Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
70 commits
Select commit Hold shift + click to select a range
5e5b886
init
katarinasupe Mar 13, 2025
55ff98c
Merge branch 'main' into memgraph-3-2
katarinasupe Mar 28, 2025
17384d2
Merge branch 'main' into memgraph-3-2
katarinasupe Mar 28, 2025
46cfb1f
Add hardware sizing
Josipmrden Apr 15, 2025
ee9a7bb
Add vm.max_map_count explanation
Josipmrden Apr 15, 2025
de342fb
Add deployment options
Josipmrden Apr 15, 2025
0b741e8
Add flag set suggestions
Josipmrden Apr 15, 2025
e8353d3
Indentation
Josipmrden Apr 15, 2025
b63517e
Remove unnecessary comment
Josipmrden Apr 15, 2025
cf434bb
Add enterprise, queries and import sections
Josipmrden Apr 15, 2025
bfc44eb
Finish general suggestions guide
Josipmrden Apr 15, 2025
d3c71fe
Make under construction notes
Josipmrden Apr 15, 2025
1a5097f
Add todo
Josipmrden Apr 15, 2025
5de8cac
Update property sizes
Josipmrden Apr 16, 2025
d63d9d1
Add backup considerations
Josipmrden Apr 16, 2025
fd35d83
Added overview page
Josipmrden Apr 16, 2025
0042907
Add hardware sizing
Josipmrden Apr 15, 2025
6de5e65
Add vm.max_map_count explanation
Josipmrden Apr 15, 2025
60f1f25
Add deployment options
Josipmrden Apr 15, 2025
01f350e
Add flag set suggestions
Josipmrden Apr 15, 2025
74715a8
Indentation
Josipmrden Apr 15, 2025
a97f41a
Remove unnecessary comment
Josipmrden Apr 15, 2025
e8753c1
Add enterprise, queries and import sections
Josipmrden Apr 15, 2025
bcf7a0c
Finish general suggestions guide
Josipmrden Apr 15, 2025
89ce823
Make under construction notes
Josipmrden Apr 15, 2025
6c5e47f
Add todo
Josipmrden Apr 15, 2025
84f4d0c
Update property sizes
Josipmrden Apr 16, 2025
51f07a4
Add backup considerations
Josipmrden Apr 16, 2025
2d481aa
Added overview page
Josipmrden Apr 16, 2025
0126e49
Merge branch 'memgraph-in-production' of github.com:memgraph/document…
Josipmrden Apr 16, 2025
81d7788
Main
Josipmrden Apr 16, 2025
72f6649
Main
Josipmrden Apr 16, 2025
c27b99d
Newline
Josipmrden Apr 16, 2025
6d1c3c3
Merge branch 'main' into memgraph-in-production
Josipmrden Apr 16, 2025
c58d7c5
Add section for query timeout
Josipmrden Apr 17, 2025
6742f61
Set up lab features
Josipmrden Apr 17, 2025
5cedea6
Sentence case
Josipmrden Apr 17, 2025
2a3aa4e
Remove empty construction pages
Josipmrden Apr 17, 2025
313e61b
Add callout
Josipmrden Apr 17, 2025
1b5c5f3
Update GraphRAG use case
Josipmrden Apr 17, 2025
05e8b71
Finish memgraph in production for graphrag
Josipmrden Apr 24, 2025
2c7e98f
Merge branch 'main' into memgraph-in-production
Josipmrden Apr 24, 2025
52485ac
Update initial page
Josipmrden Apr 24, 2025
7f2fcb2
Add graphrag link
Josipmrden Apr 24, 2025
44518e5
Merge branch 'memgraph-in-production' into evaluating-memgraph
Josipmrden Apr 24, 2025
f3b0c5c
Add page for evaluating memgraph -> mgbench
Josipmrden Apr 24, 2025
53e1526
Address PR comments
Josipmrden Apr 25, 2025
4a4c77a
Merge branch 'memgraph-in-production' into evaluating-memgraph
Josipmrden Apr 25, 2025
f2f4ff7
Add title for evaluating memgraph
Josipmrden Apr 25, 2025
5a828ad
Address PR comments
Josipmrden Apr 25, 2025
ae10ec9
Add contents before the deep-dive
Josipmrden Apr 25, 2025
b07865d
Edit titles
Josipmrden Apr 25, 2025
be53774
Add guidelines for updating the page
Josipmrden Apr 25, 2025
e9ce4ce
Finish guide for high throughput workloads
Josipmrden Apr 26, 2025
7c5fc5a
Omit constructed guide
Josipmrden Apr 26, 2025
bdc9514
Add initial mission critical page
Josipmrden Apr 26, 2025
c43bcd0
Omit guide being constructed
Josipmrden Apr 26, 2025
f6150f7
Dash
Josipmrden Apr 28, 2025
99a1ab2
Merge branch 'main' into memgraph-in-high-throughput-workloads
Josipmrden Apr 28, 2025
9d92156
Merge branch 'main' into memgraph-in-high-throughput-workloads
matea16 Apr 28, 2025
0ef77f4
Address PR commnets
Josipmrden Apr 28, 2025
fc5fbbc
Push memgraph up
Josipmrden Apr 28, 2025
17d25a8
Fix link for benchmarking Memgraph
Josipmrden Apr 28, 2025
4f0d144
Merge branch 'memgraph-in-high-throughput-workloads' into memgraph-in…
Josipmrden Apr 28, 2025
3b710e6
Merge branch 'main' into memgraph-in-mission-critical-workloads
Josipmrden Aug 18, 2025
070291a
Add guide for mission critical workloads
Josipmrden Aug 18, 2025
6b68ac7
Link backup and restore
Josipmrden Aug 18, 2025
94c3646
Add memgraph in supply chain workload
Josipmrden Aug 19, 2025
a30b09c
Add fraud detection blueprint example
Josipmrden Aug 19, 2025
a716856
Refactor guide
Josipmrden Aug 19, 2025
File filter

