fraud in detection usining neo4j -...

51
Fraud in Detection using neo4j SAIYAM KOHLI 2669077

Upload: votu

Post on 07-Jul-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Fraud in Detection using neo4j

SAIYAM KOHLI

2669077

Page 2: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Agenda

• Who are Today’s Fraudsters

How to Fight Fraud Rings with Graphs

Different Types of Credit Card Fraud & Neo4j Demo

How Neo4j Fits in a Typical Architecture

Summary

Q&A

Page 3: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Who Are Today’s Fraudsters?

Page 4: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Organized in groups Synthetic Identities Stolen Identities HijackedDevices

Who Are Today’s Fraudsters?

Page 5: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Types of Fraud

• Credit Card Fraud

• Rogue Merchants

• Fraud Rings

• Insurance Fraud

• eCommerce Fraud

• Fraud we don’t know about yet…

Page 6: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

World of Fraud

Constantly Evolving Simple and Complex Few and Many Players

Digitized and Analog “One Step Ahead”

Page 7: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Fraud Detection(From a data-modeling perspective)

Page 8: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Raw Data

Page 9: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Anomalies

Page 10: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Anomalies hidden in “normal behavior”

Page 11: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Patterns

Page 12: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Patterns

Page 13: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

1) Detect 2) Respond

Fraud Prevention is About Reacting to Patterns(And doing it fast!)

Page 14: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Relational

Database

Choosing UnderlyingTechnology

Page 15: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Data Modelled as a Graph!

Graph

Database

Page 16: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Examples of Prevalent

Fraud Types

Page 17: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Fraud Rings

Page 18: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Endpoint-CentricAnalysis of users and

their end-points

1.

Navigation CentricAnalysis of

navigation behavior

and suspect

patterns

Account-CentricAnalysis of anomaly

behavior by channel

2. 3.

PC:s

Mobile Phones

IP-addresses

User ID:s

Comparing Transaction

Identity Vetting

Traditional Fraud Detection Methods

Page 19: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Fraud rings

Fake IP-adresses

Hijacked devices

Synthetic Identities

Stolen Identities

And more…

Weaknesses

Unable to detect

DISCRETEANALYSIS

Endpoint-CentricAnalysis of users and

their end-points

1.

Navigation CentricAnalysis of

navigation behavior

and suspect

patterns

Account-CentricAnalysis of anomaly

behavior by channel

2. 3.

Traditional Fraud Detection Methods

Page 20: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

INVESTIGATE

Revolving Debt

Number of Accounts

INVESTIGATE

Normal behavior

Fraud Detection with Discrete Analysis

Page 21: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Revolving Debt

Number of Accounts

Normal behavior

Fraudulent pattern

Fraud Detection with Connected Analysis

Page 22: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

CONNECTEDANALYSIS

Endpoint-CentricAnalysis of users and

their end-points

Navigation CentricAnalysis of

navigation behavior

and suspect

patterns

Account-CentricAnalysis of anomaly

behavior by channel

DISCRETEANALYSIS

1.

CrossChannel

Analysis of anomaly

behavior correlated

across channels

Entity Linking

Analysis of relationships

to detect organized

crime and collusion

2. 3. 4. 5.

Augmented Fraud Detection

Page 23: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

ACCOUNT

HOLDER 2

Modeling a fraud ring as a graph

ACCOUNT

HOLDER 1

ACCOUNT

HOLDER 3

Page 24: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

ACCOUNT

HOLDER 2

ACCOUNT

HOLDER 1

ACCOUNT

HOLDER 3

CREDIT

CARD

BANK

ACCOUNT

BANK

ACCOUNT

BANK

ACCOUNT

PHONE

NUMBER

UNSECURED

LOAN

SSN 2

UNSECURED

LOAN

Modeling a fraud ring as a graph

Page 25: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

ACCOUNT

HOLDER 2

ACCOUNT

HOLDER 1

ACCOUNT

HOLDER 3

CREDIT

CARD

BANK

ACCOUNT

BANK

ACCOUNT

BANK

ACCOUNT

ADDRESS

PHONE

NUMBER

PHONE

NUMBER

SSN 2

UNSECURED

LOAN

SSN 2

UNSECURED

LOAN

Modeling a fraud ring as a graph

Page 26: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Credit Card Fraud

Page 27: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Example #1

“Credit Card Testing”

