SlideShare a Scribd company logo
1 of 38
Download to read offline
Detecting Fraud and Money
Laundering in Real-Time with a
Graph Database Part 2
Gaurav Deshpande and Dan Hu
September 26, 2018
Graph Gurus Episode 4
© 2018 TigerGraph. All Rights Reserved
Welcome
● Attendees are muted but you can talk to us via Chat in Zoom
● We will have 10 min for Q&A at the end
● Send questions at any time using the Q&A tab in the Zoom menu
● The webinar will be recorded
● A link to the presentation and reproducible steps will be emailed
2
Developer Edition Download https://www.tigergraph.com/developer/
© 2018 TigerGraph. All Rights Reserved
Today’s Moderator
● Built out and positioned IBM’s Big
Data and Analytics portfolio, driving
45 percent year-over-year growth.
● Led 2 startups through explosive
growth - i2 Technologies (IPO) & Trigo
Technologies (largest MDM
acquisition by IBM)
● Big Data Analytics Veteran, 14 patents
in supply chain management and big
data analytics
3
Gaurav Deshpande, VP of Marketing
© 2018 TigerGraph. All Rights Reserved
Today’s Guru
● BS & MS in Physics from University of
Science and Technology of China (USTC)
● PhD in Quantum Computation from
University of California, Merced
● 3-Year TigerGraph Veteran
● Solution Architect, Graph Query
Language Designer, Database Core
Engineer
4
Dr. Dan Hu, Distinguished AI Research Scientist
© 2018 TigerGraph. All Rights
Reserved
What is Money Laundering?
The process of transforming proceeds of illegal activities to
legitimate money
www.unodc.org/unodc/en/money-laundering/laundrycycle.html
5
© 2018 TigerGraph. All Rights
Reserved
Money Laundering Techniques - Layering
1. Funds to be laundered starts at one
source
2. Layering: Split and transferred in less
suspicious amounts to various accounts.
Split and transfer again...
3. Integration: transfer and consolidate…
4. Funds arrive in the account of a related
party
Perfect fit for graph analytics
6
© 2018 TigerGraph. All Rights
Reserved
Money Laundering Techniques - Layering Loop
● Layering requires many transactions
○ Smaller, less suspicious amounts
○ Complex pattern which is hard to notice
● But criminals still want to keep their money!
● Solution: Pass the funds around in a loop
7
© 2018 TigerGraph. All Rights
Reserved
AML Workflow with TigerGraph and Machine
Learning
8
Anti Money Laundering with TigerGraph In
Depth
Layering Loop Detection
© 2018 TigerGraph. All Rights
Reserved
Anti Money Laundering
• An effective anti money launder system should have the
following two features, i.e.
• Detect All Suspicious Behavior Quickly: system should find all
suspicious patterns of wrongdoing at all time.
• Be Easy to Use and Change: all patterns can be easily applied and
user could easily modify the pattern to adapt new rules.
10
© 2018 TigerGraph. All Rights
Reserved
Detect Suspicious Behavior with TigerGraph
• TigerGraph is a native graph database with multiple built-in
graph analytical tools.
• With its powerful graph query language (GSQL), TigerGraph
can do graph traversal & aggregation in a real time fashion.
• Detection of suspicious behavior can be easily converted into
a graph pattern matching problem.
11
© 2018 TigerGraph. All Rights
Reserved
Examples of detection of Suspicious
Behavior
• Detection of 1-level frequent money sender/receiver
• Detection of 2-level frequent money sender/receiver
• Detection of accounts with loop money transactions
• Controllable search depth (Up to 20 hops)
• Search transactions within a given time window
• Amount lower Limit
• Drain Ratio: (max - min) / max
• All transactions in the loop must be in a forward time series
12
© 2018 TigerGraph. All Rights
Reserved
Graph Schema Design
13
© 2018 TigerGraph. All Rights
Reserved
Loop Detection Pseudocode
a1
t4
t2
t1
send
send
a2
t3
a3
t5
send
send
send
send send
send
send
send
Algorithm: Start with one
account and collect paths
while traversal.
Disadvantages:
● memory cost: collect too
many invalid paths
● computation cost: can not
stop until arriving at the end
of traversal.
14
© 2018 TigerGraph. All Rights
Reserved
Bi-directional Loop Detection Pseudocode
a1
t4
t2
t1
rev_send
send
a2
t3
a3
t5
send
send
send
rev_send rev_send
send
send
send
Phase1: use bidirectional search
to mark the subgraph with loops.
Phase2: Traverse the subgraph
graph to collect loop paths.
Phase3: Apply path related filters
(drain ratio) on obtained paths
Note: The start account could be multiple related
accounts (such as linked by the same ID)
15
© 2018 TigerGraph. All Rights
Reserved
Phase 1: Bidirectional Search
a1
t4
t2
t1
rev_send
send
a2
t3
a3
t5
send
send
send
rev_send rev_send
send
send
send
Algorithm
● Traverse the first half hops from the starting
account. Label vertices with the forward and
backward reachable flags.
● Limit the other half traversal among the
vertices with reachable flags, i.e.
○ Forward reachable vertex can only
reach backward reachable vertices.
○ Backward reachable vertex can only
reach forward reachable vertices.
● The potential loop candidates are the
vertices with both forward and backward
reach flags
16
© 2018 TigerGraph. All Rights
Reserved
Phase 1: Bidirectional Search
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
Search Depth = 6, k = 1
a4 t5
a5
send send
● Traverse the first half hops (3
hops) from the starting account.
● Label vertices with the forward
