Synthetic Identity Detection Using Graph Neural Networks

Authors

  • Sunil Anasuri Independent Researcher, USA. Author

DOI:

https://doi.org/10.63282/3050-9262.IJAIDSML-V4I4P110

Keywords:

Synthetic Identity, Fraud Detection, Graph Neural Networks, Anomaly Detection, Machine Learning, Graph Embedding

Abstract

Synthetic identity fraud has become one of the most significant problems for financial institutions and online services. This is because synthetic identities can use a combination of real and false information, and through non-linear relationships and changing patterns, are difficult to identify using conventional procedures. This paper will explore Graph Neural Networks (GNNs) in the context of synthetic identity detection, which lies in their potential to capture the structure underlying relational data and learn complex network representations. As an adaptive way of thinking, GNNs utilise the graph structure to represent the identities of users, transaction histories, and social ties, taking into account dependencies and abnormal patterns that are not captured by traditional machine learning algorithms. We present our solution that consists of feature engineering, graph construction, and classification using GNNs, which shows its efficiency, built on benchmark datasets. There will be an increase in detection, a decrease in false positives, and an increase in interpretability. This paper proposes a contribution to the field of fraud detection by combining deep learning methods with graph-based learning to achieve a scalable and dynamic algorithm for classifying synthetic names in dynamic, networked digital environments

References

[1] “Alleviating the Inconsistency Problem of Applying Graph Neural Network to Fraud Detection” — Zhiwei Liu, Yingtong Dou, Philip S. Yu, Yutong Deng, Hao Peng. May 2020.

[2] Pourhabibi, T., Ong, K. L., Kam, B. H., & Boo, Y. L. (2020). Fraud detection: A systematic literature review of graph-based anomaly detection approaches. Decision Support Systems, 133, 113303.

[3] You, J., Gomes-Selman, J. M., Ying, R., & Leskovec, J. (2021, May). Identity-aware graph neural networks. In Proceedings of the AAAI conference on artificial intelligence (Vol. 35, No. 12, pp. 10737-10745).

[4] Zhang, W., Shu, K., Liu, H., & Wang, Y. (2019). Graph neural networks for user identity linkage. arXiv preprint arXiv:1903.02174.

[5] “Enhancing Graph Neural Network based Fraud Detectors against Camouflaged Fraudsters (CARE GNN)” — Yingtong Dou, Zhiwei Liu, Li Sun, Yutong Deng, Hao Peng, Philip S. Yu. August 2020.

[6] Boyaci, O., Umunnakwe, A., Sahu, A., Narimani, M. R., Ismail, M., Davis, K. R., & Serpedin, E. (2021). Graph neural networks-based detection of stealth false data injection attacks in smart grids. IEEE Systems Journal, 16(2), 2946-2957.

[7] Shen, J., Zhou, J., Xie, Y., Yu, S., & Xuan, Q. (2021, August). Identity Inference on Blockchain Using Graph Neural Networks. In International Conference on Blockchain and Trustworthy Systems (pp. 3-17). Singapore: Springer Singapore.

[8] Latchoumi, T. P., & Kannan, V. V. (2013). Synthetic Identity of Crime Detection. International Journal, 3(7), 124-129.

[9] Park, N., Kan, A., Dong, X. L., Zhao, T., & Faloutsos, C. (2019, July). Estimating node importance in knowledge graphs using graph neural networks. In Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining (pp. 596-606).

[10] Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., & Yu, P. S. (2020). A comprehensive survey on graph neural networks. IEEE transactions on neural networks and learning systems, 32(1), 4-24.

[11] Llugiqi, M., & Mayer, R. (2022, August). An empirical analysis of synthetic-data-based anomaly detection. In International Cross-Domain Conference for Machine Learning and Knowledge Extraction (pp. 306-327). Cham: Springer International Publishing.

[12] Akoglu, L., Tong, H., & Koutra, D. (2015). Graph-based anomaly detection and description: a survey. Data Mining and Knowledge Discovery, 29(3), 626-688.

[13] Yanushkevich, S., Stoica, A., Shmerko, P., Howells, W., Crockett, K., & Guest, R. (2020, July). Cognitive identity management: Synthetic data, risk and trust. In 2020 International Joint Conference on Neural Networks (IJCNN) (pp. 1-8). IEEE.

[14] Stanimirova, I., Daszykowski, M., & Walczak, B. (2007). Dealing with missing values and outliers in principal component analysis. Talanta, 72(1), 172-178.

[15] Detect financial transaction fraud using a Graph Neural Network with Amazon SageMaker, AWS, 2022. online. https://aws.amazon.com/blogs/machine-learning/detect-financial-transaction-fraud-using-a-graph-neural-network-with-amazon-sagemaker/

[16] You, J., Leskovec, J., He, K., & Xie, S. (2020, November). Graph structure of neural networks. In International Conference on Machine Learning (pp. 10881-10891). PMLR.

