SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Detecting Fraud and Money
Laundering in Real-Time with a
Graph Database Part 2
Gaurav Deshpande and Dan Hu
September 26, 2018
Graph Gurus Episode 4
© 2018 TigerGraph. All Rights Reserved
Welcome
● Attendees are muted but you can talk to us via Chat in Zoom
● We will have 10 min for Q&A at the end
● Send questions at any time using the Q&A tab in the Zoom menu
● The webinar will be recorded
● A link to the presentation and reproducible steps will be emailed
2
Developer Edition Download https://www.tigergraph.com/developer/
© 2018 TigerGraph. All Rights Reserved
Today’s Moderator
● Built out and positioned IBM’s Big
Data and Analytics portfolio, driving
45 percent year-over-year growth.
● Led 2 startups through explosive
growth - i2 Technologies (IPO) & Trigo
Technologies (largest MDM
acquisition by IBM)
● Big Data Analytics Veteran, 14 patents
in supply chain management and big
data analytics
3
Gaurav Deshpande, VP of Marketing
© 2018 TigerGraph. All Rights Reserved
Today’s Guru
● BS & MS in Physics from University of
Science and Technology of China (USTC)
● PhD in Quantum Computation from
University of California, Merced
● 3-Year TigerGraph Veteran
● Solution Architect, Graph Query
Language Designer, Database Core
Engineer
4
Dr. Dan Hu, Distinguished AI Research Scientist
© 2018 TigerGraph. All Rights
Reserved
What is Money Laundering?
The process of transforming proceeds of illegal activities to
legitimate money
www.unodc.org/unodc/en/money-laundering/laundrycycle.html
5
© 2018 TigerGraph. All Rights
Reserved
Money Laundering Techniques - Layering
1. Funds to be laundered starts at one
source
2. Layering: Split and transferred in less
suspicious amounts to various accounts.
Split and transfer again...
3. Integration: transfer and consolidate…
4. Funds arrive in the account of a related
party
Perfect fit for graph analytics
6
© 2018 TigerGraph. All Rights
Reserved
Money Laundering Techniques - Layering Loop
● Layering requires many transactions
○ Smaller, less suspicious amounts
○ Complex pattern which is hard to notice
● But criminals still want to keep their money!
● Solution: Pass the funds around in a loop
7
© 2018 TigerGraph. All Rights
Reserved
AML Workflow with TigerGraph and Machine
Learning
8
Anti Money Laundering with TigerGraph In
Depth
Layering Loop Detection
© 2018 TigerGraph. All Rights
Reserved
Anti Money Laundering
• An effective anti money launder system should have the
following two features, i.e.
• Detect All Suspicious Behavior Quickly: system should find all
suspicious patterns of wrongdoing at all time.
• Be Easy to Use and Change: all patterns can be easily applied and
user could easily modify the pattern to adapt new rules.
10
© 2018 TigerGraph. All Rights
Reserved
Detect Suspicious Behavior with TigerGraph
• TigerGraph is a native graph database with multiple built-in
graph analytical tools.
• With its powerful graph query language (GSQL), TigerGraph
can do graph traversal & aggregation in a real time fashion.
• Detection of suspicious behavior can be easily converted into
a graph pattern matching problem.
11
© 2018 TigerGraph. All Rights
Reserved
Examples of detection of Suspicious
Behavior
• Detection of 1-level frequent money sender/receiver
• Detection of 2-level frequent money sender/receiver
• Detection of accounts with loop money transactions
• Controllable search depth (Up to 20 hops)
• Search transactions within a given time window
• Amount lower Limit
• Drain Ratio: (max - min) / max
• All transactions in the loop must be in a forward time series
12
© 2018 TigerGraph. All Rights
Reserved
Graph Schema Design
13
© 2018 TigerGraph. All Rights
Reserved
Loop Detection Pseudocode
a1
t4
t2
t1
send
send
a2
t3
a3
t5
send
send
send
send send
send
send
send
Algorithm: Start with one
account and collect paths
while traversal.
Disadvantages:
● memory cost: collect too
many invalid paths
● computation cost: can not
stop until arriving at the end
of traversal.
14
© 2018 TigerGraph. All Rights
Reserved
Bi-directional Loop Detection Pseudocode
a1
t4
t2
t1
rev_send
send
a2
t3
a3
t5
send
send
send
rev_send rev_send
send
send
send
Phase1: use bidirectional search
to mark the subgraph with loops.
Phase2: Traverse the subgraph
graph to collect loop paths.
Phase3: Apply path related filters
(drain ratio) on obtained paths
Note: The start account could be multiple related
accounts (such as linked by the same ID)
15
© 2018 TigerGraph. All Rights
Reserved
Phase 1: Bidirectional Search
a1
t4
t2
t1
rev_send
send
a2
t3
a3
t5
send
send
send
rev_send rev_send
send
send
send
Algorithm
● Traverse the first half hops from the starting
account. Label vertices with the forward and
backward reachable flags.
● Limit the other half traversal among the
vertices with reachable flags, i.e.
○ Forward reachable vertex can only
reach backward reachable vertices.
○ Backward reachable vertex can only
reach forward reachable vertices.
● The potential loop candidates are the
vertices with both forward and backward
reach flags
16
© 2018 TigerGraph. All Rights
Reserved
Phase 1: Bidirectional Search
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
Search Depth = 6, k = 1
a4 t5
a5
send send
● Traverse the first half hops (3
hops) from the starting account.
