SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
SAS founded in 2013 in Paris | http://linkurio.us | @linkurious
How to identify
reshipping scams
with Neo4j.
Introduction.
CMO
>5 years in consulting
MSc Political sciences
and Competitive
Intelligence
Jean
Villedieu
Sébastien
Heymann
CEO
Gephi Founder
Phd in Computer
Science and Complex
Systems
Linkurious is a French
startup founded in 2013.
Father Of
Father Of
Siblings
What is a graph ?
This is a graph.
Father Of
Father Of
Siblings
This is a node
This is a
relationship
What is a graph ? / Nodes & relationshipsWhat is a graph : nodes and relationships.
A graph is a set of nodes
linked by relationships.
Some of the domains in which
our customers use graphs.
People, objects, movies,
restaurants, music…
Suggest new contacts, help
discover new music
Antennas, servers, phones,
people…
Diminish network outages
Supplier, roads, warehouses,
products…
Diminish transportation cost,
optimize delivery
Supply chains Social networks Communications
Differents domains where graphs are important.
The accomplice reships the
goods to the fraudster. The
fraudster sells the goods for
$.
He uses the credit cards to
buy goods on a website. He
has the goods shipped to an
accomplice.
Reshipping is used to launder
money.
A scammer steals a few
credit cards and wants to
turn it into $.
Steal credit
cards
Order goods
online
Sell the
goods
What i s reshipping.
The accomplice is sometimes a victim too..
The accomplice may think he
is doing a normal job.
Reshipping protects the
criminals.
Why use reshipping.
It is worth taking time and efforts to setup a reshipping network if it helps
launder money without getting caught.
Online fraud cost $3.5 billion per year to e-retailers.
Source : http://www.internetretailer.com/2013/03/28/online-fraud-costs-e-retailers-35-billion-2012
$3.5 billion
The cost of fraud for ecommerce 1/2.
Merchants pay $3.10 in
costs (replacements and
fees) for each dollar of
fraud losses they incur.
The cost of fraud for ecommerce 2/2.
Source : http://www.trulioo.com/blog/2014/05/13/social-login-as-an-added-measure-for-e-commerce-fraud/
How to make sense of complex data.
Is it possible for e-
retailers to identify
reshipping scams?
What is a graph ? / Nodes & relationshipsA graph data model for the ecommerce orders.
date :
11/08/2014
items : Laptop,
gifcard
amount : $878
IS_USED_FOR
Main Street
(Street)
Address 1
(Address)
San
Francisco
(City)
USA
(Country)
Order 1
(Transaction)
214.77.224.225
(IP_Address)
Address 2
(Address)
Detroit
(City)
Folsom Street
(Street)
Lagos
(City)
Nigeria
(Country)
IS_BILLING_ADDRESS
IS_SHIPPING_ADDRESS
IS_LOCATED_IN IS_LOCATED_IN
IS_LOCATED_IN IS_LOCATED_IN
IS_LOCATED_IN IS_LOCATED_IN
IS_LOCATED_IN
IS_LOCATED_IN
I’m particularly interested in orders where the billing
address, the shipping address and the location of the
IP address point in different directions ! Can we find
these?
A fraud expert designs a fraud
detection pattern.
Designing a fraud detection pattern.
The pattern is translated in a
graph language.
Looking for the pattern.
MATCH (a:Transaction)-[r*2..3]-(b:City)
WITH a, COUNT(DISTINCT b) AS group_size, COLLECT(DISTINCT b) AS cities
WHERE group_size > 2
RETURN a, cities
A graph database handles the
data analysis at scale.
We use Neo4j to store and analyse the data.
ETL
Traditional
databases.
Graph
database.
The graph databases helps store the data from various sources and analyse it in real-time to
identify potential fraud cases.
Visualization helps analyse the results.
ETL API
Traditional
database.
Graph
database.
Graph
visualization.
Graph visualization is used to
investigate the suspicious
cases.
Graph visualization solutions like Linkurious help data analysts investigate graph data faster.
Visualizing suspicious fraud cases.
The countries are in dark green, the cities in blue, the IP address in red, the street in orange, the
orders (with their date) in light green and the addresses in asparagus.
It seems a Nigerian scammer is using stolen credit
cards on our website. He has enrolled the help of
someone from Boston. We should :
- stop the transactions they are involved in ;
- ban these users and their IP addresses ;
- warn the credit card holders ;
- contact the authorities ;
The analyst turns the alert into
actions to stop the fraud.
Turning data into action.
● This is an illustration of the potential of graphs. In the real world we’d use
more advanced techniques (ex : to handle proxies).
● Address analysis has to be combined with other fraud detection
mechanisms (ex : credit card verification).
● Only a subset of the fraudulent transactions can be inspected by a human.
● Graph-based fraud detection can be applied in other domains.
Graphs are great for fraud
detection.
Beyond that example.
You can do it too!
Try Linkurious.
Contact us to discuss your projects
at contact@linkurio.us
Conclusion
GraphGist : http://gist.neo4j.org/?6873cf244c0611533029
Blog post on reshipping : https://linkurio.us/reshipping-scams-and-network-
visualization
Sample dataset : https://www.dropbox.com/s/aca6rhmz7vx2hgp/reshipping%
20scam%20dataset.zip
Additional resources.

