SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
Detecting eCommerce
fraud with Neo4j and
Linkurious.
SAS founded in 2013 in Paris | http://linkurio.us | @linkurious
Agenda and speakers.
▪ Intro
▪ Graph technologies
▪ eCommerce Fraud
▪ Detection technical challenges
▪ Benefits of using Linkurious & Neo4j
▪ Demo
▪ How it works
▪ Use case
▪ Q&A
Mohsan is a Business Developer
at Linkurious. He works with
companies worldwide to help them find
solutions to uncover hidden insights in
their connected data.
“
”
Elise is a Marketing Project
Manager at Linkurious. She works
with Linkurious' partners to cover the
emerging graph technology use
cases.
“
”
Graph visualization and analysis
startup founded in 2013.
200+ customers worldwide (NASA,
Cisco, French Ministry of Finances).
Linkurious Enterprise and Linkurious
SDK.
About Linkurious.
Unlocking the value of graph data.
A graph is a set of data recorded as
entities (nodes) and relationships
(edges).
Graph databases like Neo4j store &
process large connected graphs in
real-time.
Linkurious’ software helps analysts
easily detect and investigate insights
hidden in graph data. Node
STORE
ACCESS
Data
Graph
database
Linkurious
ORGANIZE
Edge
Typical use cases.
Cyber-security
Servers, switches, routers,
applications, etc.
Suspicious activity patterns,
identify impact of a compromised
asset.
IT Operations
Servers, switches, routers,
applications, etc.
Impact analysis, root cause
analysis.
Intelligence
People, emails, transactions,
phone call records, social.
Detecting and investigating
criminal or terrorist networks.
AML
People, transactions, watch-lists,
companies, organizations.
Detecting suspicious
transactions, identify beneficiary
owners.
Fraud
Claims, people, financial records,
personal data.
Detecting and investigating
criminal networks.
Life Sciences
Proteins, publications,
researchers, patents, topics.
Understanding protein
interactions, new drugs.
Enterprise
Architecture
Servers, applications, metadata,
business objectives.
Data lineage, curating enterprise
architecture.
Fraud schemes that uses internet
related means (emails, websites, etc) to
present fraudulent solicitations to
prospective victims or to conduct
fraudulent transactions.
A large number of fraud schemes.
Friendly fraud
Affiliate fraud
Account takeover
Identity theft
Reshipping fraud
Promotion abuse
Phishing
Merchant fraud
A fertile ground for eCommerce fraud.
eCommerce merchants
loose 1.39% of revenue to
fraud in average, which
accounts for billions of
dollars worldwide.
Juniper, ”Online payment fraud
whitepaper 2016-2020”.
Organized networks
New technologies
eCommerce growth
Using a five-layers approach to detect online fraud.
Endpoint
centric
Navigation
centric
Channel
centric
Cross-channel
centric
Entity link
analysis
Layer 1 Layer 2 Layer 3 Layer 4 Layer 5
Gartner Inc, “The conceptual model of a layered approach for fraud detection” in Market Guide, Online Fraud Detection: A Layered Approach
Few systems react in real-time & block
transactions at the point of service.
Relational databases & siloed
products offer no cross-channel view.
Challenges with traditional fraud solutions.
Closed architecture makes it hard to
keep pace with new schemes.
Cross-channel centric layer.
Combine it with external data sources
& improve risk assessment.
Get a cross-channel & cross-product
view of your client behaviors.
Model your data into a single graph
& add new type of data at anytime.
Entity-link analysis
Uncover hidden relationships in your
connected data.
Identify fraud rings and suspicious
patterns.
Analyze activities and relationships
within a network of related entities.
Demo: Detecting eCommerce
fraud with Linkurious and Neo4j.
- Modeling data into a graph
- Cross-channel overview of the data
- Investigation of entity relationships in Linkurious
- Suspicious pattern detection and analysis
Modeling our data into a graph.
Load data into Neo4j from multiple
data sources.
Windows / Linux / Mac, on-premise
or in the cloud, supports all modern
browsers.
Use Linkurious Enterprise
off-the-shelf interface or build your
custom application with Linkurious
SDK.
How it works.
Omnichannel data (transactional
data, behavior analytics, 3rd party
data, user devices data, etc...)
Synchronize
automatically
Neo4j Graph
database
Linkurious Enterprise
or custom application
Background
Fraud and compliance team of an
international bank.
Problem
Increase of credit card fraud online
and difficulty to detect suspicious
cases.
Benefit
Detection of suspicious patterns
and fast investigation.
Online banking fraud detection.
Questions?
www.linkurio.us
contact@linkurio.us
Sources and links.
Bibliography :
● DB-Engines. Knowledge Base of Relational and NoSQL Database Management Systems. Ranking
per Categories. Available: http://db-engines.com/en/ranking_categories [Avril 2017]
● eMarketer, “Worldwide Retail Ecommerce Sales: The eMarketer Forecast for 2016”. Available:
http://totalaccess.emarketer.com/Reports/Viewer.aspx?R=2001849&ecid=MX1371
● Juniper, Online payement whitepaper 2016-2020. Available :
http://www.experian.com/assets/decision-analytics/white-papers/juniper-research-online-paymen
t-fraud-wp-2016.pdf
● United states Department of Justice “19 People Indicted Following Investigations”. Available:
https://www.justice.gov/usao-dc/pr/19-people-indicted-following-investigations-international-frau
d-and-money-laundering
Images:
● Istock
● Growth icon by hans draiman from the Noun Project
● Cash flow icon by rflor from the Noun Project
● Dollar notification icon by Martin Lebreton from the Noun Project