● Label vertices with the forward
(green) and backward (blue)
reachable flags.
17
© 2018 TigerGraph. All Rights
Reserved
Phase 1: Bidirectional Search
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
Search Depth = 6, k = 2
● Traverse the first half hops (3
hops) from the starting account.
● Label vertices with the forward
(green) and backward (blue)
reachable flags.
18
© 2018 TigerGraph. All Rights
Reserved
Phase 1: Bidirectional Search
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
Search Depth = 6, k = 3
● Traverse the first half hops (3
hops) from the starting account.
● Label vertices with the forward
(green) and backward (blue)
reachable flags.
19
© 2018 TigerGraph. All Rights
Reserved
Phase 1: Bidirectional Search
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 4
● Forward reachable vertex
can only reach backward
reachable vertices.
● Backward reachable vertex
can only reach forward
reachable vertices.
20
© 2018 TigerGraph. All Rights
Reserved
Phase 1: Bidirectional Search
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 5
rev_send
send
● Forward reachable vertex
can only reach backward
reachable vertices.
● Backward reachable vertex
can only reach forward
reachable vertices.
21
© 2018 TigerGraph. All Rights
Reserved
Phase 1: Bidirectional Search
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 6
rev_send
send
rev_send
send
● Forward reachable vertex
can only reach backward
reachable vertices.
● Backward reachable vertex
can only reach forward
reachable vertices.
22
© 2018 TigerGraph. All Rights
Reserved
Phase 2: SubGraph Traversal
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6
rev_send
send
rev_send
send
● Build Paths for each loop
● Apply filter on transactions
with forward timestamps
23
© 2018 TigerGraph. All Rights
Reserved
Phase 2: SubGraph Traversal
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 1
rev_send
send
rev_send
send
● Build Paths for each loop
● Apply filter on transactions
with forward timestamps
24
© 2018 TigerGraph. All Rights
Reserved
Phase 2: SubGraph Traversal
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 2
rev_send
send
rev_send
send
● Build Paths for each loop
● Apply filter on transactions
with forward timestamps
25
© 2018 TigerGraph. All Rights
Reserved
Phase 2: SubGraph Traversal
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 3
rev_send
send
rev_send
send
● Build Paths for each loop
● Apply filter on transactions
with forward timestamps
26
© 2018 TigerGraph. All Rights
Reserved
Phase 2: SubGraph Traversal
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 4
rev_send
send
rev_send
send
● Build Paths for each loop
● Apply filter on transactions
with forward timestamps
27
© 2018 TigerGraph. All Rights
Reserved
Phase 2: SubGraph Traversal
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 5
rev_send
send
rev_send
send
● Build Paths for each loop
● Apply filter on transactions
with forward timestamps
28
© 2018 TigerGraph. All Rights
Reserved
Phase 2: SubGraph Traversal
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 6
rev_send
send
rev_send
send
● Build Paths for each loop
● Apply filter on transactions
with forward timestamps
29
© 2018 TigerGraph. All Rights
Reserved
Phase 3: Apply Path Filters
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 6
rev_send
send
rev_send
send
● Drain Ratio Check
30
© 2018 TigerGraph. All Rights
Reserved
GSQL Query: Suspicious account with loop
transactions
Graph Data
http://192.168.0.118:14240/#/loading-executor
GSQL implementation on loop transactions
http://192.168.0.118:14240/#/query-editor
For GSQL Starter
https://info.tigergraph.com/en/gsql-webinar-1
31
© 2018 TigerGraph. All Rights
Reserved
GSQL Query Batch Processing
• To search for all possible accounts with loop transactions,
one need to do loop detection query for all candidates.
• One solution would be expand the single account loop
detection algorithm to multiple accounts, which may
greatly complicate the query and may actually reduce the
performance.
• GSQL Query provide an easy alternative way to speed up
batch processing using Query Calling Query Feature.
32
© 2018 TigerGraph. All Rights
Reserved
GSQL Query Batch Processing
Query Calling Query in parallel with GSQL
• Use Vertex Block to parallelization
• Start a Vertex Block with all candidate vertices
• Call the loop detection subquery in ACCUM block
• Use Edge Block to parallelization
• Start a Edge Block with all candidate vertices as target vertex
• Call the loop detection subquery in POST-ACCUM block
33
© 2018 TigerGraph. All Rights
Reserved
GSQL Query Batch Processing
GSQL loop transactions in batch
http://192.168.0.118:14240/#/query-editor
34
© 2018 TigerGraph. All Rights
Reserved
GSQL Query: Suspicious account with loop
transactions
35
Q&A
Please send your questions via the Q&A menu in Zoom
36
© 2018 TigerGraph. All Rights Reserved
Thank You!
37
Compare the Developer Edition and Enterprise Free Trial
https://www.tigergraph.com/download/
Guru Scripts
https://github.com/tigergraph/ecosys/tree/master/guru_scripts
Join our Developer Forum
https://groups.google.com/a/opengsql.org/forum/#!forum/gsql-users
Download our Ebook
https://info.tigergraph.com/ebook
@TigerGraphDB youtube.com/tigergraph facebook.com/TigerGraphDB linkedin.com/company/TigerGraph
User Defined Function
38

