Skip to content

Commit

Permalink
Update transaction-ring-relationship-version.adoc
Browse files Browse the repository at this point in the history
Removed duplicated text from transaction fraud ring example
  • Loading branch information
neo4j-mkd committed Sep 26, 2023
1 parent 979639e commit f43081f
Showing 1 changed file with 11 additions and 37 deletions.
Original file line number Diff line number Diff line change
@@ -1,42 +1,16 @@
= Transaction Fraud Ring - Relationship Version

== 1. Introduction

A transaction fraud ring refers to a group of people collaborating to engage in fraudulent activities, like transferring funds through multiple accounts. These rings work across different locations and employ diverse strategies to evade detection. It is critical for financial organisations to detect these rings, especially with enhancement to Contingent Reimbursement Model (CRM).

== 2. Scenario

The requirement for financial institutes to implement and stop transaction fraud has been around for many years and is core to many regulations.

One example of this is enhancements that are being made to protect customers from Authorised Push Payment scams. The UK has increased customer protection and placed a more significant responsibility on financial institutions to help mitigate these scams.

One of the fastest-growing scams is the Authorised Push Payment (APP) fraud. It resulted in a loss of over *£249 million in the first half of 2022*, a 30% increase compared to the same period in 2020. Reference

Understanding fraudulent behaviour inside your network is one of many ways to help mitigate these scams, as you can identify fraudulent accounts inside your banking estate.

== 3. Solution

Neo4j offer an improved method of uncovering transaction fraud rings and other sophisticated scams with a high degree of accuracy and is capable of stopping advanced fraud scenarios in real-time.

=== How Graph Databases Can Help?

Implementing Neo4j can help execute analysis that was not previously possible. Examples of the scenarios are:

* Execute ring-based queries to follow transactions as they are sent to both internal and external beneficiaries.
* In real-time, perform advanced analytics on the transaction rings to understand patterns.
* Understand common exit and entry accounts in possible fraudulent activities.

== 4. Modelling
== 1. Modelling

This section will show examples of cypher queries on an example graph. The intention is to illustrate what the queries look like and provide a guide on how to structure your data in a real setting. We will do this on a small transaction network graph of several nodes connected in a ring structure.

The example graph will be based on the data model below:

=== 4.1. Data Model
=== 1.1. Data Model

image::finserv/fs-transaction-ring-data-relationship-version-model.svg[]

==== 4.1.1 Required Fields
==== 1.1.1 Required Fields
Below are the fields required to get started:

`Account` Node:
Expand All @@ -49,7 +23,7 @@ Below are the fields required to get started:
* `currency`: Contains the currency of the transaction.
* `date`: Contains the date the transaction occurred.

=== 4.2. Demo Data
=== 1.2. Demo Data

The following Cypher statement will create the example graph in the Neo4j database:

Expand All @@ -69,7 +43,7 @@ CREATE (a3)-[:TRANSACTION {amount: 810, currency: "gbp", date: datetime()-durati
CREATE (a4)-[:TRANSACTION {amount: 729, currency: "gbp", date: datetime()}]->(a1)
----

=== 4.3. Neo4j Schema
=== 1.3. Neo4j Schema

[source, cypher, role=noheader]
----
Expand All @@ -83,9 +57,9 @@ image::finserv/fs-transaction-ring-relationship-version-schema.svg[]

After ingesting the data, Neo4j interprets the graph schema. In the schema, we can observe an `Account` node connected to another `Account` node via a `TRANSACTION` relationship. Despite having the same label, the `Account` nodes possess different properties, such as accountNumber. However, the schema only considers the labels on nodes and relationships.

== 5. Cypher Queries
== 2. Cypher Queries

=== 5.1. Simple transaction ring
=== 2.1. Simple transaction ring

In this query, we will identify a ring with the following requirements:

Expand All @@ -100,7 +74,7 @@ MATCH path=(a:Account)-[:TRANSACTION*3..6]->(a)
RETURN path
----

=== 5.2. Transaction ring with no duplicate accounts
=== 2.2. Transaction ring with no duplicate accounts
In this query, we will identify a ring with the following requirements:

* `Account` nodes should be connected via a `TRANSACTION` relationship.
Expand All @@ -118,7 +92,7 @@ WHERE size(apoc.coll.toSet(nodes(path))) = size(nodes(path)) - 1
RETURN path
----

=== 5.3. Transaction ring with chronological transactions
=== 2.3. Transaction ring with chronological transactions

In this query, we will identify a ring with the following requirements:

Expand All @@ -143,7 +117,7 @@ AND ALL(idx in range(0, size(rel)-2)
RETURN path
----

=== 5.4. Transaction ring with 20% amount deduction
=== 2.4. Transaction ring with 20% amount deduction

When money is passed through a fraud ring, the amount that moves between accounts is often reduced by a fee of up to 20%. To account for this, our query will allow for a reduction of up to 20% at each transaction.

Expand Down Expand Up @@ -173,7 +147,7 @@ AND ALL(idx in range(0, size(rel)-2)
RETURN path
----

==== 5.4.1. What is the query doing?
==== 2.4.1. What is the query doing?

The given Cypher query is designed to identify suspicious transaction rings in a graph database where accounts are connected by transactions. The query looks for cycles of transactions that fit certain criteria and then returns those cycles. Let's break down the query step-by-step.

Expand Down

0 comments on commit f43081f

Please sign in to comment.