Weitere ähnliche Inhalte

Was ist angesagt?

TensorFlow London 18: Dr Alastair Moore, Towards the use of Graphical Models ...
TensorFlow London 18: Dr Alastair Moore, Towards the use of Graphical Models ...TensorFlow London 18: Dr Alastair Moore, Towards the use of Graphical Models ...
TensorFlow London 18: Dr Alastair Moore, Towards the use of Graphical Models ...
Seldon
 
5. big data vs it stki - pini cohen
5. big data vs  it    stki - pini cohen5. big data vs  it    stki - pini cohen
5. big data vs it stki - pini cohen
Taldor Group
 
[PhDThesis2021] - Augmenting the knowledge pyramid with unconventional data a...
[PhDThesis2021] - Augmenting the knowledge pyramid with unconventional data a...[PhDThesis2021] - Augmenting the knowledge pyramid with unconventional data a...
[PhDThesis2021] - Augmenting the knowledge pyramid with unconventional data a...
University of Bologna
 
doolyk_rev_p_001.compressed
doolyk_rev_p_001.compresseddoolyk_rev_p_001.compressed
doolyk_rev_p_001.compressed
Doolytics
 

Was ist angesagt? (20)

Navigating large graphs like a breeze with Linkurious
Navigating large graphs like a breeze with LinkuriousNavigating large graphs like a breeze with Linkurious
Navigating large graphs like a breeze with Linkurious
 
International Journal of Computer Science, Engineering and Information Techn...
International Journal of Computer Science, Engineering and  Information Techn...International Journal of Computer Science, Engineering and  Information Techn...
International Journal of Computer Science, Engineering and Information Techn...
 
Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science Machine Learning Deep Learning AI and Data Science
Machine Learning Deep Learning AI and Data Science
 
Data Activities in Austria
Data Activities in AustriaData Activities in Austria
Data Activities in Austria
 
Meme Index. Analyzing fads and sensations on the Internet by Miguel Romero at...
Meme Index. Analyzing fads and sensations on the Internet by Miguel Romero at...Meme Index. Analyzing fads and sensations on the Internet by Miguel Romero at...
Meme Index. Analyzing fads and sensations on the Internet by Miguel Romero at...
 
Study: #Big Data in #Austria
Study: #Big Data in #AustriaStudy: #Big Data in #Austria
Study: #Big Data in #Austria
 
TensorFlow London 18: Dr Alastair Moore, Towards the use of Graphical Models ...
TensorFlow London 18: Dr Alastair Moore, Towards the use of Graphical Models ...TensorFlow London 18: Dr Alastair Moore, Towards the use of Graphical Models ...
TensorFlow London 18: Dr Alastair Moore, Towards the use of Graphical Models ...
 