Page 28: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Manual skimming

of an ATM

Sophisticated Data Breaches

Retrieval of Credit Card Information

Rogue Merchant

Page 29: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

USE

Terminal ATM-

skimming

Data Breach

Card Holder

Card Issuer

Fraudster

USE MAKES

$2

$5

$10

MAKES $4000

ATTesting

Merchants

ATMAKES Tx

Page 30: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Example #2

“Fraud Origination and

Assessing Loss Magnitude”

Page 31: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

TxTx Tx TxTx Tx TxTxTx TxJohn

Page 32: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Tx

$2000

TxTx Tx TxTxTxTx Tx TxComputer

StoreJohn

Page 33: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Tx

$2000

Tx Tx

$25$10$4

TxTx Tx TxTxTxComputer

StoreJohn

Gas Station

Page 34: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Tx

$2000

Tx Tx

$25$10$4

TxTx Tx TxTxTxComputer

StoreJohn

Gas Station

Tx

$2

TxSheila TxTxTx Tx Tx Tx

$3000

TxJewelry

StoreTx

$3

Page 35: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Tx

$2000

Tx Tx

$25$10$4

TxTx Tx TxTxTxComputer

StoreJohn

Gas Station

Tx

$2

TxSheila TxTxTx Tx Tx Tx

$3000

TxJewelry

StoreTx

$3

Robert TxTxTx TxTx TxTxTx Tx Tx

Page 36: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

TxTx

$2

Tx

Tx

$2000

Tx Tx

$25$10$4

TxTx Tx TxTxTxComputer

StoreJohn

Gas Station

Sheila

Robert

$3

Karen

TxTxTx Tx Tx Tx

$3000

TxJewelry

StoreTx

$3

TxTxTx TxTx TxTx

TxTx TxTx Tx TxTx

$8 $12

Tx

$1500

Furniture

Store

Tx Tx Tx

Page 37: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

How Neo4j fits in

Page 38: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

NEO4j

Page 39: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud
Page 40: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud
Page 41: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud
Page 42: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud
Page 43: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud
Page 44: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud
Page 45: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud
Page 46: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud
Page 47: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Money

Transferring

Purchases Bank

Services Relational

database

Data Science-teamDevelop Patterns

+ Good for Discrete Analysis

– No Holistic View of Data-Relationships

– Slow query speed for connections

Page 48: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Money

Transferring

Purchases Bank

Services Relational

database

Data Lake

+ Good for MapReduce

+ Good for AnalyticalWorkloads

– No holistic view

– Non-operational workloads

– Weeks-to-months processes

Data Science-teamDevelop Patterns

Merchant Data

CreditScoreData

Other 3rd Party Data

Page 49: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Money

Transferring

Purchases Bank

Services

Neo4j powers

360° view of

transactions in

real-time

Neo4j

Cluster

SENSETransaction

stream

RESPONDAlerts & notification

LOAD RELEVANT DATA

Relational

database

Data Lake

Visualization UI

Fine Tune Patterns

Data Science-teamDevelop Patterns

Merchant Data

CreditScoreData

Other 3rd Party Data

Page 50: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

Money

Transferring

Purchases Bank

Services

Neo4j powers

360° view of

transactions in

real-time

Neo4j

Cluster

SENSETransaction

stream

RESPONDAlerts & notification

LOAD RELEVANT DATA

Relational

database

Data Lake

Visualization UI

Fine Tune Patterns

Data Science-teamDevelop Patterns

Merchant Data

CreditScoreData

Other 3rd Party Data

Data-set used

to explore

new insights

Page 51: Fraud in Detection usining neo4j - csuohio.educis.csuohio.edu/~sschung/CIS601/FraudDetectionNeo4J.pdfAgenda • • • • • • Who are Today’s Fraudsters How to Fight Fraud

THANK

YOU