Contenu connexe

En vedette

Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsLinkurious
 
How to apply graphs to network management
How to apply graphs to network managementHow to apply graphs to network management
How to apply graphs to network managementLinkurious
 
Sugar scam of Maharashtra
Sugar scam of MaharashtraSugar scam of Maharashtra
Sugar scam of Maharashtraiacmanupillai
 
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your NetworkRSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your NetworkSkybox Security
 
Enterprise Vulnerability Management - ZeroNights16
Enterprise Vulnerability Management - ZeroNights16Enterprise Vulnerability Management - ZeroNights16
Enterprise Vulnerability Management - ZeroNights16Alexander Leonov
 
Vulnerability Intelligence and Assessment with vulners.com
Vulnerability Intelligence and Assessment with vulners.comVulnerability Intelligence and Assessment with vulners.com
Vulnerability Intelligence and Assessment with vulners.comAlexander Leonov
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewFemi Ashaye
 
Survey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSurvey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSolarWinds
 
Presentation on KETAN PAREKH Scam
Presentation on  KETAN PAREKH  ScamPresentation on  KETAN PAREKH  Scam
Presentation on KETAN PAREKH ScamHimanshu Jain
 
Corporate Scam,Chit fund(Saradha scam) & Corporate Governance
Corporate Scam,Chit fund(Saradha scam) & Corporate GovernanceCorporate Scam,Chit fund(Saradha scam) & Corporate Governance
Corporate Scam,Chit fund(Saradha scam) & Corporate GovernanceZeba Rukhsar
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentMarcelo Silva
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N Gbensonoo
 

En vedette (17)

Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analytics
 
How to apply graphs to network management
How to apply graphs to network managementHow to apply graphs to network management
How to apply graphs to network management
 
Sugar scam of Maharashtra
Sugar scam of MaharashtraSugar scam of Maharashtra
Sugar scam of Maharashtra
 
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your NetworkRSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
 
Enterprise Vulnerability Management - ZeroNights16
Enterprise Vulnerability Management - ZeroNights16Enterprise Vulnerability Management - ZeroNights16
Enterprise Vulnerability Management - ZeroNights16
 
Vulnerability Intelligence and Assessment with vulners.com
Vulnerability Intelligence and Assessment with vulners.comVulnerability Intelligence and Assessment with vulners.com
Vulnerability Intelligence and Assessment with vulners.com
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
 
Survey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSurvey: Security Analytics and Intelligence
Survey: Security Analytics and Intelligence
 
Coal Scam
Coal ScamCoal Scam
Coal Scam
 
Presentation on KETAN PAREKH Scam
Presentation on  KETAN PAREKH  ScamPresentation on  KETAN PAREKH  Scam
Presentation on KETAN PAREKH Scam
 
Corporate Scam,Chit fund(Saradha scam) & Corporate Governance
Corporate Scam,Chit fund(Saradha scam) & Corporate GovernanceCorporate Scam,Chit fund(Saradha scam) & Corporate Governance
Corporate Scam,Chit fund(Saradha scam) & Corporate Governance
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
 