[17] Zhang, L., Song, H., Aletras, N., & Lu, H. (2018). Graph node-feature convolution for representation learning. arXiv preprint arXiv:1812.00086.

[18] Xu, X., Liu, C., Feng, Q., Yin, H., Song, L., & Song, D. (2017, October). Neural network-based graph embedding for cross-platform binary code similarity detection. In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 363-376).

[19] Kamath, C. N., Bukhari, S. S., & Dengel, A. (2018, August). Comparative study between traditional machine learning and deep learning approaches for text classification. In Proceedings of the ACM Symposium on Document Engineering 2018 (pp. 1-11).

[20] Wang, P., Fan, E., & Wang, P. (2021). Comparative analysis of image classification algorithms based on traditional machine learning and deep learning. Pattern recognition letters, 141, 61-67.

[21] Pappula, K. K., & Anasuri, S. (2020). A Domain-Specific Language for Automating Feature-Based Part Creation in Parametric CAD. International Journal of Emerging Research in Engineering and Technology, 1(3), 35-44. https://doi.org/10.63282/3050-922X.IJERET-V1I3P105

[22] Rahul, N. (2020). Optimizing Claims Reserves and Payments with AI: Predictive Models for Financial Accuracy. International Journal of Emerging Trends in Computer Science and Information Technology, 1(3), 46-55. https://doi.org/10.63282/3050-9246.IJETCSIT-V1I3P106

[23] Enjam, G. R. (2020). Ransomware Resilience and Recovery Planning for Insurance Infrastructure. International Journal of AI, BigData, Computational and Management Studies, 1(4), 29-37. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V1I4P104

[24] Pappula, K. K., Anasuri, S., & Rusum, G. P. (2021). Building Observability into Full-Stack Systems: Metrics That Matter. International Journal of Emerging Research in Engineering and Technology, 2(4), 48-58. https://doi.org/10.63282/3050-922X.IJERET-V2I4P106

[25] Pedda Muntala, P. S. R., & Jangam, S. K. (2021). End-to-End Hyperautomation with Oracle ERP and Oracle Integration Cloud. International Journal of Emerging Research in Engineering and Technology, 2(4), 59-67. https://doi.org/10.63282/3050-922X.IJERET-V2I4P107

[26] Enjam, G. R. (2021). Data Privacy & Encryption Practices in Cloud-Based Guidewire Deployments. International Journal of AI, BigData, Computational and Management Studies, 2(3), 64-73. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V2I3P108

[27] Rusum, G. P. (2022). WebAssembly across Platforms: Running Native Apps in the Browser, Cloud, and Edge. International Journal of Emerging Trends in Computer Science and Information Technology, 3(1), 107-115. https://doi.org/10.63282/3050-9246.IJETCSIT-V3I1P112

[28] Pappula, K. K. (2022). Containerized Zero-Downtime Deployments in Full-Stack Systems. International Journal of AI, BigData, Computational and Management Studies, 3(4), 60-69. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V3I4P107

[29] Jangam, S. K., & Karri, N. (2022). Potential of AI and ML to Enhance Error Detection, Prediction, and Automated Remediation in Batch Processing. International Journal of AI, BigData, Computational and Management Studies, 3(4), 70-81. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V3I4P108

[30] Pedda Muntala, P. S. R. (2022). Natural Language Querying in Oracle Fusion Analytics: A Step toward Conversational BI. International Journal of Emerging Trends in Computer Science and Information Technology, 3(3), 81-89. https://doi.org/10.63282/3050-9246.IJETCSIT-V3I3P109

[31] Rahul, N. (2022). Automating Claims, Policy, and Billing with AI in Guidewire: Streamlining Insurance Operations. International Journal of Emerging Research in Engineering and Technology, 3(4), 75-83. https://doi.org/10.63282/3050-922X.IJERET-V3I4P109

[32] Enjam, G. R., & Tekale, K. M. (2022). Predictive Analytics for Claims Lifecycle Optimization in Cloud-Native Platforms. International Journal of Artificial Intelligence, Data Science, and Machine Learning, 3(1), 95-104. https://doi.org/10.63282/3050-9262.IJAIDSML-V3I1P110

Published

2023-12-30

Issue

Section

Articles

How to Cite

1.
Anasuri S. Synthetic Identity Detection Using Graph Neural Networks. IJAIDSML [Internet]. 2023 Dec. 30 [cited 2025 Oct. 6];4(4):87-96. Available from: https://ijaidsml.org/index.php/ijaidsml/article/view/254