SlideShare una empresa de Scribd logo
1 de 31
Descargar para leer sin conexión
Detecting Fraud & Anti-
Money Laundering (AML)
Violations In Real-Time
Victor Lee & Gaurav Deshpande
for Banking, Telecom, and eCommerce
© 2018 TigerGraph. All Rights Reserved
Speaking Today
2
Victor Lee
Director of Product Management
TigerGraph
victor@tigergraph.com
Graph Data Mining Expert
Gaurav Deshpande
Vice President of Marketing
TigerGraph
gaurav@tigergraph.com, +1 510 388 2360
Big Data Analytics Veteran
© 2018 TigerGraph. All Rights Reserved
Agenda
3
Fraud and Money Laundering –
Scale and Complexity
Addressing Fraud and Money Laundering –
Traditional Approach
Addressing Fraud and AML Violations
in Real-Time with Deep Link Analytics
Getting Started on your own journey
to a more secure and compliant organization
3
2
1
4
© 2018 TigerGraph. All Rights Reserved
Fraud Impacts Multiple Industries
4
The 2018 Global Fraud and Identity Report, Jan 2018
63% of businesses have experienced the same or
more fraud losses in the past 12 months
Online fraud alone costs consumers $16 Billion
per year (bank and merchant costs are higher)
Fraud cost consumers more than $16 billion, Feb 2018
Telecoms operators face $300bn global loss, Jan 2016
$300 Billion in global loss across Telecom from
uncollected revenue and fraud in 2016
© 2018 TigerGraph. All Rights Reserved
Impact of Money Laundering on Global Banking
5
Reuters News, Sept 27, 2017
$342 Billion - total US & EU fines on banks’ misconduct
including anti-money laundering violations since 2009
Regulators fined US Bank $613 Million due to
lax anti-money laundering controls
US Bank fined over $600 Million, Feb 15, 2018
Compliance doesn’t pay, Bloomberg, April 11 2018
5% of transactions which firms identify as suspicious
is reported to the authorities, of which 10% leads to
further investigation (Just 0.5% of suspicious
transactions investigated)
© 2018 TigerGraph. All Rights Reserved
Traditional Approach to Fraud Prevention & AML
Compliance
6
Transactions
(Payments, Orders, calls)
Customers
Merchants, Drivers, ..
Devices, Locations, ..
Input Data
Fraud Analytics Solution
+ Rules Engine
Analysts Suspicious Activity
Report (SAR)
Queries for
additional
information
Investigators
BI /
Investigation
workflow tool
Suspicious activities
False positives
Machine
Learning
Models
Training Data
© 2018 TigerGraph. All Rights Reserved
So What’s Missing?
Current Approach
• Data: features of entities, e.g., users,
accounts, locations. Examples:
• Phone-based fraud detection: frequency and
duration of one-directional calls
• Money laundering:
size and frequency of the payment transactions,
transactions with immediate neighbors
• Detection: Analysts manually write rules
regarding features of nodes or their
immediate neighbors (1 to 2 hops).
7
Attributes/
features for
a phone
Abnormal
model
Ads
model
Harassment
rule
Scam
model
Good
phone
Ads
Harassment
Scam
candidateScam
• Performance:
• False positives: too many cases to investigate, block legitimate business
• False negatives: Fail to catch many fraud cases
© 2018 TigerGraph. All Rights Reserved
Consider an Example - Phone Scam
Illegally acquiring money from
victims, or failing to pay a telecom
company
• $4.96 Billion – Compromised
PBX/Voicemail Systems
• $4.32 Billion – Subscription/Identity Theft
• $3.84 Billion – International Revenue
Share Fraud
• $2.88 Billion – By-Pass Fraud
• $2.40 Billion – Credit Card Fraud
8
© 2018 TigerGraph. All Rights Reserved
Detecting Phone-Based Fraud by Analyzing Network or
Graph Relationship Features
9
Good Phone
Features
Bad Phone
Features
(1) Short term call
duration
(2) Empty stable group
(3) No call back phone
(4) Many rejected calls
(5) Average distance > 3
Empty stable group
Many rejected
calls
Average distance
> 3
(1) High call back phone
(2) Stable group
(3) Long term phone
(4) Many in-group
connections
(5) 3-step friend relation
Stable group
Many in-group
connections
Good Phone