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion pages/deployment/benchmarking-memgraph.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -62,7 +62,7 @@ While `mgbench` gives you full control over benchmarking and produces raw result
analyzing performance metrics at scale can be time-consuming. That’s why we created
[**Benchgraph**](https://github.com/memgraph/benchgraph)—a companion visualization tool for `mgbench`.

![](/pages/memgraph-in-production/benchmarking-memgraph/benchgraph-snippet.png)
![](/pages/deployment/benchmarking-memgraph/benchgraph-snippet.png)

Benchgraph is not required to use `mgbench`, but it offers a **convenient way to visualize and explore**
benchmark results across a variety of run conditions:
Expand Down
8 changes: 6 additions & 2 deletions pages/deployment/workloads.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -47,12 +47,16 @@ Scale your write throughput while keeping up with fast-changing, high-velocity g
### [Memgraph in GraphRAG use cases](/deployment/workloads/memgraph-in-graphrag)
Learn how to optimize Memgraph for Retrieval-Augmented Generation (RAG) systems using graph data.

### [Memgraph in supply chain](/deployment/workloads/memgraph-in-supply-chain)
Use Memgraph for root-cause analysis, what‑if impact analysis, constraint-based pathfinding, and many more other use cases across your supply chain network.

### [Memgraph in fraud detection](/deployment/workloads/memgraph-in-fraud-detection)
Deploy Memgraph for real-time scoring, fraud ring discovery, and investigator workflows at scale.

## 🚧 Guides in construction
- Memgraph in transactional workloads
- Memgraph in analytical workloads
- Memgraph in mission critical workloads
- Memgraph in supply chain use cases
- Memgraph in fraud detection use cases

<Callout type="info">
If you'd like to help us **prioritize** this content, feel free to reach out on [Discord](https://discord.gg/memgraph)!
Expand Down
3 changes: 3 additions & 0 deletions pages/deployment/workloads/_meta.ts
Original file line number Diff line number Diff line change
Expand Up @@ -2,4 +2,7 @@ export default {
"memgraph-in-cybersecurity": "Memgraph in cybersecurity",
"memgraph-in-graphrag": "Memgraph in GraphRAG use cases",
"memgraph-in-high-throughput-workloads": "Memgraph in high-throughput workloads",
"memgraph-in-mission-critical-workloads": "Memgraph in mission critical workloads",
"memgraph-in-supply-chain": "Memgraph in supply chain",
"memgraph-in-fraud-detection": "Memgraph in fraud detection",
}
2 changes: 1 addition & 1 deletion pages/deployment/workloads/memgraph-in-cybersecurity.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ Here's why Memgraph is a great fit for cybersecurity use cases:
While many graph databases **max out around 1,000 events per second**, Memgraph can handle **up to 50x more**
(see image below), making it ideal for **high-velocity security event processing**.