(green) and backward (blue)
reachable flags.
17
© 2018 TigerGraph. All Rights
Reserved
Phase 1: Bidirectional Search
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
Search Depth = 6, k = 2
● Traverse the first half hops (3
hops) from the starting account.
● Label vertices with the forward
(green) and backward (blue)
reachable flags.
18
© 2018 TigerGraph. All Rights
Reserved
Phase 1: Bidirectional Search
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
Search Depth = 6, k = 3
● Traverse the first half hops (3
hops) from the starting account.
● Label vertices with the forward
(green) and backward (blue)
reachable flags.
19
© 2018 TigerGraph. All Rights
Reserved
Phase 1: Bidirectional Search
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 4
● Forward reachable vertex
can only reach backward
reachable vertices.
● Backward reachable vertex
can only reach forward
reachable vertices.
20
© 2018 TigerGraph. All Rights
Reserved
Phase 1: Bidirectional Search
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 5
rev_send
send
● Forward reachable vertex
can only reach backward
reachable vertices.
● Backward reachable vertex
can only reach forward
reachable vertices.
21
© 2018 TigerGraph. All Rights
Reserved
Phase 1: Bidirectional Search
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 6
rev_send
send
rev_send
send
● Forward reachable vertex
can only reach backward
reachable vertices.
● Backward reachable vertex
can only reach forward
reachable vertices.
22
© 2018 TigerGraph. All Rights
Reserved
Phase 2: SubGraph Traversal
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6
rev_send
send
rev_send
send
● Build Paths for each loop
● Apply filter on transactions
with forward timestamps
23
© 2018 TigerGraph. All Rights
Reserved
Phase 2: SubGraph Traversal
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 1
rev_send
send
rev_send
send
● Build Paths for each loop
● Apply filter on transactions
with forward timestamps
24
© 2018 TigerGraph. All Rights
Reserved
Phase 2: SubGraph Traversal
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 2
rev_send
send
rev_send
send
● Build Paths for each loop
● Apply filter on transactions
with forward timestamps
25
© 2018 TigerGraph. All Rights
Reserved
Phase 2: SubGraph Traversal
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 3
rev_send
send
rev_send
send
● Build Paths for each loop
● Apply filter on transactions
with forward timestamps
26
© 2018 TigerGraph. All Rights
Reserved
Phase 2: SubGraph Traversal
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 4
rev_send
send
rev_send
send
● Build Paths for each loop
● Apply filter on transactions
with forward timestamps
27
© 2018 TigerGraph. All Rights
Reserved
Phase 2: SubGraph Traversal
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 5
rev_send
send
rev_send
send
● Build Paths for each loop
● Apply filter on transactions
with forward timestamps
28
© 2018 TigerGraph. All Rights
Reserved
Phase 2: SubGraph Traversal
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 6
rev_send
send
rev_send
send
● Build Paths for each loop
● Apply filter on transactions
with forward timestamps
29
© 2018 TigerGraph. All Rights
Reserved
Phase 3: Apply Path Filters
a1
t4
t2
t1
rev_send
send
a2
t3
a3
send
send
send
rev_send rev_send
send
a4 t5
a5
send send
send
rev_send
Search Depth = 6, k = 6
rev_send
send
rev_send
send
● Drain Ratio Check
30
© 2018 TigerGraph. All Rights
Reserved
GSQL Query: Suspicious account with loop
transactions
Graph Data
http://192.168.0.118:14240/#/loading-executor
GSQL implementation on loop transactions
http://192.168.0.118:14240/#/query-editor
For GSQL Starter
https://info.tigergraph.com/en/gsql-webinar-1
31
© 2018 TigerGraph. All Rights
Reserved
GSQL Query Batch Processing
• To search for all possible accounts with loop transactions,
one need to do loop detection query for all candidates.
• One solution would be expand the single account loop
detection algorithm to multiple accounts, which may
greatly complicate the query and may actually reduce the
performance.
• GSQL Query provide an easy alternative way to speed up
batch processing using Query Calling Query Feature.
32
© 2018 TigerGraph. All Rights
Reserved
GSQL Query Batch Processing
Query Calling Query in parallel with GSQL
• Use Vertex Block to parallelization
• Start a Vertex Block with all candidate vertices
• Call the loop detection subquery in ACCUM block
• Use Edge Block to parallelization
• Start a Edge Block with all candidate vertices as target vertex
• Call the loop detection subquery in POST-ACCUM block
33
© 2018 TigerGraph. All Rights
Reserved
GSQL Query Batch Processing
GSQL loop transactions in batch
http://192.168.0.118:14240/#/query-editor
34
© 2018 TigerGraph. All Rights
Reserved
GSQL Query: Suspicious account with loop
transactions
35
Q&A
Please send your questions via the Q&A menu in Zoom
36
© 2018 TigerGraph. All Rights Reserved
Thank You!
37
Compare the Developer Edition and Enterprise Free Trial
https://www.tigergraph.com/download/
Guru Scripts
https://github.com/tigergraph/ecosys/tree/master/guru_scripts
Join our Developer Forum
https://groups.google.com/a/opengsql.org/forum/#!forum/gsql-users
Download our Ebook
https://info.tigergraph.com/ebook
@TigerGraphDB youtube.com/tigergraph facebook.com/TigerGraphDB linkedin.com/company/TigerGraph
User Defined Function
38