2G spectrum scam
2G spectrum scam2G spectrum scam
2G spectrum scam
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Graphs ppt
Graphs pptGraphs ppt
Graphs ppt
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 

Similaire à How to identify reshipping scams with Neo4j

A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...IRJET Journal
 
Sample set exam eb bus 5-6-7-9-12
Sample set exam  eb bus 5-6-7-9-12Sample set exam  eb bus 5-6-7-9-12
Sample set exam eb bus 5-6-7-9-12BookStoreLib
 
credit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractcredit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractVenkat Projects
 
IRJET- Financial Fraud Detection along with Outliers Pattern
IRJET-  	  Financial Fraud Detection along with Outliers PatternIRJET-  	  Financial Fraud Detection along with Outliers Pattern
IRJET- Financial Fraud Detection along with Outliers PatternIRJET Journal
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning TechniquesIRJET Journal
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET Journal
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
 
Online Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningOnline Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningIRJET Journal
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...IRJET Journal
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousNeo4j
 
A visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaA visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaData Driven Innovation
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET Journal
 
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Arm Igf
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...
The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...
The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...Bernard Marr
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyNEW Momentum
 
Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Kount
 
Exploiting the Internet of Things with investigative analytics
Exploiting the Internet of Things with investigative analyticsExploiting the Internet of Things with investigative analytics
Exploiting the Internet of Things with investigative analyticsThe Marketing Distillery
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)Zohra Razaq
 

Similaire à How to identify reshipping scams with Neo4j (20)

A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
 
Sample set exam eb bus 5-6-7-9-12
Sample set exam  eb bus 5-6-7-9-12Sample set exam  eb bus 5-6-7-9-12
Sample set exam eb bus 5-6-7-9-12
 
credit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstractcredit card fraud analysis using predictive modeling python project abstract
credit card fraud analysis using predictive modeling python project abstract
 
IRJET- Financial Fraud Detection along with Outliers Pattern
IRJET-  	  Financial Fraud Detection along with Outliers PatternIRJET-  	  Financial Fraud Detection along with Outliers Pattern
IRJET- Financial Fraud Detection along with Outliers Pattern
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
 
Online Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine LearningOnline Transaction Fraud Detection System Based on Machine Learning
Online Transaction Fraud Detection System Based on Machine Learning
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment A...
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
 
A visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe FrancavillaA visual approach to fraud detection and investigation - Giuseppe Francavilla
A visual approach to fraud detection and investigation - Giuseppe Francavilla
 
IRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid ModelsIRJET- Credit Card Fraud Detection using Hybrid Models
IRJET- Credit Card Fraud Detection using Hybrid Models
 
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...
The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...
The Amazing Ways How Mastercard Uses Artificial Intelligence To Stop Fraud An...
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit Piracy
 
Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101
 
Exploiting the Internet of Things with investigative analytics
Exploiting the Internet of Things with investigative analyticsExploiting the Internet of Things with investigative analytics
Exploiting the Internet of Things with investigative analytics
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 

Plus de Linkurious

Using graph technology for multi-INT investigations
Using graph technology for multi-INT investigationsUsing graph technology for multi-INT investigations
Using graph technology for multi-INT investigationsLinkurious
 
Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8Linkurious
 
Graph-based intelligence analysis
Graph-based intelligence analysis Graph-based intelligence analysis
Graph-based intelligence analysis Linkurious
 
What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7Linkurious
 
How to visualize Cosmos DB graph data
How to visualize Cosmos DB graph dataHow to visualize Cosmos DB graph data
How to visualize Cosmos DB graph dataLinkurious
 
GraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph VisualizationGraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph VisualizationLinkurious
 
Getting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious EnterpriseGetting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious EnterpriseLinkurious
 
GraphTech Ecosystem - part 2: Graph Analytics
 GraphTech Ecosystem - part 2: Graph Analytics GraphTech Ecosystem - part 2: Graph Analytics
GraphTech Ecosystem - part 2: Graph AnalyticsLinkurious
 
GraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph DatabasesGraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph DatabasesLinkurious
 
