Immediate detection of fraud rings

Fraud detection is a typical usecase that requires graphs. It’s all about relationships between identifiers, and about quickly detecting that they are being shared. Shapes and sizes of fraud rings can vary considerably. Neo4j’s Cypher language facilitates the creation of pattern recognition capabilities to help detect fraud rings as they emerge, and when combined with our InterActor, provide a vizualisation of the fraud ring itself. At the same time suspected fraudulent identities and victims are spotted.

For this demo, 400 valid identities are created, each identity has a name, an address, a social security number (ssn) and a phonenumber. In addition, 64 fake identities are created based on the cartesian product of a set of 4 randomly chosen addresses,ssn and phone numbers from the valid identities. So, in total we have 464 identities.

As long as these identities don’t have opened accounts in their names, it’s not possible to see which identities are fraudulent and which are not. Even when there is just a single fraudulent identity that opens an account, it’s difficult. But when we detect that account-holders start to share addresses, ssn and phone, the pattern emerges rapidly. In this demo, we create individual random accounts, and once we suspect fraud, the InterActor application identifies identities that may be fraudulent, as well as identities that may be victims. The latter are those that share only one of their valid identifiers  (ssn, address or phone) with other account-holders. Note in the video that an identity that is initially identified as a victim, later on appears to be member of the fraud ring.


Card image cap
Conversations with Ariadne

We've added a new conversational feature to Ariadne, our LLM-enhanced guide for the Graphileon platform. It makes learning the platform more intuitive and accessible.

Card image cap
Technical Interoperability: n8n & Graphileon Working Seamlessly Together

The combination of n8n and Graphileon offers unprecedented possibilities. n8n users get access to the graphy world of Graphileon, including the UI and the graph (data-science) libraries, Graphileon users benefit from the comprehensive suite of n8n connectors.

Card image cap
Building Secure Low-Code Solutions: Introducing the Hash function for Graphileon

Graphileon now has a Hash function, adding security and fingerprinting using various algorithms to the application flows.

Get started with Graphileon Cloud

The easiest way to get to know Graphileon is to create an account on Graphileon Cloud and start a free two-weeks trial. You'll get an environment with two graph stores installed, as well as access to the App Library with many examples.

You will be able to build graphy applications an browse your graph stores in a way you never did before.