More Related Content

What's hot

Graph-Based Network Topology Analysis for Telecom Operators
Graph-Based Network Topology Analysis for Telecom OperatorsGraph-Based Network Topology Analysis for Telecom Operators
Graph-Based Network Topology Analysis for Telecom OperatorsNeo4j
 
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkrout
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron SchildkroutKafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkrout
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkroutconfluent
 
What is Differential Privacy?
What is Differential Privacy?What is Differential Privacy?
What is Differential Privacy?Georgian
 
Real-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
Real-time Fraud Detection for Southeast Asia’s Leading Mobile PlatformReal-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
Real-time Fraud Detection for Southeast Asia’s Leading Mobile PlatformScyllaDB
 
AWS Neptune - A Fast and reliable Graph Database Built for the Cloud
AWS Neptune - A Fast and reliable Graph Database Built for the CloudAWS Neptune - A Fast and reliable Graph Database Built for the Cloud
AWS Neptune - A Fast and reliable Graph Database Built for the CloudAmazon Web Services
 
A Universe of Knowledge Graphs
A Universe of Knowledge GraphsA Universe of Knowledge Graphs
A Universe of Knowledge GraphsNeo4j
 
Försäkringskassan: Neo4j as an Information Hub (GraphSummit Stockholm 2023)
Försäkringskassan: Neo4j as an Information Hub (GraphSummit Stockholm 2023)Försäkringskassan: Neo4j as an Information Hub (GraphSummit Stockholm 2023)
Försäkringskassan: Neo4j as an Information Hub (GraphSummit Stockholm 2023)Neo4j
 
Storing State Forever: Why It Can Be Good For Your Analytics
Storing State Forever: Why It Can Be Good For Your AnalyticsStoring State Forever: Why It Can Be Good For Your Analytics
Storing State Forever: Why It Can Be Good For Your AnalyticsYaroslav Tkachenko
 
DAS Slides: Data Governance - Combining Data Management with Organizational ...
DAS Slides: Data Governance -  Combining Data Management with Organizational ...DAS Slides: Data Governance -  Combining Data Management with Organizational ...
DAS Slides: Data Governance - Combining Data Management with Organizational ...DATAVERSITY
 
Graphs for Enterprise Architects
Graphs for Enterprise ArchitectsGraphs for Enterprise Architects
Graphs for Enterprise ArchitectsNeo4j
 
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...Simplilearn
 
Spark Summit EU 2015: Lessons from 300+ production users
Spark Summit EU 2015: Lessons from 300+ production usersSpark Summit EU 2015: Lessons from 300+ production users
Spark Summit EU 2015: Lessons from 300+ production usersDatabricks
 
It's Time To Stop Using Lambda Architecture
It's Time To Stop Using Lambda ArchitectureIt's Time To Stop Using Lambda Architecture
It's Time To Stop Using Lambda ArchitectureYaroslav Tkachenko
 