![](/pages/memgraph-in-production/benchmarking-memgraph/realistic-workload.png)
![](/pages/deployment/benchmarking-memgraph/realistic-workload.png)

- **Non-blocking reads and writes with MVCC**: Built on multi-version concurrency control (MVCC),
Memgraph ensures that **security event ingestion doesn't block threat analysis** and **analysis doesn't block ingestion**,
Expand Down
149 changes: 149 additions & 0 deletions pages/deployment/workloads/memgraph-in-fraud-detection.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,149 @@
---
title: Memgraph in fraud detection
description: Suggestions on how to bring your Memgraph to production in fraud detection and anti-abuse use cases.
---

import { Callout } from 'nextra/components'
import { CommunityLinks } from '/components/social-card/CommunityLinks'

# Memgraph in fraud detection

<Callout type="info">
Before diving into this guide, we recommend starting with the [Deployment best practices](/deployment/best-practices)
page. It provides foundational, use-case-agnostic advice for deploying Memgraph in production.

This guide builds on that foundation, offering additional recommendations tailored to fraud detection and anti-abuse workloads.
In cases where guidance overlaps, consider the information here as complementary or overriding, depending on the
unique needs of your use case.
</Callout>

## Is this guide for you?

This guide is for you if you're building real-time **fraud detection**, **anti-money laundering (AML)**, or **account abuse** systems.
You'll benefit from this content if:

- You need to **detect anomalies in real time** across transactions, devices, identities, and merchants.
- You want to uncover **multi-hop fraud rings** (e.g., money mules, collusion networks, synthetic identities) and **account takeover cascades**.
- You plan to run **what‑if tests** to evaluate new rules, thresholds, and investigation workflows before rollout.
- You ingest high-velocity events from **payments/auth logs/identity services** and require consistent read performance while updates stream in.
- You need to correlate evidence across systems for **investigation and case management**.

## Why choose Memgraph for fraud detection?

- **In-memory architecture**: Consistent, predictable response times for scoring, alerting, and investigator tooling.
- **Graph algorithms (MAGE)**: Use community detection, node similarity, centralities, and more to **infer hidden structure and risk signals** (e.g., collusion clusters, mule networks, synthetic identities). Explore the [available algorithms](/advanced-algorithms/available-algorithms).
- **Streaming/dynamic algorithms**: Keep results fresh on **high‑velocity data** with online/dynamic algorithms that update incrementally (e.g., online centralities). See [dynamic graph algorithms](/advanced-algorithms/available-algorithms#dynamic-graph-algorithms-enterprise).
- **GNNs and ML on graph topology**: Leverage graph-native topology for **GNNs** (e.g., node classification, link prediction) and combine **embeddings** with graph algorithms to improve fraud detection accuracy over tabular‑only baselines.


## What is covered?
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This section doesn't correspond to the content of the page, resolve content and links


The suggestions for fraud detection workloads complement several key sections in the
[general suggestions guide](/deployment/best-practices). These sections offer important context and
additional best practices tailored for performance, stability, and scalability in production:

- [Choosing the right Memgraph flag set](/deployment/best-practices#choosing-the-right-memgraph-flag-set)
Configure flags for schema access.

- [Choosing the right Memgraph storage mode](/deployment/best-practices#choosing-the-right-memgraph-storage-mode)
Select between transactional durability and multithreaded ingestion for your workload.

- [Optimizing fraud detection](#optimizing-fraud-detection)
Use deep path traversals, map properties, and nested indices.

- [Enterprise features you might require](#enterprise-features-you-might-require)
Secure multi-user environments and ensure governance.

## Choosing the right Memgraph flag set

If you plan to power natural-language interfaces for investigators (see GraphRAG below), enable constant-time schema retrieval:

```bash
--schema-info-enabled=true
```

This drastically reduces time to provide schema to an LLM, improving responsiveness.

## Choosing the right Memgraph storage mode

Most finance and fraud workloads are inherently **transactional** (safety-critical decisions, auditability, recoverability). As a default,
we recommend running in `IN_MEMORY_TRANSACTIONAL` mode to ensure **ACID guarantees**, support for **replication/HA**, and **WAL/snapshot** durability.