Weitere ähnliche Inhalte

Was ist angesagt?

An overview of Neo4j Internals
An overview of Neo4j InternalsAn overview of Neo4j Internals
An overview of Neo4j Internals
Tobias Lindaaker
 
How to Rebuild an End-to-End ML Pipeline with Databricks and Upwork with Than...
How to Rebuild an End-to-End ML Pipeline with Databricks and Upwork with Than...How to Rebuild an End-to-End ML Pipeline with Databricks and Upwork with Than...
How to Rebuild an End-to-End ML Pipeline with Databricks and Upwork with Than...
Databricks
 

Was ist angesagt? (20)

Airflow at lyft
Airflow at lyftAirflow at lyft
Airflow at lyft
 
Get Started with the Most Advanced Edition Yet of Neo4j Graph Data Science
Get Started with the Most Advanced Edition Yet of Neo4j Graph Data ScienceGet Started with the Most Advanced Edition Yet of Neo4j Graph Data Science
Get Started with the Most Advanced Edition Yet of Neo4j Graph Data Science
 
Spark streaming , Spark SQL
Spark streaming , Spark SQLSpark streaming , Spark SQL
Spark streaming , Spark SQL
 
Traversing Graphs with Gremlin
Traversing Graphs with GremlinTraversing Graphs with Gremlin
Traversing Graphs with Gremlin
 