Neo4j Graph Use Cases, Bruno Ungermann, Neo4j
Neo4j Graph Use Cases, Bruno Ungermann, Neo4jNeo4j Graph Use Cases, Bruno Ungermann, Neo4j
Neo4j Graph Use Cases, Bruno Ungermann, Neo4jNeo4j
 
Graph Gurus 15: Introducing TigerGraph 2.4
Graph Gurus 15: Introducing TigerGraph 2.4 Graph Gurus 15: Introducing TigerGraph 2.4
Graph Gurus 15: Introducing TigerGraph 2.4 TigerGraph
 
Workshop - Build a Graph Solution
Workshop - Build a Graph SolutionWorkshop - Build a Graph Solution
Workshop - Build a Graph SolutionNeo4j
 
The Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent ApplicationsThe Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent ApplicationsNeo4j
 

What's hot (20)

Graph-Based Network Topology Analysis for Telecom Operators
Graph-Based Network Topology Analysis for Telecom OperatorsGraph-Based Network Topology Analysis for Telecom Operators
Graph-Based Network Topology Analysis for Telecom Operators
 
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkrout
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron SchildkroutKafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkrout
Kafka + Uber- The World’s Realtime Transit Infrastructure, Aaron Schildkrout
 
What is Differential Privacy?
What is Differential Privacy?What is Differential Privacy?
What is Differential Privacy?
 
Real-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
Real-time Fraud Detection for Southeast Asia’s Leading Mobile PlatformReal-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
Real-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
 
AWS Neptune - A Fast and reliable Graph Database Built for the Cloud
AWS Neptune - A Fast and reliable Graph Database Built for the CloudAWS Neptune - A Fast and reliable Graph Database Built for the Cloud
AWS Neptune - A Fast and reliable Graph Database Built for the Cloud
 
A Universe of Knowledge Graphs
A Universe of Knowledge GraphsA Universe of Knowledge Graphs
A Universe of Knowledge Graphs
 
Försäkringskassan: Neo4j as an Information Hub (GraphSummit Stockholm 2023)
Försäkringskassan: Neo4j as an Information Hub (GraphSummit Stockholm 2023)Försäkringskassan: Neo4j as an Information Hub (GraphSummit Stockholm 2023)
Försäkringskassan: Neo4j as an Information Hub (GraphSummit Stockholm 2023)
 
Storing State Forever: Why It Can Be Good For Your Analytics
Storing State Forever: Why It Can Be Good For Your AnalyticsStoring State Forever: Why It Can Be Good For Your Analytics
Storing State Forever: Why It Can Be Good For Your Analytics
 
DAS Slides: Data Governance - Combining Data Management with Organizational ...
DAS Slides: Data Governance -  Combining Data Management with Organizational ...DAS Slides: Data Governance -  Combining Data Management with Organizational ...
DAS Slides: Data Governance - Combining Data Management with Organizational ...
 
Expectation maximization
Expectation maximizationExpectation maximization
Expectation maximization
 
Graphs for Enterprise Architects
Graphs for Enterprise ArchitectsGraphs for Enterprise Architects
Graphs for Enterprise Architects
 
The delta architecture
The delta architectureThe delta architecture
The delta architecture
 
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
Pig Tutorial | Apache Pig Tutorial | What Is Pig In Hadoop? | Apache Pig Arch...
 
Spark Summit EU 2015: Lessons from 300+ production users
Spark Summit EU 2015: Lessons from 300+ production usersSpark Summit EU 2015: Lessons from 300+ production users
Spark Summit EU 2015: Lessons from 300+ production users
 
It's Time To Stop Using Lambda Architecture
It's Time To Stop Using Lambda ArchitectureIt's Time To Stop Using Lambda Architecture
It's Time To Stop Using Lambda Architecture
 
Neo4j Graph Use Cases, Bruno Ungermann, Neo4j
Neo4j Graph Use Cases, Bruno Ungermann, Neo4jNeo4j Graph Use Cases, Bruno Ungermann, Neo4j
Neo4j Graph Use Cases, Bruno Ungermann, Neo4j
 
Graph Gurus 15: Introducing TigerGraph 2.4
Graph Gurus 15: Introducing TigerGraph 2.4 Graph Gurus 15: Introducing TigerGraph 2.4
Graph Gurus 15: Introducing TigerGraph 2.4
 
Workshop - Build a Graph Solution
Workshop - Build a Graph SolutionWorkshop - Build a Graph Solution
Workshop - Build a Graph Solution
 
The Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent ApplicationsThe Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent Applications
 