A gentle introduction to relational learning
A gentle introduction to relational learning A gentle introduction to relational learning
A gentle introduction to relational learning
 
5. big data vs it stki - pini cohen
5. big data vs  it    stki - pini cohen5. big data vs  it    stki - pini cohen
5. big data vs it stki - pini cohen
 
The Python ecosystem for data science - Landscape Overview
The Python ecosystem for data science - Landscape OverviewThe Python ecosystem for data science - Landscape Overview
The Python ecosystem for data science - Landscape Overview
 
[PhDThesis2021] - Augmenting the knowledge pyramid with unconventional data a...
[PhDThesis2021] - Augmenting the knowledge pyramid with unconventional data a...[PhDThesis2021] - Augmenting the knowledge pyramid with unconventional data a...
[PhDThesis2021] - Augmenting the knowledge pyramid with unconventional data a...
 
Proposed Talk Outline for Pycon2017
Proposed Talk Outline for Pycon2017 Proposed Talk Outline for Pycon2017
Proposed Talk Outline for Pycon2017
 
Building a Consistent Hybrid Cloud Semantic Model In Denodo
Building a Consistent Hybrid Cloud Semantic Model In DenodoBuilding a Consistent Hybrid Cloud Semantic Model In Denodo
Building a Consistent Hybrid Cloud Semantic Model In Denodo
 
How to design ai functions to the cloud native infra
How to design ai functions to the cloud native infraHow to design ai functions to the cloud native infra
How to design ai functions to the cloud native infra
 
[DOLAP2019] Augmented Business Intelligence
[DOLAP2019] Augmented Business Intelligence[DOLAP2019] Augmented Business Intelligence
[DOLAP2019] Augmented Business Intelligence
 
Future.ready().watson dataplatform 01
Future.ready().watson dataplatform 01Future.ready().watson dataplatform 01
Future.ready().watson dataplatform 01
 
Privacy preserving machine learning
Privacy preserving machine learningPrivacy preserving machine learning
Privacy preserving machine learning
 
Knowledge Discovery in Production
Knowledge Discovery in ProductionKnowledge Discovery in Production
Knowledge Discovery in Production
 
doolyk_rev_p_001.compressed
doolyk_rev_p_001.compresseddoolyk_rev_p_001.compressed
doolyk_rev_p_001.compressed
 
Discovering Things and Things’ data/services
Discovering Things and  Things’ data/servicesDiscovering Things and  Things’ data/services
Discovering Things and Things’ data/services
 

Ähnlich wie Detecting eCommerce Fraud with Neo4j and Linkurious

The Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent ApplicationsThe Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent Applications
Neo4j
 
Phishing URL Detection
Phishing URL DetectionPhishing URL Detection
Phishing URL Detection
ijtsrd
 

Ähnlich wie Detecting eCommerce Fraud with Neo4j and Linkurious (20)

Next Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4jNext Generation Fraud Solutions using Neo4j
Next Generation Fraud Solutions using Neo4j
 
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
Neo4j GraphTalk Copenhagen - Next Generation Solutions using Neo4j
 
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4jAI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
AI, ML and Graph Algorithms: Real Life Use Cases with Neo4j
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle Management
 
Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.
 
How Startups can leverage big data?
How Startups can leverage big data?How Startups can leverage big data?
How Startups can leverage big data?
 
Using graph technologies to fight fraud
Using graph technologies to fight fraudUsing graph technologies to fight fraud
Using graph technologies to fight fraud
 
RDBMS to Graph Webinar
RDBMS to Graph WebinarRDBMS to Graph Webinar
RDBMS to Graph Webinar
 
Using Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projectsUsing Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projects
 
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdfNeo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
Neo4j_Exploring the Impact of Graph Technology on Financial Services.pdf
 
The Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent ApplicationsThe Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent Applications
 
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdfRabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
Rabobank_Exploring the Impact of Graph Technology on Financial Services.pdf
 
GraphTour - Next generation solutions using Neo4j
GraphTour - Next generation solutions using Neo4jGraphTour - Next generation solutions using Neo4j
GraphTour - Next generation solutions using Neo4j
 
1. The Importance of Graphs in Government
1. The Importance of Graphs in Government1. The Importance of Graphs in Government
1. The Importance of Graphs in Government
 
Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...
Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...
Fast Data and Architecting the Digital Enterprise Fast Data drivers, componen...
 
WeDo Technologies Blog 2014
WeDo Technologies Blog 2014WeDo Technologies Blog 2014
WeDo Technologies Blog 2014
 
Phishing URL Detection
Phishing URL DetectionPhishing URL Detection
Phishing URL Detection
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
 
Web Scraping Services.pptx
Web Scraping Services.pptxWeb Scraping Services.pptx
Web Scraping Services.pptx
 

Mehr von Neo4j

Mehr von Neo4j (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansQIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
QIAGEN: Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
ISDEFE - GraphSummit Madrid - ARETA: Aviation Real-Time Emissions Token Accre...
 
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafosBBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
BBVA - GraphSummit Madrid - Caso de éxito en BBVA: Optimizando con grafos
 
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
Graph Everywhere - Josep Taruella - Por qué Graph Data Science en tus modelos...
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!Webinar - IA generativa e grafi Neo4j: RAG time!
Webinar - IA generativa e grafi Neo4j: RAG time!
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG time
 
Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)Neo4j: Data Engineering for RAG (retrieval augmented generation)
Neo4j: Data Engineering for RAG (retrieval augmented generation)
 
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdfNeo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
Neo4j Graph Summit 2024 Workshop - EMEA - Breda_and_Munchen.pdf
 
Enabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge GraphsEnabling GenAI Breakthroughs with Knowledge Graphs
Enabling GenAI Breakthroughs with Knowledge Graphs
 
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdfNeo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
Neo4j_Anurag Tandon_Product Vision and Roadmap.Benelux.pptx.pdf
 
Neo4j Jesus Barrasa The Art of the Possible with Graph
Neo4j Jesus Barrasa The Art of the Possible with GraphNeo4j Jesus Barrasa The Art of the Possible with Graph
Neo4j Jesus Barrasa The Art of the Possible with Graph
 
SWIFT: Maintaining Critical Standards in the Financial Services Industry with...
SWIFT: Maintaining Critical Standards in the Financial Services Industry with...SWIFT: Maintaining Critical Standards in the Financial Services Industry with...
SWIFT: Maintaining Critical Standards in the Financial Services Industry with...
 
Deloitte & Red Cross: Talk to your data with Knowledge-enriched Generative AI
Deloitte & Red Cross: Talk to your data with Knowledge-enriched Generative AIDeloitte & Red Cross: Talk to your data with Knowledge-enriched Generative AI
Deloitte & Red Cross: Talk to your data with Knowledge-enriched Generative AI
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Detecting eCommerce Fraud with Neo4j and Linkurious