Graph analytics in Linkurious Enterprise
Graph analytics in Linkurious EnterpriseGraph analytics in Linkurious Enterprise
Graph analytics in Linkurious EnterpriseLinkurious
 
Graph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise PapersGraph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise PapersLinkurious
 
Visualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your DataVisualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your DataLinkurious
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementLinkurious
 
Fraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et DétectionFraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et DétectionLinkurious
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousLinkurious
 
Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.Linkurious
 
Graph-powered data lineage in Finance
Graph-powered data lineage in FinanceGraph-powered data lineage in Finance
Graph-powered data lineage in FinanceLinkurious
 
Using Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projectsUsing Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projectsLinkurious
 
Linkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications fasterLinkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications fasterLinkurious
 
Fighting financial crime with graph analysis at BIWA Summit 2017
Fighting financial crime with graph analysis at BIWA Summit 2017Fighting financial crime with graph analysis at BIWA Summit 2017
Fighting financial crime with graph analysis at BIWA Summit 2017Linkurious
 

Plus de Linkurious (20)

Using graph technology for multi-INT investigations
Using graph technology for multi-INT investigationsUsing graph technology for multi-INT investigations
Using graph technology for multi-INT investigations
 
Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8
 
Graph-based intelligence analysis
Graph-based intelligence analysis Graph-based intelligence analysis
Graph-based intelligence analysis
 
What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7
 
How to visualize Cosmos DB graph data
How to visualize Cosmos DB graph dataHow to visualize Cosmos DB graph data
How to visualize Cosmos DB graph data
 
GraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph VisualizationGraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph Visualization
 
Getting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious EnterpriseGetting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious Enterprise
 
GraphTech Ecosystem - part 2: Graph Analytics
 GraphTech Ecosystem - part 2: Graph Analytics GraphTech Ecosystem - part 2: Graph Analytics
GraphTech Ecosystem - part 2: Graph Analytics
 
GraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph DatabasesGraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph Databases
 
Graph analytics in Linkurious Enterprise
Graph analytics in Linkurious EnterpriseGraph analytics in Linkurious Enterprise
Graph analytics in Linkurious Enterprise
 
Graph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise PapersGraph technology and data-journalism: the case of the Paradise Papers
Graph technology and data-journalism: the case of the Paradise Papers
 
Visualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your DataVisualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your Data
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle Management
 
Fraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et DétectionFraudes Financières: Méthodes de Prévention et Détection
Fraudes Financières: Méthodes de Prévention et Détection
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
 
Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.
 
Graph-powered data lineage in Finance
Graph-powered data lineage in FinanceGraph-powered data lineage in Finance
Graph-powered data lineage in Finance
 
Using Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projectsUsing Linkurious in your Enterprise Architecture projects
Using Linkurious in your Enterprise Architecture projects
 
Linkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications fasterLinkurious SDK: Build enterprise-ready graph applications faster
Linkurious SDK: Build enterprise-ready graph applications faster
 
Fighting financial crime with graph analysis at BIWA Summit 2017
Fighting financial crime with graph analysis at BIWA Summit 2017Fighting financial crime with graph analysis at BIWA Summit 2017
Fighting financial crime with graph analysis at BIWA Summit 2017
 