Graph and Amazon Neptune
Graph and Amazon NeptuneGraph and Amazon Neptune
Graph and Amazon Neptune
 

Similar to Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2

Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...TigerGraph
 
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...InfluxData
 
Graph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 5: Webinar PageRankGraph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 5: Webinar PageRankTigerGraph
 
Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...
Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...
Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...TigerGraph
 
Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph
Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph  Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph
Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph TigerGraph
 
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1TigerGraph
 
Network Traffic Packets Classified as Textual Images for Intrusion Detection
Network Traffic Packets Classified as Textual Images for Intrusion DetectionNetwork Traffic Packets Classified as Textual Images for Intrusion Detection
Network Traffic Packets Classified as Textual Images for Intrusion Detectioniammyr
 
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...TigerGraph
 
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5TigerGraph
 
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 ClassificationUsing Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 ClassificationTigerGraph
 
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityUsing Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityTigerGraph
 
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2TigerGraph
 
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...TigerGraph
 
Surprising Advantages of Streaming - ACM March 2018
Surprising Advantages of Streaming - ACM March 2018Surprising Advantages of Streaming - ACM March 2018
Surprising Advantages of Streaming - ACM March 2018Ellen Friedman
 
Graph Gurus Episode 11: Accumulators for Complex Graph Analytics
Graph Gurus Episode 11: Accumulators for Complex Graph AnalyticsGraph Gurus Episode 11: Accumulators for Complex Graph Analytics
Graph Gurus Episode 11: Accumulators for Complex Graph AnalyticsTigerGraph
 
Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...
Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...
Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...Citus Data
 
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...Databricks
 
Introducing VenmoPlus.com 6/27 version
Introducing VenmoPlus.com 6/27 versionIntroducing VenmoPlus.com 6/27 version
Introducing VenmoPlus.com 6/27 versionQingpeng "Q.P." Zhang
 
20181129 keynote augmented intelligence and artificial intelligence
20181129 keynote augmented intelligence and artificial intelligence20181129 keynote augmented intelligence and artificial intelligence
20181129 keynote augmented intelligence and artificial intelligenceSantiago Cabrera-Naranjo
 
A Fast Intro to Fast Query with ClickHouse, by Robert Hodges
A Fast Intro to Fast Query with ClickHouse, by Robert HodgesA Fast Intro to Fast Query with ClickHouse, by Robert Hodges
A Fast Intro to Fast Query with ClickHouse, by Robert HodgesAltinity Ltd
 

Similar to Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2 (20)

Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
Graph Gurus Episode 7: Connecting the Dots in Real-Time: Deep Link Analysis w...
 
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...
InfluxDB 101 – Concepts and Architecture by Michael DeSa, Software Engineer |...
 
Graph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 5: Webinar PageRankGraph Gurus Episode 5: Webinar PageRank
Graph Gurus Episode 5: Webinar PageRank
 
Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...
Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...
Graph Gurus Episode 8: Location, Location, Location - Geospatial Analysis wit...
 
Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph
Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph  Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph
Graph Gurus Episode 13: Visualizing Bitcoin Blockchain with Tiger Graph
 
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
 
Network Traffic Packets Classified as Textual Images for Intrusion Detection
Network Traffic Packets Classified as Textual Images for Intrusion DetectionNetwork Traffic Packets Classified as Textual Images for Intrusion Detection
Network Traffic Packets Classified as Textual Images for Intrusion Detection
 
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
Graph Gurus Episode 34: Graph Databases are Changing the Fraud Detection and ...
 
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
Graph Gurus Episode 32: Using Graph Algorithms for Advanced Analytics Part 5
 
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 ClassificationUsing Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
 
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityUsing Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
 
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
Graph Gurus Episode 27: Using Graph Algorithms for Advanced Analytics Part 2
 
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
Detecting Fraud and AML Violations In Real-Time for Banking, Telecom and eCom...
 
Surprising Advantages of Streaming - ACM March 2018
Surprising Advantages of Streaming - ACM March 2018Surprising Advantages of Streaming - ACM March 2018
Surprising Advantages of Streaming - ACM March 2018
 
Graph Gurus Episode 11: Accumulators for Complex Graph Analytics
Graph Gurus Episode 11: Accumulators for Complex Graph AnalyticsGraph Gurus Episode 11: Accumulators for Complex Graph Analytics
Graph Gurus Episode 11: Accumulators for Complex Graph Analytics
 
Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...
Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...
Scaling Multi-tenant Applications Using the Django ORM & Postgres | PyCon Can...
 
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
Real-Time Fraud Detection at Scale—Integrating Real-Time Deep-Link Graph Anal...
 