Features
3-step friend
relation
///
Good phone Bad phone
X
X
X
© 2018 TigerGraph. All Rights Reserved
Generating New Training Data for Machine Learning to
Detect Phone-Based Scam
Graph with 500 Million phones and 10 Billion calls,1000s of new calls per second.
Feed Machine Learning with new training data with 118 features per phone every 2 hours
10
Phone 2 Features
Machine
Learning Solution
Phone 1 Features
(1) High call back phone
(2) Stable group
(3) Long term phone
(4) Many in-group
connections
(5) 3-step friend relation
(1) Short term call
duration
(2) Empty stable group
(3) No call back phone
(4) Many rejected calls
(5) Avg. distance > 3
Training Data
Tens – Hundreds of Billions of calls
© 2018 TigerGraph. All Rights Reserved
Evolution of Graph Technology
11
Graph 1.0
• Storage and Visualization
focused
• No built-in parallel
computation model
• Very slow loading large
datasets
• Cannot scale out
• Not designed for real-time
graph updates or queries
for large datasets
• Limited multi-hop analytics
capabilities on large
graphs (2 hops)
Example – Neo4j
Graph 3.0
• Better scale-out, but
speed and updates are
still an issue
• Built on top of NoSQL
repository such as Apache
Cassandra
• Not designed for real-time
graph updates or queries
for large datasets
• Limited multi-hop analytics
capabilities on large
graphs (2 hops)
• Scalability for massive
datasets
• Supports real-time graph
updates and queries for
enterprise scale
• Provides deep link analytics
(3-10+ hops) traversing
millions of nodes and
performing complex
calculations
• Privacy for sensitive data
• Ease of use for development
& deployment
Graph 2.0
Example – DataStax
© 2018 TigerGraph. All Rights Reserved
Addressing Fraud Prevention and AML compliance with
Real-time Deep Link Analytics
12
Real-time Multi-Hop Performance
Sub-second response for queries
touching tens of millions of
entities/relationships
Transactional (Mutable) Graph
Hundreds of thousands of updates per
second, Billions of transactions per day
Scalability for Massive Datasets
100 B+ entities, 1 Trillion+ relationships
Ease of Development & Deployment
Easy to use query language (GSQL) for rapidly
developing & deploying complex analytics
Privacy for Sensitive Data
Control access based on user role,
data type, or department
Deep Link Analytics
Queries traverse 3 to 10+ hops deep into
the graph performing complex calculations
© 2018 TigerGraph. All Rights Reserved
Different Types of Financial Fraud
• Phone Scam
• Credit Card Chargeback
Fraud
• Advertising/Camouflage
Fraud
• Money Laundering
13
© 2018 TigerGraph. All Rights Reserved
Credit Card Chargeback Fraud
• Fraudsters use stolen credit card
and phone to buy product/service
from a merchant
• Fraudsters receive and resell
product/service
• Card owner realizes and cancels
the stolen credit card
• Fraudster walks away with the
money, while bank and merchant
selling the product/service bear
the loss
14
© 2018 TigerGraph. All Rights Reserved
Detecting Credit Card
Chargeback Fraud
• Analyze complex network of
payment transactions,
devices/phones and linked
accounts
• Find accounts that are connected
to fraudulent transactions and/or
devices
• If connection is strong enough à
shut down account to prevent
further loss
15
1
2
1
2
Account 1 Account 2
Account 3
7. Chargeback
4. Unsettled
5. Settled
6. Unsettled
3. Chargeback1. Chargeback
2. Unsettled
Active Account
Active Account Neighbor Info
• Total chargeback $
• Total Unsettled $
• Total Settled $
• # of transactions
• # of settled transactions
• # of unsettled transactions
• # of banned credit card
• #of active credit card
• # of banned device
• # of normal device
© 2018 TigerGraph. All Rights Reserved
Advertising/Recommendation Fraud
• Click/Impression Fraud
• Pay-per-click
• Pay-per-impression
• Recommendation
Fraud
• Fake reviews or follows
• Use camouflage or
hijacked accounts
16
© 2018 TigerGraph. All Rights Reserved
Detecting Advertising/Recommendation Fraud
