HomeNewsKatana Graph Solving Security Issues With Graph Technology
Katana Graph Solving Security Issues With Graph Technology

Katana Graph Solving Security Issues With Graph Technology

Last updated 31st Jan 2023

As the amount of data we generate grows, it requires more complex technology to be able to extract all the possible value from it. That is true in fraud detection and a young company is using graph technology to provide valuable insights and protection to financial services firms.

More and more of that data is unstructured and that makes it harder to interpret, but Katana Graph is using graph technology to identify relationships between entities which is modelled using a graph, cofounder and CEO Keshav Pingali said.

We use graphs all of the time, often without realize it, Mr. Pingali explained. Think of planning a flight somewhere. Airports are the nodes and the flights are the edges. Which airports can get you to your ultimate destination? That is a simple example of a graph.

Consider money laundering, where money can move from one account to 10 others and from there to 10 others, before working its way back to one or two new ones. That process is tough to track using traditional rules-based systems, but with graphs they can better able to zero in on the money laundering schemes that are most likely to be happening. Remember the above airport analogy but see the accounts as nodes and the transactions as edges. This time look for anomalous links from unfamiliar communities that could suggest a high likelihood of fraud that could be in the form of shared IP addresses and multiple uses of the same email accounts.

Many industries can benefit from Katana Graph’s technology, but the company is limiting itself to a few sectors so they maximize competencies. One is medicine, where the technology can create knowledge graphs on drugs, organizations, diseases and research and combine them in one data base for hypothesis generation on new drugs.

“If you can use these ai techniques on these graphs and basically mine the medical knowledge you might be able to rule out a bunch of candidates without having to do the lab tests.” Mr. Pingali said.

The other is intrusion protection for computer networks. Katana Graph can build interaction graphs in real time. What are the normal lines of communication between certain parties? Which people are usually in their networks? Is there anybody knew? What are their usual networks?  If the system flags anomalies they can be forwarded to a human operator to investigate.

This system has another key advantage over rules-based ones.

“It is hard for rules-based systems (to do),” Mr. Steck said. “With graph AI, given examples, the system learns on its own how to do these inferences.”

News Desk

News Desk

The latest news, comment and analysis from our crypto news desk.