Data engineering in 10 years.pdf
Data engineering in 10 years.pdfData engineering in 10 years.pdf
Data engineering in 10 years.pdf
 
From Data Warehouse to Lakehouse
From Data Warehouse to LakehouseFrom Data Warehouse to Lakehouse
From Data Warehouse to Lakehouse
 
Productionzing ML Model Using MLflow Model Serving
Productionzing ML Model Using MLflow Model ServingProductionzing ML Model Using MLflow Model Serving
Productionzing ML Model Using MLflow Model Serving
 
A Thorough Comparison of Delta Lake, Iceberg and Hudi
A Thorough Comparison of Delta Lake, Iceberg and HudiA Thorough Comparison of Delta Lake, Iceberg and Hudi
A Thorough Comparison of Delta Lake, Iceberg and Hudi
 
Deep Natural Language Processing for Search Systems (sigir 2019 tutorial)
Deep Natural Language Processing for Search Systems (sigir 2019 tutorial)Deep Natural Language Processing for Search Systems (sigir 2019 tutorial)
Deep Natural Language Processing for Search Systems (sigir 2019 tutorial)
 
LLaMA 2.pptx
LLaMA 2.pptxLLaMA 2.pptx
LLaMA 2.pptx
 
Hadoop Meetup Jan 2019 - HDFS Scalability and Consistent Reads from Standby Node
Hadoop Meetup Jan 2019 - HDFS Scalability and Consistent Reads from Standby NodeHadoop Meetup Jan 2019 - HDFS Scalability and Consistent Reads from Standby Node
Hadoop Meetup Jan 2019 - HDFS Scalability and Consistent Reads from Standby Node
 
An overview of Neo4j Internals
An overview of Neo4j InternalsAn overview of Neo4j Internals
An overview of Neo4j Internals
 
LLaMA Open and Efficient Foundation Language Models - 230528.pdf
LLaMA Open and Efficient Foundation Language Models - 230528.pdfLLaMA Open and Efficient Foundation Language Models - 230528.pdf
LLaMA Open and Efficient Foundation Language Models - 230528.pdf
 
https://www.slideshare.net/neo4j/a-fusion-of-machine-learning-and-graph-analy...
https://www.slideshare.net/neo4j/a-fusion-of-machine-learning-and-graph-analy...https://www.slideshare.net/neo4j/a-fusion-of-machine-learning-and-graph-analy...
https://www.slideshare.net/neo4j/a-fusion-of-machine-learning-and-graph-analy...
 
TigerGraph UI Toolkits Financial Crimes
TigerGraph UI Toolkits Financial CrimesTigerGraph UI Toolkits Financial Crimes
TigerGraph UI Toolkits Financial Crimes
 
Consolidating MLOps at One of Europe’s Biggest Airports
Consolidating MLOps at One of Europe’s Biggest AirportsConsolidating MLOps at One of Europe’s Biggest Airports
Consolidating MLOps at One of Europe’s Biggest Airports
 
How to Rebuild an End-to-End ML Pipeline with Databricks and Upwork with Than...
How to Rebuild an End-to-End ML Pipeline with Databricks and Upwork with Than...How to Rebuild an End-to-End ML Pipeline with Databricks and Upwork with Than...
How to Rebuild an End-to-End ML Pipeline with Databricks and Upwork with Than...
 
Delta lake and the delta architecture
Delta lake and the delta architectureDelta lake and the delta architecture
Delta lake and the delta architecture
 
RAPIDS: GPU-Accelerated ETL and Feature Engineering
RAPIDS: GPU-Accelerated ETL and Feature EngineeringRAPIDS: GPU-Accelerated ETL and Feature Engineering
RAPIDS: GPU-Accelerated ETL and Feature Engineering
 
Salesforce enabling real time scenarios at scale using kafka
Salesforce enabling real time scenarios at scale using kafkaSalesforce enabling real time scenarios at scale using kafka
Salesforce enabling real time scenarios at scale using kafka
 

Ähnlich wie Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2

Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
Databricks
 

Ähnlich wie Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2 (20)

Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
 
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...
 
