Open Access   Article Go Back

Fraud Pattern Recognition In Banking Sector Using Graph Database

Sonali Sen1 , Trishita Mukherjee2 , Sunanda Pal3 , Sumana Ghosh4

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 1394-1398, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.13941398

Online published on Jun 30, 2018

Copyright © Sonali Sen, Trishita Mukherjee, Sunanda Pal, Sumana Ghosh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sonali Sen, Trishita Mukherjee, Sunanda Pal, Sumana Ghosh, “Fraud Pattern Recognition In Banking Sector Using Graph Database,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1394-1398, 2018.

MLA Style Citation: Sonali Sen, Trishita Mukherjee, Sunanda Pal, Sumana Ghosh "Fraud Pattern Recognition In Banking Sector Using Graph Database." International Journal of Computer Sciences and Engineering 6.6 (2018): 1394-1398.

APA Style Citation: Sonali Sen, Trishita Mukherjee, Sunanda Pal, Sumana Ghosh, (2018). Fraud Pattern Recognition In Banking Sector Using Graph Database. International Journal of Computer Sciences and Engineering, 6(6), 1394-1398.

BibTex Style Citation:
@article{Sen_2018,
author = {Sonali Sen, Trishita Mukherjee, Sunanda Pal, Sumana Ghosh},
title = {Fraud Pattern Recognition In Banking Sector Using Graph Database},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1394-1398},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2358},
doi = {https://doi.org/10.26438/ijcse/v6i6.13941398}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.13941398}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2358
TI - Fraud Pattern Recognition In Banking Sector Using Graph Database
T2 - International Journal of Computer Sciences and Engineering
AU - Sonali Sen, Trishita Mukherjee, Sunanda Pal, Sumana Ghosh
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1394-1398
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
923 435 downloads 241 downloads
  
  
           

Abstract

Bank sector gives the proper economic structure and support in a country. Frauds in the banking sector have become a major issue in the banking arena. Therefore, it has become a necessity in implementing fraud pattern detection mechanisms to unmask the fraudsters. Ideal mechanism of recognizing such fraud patterns can be implemented using a graphical structure. Graph database provides such a graphical structure with node-relationship analysis. Typical pattern fraudulent methods like bust-out fraud (BOF) and credit-card fraud (CRF) can be recognized via such a graphical structure analysis. The motive behind such a proposal is to detect fraudulent patterns and implement transaction analysis in a bust-out fraud and credit-card fraud. We are trying to observe possible fraud rings in the bust-out fraud and in the credit-card fraud we are trying to identify the origin of the scam. This proposal provides the ideal solution for the investigation of large amounts of heterogeneous data that is required to recognize the fraudulent patterns in the bust-out and credit-card fraud.

Key-Words / Index Term

Graph database, Bust-out fraud, Credit card fraud

References

[1]. Harsha R. Vyawahare, Dr. P. P. Karde, An Overview on Graph Database Model, Vol. 3, Issue 8, August 2015, IJIRCCE.
[2]. Shefali Patil, Gaurav Vaswani, Anuradha Bhatia, Graph Databases- An Overview , IJCSIT, Vol. 5(1), 2014,657-660
[3]. Arnaud Castelltort, Anne Laurent, Rogue behavior detection in NoSQL graph databases. Journal of Innovation in Digital Ecosystems, Elsevier 2016, 3 (2), pp.70-82.
[4]. In: Saeed K., Homenda W ,Pokorný J. (2015) Graph Databases: Their Power and Limitations, (eds) Computer Information Systems and Industrial Management. CISIM 2015. Lecture Notes in Computer Science, vol. 9339. Springer, Cham
[5]. Graph Databases – Book by Emil Eifrem, Ian Robinson, and Jim Webber,-O’REILLY
[6]. Harsha R Vyavahare, Dr.P.P.Karde, SHORT SURVEY ON GRAPHICAL DATABASE, ISSN: 0976-5166 Vol. 6 No.4 Aug-Sep 2015-IJCSE.
[7]. R.Satraboyina, G.K Chakravarthi, Discovery of ranking fraud detection system for mobile apps-, vol.4, Issue 4, p.p.7-10, Aug-2016-IJSRCSE.