Introducing VenmoPlus.com 6/27 version
Introducing VenmoPlus.com 6/27 versionIntroducing VenmoPlus.com 6/27 version
Introducing VenmoPlus.com 6/27 version
 
20181129 keynote augmented intelligence and artificial intelligence
20181129 keynote augmented intelligence and artificial intelligence20181129 keynote augmented intelligence and artificial intelligence
20181129 keynote augmented intelligence and artificial intelligence
 
A Fast Intro to Fast Query with ClickHouse, by Robert Hodges
A Fast Intro to Fast Query with ClickHouse, by Robert HodgesA Fast Intro to Fast Query with ClickHouse, by Robert Hodges
A Fast Intro to Fast Query with ClickHouse, by Robert Hodges
 

More from TigerGraph

MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATIONMAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATIONTigerGraph
 
Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...TigerGraph
 
Building an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signalsBuilding an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signalsTigerGraph
 
Care Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information SystemCare Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information SystemTigerGraph
 
Correspondent Banking Networks
Correspondent Banking NetworksCorrespondent Banking Networks
Correspondent Banking NetworksTigerGraph
 
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...TigerGraph
 
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...TigerGraph
 
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningFraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningTigerGraph
 
Fraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On GraphsFraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On GraphsTigerGraph
 
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraphFROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraphTigerGraph
 
Customer Experience Management
Customer Experience ManagementCustomer Experience Management
Customer Experience ManagementTigerGraph
 
Graph+AI for Fin. Services
Graph+AI for Fin. ServicesGraph+AI for Fin. Services
Graph+AI for Fin. ServicesTigerGraph
 
Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.TigerGraph
 
Plume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis LibraryPlume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis LibraryTigerGraph
 
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMSGRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMSTigerGraph
 
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...TigerGraph
 
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...TigerGraph
 
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUIMachine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUITigerGraph
 
Recommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine LearningRecommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine LearningTigerGraph
 

More from TigerGraph (20)

MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATIONMAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
MAXIMIZING THE VALUE OF SCIENTIFIC INFORMATION TO ACCELERATE INNOVATION
 
Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...Better Together: How Graph database enables easy data integration with Spark ...
Better Together: How Graph database enables easy data integration with Spark ...
 
Building an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signalsBuilding an accurate understanding of consumers based on real-world signals
Building an accurate understanding of consumers based on real-world signals
 
Care Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information SystemCare Intervention Assistant - Omaha Clinical Data Information System
Care Intervention Assistant - Omaha Clinical Data Information System
 
Correspondent Banking Networks
Correspondent Banking NetworksCorrespondent Banking Networks
Correspondent Banking Networks
 
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
Delivering Large Scale Real-time Graph Analytics with Dell Infrastructure and...
 
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
Deploying an End-to-End TigerGraph Enterprise Architecture using Kafka, Maria...
 
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningFraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph Learning
 
Fraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On GraphsFraudulent credit card cash-out detection On Graphs
Fraudulent credit card cash-out detection On Graphs
 
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraphFROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
FROM DATAFRAMES TO GRAPH Data Science with pyTigerGraph
 
Customer Experience Management
Customer Experience ManagementCustomer Experience Management
Customer Experience Management
 
Graph+AI for Fin. Services
Graph+AI for Fin. ServicesGraph+AI for Fin. Services
Graph+AI for Fin. Services
 
Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.Davraz - A graph visualization and exploration software.
Davraz - A graph visualization and exploration software.
 
Plume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis LibraryPlume - A Code Property Graph Extraction and Analysis Library
Plume - A Code Property Graph Extraction and Analysis Library
 
TigerGraph.js
TigerGraph.jsTigerGraph.js
TigerGraph.js
 
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMSGRAPHS FOR THE FUTURE ENERGY SYSTEMS
GRAPHS FOR THE FUTURE ENERGY SYSTEMS
 
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
Hardware Accelerated Machine Learning Solution for Detecting Fraud and Money ...
 
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
How to Build An AI Based Customer Data Platform: Learn the design patterns fo...
 