Graph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 5: Webinar PageRankGraph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 5: Webinar PageRank
 
Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...
Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...
Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...
 
Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph
Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph  Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph
Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph
 
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
 
Network Traffic Packets Classified as Textual Images for Intrusion Detection
Network Traffic Packets Classified as Textual Images for Intrusion DetectionNetwork Traffic Packets Classified as Textual Images for Intrusion Detection
Network Traffic Packets Classified as Textual Images for Intrusion Detection
 
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
 
Scaling up business value with real-time operational graph analytics
Scaling up business value with real-time operational graph analyticsScaling up business value with real-time operational graph analytics
Scaling up business value with real-time operational graph analytics
 
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
 
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 ClassificationUsing Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
 
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityUsing Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
 
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
 
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
 
Surprising Advantages of Streaming - ACM March 2018
Surprising Advantages of Streaming - ACM March 2018Surprising Advantages of Streaming - ACM March 2018
Surprising Advantages of Streaming - ACM March 2018
 
Graph Gurus Episode 11: Accumulators for Complex Graph Analytics
Graph Gurus Episode 11: Accumulators for Complex Graph AnalyticsGraph Gurus Episode 11: Accumulators for Complex Graph Analytics
Graph Gurus Episode 11: Accumulators for Complex Graph Analytics
 
Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...
Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...
Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...
 
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
 
Introducing VenmoPlus.com 6/27 version
Introducing VenmoPlus.com 6/27 versionIntroducing VenmoPlus.com 6/27 version
Introducing VenmoPlus.com 6/27 version
 
20181129 keynote augmented intelligence and artificial intelligence
20181129 keynote augmented intelligence and artificial intelligence20181129 keynote augmented intelligence and artificial intelligence
20181129 keynote augmented intelligence and artificial intelligence
 

Mehr von TigerGraph

Mehr von TigerGraph (20)

MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATIONMAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
 
Building an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signalsBuilding an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signals
 
Care Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information SystemCare Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information System
 
Correspondent Banking Networks
Correspondent Banking NetworksCorrespondent Banking Networks
Correspondent Banking Networks
 
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
 
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
 
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningFraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph Learning
 
Fraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On GraphsFraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On Graphs
 
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraphFROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
 
Customer Experience Management
Customer Experience ManagementCustomer Experience Management
Customer Experience Management
 
Graph+AI for Fin. Services
Graph+AI for Fin. ServicesGraph+AI for Fin. Services
Graph+AI for Fin. Services
 
Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.
 
Plume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis LibraryPlume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis Library
 
TigerGraph.js
TigerGraph.jsTigerGraph.js
TigerGraph.js
 
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMSGRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
 
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
 
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
 
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUIMachine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
 
Recommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine LearningRecommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine Learning
 
Supply Chain and Logistics Management with Graph & AI
Supply Chain and Logistics Management with Graph & AISupply Chain and Logistics Management with Graph & AI
Supply Chain and Logistics Management with Graph & AI
 

Kürzlich hochgeladen

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Kürzlich hochgeladen (20)

Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 

Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2

  • 1. Detecting Fraud and Money Laundering in Real-Time with a Graph Database Part 2 Gaurav Deshpande and Dan Hu September 26, 2018 Graph Gurus Episode 4
  • 2. © 2018 TigerGraph. All Rights Reserved Welcome ● Attendees are muted but you can talk to us via Chat in Zoom ● We will have 10 min for Q&A at the end ● Send questions at any time using the Q&A tab in the Zoom menu ● The webinar will be recorded ● A link to the presentation and reproducible steps will be emailed 2 Developer Edition Download https://www.tigergraph.com/developer/
  • 3. © 2018 TigerGraph. All Rights Reserved Today’s Moderator ● Built out and positioned IBM’s Big Data and Analytics portfolio, driving 45 percent year-over-year growth. ● Led 2 startups through explosive growth - i2 Technologies (IPO) & Trigo Technologies (largest MDM acquisition by IBM) ● Big Data Analytics Veteran, 14 patents in supply chain management and big data analytics 3 Gaurav Deshpande, VP of Marketing
  • 4. © 2018 TigerGraph. All Rights Reserved Today’s Guru ● BS & MS in Physics from University of Science and Technology of China (USTC) ● PhD in Quantum Computation from University of California, Merced ● 3-Year TigerGraph Veteran ● Solution Architect, Graph Query Language Designer, Database Core Engineer 4 Dr. Dan Hu, Distinguished AI Research Scientist
  • 5. © 2018 TigerGraph. All Rights Reserved What is Money Laundering? The process of transforming proceeds of illegal activities to legitimate money www.unodc.org/unodc/en/money-laundering/laundrycycle.html 5
  • 6. © 2018 TigerGraph. All Rights Reserved Money Laundering Techniques - Layering 1. Funds to be laundered starts at one source 2. Layering: Split and transferred in less suspicious amounts to various accounts. Split and transfer again... 3. Integration: transfer and consolidate… 4. Funds arrive in the account of a related party Perfect fit for graph analytics 6
  • 7. © 2018 TigerGraph. All Rights Reserved Money Laundering Techniques - Layering Loop ● Layering requires many transactions ○ Smaller, less suspicious amounts ○ Complex pattern which is hard to notice ● But criminals still want to keep their money! ● Solution: Pass the funds around in a loop 7
  • 8. © 2018 TigerGraph. All Rights Reserved AML Workflow with TigerGraph and Machine Learning 8
  • 9. Anti Money Laundering with TigerGraph In Depth Layering Loop Detection
  • 10. © 2018 TigerGraph. All Rights Reserved Anti Money Laundering • An effective anti money launder system should have the following two features, i.e. • Detect All Suspicious Behavior Quickly: system should find all suspicious patterns of wrongdoing at all time. • Be Easy to Use and Change: all patterns can be easily applied and user could easily modify the pattern to adapt new rules. 10
  • 11. © 2018 TigerGraph. All Rights Reserved Detect Suspicious Behavior with TigerGraph • TigerGraph is a native graph database with multiple built-in graph analytical tools. • With its powerful graph query language (GSQL), TigerGraph can do graph traversal & aggregation in a real time fashion. • Detection of suspicious behavior can be easily converted into a graph pattern matching problem. 11
  • 12. © 2018 TigerGraph. All Rights Reserved Examples of detection of Suspicious Behavior • Detection of 1-level frequent money sender/receiver • Detection of 2-level frequent money sender/receiver • Detection of accounts with loop money transactions • Controllable search depth (Up to 20 hops) • Search transactions within a given time window • Amount lower Limit • Drain Ratio: (max - min) / max • All transactions in the loop must be in a forward time series 12
  • 13. © 2018 TigerGraph. All Rights Reserved Graph Schema Design 13
  • 14. © 2018 TigerGraph. All Rights Reserved Loop Detection Pseudocode a1 t4 t2 t1 send send a2 t3 a3 t5 send send send send send send send send Algorithm: Start with one account and collect paths while traversal. Disadvantages: ● memory cost: collect too many invalid paths ● computation cost: can not stop until arriving at the end of traversal. 14
  • 15. © 2018 TigerGraph. All Rights Reserved Bi-directional Loop Detection Pseudocode a1 t4 t2 t1 rev_send send a2 t3 a3 t5 send send send rev_send rev_send send send send Phase1: use bidirectional search to mark the subgraph with loops. Phase2: Traverse the subgraph graph to collect loop paths. Phase3: Apply path related filters (drain ratio) on obtained paths Note: The start account could be multiple related accounts (such as linked by the same ID) 15
  • 16. © 2018 TigerGraph. All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 t5 send send send rev_send rev_send send send send Algorithm ● Traverse the first half hops from the starting account. Label vertices with the forward and backward reachable flags. ● Limit the other half traversal among the vertices with reachable flags, i.e. ○ Forward reachable vertex can only reach backward reachable vertices. ○ Backward reachable vertex can only reach forward reachable vertices. ● The potential loop candidates are the vertices with both forward and backward reach flags 16