Consider `IN_MEMORY_ANALYTICAL` only for specialized pipelines focused on **bulk/multithreaded ingestion** and **read-only analytics/simulations** where transactional rollback isn’t required.
Another suitable flow for using analytical is during import, after which the user will switch to `IN_MEMORY_TRANASCTIONAL` mode for ensuring data consistency during the batch update process day-to-day.

Learn more about storage modes in the [Storage memory usage](/fundamentals/storage-memory-usage#storage-modes) documentation.

## Enterprise features you might require

- **Role-based and label-based access control (RBAC/LBAC)**
Ensure least-privilege access across analysts, SOC teams, and external partners. See
[Role-based access control](/database-management/authentication-and-authorization/role-based-access-control).

- **Replication and high availability**
Keep scoring and investigations online with leader–replica setups and automatic failover. See
[High availability](/clustering/high-availability) and [Replication](/clustering/replication).

- **Multi-tenancy**
Isolate per product, region, or use case. See [Multi-tenancy](/database-management/multi-tenancy).

- **Single sign-on (SSO) for Memgraph Lab**
Streamline secure access for your fraud investigators and stakeholders. See [Single sign-on](/memgraph-lab/features/single-sign-on).

- **Audit logs**
Track access and changes for compliance and investigations. See [Audit log](/database-management/enabling-memgraph-enterprise#audit-log).

- **Query sharing for collaboration**
Enable investigators to share queries and findings seamlessly. See [Sharing features](/database-management/enabling-memgraph-enterprise#sharing-features).

Comment on lines +79 to +98
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- **Role-based and label-based access control (RBAC/LBAC)**
Ensure least-privilege access across analysts, SOC teams, and external partners. See
[Role-based access control](/database-management/authentication-and-authorization/role-based-access-control).
- **Replication and high availability**
Keep scoring and investigations online with leader–replica setups and automatic failover. See
[High availability](/clustering/high-availability) and [Replication](/clustering/replication).
- **Multi-tenancy**
Isolate per product, region, or use case. See [Multi-tenancy](/database-management/multi-tenancy).
- **Single sign-on (SSO) for Memgraph Lab**
Streamline secure access for your fraud investigators and stakeholders. See [Single sign-on](/memgraph-lab/features/single-sign-on).
- **Audit logs**
Track access and changes for compliance and investigations. See [Audit log](/database-management/enabling-memgraph-enterprise#audit-log).
- **Query sharing for collaboration**
Enable investigators to share queries and findings seamlessly. See [Sharing features](/database-management/enabling-memgraph-enterprise#sharing-features).
- [Role-based and label-based access control (RBAC/LBAC)](/database-management/authentication-and-authorization/role-based-access-control)
Ensure least-privilege access across analysts, SOC teams, and external partners.
- [Replication](/clustering/replication) and [high availability](/clustering/high-availability)
Keep scoring and investigations online with leader–replica setups and automatic failover.
- [Multi-tenancy](/database-management/multi-tenancy)
Isolate per product, region, or use case.
- [Single sign-on (SSO) for Memgraph Lab](/memgraph-lab/features/single-sign-on)
Streamline secure access for your fraud investigators and stakeholders.
- [Audit logs](/database-management/enabling-memgraph-enterprise#audit-log)
Track access and changes for compliance and investigations.
- [Query sharing](/database-management/enabling-memgraph-enterprise#sharing-features) for collaboration
Enable investigators to share queries and findings seamlessly.
## Working with fraud detection

There are three complementary ways to build fraud detection on Memgraph:

### 1) Basic pattern matching in Cypher
Comment on lines +101 to +103
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
There are three complementary ways to build fraud detection on Memgraph:
### 1) Basic pattern matching in Cypher
There are three complementary ways to build fraud detection on Memgraph:
1. [Basic pattern matching in Cypher](#basic-pattern-matching-in-cypher)
2. [Graph algorithms (MAGE library)](#graph-algorithms-mage)
3. [Machine learning on graphs](#machine-learning-on-graphs)
### Basic pattern matching in Cypher
Use Cypher to encode rules and patterns directly over the graph:
- Variable‑length paths for multi‑hop patterns (e.g., mule chains, shared devices)
- Property/time filters for velocity and windowing
- Negative patterns (absence of expected relationships)

```cypher
// Example: shared device across multiple accounts in a short window
MATCH (d:Device)<-[:USED_DEVICE]-(a:Account)-[:PERFORMED]->(tx:Txn)
WHERE tx.ts >= $from AND tx.ts < $to
WITH d, collect(DISTINCT a) AS accounts
WHERE size(accounts) >= $minAccounts
RETURN d, accounts;
```