Looks like many users, but really controlled by one
17
• Use machine learning to find the
difference between organic
reviews/follows vs. fake
• Example Features used in analytics:
# common products/brands
followed/purchased
# products/brands not
followed/purchased together
# hops between accounts
# timing between events
# devices shared
# payment instruments shared
Fraudster
© 2018 TigerGraph. All Rights Reserved
Money Laundering
Transforming the profits from illegal activities
and corruption into apparently “legitimate”
assets.
• Structuring: many small cash deposits, to
avoid anti-money laundering report
requirements
• Bulk cash smuggling: smuggling cash to
offshore financial institutions
• Cash-intensive business: restaurants,
casinos, etc.
• Round-tripping: money deposited
offshore, brought back as investment to
avoid taxation
18
© 2018 TigerGraph. All Rights Reserved
Detecting Money Laundering Violations/
Anti-Money Laundering (AML)
19
© 2018 TigerGraph. All Rights Reserved
Detecting Money Laundering Violations/
Anti-Money Laundering (AML)
1. Start from a few initial suspicious accounts/transactions.
2. Probe upstream and downstream of money flow.
3. Ignore normal accounts.
4. Add in more “participating” accounts that may be involved in money
laundering
5. Converge when the algorithm finds the “source” account and the
“target” account.
20
Algorithm to Discover Money Laundering Subgraph
© 2018 TigerGraph. All Rights Reserved
AML—Initial Suspicious Accounts
21
1. Start from a few initial
suspicious accounts.
© 2018 TigerGraph. All Rights Reserved
AML—Upstream Probe 1
22
2. Probe upstream…
© 2018 TigerGraph. All Rights Reserved
AML—Upstream Probe 2
23
2. Probe upstream…
© 2018 TigerGraph. All Rights Reserved
AML—Downstream Probe 1
24
2. … and downstream
© 2018 TigerGraph. All Rights Reserved
AML—Downstream Probe 2
25
2. … and downstream
© 2018 TigerGraph. All Rights Reserved
AML— Final Subgraph Is Returned
26
• Converge when the
algorithm finds
“source” account(s) and
“target” account(s).
© 2018 TigerGraph. All Rights Reserved
Detecting Various Types of Fraud with
TigerGraph
• Graph Features to the rescue
• Integrate multiple data sources into one graph
• Real-time updates
• GSQL helps easily collect complex, deep-link, aggregate graph features
• Feed Machine Learning algorithm with new training data
• Deep Link Analytics to the rescue
• GSQL easily describes graph traversal and compute patterns
• Massive parallel processing for speed and efficiency
• Visualization shows evidence right on the spot
27
Real-time Deep Link Analytics at Massive Scale
© 2018 TigerGraph. All Rights Reserved
Real-Time Graph Analytics Platform
28
User Interface:
• GSQL language for
schema/loading/
queries/updates
• REST API for connecting to
other applications
• GraphStudio GUI for human
interaction
Output:
• JSON or visual graph
© 2018 TigerGraph. All Rights Reserved
#1 e-payment company in the
world, 100M daily active users
#1 US payment company
#1 Mobile E-commerce
#1 Mobile global supply-chain
#1 Power-grid company
The largest transaction graph in
production in the world (100B+ vertices,
2B+ daily real time updates)
Business Graph
Real-time Personalized Recommendation
Supply-chain logistics
Electrical Power Grid
#1 Ride sharing company Risk and Compliance
Customers
29
© 2018 TigerGraph. All Rights Reserved
Getting Started with your own journey to a more
secure and compliant organization
• Download the Fraud Prevention & AML brief
https://info.tigergraph.com/aml-solution-brief
• Read the benchmark report comparing
TigerGraph with older generation graph
solutions -
https://info.tigergraph.com/benchmark
• See TigerGraph in action – take the test drive:
https://www.tigergraph.com/try-tigergraph/
30
© 2018 TigerGraph. All Rights Reserved
Thank You
Check us out on social media!
31
@TigerGraphDB Youtube.com/tigergraph Facebook.com/Tiger
GraphDB
Linkedin.com/company/Ti
gerGraph