  • 17. © 2018 TigerGraph. All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send Search Depth = 6, k = 1 a4 t5 a5 send send ● Traverse the first half hops (3 hops) from the starting account. ● Label vertices with the forward (green) and backward (blue) reachable flags. 17
  • 18. © 2018 TigerGraph. All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send Search Depth = 6, k = 2 ● Traverse the first half hops (3 hops) from the starting account. ● Label vertices with the forward (green) and backward (blue) reachable flags. 18
  • 19. © 2018 TigerGraph. All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send Search Depth = 6, k = 3 ● Traverse the first half hops (3 hops) from the starting account. ● Label vertices with the forward (green) and backward (blue) reachable flags. 19
  • 20. © 2018 TigerGraph. All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 4 ● Forward reachable vertex can only reach backward reachable vertices. ● Backward reachable vertex can only reach forward reachable vertices. 20
  • 21. © 2018 TigerGraph. All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 5 rev_send send ● Forward reachable vertex can only reach backward reachable vertices. ● Backward reachable vertex can only reach forward reachable vertices. 21
  • 22. © 2018 TigerGraph. All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 6 rev_send send rev_send send ● Forward reachable vertex can only reach backward reachable vertices. ● Backward reachable vertex can only reach forward reachable vertices. 22
  • 23. © 2018 TigerGraph. All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 23
  • 24. © 2018 TigerGraph. All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 1 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 24
  • 25. © 2018 TigerGraph. All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 2 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 25
  • 26. © 2018 TigerGraph. All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 3 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 26
  • 27. © 2018 TigerGraph. All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 4 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 27
  • 28. © 2018 TigerGraph. All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 5 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 28
  • 29. © 2018 TigerGraph. All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 6 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 29
  • 30. © 2018 TigerGraph. All Rights Reserved Phase 3: Apply Path Filters a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 6 rev_send send rev_send send ● Drain Ratio Check 30
  • 31. © 2018 TigerGraph. All Rights Reserved GSQL Query: Suspicious account with loop transactions Graph Data http://192.168.0.118:14240/#/loading-executor GSQL implementation on loop transactions http://192.168.0.118:14240/#/query-editor For GSQL Starter https://info.tigergraph.com/en/gsql-webinar-1 31
  • 32. © 2018 TigerGraph. All Rights Reserved GSQL Query Batch Processing • To search for all possible accounts with loop transactions, one need to do loop detection query for all candidates. • One solution would be expand the single account loop detection algorithm to multiple accounts, which may greatly complicate the query and may actually reduce the performance. • GSQL Query provide an easy alternative way to speed up batch processing using Query Calling Query Feature. 32
  • 33. © 2018 TigerGraph. All Rights Reserved GSQL Query Batch Processing Query Calling Query in parallel with GSQL • Use Vertex Block to parallelization • Start a Vertex Block with all candidate vertices • Call the loop detection subquery in ACCUM block • Use Edge Block to parallelization • Start a Edge Block with all candidate vertices as target vertex • Call the loop detection subquery in POST-ACCUM block 33
  • 34. © 2018 TigerGraph. All Rights Reserved GSQL Query Batch Processing GSQL loop transactions in batch http://192.168.0.118:14240/#/query-editor 34
  • 35. © 2018 TigerGraph. All Rights Reserved GSQL Query: Suspicious account with loop transactions 35
  • 36. Q&A Please send your questions via the Q&A menu in Zoom 36
  • 37. © 2018 TigerGraph. All Rights Reserved Thank You! 37 Compare the Developer Edition and Enterprise Free Trial https://www.tigergraph.com/download/ Guru Scripts https://github.com/tigergraph/ecosys/tree/master/guru_scripts Join our Developer Forum https://groups.google.com/a/opengsql.org/forum/#!forum/gsql-users Download our Ebook https://info.tigergraph.com/ebook @TigerGraphDB youtube.com/tigergraph facebook.com/TigerGraphDB linkedin.com/company/TigerGraph