Skip to main content

Temporal Network Analytics for Fraud Detection in the Banking Sector

  • Conference paper
  • First Online:
ADBIS, TPDL and EDA 2020 Common Workshops and Doctoral Consortium (TPDL 2020, ADBIS 2020)

Abstract

A new methodology in temporal networks is presented for the use of fraud detection systems in the banking sector. Standard approaches of fraudulence monitoring mainly have the focus on the individual client data. Our approach will concentrate on the hidden data produced by the network of the transaction database. The methodology is based on a cycle detection method with the help of which important patterns can be identified as shown by the test on real data. Our solution is integrated into a financial fraud system of a bank; the experimental results are demonstrated by a real-world case study.

The Authors gratefully acknowledge the European Commission for funding the InnoRenew CoE project (Grant Agreement 739574) under the Horizon2020 Widespread-Teaming program, and the Republic of Slovenia (Investment funding of the Republic of Slovenia and the European Union of the European Regional Development Fund).

L. Hajdu—Supported by the project ”Integrated program for training new generation of scientists in the elds of computer science”, no EFOP-3.6.3- VEKOP-16-2017-0002 (supported by the European Union and co-funded by the European Social Fund).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bolton, R.J., Hand, D.J.: Statistical fraud detection, a review. Stat. Sci. 17(3), 235–249 (2002)

    Article  MathSciNet  Google Scholar 

  2. Bonifati, A., Dumbrava, S., Queries, G.: From theory to practice. SIGMOD Rec. 47, 5–16 (2019)

    Article  Google Scholar 

  3. Bóta, A., Csernenszky, A., Győrffy, L., Kovács, G., Krész, M., Pluhár, A.: Applications of the inverse infection problem on bank transaction networks. CEJOR 23(2), 345–356 (2014). https://doi.org/10.1007/s10100-014-0375-2

    Article  MathSciNet  MATH  Google Scholar 

  4. Cattuto, C., Quaggiotto, M., Panisson, A., Averbuch, A.: Time-varying social networks in a graph database: a Neo4j use case. In: GRADES 2013 (2013)

    Google Scholar 

  5. Chau, D.H., Faloutsos, C.: Fraud detection using social network analysis: a case study. In: Encyclopedia of Social Network Analysis and Mining, 2nd (edn) (2018)

    Google Scholar 

  6. Johnson, D.B.: Finding all the elementary circuits of a directed graph. SIAM J. Comput. 4, 77–84 (1975)

    Article  MathSciNet  Google Scholar 

  7. Krész, M., Pluhár, A.: Economic network analysis based on infection models. In: Encyclopedia of Social Network Analysis and Mining, 2nd (edn) (2018)

    Google Scholar 

  8. Kumar, R., Calders, T.: 2SCENT: an efficient algorithm to enumerate all simple temporal cycles. Proc. VLDB Endow. 11, 1441–1453 (2018)

    Article  Google Scholar 

  9. Litan, A.: The Five Layers of Fraud Prevention and Using Them to Beat Malware. Gartner, Stamford (2011)

    Google Scholar 

  10. Ngai, E.W.T., Hu, Y., Wong, Y.H., Chen, Y., Sun, X.: The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature. Decis. Support Syst. 50(3), 559–569 (2011)

    Article  Google Scholar 

  11. Pandit, S., Chau, D.H., Wang, S., Faloutsos, C.: Netprobe: a fast and scalable system for fraud detection in online auction networks. In: WWW 2007 (2007)

    Google Scholar 

  12. Paranjape, A., Benson, A.R., Leskovec, J.: Motifs in temporal networks. In: WSDM 2017 (2017)

    Google Scholar 

  13. Qiu, X., Cen, W., Qian, Z., Peng, Y., Zhang, Y., Lin, X., Zhou, J.: Real-time constrained cycle detection in large dynamic graphs. Proc. VLDB Endow. 11, 1876–1888 (2018)

    Article  Google Scholar 

  14. Rodrigo, C.R., Bhalchandra, D.T.: Distributed cycle detection in large-scale sparse graphs. In: Simpósio Brasileiro de Pesquisa Operacional (SBPO) (2015)

    Google Scholar 

  15. Sadowksi, G.G., Rathle, P.: Fraud detection: discovering connections with graph databases, Neo4j White Paper (2015)

    Google Scholar 

  16. Tarjan, R.: Depth-first search and linear graph algorithms. SIAM J. Comput. 1(2), 146–160 (1972)

    Article  MathSciNet  Google Scholar 

  17. Tucker, A.: Covering circuits and graph colorings. In: Applied Combinatorics, 6th 9edn), p. 49 (2006)

    Google Scholar 

  18. West, J., Bhattacharya, M.: Intelligent financial fraud detection: a comprehensive review. Comput. Secur. 57, 47–66 (2016)

    Article  Google Scholar 

  19. Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75–105 (2004)

    Article  Google Scholar 

  20. Peffers, K., Tuunanen, T., Rothenberger, M., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24(3), 45–77 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to László Hajdu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hajdu, L., Krész, M. (2020). Temporal Network Analytics for Fraud Detection in the Banking Sector. In: Bellatreche, L., et al. ADBIS, TPDL and EDA 2020 Common Workshops and Doctoral Consortium. TPDL ADBIS 2020 2020. Communications in Computer and Information Science, vol 1260. Springer, Cham. https://doi.org/10.1007/978-3-030-55814-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-55814-7_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-55813-0

  • Online ISBN: 978-3-030-55814-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics