner Pseudo owner Offshore entity Swiss bank account Controls ControlsMarried
  • 15. Stolen credit cards. Customer #1 Merchant #3 Customer #2 Merchant #2 Merchant #1 Merchant #4 Who is stealing credit cards? Normal TX Contested TX Contested TX Normal TX Contested TX Contested TX
  • 16. First enterprise-ready graph visualization platform.
  • 17. Improve your fraud detection system. Detect new fraud cases. Graph databases like Neo4j provides the ability to identify fraud patterns at scale. Faster fraud investigations. Linkurious provides a simple interface to investigate suspicious patterns.
  • 18. How it works. Legacy DB DB On-premise server Web-browser
  • 19. Pricing. Starter Enterprise Toolkit Search and explore your data Enterprise-ready security and collaboration Build or improve an existing web application Desktop Server Code Single user Mature organization Mature organization €990/user/year €1,990/user/year €30,000/product/year
  • 21. Want to know more? ● Insider trading: https://linkurio.us/using-graphs-to-uncover-insider-trading-schemes/ ● Conflict of interest: https://linkurio.us/fraud-detection-identifying-conflicts-of-interest-with-graphs/ ● Synthetic identify: https://linkurio.us/how-to-detect-bank-loan-fraud-with-graphs-part-1/ and https://linkurio.us/how-to-detect-bank-loan-fraud-with-graphs-part-2/ ● Ecommerce fraud: https://linkurio.us/reshipping-scams-and-network-visualization/ ● Swiss Leaks: https://linkurio.us/how-the-icij-used-linkurious-to-reveal-the-secrets-hidden-in-the- swiss-leaks-data/ ● Fraud detection in retail: https://linkurio.us/fraud-detection-in-retail/ ● Credit card fraud: https://linkurio.us/stolen-credit-cards-and-fraud-detection-with-neo4j/