Skip to content

Network Analysis for Fraud

Definition

Network/graph analysis detects fraud by identifying connections between entities (people, devices, addresses, phone numbers) that reveal organized fraud patterns invisible when examining individual accounts.


Entity Graph

graph TD
    A[Person A] -->|same device| B[Person B]
    A -->|same address| C[Person C]
    B -->|same phone| C
    C -->|same email domain| D[Person D]
    D -->|same IP| E[Person E]

    style A fill:#e53935,color:#fff
    style B fill:#e53935,color:#fff
    style C fill:#e53935,color:#fff
    style D fill:#e53935,color:#fff
    style E fill:#e53935,color:#fff

Individually: Each person passes eKYC verification. As a network: Five "unrelated" people sharing devices, addresses, and phones = fraud ring.

Graph Features

Feature What It Reveals
Degree centrality How many connections an entity has (high = hub)
Community detection Clusters of connected entities (fraud rings)
Temporal patterns When connections were formed (bulk creation = suspicious)
Cross-institution links Same entity across multiple financial institutions

Technologies

Tool Type Use
Neo4j Graph database Store and query entity relationships
TigerGraph Graph analytics platform Real-time fraud graph analysis
Amazon Neptune Managed graph DB Cloud-native graph
Graph Neural Networks ML on graphs Learn fraud patterns from graph structure

Key Takeaways

Summary

  • Network analysis catches fraud that individual-level analysis misses — fraud rings, organized crime
  • Entity resolution (linking same person across records) is the foundation
  • Graph databases (Neo4j, TigerGraph) enable real-time relationship querying
  • Cross-institution data sharing dramatically increases graph power