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUIMachine Learning Feature Design with TigerGraph 3.0 No-Code GUI
Machine Learning Feature Design with TigerGraph 3.0 No-Code GUI
 
Recommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine LearningRecommendation Engine with In-Database Machine Learning
Recommendation Engine with In-Database Machine Learning
 

Recently uploaded

EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 

Recently uploaded (20)

EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 

Graph Gurus Episode 4: Detecting Fraud and Money Laudering in Real-Time Part 2

  • 1. Detecting Fraud and Money Laundering in Real-Time with a Graph Database Part 2 Gaurav Deshpande and Dan Hu September 26, 2018 Graph Gurus Episode 4
  • 2. © 2018 TigerGraph. All Rights Reserved Welcome ● Attendees are muted but you can talk to us via Chat in Zoom ● We will have 10 min for Q&A at the end ● Send questions at any time using the Q&A tab in the Zoom menu ● The webinar will be recorded ● A link to the presentation and reproducible steps will be emailed 2 Developer Edition Download https://www.tigergraph.com/developer/
  • 3. © 2018 TigerGraph. All Rights Reserved Today’s Moderator ● Built out and positioned IBM’s Big Data and Analytics portfolio, driving 45 percent year-over-year growth. ● Led 2 startups through explosive growth - i2 Technologies (IPO) & Trigo Technologies (largest MDM acquisition by IBM) ● Big Data Analytics Veteran, 14 patents in supply chain management and big data analytics 3 Gaurav Deshpande, VP of Marketing
  • 4. © 2018 TigerGraph. All Rights Reserved Today’s Guru ● BS & MS in Physics from University of Science and Technology of China (USTC) ● PhD in Quantum Computation from University of California, Merced ● 3-Year TigerGraph Veteran ● Solution Architect, Graph Query Language Designer, Database Core Engineer 4 Dr. Dan Hu, Distinguished AI Research Scientist
  • 5. © 2018 TigerGraph. All Rights Reserved What is Money Laundering? The process of transforming proceeds of illegal activities to legitimate money www.unodc.org/unodc/en/money-laundering/laundrycycle.html 5
  • 6. © 2018 TigerGraph. All Rights Reserved Money Laundering Techniques - Layering 1. Funds to be laundered starts at one source 2. Layering: Split and transferred in less suspicious amounts to various accounts. Split and transfer again... 3. Integration: transfer and consolidate… 4. Funds arrive in the account of a related party Perfect fit for graph analytics 6
  • 7. © 2018 TigerGraph. All Rights Reserved Money Laundering Techniques - Layering Loop ● Layering requires many transactions ○ Smaller, less suspicious amounts ○ Complex pattern which is hard to notice ● But criminals still want to keep their money! ● Solution: Pass the funds around in a loop 7
  • 8. © 2018 TigerGraph. All Rights Reserved AML Workflow with TigerGraph and Machine Learning 8
  • 9. Anti Money Laundering with TigerGraph In Depth Layering Loop Detection
  • 10. © 2018 TigerGraph. All Rights Reserved Anti Money Laundering • An effective anti money launder system should have the following two features, i.e. • Detect All Suspicious Behavior Quickly: system should find all suspicious patterns of wrongdoing at all time. • Be Easy to Use and Change: all patterns can be easily applied and user could easily modify the pattern to adapt new rules. 10
  • 11. © 2018 TigerGraph. All Rights Reserved Detect Suspicious Behavior with TigerGraph • TigerGraph is a native graph database with multiple built-in graph analytical tools. • With its powerful graph query language (GSQL), TigerGraph can do graph traversal & aggregation in a real time fashion. • Detection of suspicious behavior can be easily converted into a graph pattern matching problem. 11
  • 12. © 2018 TigerGraph. All Rights Reserved Examples of detection of Suspicious Behavior • Detection of 1-level frequent money sender/receiver • Detection of 2-level frequent money sender/receiver • Detection of accounts with loop money transactions • Controllable search depth (Up to 20 hops) • Search transactions within a given time window • Amount lower Limit • Drain Ratio: (max - min) / max • All transactions in the loop must be in a forward time series 12
  • 13. © 2018 TigerGraph. All Rights Reserved Graph Schema Design 13
  • 14. © 2018 TigerGraph. All Rights Reserved Loop Detection Pseudocode a1 t4 t2 t1 send send a2 t3 a3 t5 send send send send send send send send Algorithm: Start with one account and collect paths while traversal. Disadvantages: ● memory cost: collect too many invalid paths ● computation cost: can not stop until arriving at the end of traversal. 14
  • 15. © 2018 TigerGraph. All Rights Reserved Bi-directional Loop Detection Pseudocode a1 t4 t2 t1 rev_send send a2 t3 a3 t5 send send send rev_send rev_send send send send Phase1: use bidirectional search to mark the subgraph with loops. Phase2: Traverse the subgraph graph to collect loop paths. Phase3: Apply path related filters (drain ratio) on obtained paths Note: The start account could be multiple related accounts (such as linked by the same ID) 15