Más contenido relacionado

La actualidad más candente

How to Choose The Right Database on AWS - Berlin Summit - 2019
How to Choose The Right Database on AWS - Berlin Summit - 2019How to Choose The Right Database on AWS - Berlin Summit - 2019
How to Choose The Right Database on AWS - Berlin Summit - 2019Randall Hunt
 
Creating an Effective MDM Strategy for Salesforce
Creating an Effective MDM Strategy for SalesforceCreating an Effective MDM Strategy for Salesforce
Creating an Effective MDM Strategy for SalesforcePerficient, Inc.
 
Data Analytics for Finance
Data Analytics for FinanceData Analytics for Finance
Data Analytics for Financeellenica
 
Data Monetization
Data MonetizationData Monetization
Data MonetizationDATAVERSITY
 
Third-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIsThird-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIsBim Akinfenwa
 
Enterprise Data Architecture Deliverables
Enterprise Data Architecture DeliverablesEnterprise Data Architecture Deliverables
Enterprise Data Architecture DeliverablesLars E Martinsson
 
Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2
Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2
Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2TigerGraph
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
Supply Chain Management in ERP
Supply Chain Management in ERPSupply Chain Management in ERP
Supply Chain Management in ERPTom Matys
 
Build Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and GraphsBuild Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and GraphsNeo4j
 
Deloitte - Relationship Analysis as Key to Financial Crime Prevention
Deloitte - Relationship Analysis as Key to Financial Crime PreventionDeloitte - Relationship Analysis as Key to Financial Crime Prevention
Deloitte - Relationship Analysis as Key to Financial Crime PreventionNeo4j
 
Snowflake Company Presentation
Snowflake Company PresentationSnowflake Company Presentation
Snowflake Company PresentationAndrewJiang18
 
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?DATAVERSITY
 
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...DataWorks Summit
 
Data Mesh at CMC Markets: Past, Present and Future
Data Mesh at CMC Markets: Past, Present and FutureData Mesh at CMC Markets: Past, Present and Future
Data Mesh at CMC Markets: Past, Present and FutureLorenzo Nicora
 
Master Data Management
Master Data ManagementMaster Data Management
Master Data ManagementSung Kuan
 

La actualidad más candente (20)

How to Choose The Right Database on AWS - Berlin Summit - 2019
How to Choose The Right Database on AWS - Berlin Summit - 2019How to Choose The Right Database on AWS - Berlin Summit - 2019
How to Choose The Right Database on AWS - Berlin Summit - 2019
 
Creating an Effective MDM Strategy for Salesforce
Creating an Effective MDM Strategy for SalesforceCreating an Effective MDM Strategy for Salesforce
Creating an Effective MDM Strategy for Salesforce
 
Data Analytics for Finance
Data Analytics for FinanceData Analytics for Finance
Data Analytics for Finance
 
Machine Learning In Insurance
Machine Learning In InsuranceMachine Learning In Insurance
Machine Learning In Insurance
 
Data Monetization
Data MonetizationData Monetization
Data Monetization
 
Data Monetization
Data MonetizationData Monetization
Data Monetization
 
Third-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIsThird-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIs
 
Predictive Modelling
Predictive ModellingPredictive Modelling
Predictive Modelling
 
Enterprise Data Architecture Deliverables
Enterprise Data Architecture DeliverablesEnterprise Data Architecture Deliverables
Enterprise Data Architecture Deliverables
 
Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2
Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2
Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Supply Chain Management in ERP
Supply Chain Management in ERPSupply Chain Management in ERP
Supply Chain Management in ERP
 
Build Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and GraphsBuild Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and Graphs
 
ERP Overview
ERP OverviewERP Overview
ERP Overview
 
Deloitte - Relationship Analysis as Key to Financial Crime Prevention
Deloitte - Relationship Analysis as Key to Financial Crime PreventionDeloitte - Relationship Analysis as Key to Financial Crime Prevention
Deloitte - Relationship Analysis as Key to Financial Crime Prevention
 
Snowflake Company Presentation
Snowflake Company PresentationSnowflake Company Presentation
Snowflake Company Presentation
 
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
 
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
How Big Data and Predictive Analytics are revolutionizing AML and Financial C...
 
Data Mesh at CMC Markets: Past, Present and Future
Data Mesh at CMC Markets: Past, Present and FutureData Mesh at CMC Markets: Past, Present and Future
Data Mesh at CMC Markets: Past, Present and Future
 
Master Data Management
Master Data ManagementMaster Data Management
Master Data Management
 

Similar a Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCommerce

Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...TigerGraph
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take OverLaurent Pacalin
 
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...Dataconomy Media
 
Artificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud PreventionArtificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud PreventionJérôme Kehrli
 
The future of FinTech product using pervasive Machine Learning automation - A...
The future of FinTech product using pervasive Machine Learning automation - A...The future of FinTech product using pervasive Machine Learning automation - A...
The future of FinTech product using pervasive Machine Learning automation - A...Shift Conference
 
Scaling up business value with real-time operational graph analytics
Scaling up business value with real-time operational graph analyticsScaling up business value with real-time operational graph analytics
Scaling up business value with real-time operational graph analyticsConnected Data World
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupLaurent Pacalin
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label IssuersChristopher Uriarte
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceCloudera, Inc.
 