  • 1. Detecting eCommerce fraud with Neo4j and Linkurious. SAS founded in 2013 in Paris | http://linkurio.us | @linkurious
  • 2. Agenda and speakers. ▪ Intro ▪ Graph technologies ▪ eCommerce Fraud ▪ Detection technical challenges ▪ Benefits of using Linkurious & Neo4j ▪ Demo ▪ How it works ▪ Use case ▪ Q&A Mohsan is a Business Developer at Linkurious. He works with companies worldwide to help them find solutions to uncover hidden insights in their connected data. “ ” Elise is a Marketing Project Manager at Linkurious. She works with Linkurious' partners to cover the emerging graph technology use cases. “ ”
  • 3. Graph visualization and analysis startup founded in 2013. 200+ customers worldwide (NASA, Cisco, French Ministry of Finances). Linkurious Enterprise and Linkurious SDK. About Linkurious.
  • 4. Unlocking the value of graph data. A graph is a set of data recorded as entities (nodes) and relationships (edges). Graph databases like Neo4j store & process large connected graphs in real-time. Linkurious’ software helps analysts easily detect and investigate insights hidden in graph data. Node STORE ACCESS Data Graph database Linkurious ORGANIZE Edge
  • 5. Typical use cases. Cyber-security Servers, switches, routers, applications, etc. Suspicious activity patterns, identify impact of a compromised asset. IT Operations Servers, switches, routers, applications, etc. Impact analysis, root cause analysis. Intelligence People, emails, transactions, phone call records, social. Detecting and investigating criminal or terrorist networks. AML People, transactions, watch-lists, companies, organizations. Detecting suspicious transactions, identify beneficiary owners. Fraud Claims, people, financial records, personal data. Detecting and investigating criminal networks. Life Sciences Proteins, publications, researchers, patents, topics. Understanding protein interactions, new drugs. Enterprise Architecture Servers, applications, metadata, business objectives. Data lineage, curating enterprise architecture.
  • 6. Fraud schemes that uses internet related means (emails, websites, etc) to present fraudulent solicitations to prospective victims or to conduct fraudulent transactions.
  • 7. A large number of fraud schemes. Friendly fraud Affiliate fraud Account takeover Identity theft Reshipping fraud Promotion abuse Phishing Merchant fraud
  • 8. A fertile ground for eCommerce fraud. eCommerce merchants loose 1.39% of revenue to fraud in average, which accounts for billions of dollars worldwide. Juniper, ”Online payment fraud whitepaper 2016-2020”. Organized networks New technologies eCommerce growth
  • 9. Using a five-layers approach to detect online fraud. Endpoint centric Navigation centric Channel centric Cross-channel centric Entity link analysis Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Gartner Inc, “The conceptual model of a layered approach for fraud detection” in Market Guide, Online Fraud Detection: A Layered Approach
  • 10. Few systems react in real-time & block transactions at the point of service. Relational databases & siloed products offer no cross-channel view. Challenges with traditional fraud solutions. Closed architecture makes it hard to keep pace with new schemes.
  • 11. Cross-channel centric layer. Combine it with external data sources & improve risk assessment. Get a cross-channel & cross-product view of your client behaviors. Model your data into a single graph & add new type of data at anytime.
  • 12. Entity-link analysis Uncover hidden relationships in your connected data. Identify fraud rings and suspicious patterns. Analyze activities and relationships within a network of related entities.
  • 13. Demo: Detecting eCommerce fraud with Linkurious and Neo4j. - Modeling data into a graph - Cross-channel overview of the data - Investigation of entity relationships in Linkurious - Suspicious pattern detection and analysis
  • 14. Modeling our data into a graph.
  • 15. Load data into Neo4j from multiple data sources. Windows / Linux / Mac, on-premise or in the cloud, supports all modern browsers. Use Linkurious Enterprise off-the-shelf interface or build your custom application with Linkurious SDK. How it works. Omnichannel data (transactional data, behavior analytics, 3rd party data, user devices data, etc...) Synchronize automatically Neo4j Graph database Linkurious Enterprise or custom application
  • 16. Background Fraud and compliance team of an international bank. Problem Increase of credit card fraud online and difficulty to detect suspicious cases. Benefit Detection of suspicious patterns and fast investigation. Online banking fraud detection.
  • 19. Sources and links. Bibliography : ● DB-Engines. Knowledge Base of Relational and NoSQL Database Management Systems. Ranking per Categories. Available: http://db-engines.com/en/ranking_categories [Avril 2017] ● eMarketer, “Worldwide Retail Ecommerce Sales: The eMarketer Forecast for 2016”. Available: http://totalaccess.emarketer.com/Reports/Viewer.aspx?R=2001849&ecid=MX1371 ● Juniper, Online payement whitepaper 2016-2020. Available : http://www.experian.com/assets/decision-analytics/white-papers/juniper-research-online-paymen t-fraud-wp-2016.pdf ● United states Department of Justice “19 People Indicted Following Investigations”. Available: https://www.justice.gov/usao-dc/pr/19-people-indicted-following-investigations-international-frau d-and-money-laundering Images: ● Istock ● Growth icon by hans draiman from the Noun Project ● Cash flow icon by rflor from the Noun Project ● Dollar notification icon by Martin Lebreton from the Noun Project