How to identify reshipping scams with Neo4j

  • 1. SAS founded in 2013 in Paris | http://linkurio.us | @linkurious How to identify reshipping scams with Neo4j.
  • 2. Introduction. CMO >5 years in consulting MSc Political sciences and Competitive Intelligence Jean Villedieu Sébastien Heymann CEO Gephi Founder Phd in Computer Science and Complex Systems Linkurious is a French startup founded in 2013.
  • 3. Father Of Father Of Siblings What is a graph ? This is a graph.
  • 4. Father Of Father Of Siblings This is a node This is a relationship What is a graph ? / Nodes & relationshipsWhat is a graph : nodes and relationships. A graph is a set of nodes linked by relationships.
  • 5. Some of the domains in which our customers use graphs. People, objects, movies, restaurants, music… Suggest new contacts, help discover new music Antennas, servers, phones, people… Diminish network outages Supplier, roads, warehouses, products… Diminish transportation cost, optimize delivery Supply chains Social networks Communications Differents domains where graphs are important.
  • 6. The accomplice reships the goods to the fraudster. The fraudster sells the goods for $. He uses the credit cards to buy goods on a website. He has the goods shipped to an accomplice. Reshipping is used to launder money. A scammer steals a few credit cards and wants to turn it into $. Steal credit cards Order goods online Sell the goods What i s reshipping.
  • 7. The accomplice is sometimes a victim too.. The accomplice may think he is doing a normal job.
  • 8. Reshipping protects the criminals. Why use reshipping. It is worth taking time and efforts to setup a reshipping network if it helps launder money without getting caught.
  • 9. Online fraud cost $3.5 billion per year to e-retailers. Source : http://www.internetretailer.com/2013/03/28/online-fraud-costs-e-retailers-35-billion-2012 $3.5 billion The cost of fraud for ecommerce 1/2.
  • 10. Merchants pay $3.10 in costs (replacements and fees) for each dollar of fraud losses they incur. The cost of fraud for ecommerce 2/2. Source : http://www.trulioo.com/blog/2014/05/13/social-login-as-an-added-measure-for-e-commerce-fraud/
  • 11. How to make sense of complex data. Is it possible for e- retailers to identify reshipping scams?
  • 12. What is a graph ? / Nodes & relationshipsA graph data model for the ecommerce orders. date : 11/08/2014 items : Laptop, gifcard amount : $878 IS_USED_FOR Main Street (Street) Address 1 (Address) San Francisco (City) USA (Country) Order 1 (Transaction) 214.77.224.225 (IP_Address) Address 2 (Address) Detroit (City) Folsom Street (Street) Lagos (City) Nigeria (Country) IS_BILLING_ADDRESS IS_SHIPPING_ADDRESS IS_LOCATED_IN IS_LOCATED_IN IS_LOCATED_IN IS_LOCATED_IN IS_LOCATED_IN IS_LOCATED_IN IS_LOCATED_IN IS_LOCATED_IN
  • 13. I’m particularly interested in orders where the billing address, the shipping address and the location of the IP address point in different directions ! Can we find these? A fraud expert designs a fraud detection pattern. Designing a fraud detection pattern.
  • 14. The pattern is translated in a graph language. Looking for the pattern. MATCH (a:Transaction)-[r*2..3]-(b:City) WITH a, COUNT(DISTINCT b) AS group_size, COLLECT(DISTINCT b) AS cities WHERE group_size > 2 RETURN a, cities
  • 15. A graph database handles the data analysis at scale. We use Neo4j to store and analyse the data. ETL Traditional databases. Graph database. The graph databases helps store the data from various sources and analyse it in real-time to identify potential fraud cases.
  • 16. Visualization helps analyse the results. ETL API Traditional database. Graph database. Graph visualization. Graph visualization is used to investigate the suspicious cases. Graph visualization solutions like Linkurious help data analysts investigate graph data faster.
  • 17. Visualizing suspicious fraud cases. The countries are in dark green, the cities in blue, the IP address in red, the street in orange, the orders (with their date) in light green and the addresses in asparagus.
  • 18. It seems a Nigerian scammer is using stolen credit cards on our website. He has enrolled the help of someone from Boston. We should : - stop the transactions they are involved in ; - ban these users and their IP addresses ; - warn the credit card holders ; - contact the authorities ; The analyst turns the alert into actions to stop the fraud. Turning data into action.
  • 19. ● This is an illustration of the potential of graphs. In the real world we’d use more advanced techniques (ex : to handle proxies). ● Address analysis has to be combined with other fraud detection mechanisms (ex : credit card verification). ● Only a subset of the fraudulent transactions can be inspected by a human. ● Graph-based fraud detection can be applied in other domains. Graphs are great for fraud detection. Beyond that example.
  • 20. You can do it too! Try Linkurious.
  • 21. Contact us to discuss your projects at contact@linkurio.us Conclusion
  • 22. GraphGist : http://gist.neo4j.org/?6873cf244c0611533029 Blog post on reshipping : https://linkurio.us/reshipping-scams-and-network- visualization Sample dataset : https://www.dropbox.com/s/aca6rhmz7vx2hgp/reshipping% 20scam%20dataset.zip Additional resources.