Anomaly Detection in Telco Networks
Anomaly Detection in Telco NetworksAnomaly Detection in Telco Networks
Anomaly Detection in Telco NetworksEsbert Frédéric
 
GraphTour - Next generation solutions using Neo4j
GraphTour - Next generation solutions using Neo4jGraphTour - Next generation solutions using Neo4j
GraphTour - Next generation solutions using Neo4jNeo4j
 
20181129 keynote augmented intelligence and artificial intelligence
20181129 keynote augmented intelligence and artificial intelligence20181129 keynote augmented intelligence and artificial intelligence
20181129 keynote augmented intelligence and artificial intelligenceSantiago Cabrera-Naranjo
 
Graph+AI for Fin. Services
Graph+AI for Fin. ServicesGraph+AI for Fin. Services
Graph+AI for Fin. ServicesTigerGraph
 
Five Trends in Real Time Applications
Five Trends in Real Time ApplicationsFive Trends in Real Time Applications
Five Trends in Real Time Applicationsconfluent
 
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...Connected Data World
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeLaurent Pacalin
 
Protect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in TaxProtect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in TaxCapgemini
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...cVidya Networks
 
Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy European Merchant Services
 

Similar a Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCommerce (20)

Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
 
Digital banking Account Take Over
Digital banking Account Take OverDigital banking Account Take Over
Digital banking Account Take Over
 
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
 
Artificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud PreventionArtificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud Prevention
 
The future of FinTech product using pervasive Machine Learning automation - A...
The future of FinTech product using pervasive Machine Learning automation - A...The future of FinTech product using pervasive Machine Learning automation - A...
The future of FinTech product using pervasive Machine Learning automation - A...
 
Scaling up business value with real-time operational graph analytics
Scaling up business value with real-time operational graph analyticsScaling up business value with real-time operational graph analytics
Scaling up business value with real-time operational graph analytics
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite Group
 
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle :  A Guide For Private Label IssuersUnderstanding the Card Fraud Lifecycle :  A Guide For Private Label Issuers
Understanding the Card Fraud Lifecycle : A Guide For Private Label Issuers
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services Experience
 
Anomaly Detection in Telco Networks
Anomaly Detection in Telco NetworksAnomaly Detection in Telco Networks
Anomaly Detection in Telco Networks
 
GraphTour - Next generation solutions using Neo4j
GraphTour - Next generation solutions using Neo4jGraphTour - Next generation solutions using Neo4j
GraphTour - Next generation solutions using Neo4j
 
Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017Chanchal ODSC-fraud-2017
Chanchal ODSC-fraud-2017
 
20181129 keynote augmented intelligence and artificial intelligence
20181129 keynote augmented intelligence and artificial intelligence20181129 keynote augmented intelligence and artificial intelligence
20181129 keynote augmented intelligence and artificial intelligence
 
Graph+AI for Fin. Services
Graph+AI for Fin. ServicesGraph+AI for Fin. Services
Graph+AI for Fin. Services
 
Five Trends in Real Time Applications
Five Trends in Real Time ApplicationsFive Trends in Real Time Applications
Five Trends in Real Time Applications
 
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
How Graphs Continue to Revolutionize The Prevention of Financial Crime & Frau...
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
 
Protect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in TaxProtect Your Revenue Streams: Big Data & Analytics in Tax
Protect Your Revenue Streams: Big Data & Analytics in Tax
 
The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...The Great Unknown - How can operators leverage big data to prevent future rev...
The Great Unknown - How can operators leverage big data to prevent future rev...
 
Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy Understanding the impact of your fraud strategy
Understanding the impact of your fraud strategy
 

Más de TigerGraph

MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATIONMAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATIONTigerGraph
 
Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...TigerGraph
 
Building an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signalsBuilding an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signalsTigerGraph
 
Care Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information SystemCare Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information SystemTigerGraph
 
Correspondent Banking Networks
Correspondent Banking NetworksCorrespondent Banking Networks
Correspondent Banking NetworksTigerGraph
 
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...TigerGraph
 
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...TigerGraph
 
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningFraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningTigerGraph
 
Fraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On GraphsFraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On GraphsTigerGraph
 
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraphFROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraphTigerGraph
 
Customer Experience Management
Customer Experience ManagementCustomer Experience Management
Customer Experience ManagementTigerGraph
 
Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.TigerGraph
 
Plume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis LibraryPlume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis LibraryTigerGraph
 
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMSGRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMSTigerGraph
 
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...TigerGraph
 
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...TigerGraph
 
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUIMachine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUITigerGraph
 
Recommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine LearningRecommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine LearningTigerGraph
 
Supply Chain and Logistics Management with Graph & AI
Supply Chain and Logistics Management with Graph & AISupply Chain and Logistics Management with Graph & AI
Supply Chain and Logistics Management with Graph & AITigerGraph
 

Más de TigerGraph (20)

MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATIONMAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
 
Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...
 