  • 16. © 2018 TigerGraph. All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 t5 send send send rev_send rev_send send send send Algorithm ● Traverse the first half hops from the starting account. Label vertices with the forward and backward reachable flags. ● Limit the other half traversal among the vertices with reachable flags, i.e. ○ Forward reachable vertex can only reach backward reachable vertices. ○ Backward reachable vertex can only reach forward reachable vertices. ● The potential loop candidates are the vertices with both forward and backward reach flags 16
  • 17. © 2018 TigerGraph. All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send Search Depth = 6, k = 1 a4 t5 a5 send send ● Traverse the first half hops (3 hops) from the starting account. ● Label vertices with the forward (green) and backward (blue) reachable flags. 17
  • 18. © 2018 TigerGraph. All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send Search Depth = 6, k = 2 ● Traverse the first half hops (3 hops) from the starting account. ● Label vertices with the forward (green) and backward (blue) reachable flags. 18
  • 19. © 2018 TigerGraph. All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send Search Depth = 6, k = 3 ● Traverse the first half hops (3 hops) from the starting account. ● Label vertices with the forward (green) and backward (blue) reachable flags. 19
  • 20. © 2018 TigerGraph. All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 4 ● Forward reachable vertex can only reach backward reachable vertices. ● Backward reachable vertex can only reach forward reachable vertices. 20
  • 21. © 2018 TigerGraph. All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 5 rev_send send ● Forward reachable vertex can only reach backward reachable vertices. ● Backward reachable vertex can only reach forward reachable vertices. 21
  • 22. © 2018 TigerGraph. All Rights Reserved Phase 1: Bidirectional Search a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 6 rev_send send rev_send send ● Forward reachable vertex can only reach backward reachable vertices. ● Backward reachable vertex can only reach forward reachable vertices. 22
  • 23. © 2018 TigerGraph. All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 23
  • 24. © 2018 TigerGraph. All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 1 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 24
  • 25. © 2018 TigerGraph. All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 2 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 25
  • 26. © 2018 TigerGraph. All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 3 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 26
  • 27. © 2018 TigerGraph. All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 4 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 27
  • 28. © 2018 TigerGraph. All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 5 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 28
  • 29. © 2018 TigerGraph. All Rights Reserved Phase 2: SubGraph Traversal a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 6 rev_send send rev_send send ● Build Paths for each loop ● Apply filter on transactions with forward timestamps 29
  • 30. © 2018 TigerGraph. All Rights Reserved Phase 3: Apply Path Filters a1 t4 t2 t1 rev_send send a2 t3 a3 send send send rev_send rev_send send a4 t5 a5 send send send rev_send Search Depth = 6, k = 6 rev_send send rev_send send ● Drain Ratio Check 30
  • 31. © 2018 TigerGraph. All Rights Reserved GSQL Query: Suspicious account with loop transactions Graph Data http://192.168.0.118:14240/#/loading-executor GSQL implementation on loop transactions http://192.168.0.118:14240/#/query-editor For GSQL Starter https://info.tigergraph.com/en/gsql-webinar-1 31
  • 32. © 2018 TigerGraph. All Rights Reserved GSQL Query Batch Processing • To search for all possible accounts with loop transactions, one need to do loop detection query for all candidates. • One solution would be expand the single account loop detection algorithm to multiple accounts, which may greatly complicate the query and may actually reduce the performance. • GSQL Query provide an easy alternative way to speed up batch processing using Query Calling Query Feature. 32
  • 33. © 2018 TigerGraph. All Rights Reserved GSQL Query Batch Processing Query Calling Query in parallel with GSQL • Use Vertex Block to parallelization • Start a Vertex Block with all candidate vertices • Call the loop detection subquery in ACCUM block • Use Edge Block to parallelization • Start a Edge Block with all candidate vertices as target vertex • Call the loop detection subquery in POST-ACCUM block 33
  • 34. © 2018 TigerGraph. All Rights Reserved GSQL Query Batch Processing GSQL loop transactions in batch http://192.168.0.118:14240/#/query-editor 34
  • 35. © 2018 TigerGraph. All Rights Reserved GSQL Query: Suspicious account with loop transactions 35
  • 36. Q&A Please send your questions via the Q&A menu in Zoom 36
  • 37. © 2018 TigerGraph. All Rights Reserved Thank You! 37 Compare the Developer Edition and Enterprise Free Trial https://www.tigergraph.com/download/ Guru Scripts https://github.com/tigergraph/ecosys/tree/master/guru_scripts Join our Developer Forum https://groups.google.com/a/opengsql.org/forum/#!forum/gsql-users Download our Ebook https://info.tigergraph.com/ebook @TigerGraphDB youtube.com/tigergraph facebook.com/TigerGraphDB linkedin.com/company/TigerGraph