How Graph Databases Stop E-Commerce Fraud in Real-Time
Fraudsters are constantly coming up with clever new ways to defraud online payment systems. Fortunately, graph database technology is able to detect the patterns that arise around these e-commerce fraud scenarios and put an end to them in real time–before a fraudster can inflict significant damage.
Join the DZone community and get the full member experience.Join For Free
as our lives become increasingly digital, a growing number of financial transactions are conducted online.
fraudsters have been quick to adapt to this trend and to devise clever ways to defraud online payment systems. while this type of activity can and does involve criminal fraud rings, a well-educated fraudster can create a very large number of synthetic identities on his or her own and use these to carry on sizeable schemes.
fortunately, graph database technology is able to detect the patterns that arise around these e-commerce fraud scenarios and put an end to them in real time– before a fraudster can inflict significant damage.
in this series on fraud detection , we’re going to take a closer look at how graph databases help detect and mitigate three types of fraud:
this week, we’ll take a closer look at e-commerce fraud detection.
a typical e-commerce fraud scenario
consider an online transaction with the following identifiers:
- user id
- ip address
- a tracking cookie
- credit card number
one would typically expect the relationships between these identifiers to be fairly close to one-to-one. some variations are naturally to be tolerated to account for shared machines, families sharing a single credit card number, individuals using multiple computers, and the like.
however, as soon as the relationships begin to exceed a reasonable number, e-commerce fraud is often at play. for example, a large number of users may have transactions originating from the same ip, large numbers of shipments to different addresses may use the same credit card, or a large numbers of credit cards may all use the same address.
in each of these scenarios, it is the pattern inside the graph–discovered by walking the relationships between disparate pieces of information–that can serve as strong indicating signals of an e-commerce fraud event.
the more interconnections exist amongst identifiers, the greater the cause for concern. large and tightly-knit graphs are very strong indicators that fraud is taking place.
how graph databases help with e-commerce fraud detection
by putting checks into place and associating them with the appropriate event triggers, such schemes can be uncovered before they are able to inflict significant damage. triggers can include events such as login, placing an order, or registering a new credit card.
the graph below shows a series of transactions from different ip addresses. ipx represents distinct ip address, ccx distinct credit card number, idx represents the userid used to carry out the online transaction and ckx refers to a specific cookie stored in the system.
in this example, there is a likely e-commerce fraud event occurring from ip1, which has carried out multiple transactions using five credit cards, one of which (cc1) is used by multiple ids, where two cookies (ck1 and ck2) each share two ids.
graph databases are the ideal enabler for efficient and manageable fraud detection solutions . from fraud rings and collusive groups, to educated criminals operating on their own, graph databases uncover a variety of important e-commerce fraud patterns–and, all in real time.
Published at DZone with permission of Philip Rathle. See the original article here.
Opinions expressed by DZone contributors are their own.