Building an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signalsBuilding an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signals
 
Care Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information SystemCare Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information System
 
Correspondent Banking Networks
Correspondent Banking NetworksCorrespondent Banking Networks
Correspondent Banking Networks
 
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
 
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
 
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningFraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph Learning
 
Fraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On GraphsFraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On Graphs
 
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraphFROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
 
Customer Experience Management
Customer Experience ManagementCustomer Experience Management
Customer Experience Management
 
Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.
 
Plume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis LibraryPlume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis Library
 
TigerGraph.js
TigerGraph.jsTigerGraph.js
TigerGraph.js
 
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMSGRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
 
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
 
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
 
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUIMachine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
 
Recommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine LearningRecommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine Learning
 
Supply Chain and Logistics Management with Graph & AI
Supply Chain and Logistics Management with Graph & AISupply Chain and Logistics Management with Graph & AI
Supply Chain and Logistics Management with Graph & AI
 

Último

Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...amitlee9823
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...amitlee9823
 
Detecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachDetecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachBoston Institute of Analytics
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...amitlee9823
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...amitlee9823
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...karishmasinghjnh
 

Último (20)

Predicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science ProjectPredicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science Project
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
Detecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachDetecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning Approach
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night StandCall Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Doddaballapur Road ☎ 7737669865 🥵 Book Your One night Stand
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
👉 Amritsar Call Girl 👉📞 6367187148 👉📞 Just📲 Call Ruhi Call Girl Phone No Amri...
 

Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCommerce

  • 1. Detecting Fraud & Anti- Money Laundering (AML) Violations In Real-Time Victor Lee & Gaurav Deshpande for Banking, Telecom, and eCommerce
  • 2. © 2018 TigerGraph. All Rights Reserved Speaking Today 2 Victor Lee Director of Product Management TigerGraph victor@tigergraph.com Graph Data Mining Expert Gaurav Deshpande Vice President of Marketing TigerGraph gaurav@tigergraph.com, +1 510 388 2360 Big Data Analytics Veteran
  • 3. © 2018 TigerGraph. All Rights Reserved Agenda 3 Fraud and Money Laundering – Scale and Complexity Addressing Fraud and Money Laundering – Traditional Approach Addressing Fraud and AML Violations in Real-Time with Deep Link Analytics Getting Started on your own journey to a more secure and compliant organization 3 2 1 4
  • 4. © 2018 TigerGraph. All Rights Reserved Fraud Impacts Multiple Industries 4 The 2018 Global Fraud and Identity Report, Jan 2018 63% of businesses have experienced the same or more fraud losses in the past 12 months Online fraud alone costs consumers $16 Billion per year (bank and merchant costs are higher) Fraud cost consumers more than $16 billion, Feb 2018 Telecoms operators face $300bn global loss, Jan 2016 $300 Billion in global loss across Telecom from uncollected revenue and fraud in 2016
  • 5. © 2018 TigerGraph. All Rights Reserved Impact of Money Laundering on Global Banking 5 Reuters News, Sept 27, 2017 $342 Billion - total US & EU fines on banks’ misconduct including anti-money laundering violations since 2009 Regulators fined US Bank $613 Million due to lax anti-money laundering controls US Bank fined over $600 Million, Feb 15, 2018 Compliance doesn’t pay, Bloomberg, April 11 2018 5% of transactions which firms identify as suspicious is reported to the authorities, of which 10% leads to further investigation (Just 0.5% of suspicious transactions investigated)
  • 6. © 2018 TigerGraph. All Rights Reserved Traditional Approach to Fraud Prevention & AML Compliance 6 Transactions (Payments, Orders, calls) Customers Merchants, Drivers, .. Devices, Locations, .. Input Data Fraud Analytics Solution + Rules Engine Analysts Suspicious Activity Report (SAR) Queries for additional information Investigators BI / Investigation workflow tool Suspicious activities False positives Machine Learning Models Training Data
  • 7. © 2018 TigerGraph. All Rights Reserved So What’s Missing? Current Approach • Data: features of entities, e.g., users, accounts, locations. Examples: • Phone-based fraud detection: frequency and duration of one-directional calls • Money laundering: size and frequency of the payment transactions, transactions with immediate neighbors • Detection: Analysts manually write rules regarding features of nodes or their immediate neighbors (1 to 2 hops). 7 Attributes/ features for a phone Abnormal model Ads model Harassment rule Scam model Good phone Ads Harassment Scam candidateScam • Performance: • False positives: too many cases to investigate, block legitimate business • False negatives: Fail to catch many fraud cases
  • 8. © 2018 TigerGraph. All Rights Reserved Consider an Example - Phone Scam Illegally acquiring money from victims, or failing to pay a telecom company • $4.96 Billion – Compromised PBX/Voicemail Systems • $4.32 Billion – Subscription/Identity Theft • $3.84 Billion – International Revenue Share Fraud • $2.88 Billion – By-Pass Fraud • $2.40 Billion – Credit Card Fraud 8
  • 9. © 2018 TigerGraph. All Rights Reserved Detecting Phone-Based Fraud by Analyzing Network or Graph Relationship Features 9 Good Phone Features Bad Phone Features (1) Short term call duration (2) Empty stable group (3) No call back phone (4) Many rejected calls (5) Average distance > 3 Empty stable group Many rejected calls Average distance > 3 (1) High call back phone (2) Stable group (3) Long term phone (4) Many in-group connections (5) 3-step friend relation Stable group Many in-group connections Good Phone Features 3-step friend relation /// Good phone Bad phone X X X
  • 10. © 2018 TigerGraph. All Rights Reserved Generating New Training Data for Machine Learning to Detect Phone-Based Scam Graph with 500 Million phones and 10 Billion calls,1000s of new calls per second. Feed Machine Learning with new training data with 118 features per phone every 2 hours 10 Phone 2 Features Machine Learning Solution Phone 1 Features (1) High call back phone (2) Stable group (3) Long term phone (4) Many in-group connections (5) 3-step friend relation (1) Short term call duration (2) Empty stable group (3) No call back phone (4) Many rejected calls (5) Avg. distance > 3 Training Data Tens – Hundreds of Billions of calls
  • 11. © 2018 TigerGraph. All Rights Reserved Evolution of Graph Technology 11 Graph 1.0 • Storage and Visualization focused • No built-in parallel computation model • Very slow loading large datasets • Cannot scale out • Not designed for real-time graph updates or queries for large datasets • Limited multi-hop analytics capabilities on large graphs (2 hops) Example – Neo4j Graph 3.0 • Better scale-out, but speed and updates are still an issue • Built on top of NoSQL repository such as Apache Cassandra • Not designed for real-time graph updates or queries for large datasets • Limited multi-hop analytics capabilities on large graphs (2 hops) • Scalability for massive datasets • Supports real-time graph updates and queries for enterprise scale • Provides deep link analytics (3-10+ hops) traversing millions of nodes and performing complex calculations • Privacy for sensitive data • Ease of use for development & deployment Graph 2.0 Example – DataStax