### 2) Graph algorithms (MAGE)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
### 2) Graph algorithms (MAGE)
### Graph algorithms (MAGE)
Compute risk signals by scoring topology. Commonly useful algorithms include:
- [Katz centrality](/advanced-algorithms/available-algorithms/katz_centrality)
- [Degree centrality](/advanced-algorithms/available-algorithms/degree_centrality)
- [Community detection](/advanced-algorithms/available-algorithms/community_detection)
- [PageRank](/advanced-algorithms/available-algorithms/pagerank)
- [Betweenness centrality](/advanced-algorithms/available-algorithms/betweenness_centrality)
- [Node similarity](/advanced-algorithms/available-algorithms/node_similarity)

Browse more in [Available algorithms](/advanced-algorithms/available-algorithms). Many also have online/dynamic variants (e.g., [pagerank_online](/advanced-algorithms/available-algorithms/pagerank_online), [katz_centrality_online](/advanced-algorithms/available-algorithms/katz_centrality_online)) for high‑velocity data.

### 3) Machine learning on graphs
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
### 3) Machine learning on graphs
### Machine learning on graphs
Leverage graph structure and embeddings to train models:
- Supervised GNNs: [GNN node classification](/advanced-algorithms/available-algorithms/gnn_node_classification), [GNN link prediction](/advanced-algorithms/available-algorithms/gnn_link_prediction)
- Unsupervised embeddings: [node2vec](/advanced-algorithms/available-algorithms/node2vec), [node2vec_online](/advanced-algorithms/available-algorithms/node2vec_online)

Combine ML features (embeddings, graph algorithm scores, rule outputs) into your fraud scoring pipeline to maximize precision/recall.


## Interact with your fraud graph using GraphRAG

Enable natural-language interaction for triage and investigations with GraphRAG and GraphChat in Memgraph Lab.
This helps non-technical stakeholders quickly ask: “Is user X linked to known fraud rings?” or “Show connections between these accounts in the last 30 days.”

- See: [Memgraph in GraphRAG use cases](/deployment/workloads/memgraph-in-graphrag)
- Include constant-time schema retrieval in your pipeline:

```cypher
SHOW SCHEMA INFO;
```

<CommunityLinks/>
2 changes: 1 addition & 1 deletion pages/deployment/workloads/memgraph-in-graphrag.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ Here's what makes Memgraph a perfect fit for GraphRAG:
## What is covered?

The suggestions for GraphRAG use cases **complement** several key sections in the
[general suggestions guide](/memgraph-in-production/general-suggestions). These sections offer important context and
[general suggestions guide](/deployment/best-practices). These sections offer important context and
additional best practices tailored for performance, stability, and scalability in GraphRAG systems:

- [Hardware sizing](#hardware-sizing)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,7 @@ Here's why Memgraph is a great fit for high-throughput use cases:
While many graph databases **max out around 1,000 writes per second**, Memgraph can handle **up to 50x more**
(see image below), making it ideal for **high-velocity, write-intensive workloads**.

![](/pages/memgraph-in-production/benchmarking-memgraph/realistic-workload.png)
![](/pages/deployment/benchmarking-memgraph/realistic-workload.png)

- **Non-blocking reads and writes with MVCC**: Built on multi-version concurrency control (MVCC),
Memgraph ensures that **writes don’t block reads** and **reads don’t block writes**, allowing each to scale independently.
Expand All @@ -71,7 +71,7 @@ Here's why Memgraph is a great fit for high-throughput use cases:
## What is covered?

The suggestions for high-throughput workloads **complement** several key sections in the
[general suggestions guide](/memgraph-in-production/general-suggestions). These sections offer important context and
[best practices guide](/deployment/best-practices). These sections offer important context and
additional best practices tailored for performance, stability, and scalability in high-throughput systems:

- [Choosing the right Memgraph flag set](#choosing-the-right-memgraph-flag-set) <br />
Expand Down
Loading