  • 12. © 2018 TigerGraph. All Rights Reserved Addressing Fraud Prevention and AML compliance with Real-time Deep Link Analytics 12 Real-time Multi-Hop Performance Sub-second response for queries touching tens of millions of entities/relationships Transactional (Mutable) Graph Hundreds of thousands of updates per second, Billions of transactions per day Scalability for Massive Datasets 100 B+ entities, 1 Trillion+ relationships Ease of Development & Deployment Easy to use query language (GSQL) for rapidly developing & deploying complex analytics Privacy for Sensitive Data Control access based on user role, data type, or department Deep Link Analytics Queries traverse 3 to 10+ hops deep into the graph performing complex calculations
  • 13. © 2018 TigerGraph. All Rights Reserved Different Types of Financial Fraud • Phone Scam • Credit Card Chargeback Fraud • Advertising/Camouflage Fraud • Money Laundering 13
  • 14. © 2018 TigerGraph. All Rights Reserved Credit Card Chargeback Fraud • Fraudsters use stolen credit card and phone to buy product/service from a merchant • Fraudsters receive and resell product/service • Card owner realizes and cancels the stolen credit card • Fraudster walks away with the money, while bank and merchant selling the product/service bear the loss 14
  • 15. © 2018 TigerGraph. All Rights Reserved Detecting Credit Card Chargeback Fraud • Analyze complex network of payment transactions, devices/phones and linked accounts • Find accounts that are connected to fraudulent transactions and/or devices • If connection is strong enough à shut down account to prevent further loss 15 1 2 1 2 Account 1 Account 2 Account 3 7. Chargeback 4. Unsettled 5. Settled 6. Unsettled 3. Chargeback1. Chargeback 2. Unsettled Active Account Active Account Neighbor Info • Total chargeback $ • Total Unsettled $ • Total Settled $ • # of transactions • # of settled transactions • # of unsettled transactions • # of banned credit card • #of active credit card • # of banned device • # of normal device
  • 16. © 2018 TigerGraph. All Rights Reserved Advertising/Recommendation Fraud • Click/Impression Fraud • Pay-per-click • Pay-per-impression • Recommendation Fraud • Fake reviews or follows • Use camouflage or hijacked accounts 16
  • 17. © 2018 TigerGraph. All Rights Reserved Detecting Advertising/Recommendation Fraud Looks like many users, but really controlled by one 17 • Use machine learning to find the difference between organic reviews/follows vs. fake • Example Features used in analytics: # common products/brands followed/purchased # products/brands not followed/purchased together # hops between accounts # timing between events # devices shared # payment instruments shared Fraudster
  • 18. © 2018 TigerGraph. All Rights Reserved Money Laundering Transforming the profits from illegal activities and corruption into apparently “legitimate” assets. • Structuring: many small cash deposits, to avoid anti-money laundering report requirements • Bulk cash smuggling: smuggling cash to offshore financial institutions • Cash-intensive business: restaurants, casinos, etc. • Round-tripping: money deposited offshore, brought back as investment to avoid taxation 18
  • 19. © 2018 TigerGraph. All Rights Reserved Detecting Money Laundering Violations/ Anti-Money Laundering (AML) 19
  • 20. © 2018 TigerGraph. All Rights Reserved Detecting Money Laundering Violations/ Anti-Money Laundering (AML) 1. Start from a few initial suspicious accounts/transactions. 2. Probe upstream and downstream of money flow. 3. Ignore normal accounts. 4. Add in more “participating” accounts that may be involved in money laundering 5. Converge when the algorithm finds the “source” account and the “target” account. 20 Algorithm to Discover Money Laundering Subgraph
  • 21. © 2018 TigerGraph. All Rights Reserved AML—Initial Suspicious Accounts 21 1. Start from a few initial suspicious accounts.
  • 22. © 2018 TigerGraph. All Rights Reserved AML—Upstream Probe 1 22 2. Probe upstream…
  • 23. © 2018 TigerGraph. All Rights Reserved AML—Upstream Probe 2 23 2. Probe upstream…
  • 24. © 2018 TigerGraph. All Rights Reserved AML—Downstream Probe 1 24 2. … and downstream
  • 25. © 2018 TigerGraph. All Rights Reserved AML—Downstream Probe 2 25 2. … and downstream
  • 26. © 2018 TigerGraph. All Rights Reserved AML— Final Subgraph Is Returned 26 • Converge when the algorithm finds “source” account(s) and “target” account(s).
  • 27. © 2018 TigerGraph. All Rights Reserved Detecting Various Types of Fraud with TigerGraph • Graph Features to the rescue • Integrate multiple data sources into one graph • Real-time updates • GSQL helps easily collect complex, deep-link, aggregate graph features • Feed Machine Learning algorithm with new training data • Deep Link Analytics to the rescue • GSQL easily describes graph traversal and compute patterns • Massive parallel processing for speed and efficiency • Visualization shows evidence right on the spot 27 Real-time Deep Link Analytics at Massive Scale
  • 28. © 2018 TigerGraph. All Rights Reserved Real-Time Graph Analytics Platform 28 User Interface: • GSQL language for schema/loading/ queries/updates • REST API for connecting to other applications • GraphStudio GUI for human interaction Output: • JSON or visual graph
  • 29. © 2018 TigerGraph. All Rights Reserved #1 e-payment company in the world, 100M daily active users #1 US payment company #1 Mobile E-commerce #1 Mobile global supply-chain #1 Power-grid company The largest transaction graph in production in the world (100B+ vertices, 2B+ daily real time updates) Business Graph Real-time Personalized Recommendation Supply-chain logistics Electrical Power Grid #1 Ride sharing company Risk and Compliance Customers 29
  • 30. © 2018 TigerGraph. All Rights Reserved Getting Started with your own journey to a more secure and compliant organization • Download the Fraud Prevention & AML brief https://info.tigergraph.com/aml-solution-brief • Read the benchmark report comparing TigerGraph with older generation graph solutions - https://info.tigergraph.com/benchmark • See TigerGraph in action – take the test drive: https://www.tigergraph.com/try-tigergraph/ 30
  • 31. © 2018 TigerGraph. All Rights Reserved Thank You Check us out on social media! 31 @TigerGraphDB Youtube.com/tigergraph Facebook.com/Tiger GraphDB Linkedin.com/company/Ti gerGraph