Difference between revisions of "ISSS608 2017-18 T3 Assign Vishal Badrinarayanan Question4"

From Visual Analytics and Applications
Jump to navigation Jump to search
(Created page with "<!--MAIN HEADER --> <!--MAIN MENU --> {|style="background-color:#1B338F;" width="100%" cellspacing="0" cellpadding="0" valign="top" border="3" | | style="font-family: Verdana...")
 
 
(8 intermediate revisions by the same user not shown)
Line 1: Line 1:
 +
[[File:Breaking-chain1.jpg|centre|700px]]
 
<!--MAIN HEADER -->
 
<!--MAIN HEADER -->
 
<!--MAIN MENU -->  
 
<!--MAIN MENU -->  
Line 4: Line 5:
 
| style="font-family: Verdana; font-size:100%; solid #000000; background:#000024; text-align:center;" width="10%"|  
 
| style="font-family: Verdana; font-size:100%; solid #000000; background:#000024; text-align:center;" width="10%"|  
 
;
 
;
[[ISSS608_2017-18_T3_Assign_Vishal_Badrinarayanan_Overview| <font color="#F9C124"><b>Overview</b></font>]]
+
[[ISSS608_2017-18_T3_Assign_Vishal_Badrinarayanan| <font color="#F9C124"><b>Overview</b></font>]]
 
   
 
   
 
| style="font-family:'Droid Sans', sans-serif;; font-size:100%; solid: #FFFF00; background:#000024; text-align:center;" width="10%"  |   
 
| style="font-family:'Droid Sans', sans-serif;; font-size:100%; solid: #FFFF00; background:#000024; text-align:center;" width="10%"  |   
Line 37: Line 38:
  
 
<!--Question 4 -->
 
<!--Question 4 -->
 +
<p><font color="#F9C124"><b><h2>Observations and Analysis</h2></b></font></p>
  
<ul>
 
<li>Data for Q4:
 
 
<ul>
 
<ul>
 
<li>The data for this is obtained from the other suspicious purchases details which was provided by the insider .</li>
 
<li>The data for this is obtained from the other suspicious purchases details which was provided by the insider .</li>
Line 48: Line 48:
 
<li>Here Red is Purchases , purple is mails and green is calls.</li>
 
<li>Here Red is Purchases , purple is mails and green is calls.</li>
 
</ul>
 
</ul>
</li>
+
 
</ul>
 
 
<p>&nbsp;</p>
 
<p>&nbsp;</p>
<p>Static plot:</p>
+
<p>
<p>Image</p>
+
<table>
 +
<tr>
 +
<td>
 +
[[File:Vishal Q4.1.JPG|500px|center]]
 +
</td>
 +
<td>
 +
[[File:Vishal Q4.2.JPG|500px|center]]
 +
</td>
 +
</tr>
 +
</table>
 +
</p>
 +
<p>[[File:Vishal Q4.4.JPG|200px|center]]</p>
 
<p>We used the modularity class and we found that in this dataset also there is one node which has the maximum influence like Richard fox .Here also like the initial suspicious list there are some specific people who are involved with purchases.In this graph there are more than two people involved in purchases compared to last question.The smaller groups formd usually interact mainly within their clusters.</p>
 
<p>We used the modularity class and we found that in this dataset also there is one node which has the maximum influence like Richard fox .Here also like the initial suspicious list there are some specific people who are involved with purchases.In this graph there are more than two people involved in purchases compared to last question.The smaller groups formd usually interact mainly within their clusters.</p>
<p>When we filter the graph based on the degree with giving value 3 we get the following filtered graph.</p>
+
<p>From the graph we can find that Aplha Chessor is the most influential node and after that it is Laure Pelkey. These two nodes are connected with a lot of other nodes not in their cluster. Gail Feindt is used as the main person for any kind of purchases.
<p>Img</p>
+
Most of the orders for the purchases is from Laura and Alpha who are the two most influential people in the network.</p>
<p>&nbsp;</p>
 
<p>From the graph we can find that Aplha Chessor is the most influential node and after that it is Laure Pelkey. These two nodes are connected with a lot of other nodes not in their cluster. Gail Feindt is used as the main person for any kind of purchases.</p>
 
<p>Most of the orders for the purchases is from Laura and Alpha who are the two most influential people in the network.</p>
 
 
<p>&nbsp;</p>
 
<p>&nbsp;</p>
 
<p>Example of Suspicious Activity:</p>
 
<p>Example of Suspicious Activity:</p>
 
<ul>
 
<ul>
 
<li>Gail Fendt is not present in the suspicious list so we can analyse other nodes who are involved in purchase activities.</li>
 
<li>Gail Fendt is not present in the suspicious list so we can analyse other nodes who are involved in purchase activities.</li>
<li>Pic :</li>
+
<table>
</ul>
+
<tr>
<p>We can tell from this picture Ben Wilensky has the highest betweenness and all the purchases also go through him. We find that there are orders to Gregory Russell which can make other nodes like Ben Wilensky could be involved in suspicious transactions.</p>
+
<td>
<p>&nbsp;</p>
+
<p>[[File:Vishal Q4.5.JPG|400px|center]]</p>
<p>Also there are purchase transaction from Alli Fowler to Ben Hilensky and some other purchase orders.</p>
+
</td>
<p>&nbsp;</p>
+
<td>
<ul>
+
<p>[[File:Vishal Q4.6.JPG|400px|center]]</p>
<li>There is only one transaction for Carlos Morris from Laure Pelkey which is unusual as most of the purchase from her is sent to Gild Feint.</li>
+
</td>
<li>There are purchase sent from Alpha and Laure which might be suspicious as they are in the suspicious list.</li>
+
</tr>
 +
</table>
 
</ul>
 
</ul>
 +
<p>We can tell from this picture Ben Wilensky has the highest betweenness and all the purchases also go through him. We find that there are orders to Gregory Russell which can make other nodes like Ben Wilensky be involved in suspicious transactions.
 +
Also there are purchase transaction from Alli Fowler to Ben Hilensky and some other purchase orders.</p>
 +
 +
<p>There is only one transaction for Carlos Morris from Laure Pelkey which is unusual as most of the purchase from her is sent to Gild Feint.&nbsp;</p>
 +
 +
 +
 
<p>&nbsp;</p>
 
<p>&nbsp;</p>
 
<p>Some transaction which are involved in suspicious transactions and can be shown as a temporal pattern are:</p>
 
<p>Some transaction which are involved in suspicious transactions and can be shown as a temporal pattern are:</p>
 +
<p> SAMPLE 1</p>
 
<ul>
 
<ul>
<li>Pearl Tran &ndash; Tyree Barreneche -</li>
+
<li>1st Transaction - Pearl Tran &ndash; Tyree Barreneche -</li>
<li>Tyree Barrenche &ndash; Trevor web &ndash;</li>
+
<li>2nd Transaction - Tyree Barrenche &ndash; Trevor web &ndash;</li>
 
</ul>
 
</ul>
 
<p>&nbsp;</p>
 
<p>&nbsp;</p>
<p>IMG</p>
+
<p>[[File:Vishal Q4.13.JPG|600px|center]]</p>
 +
 
 
<p>&nbsp;</p>
 
<p>&nbsp;</p>
 +
<br>
 +
<p> SAMPLE 2</p>
 
<ul>
 
<ul>
<li>Timothy Gibson / Sherilyn Cooper / Lilla &ndash; Alpha Cessor</li>
+
<li> 1st transaction - Timothy Gibson / Sherilyn Cooper / Lilla &ndash to Alpha Cessor</li>
<li>Alpha Cessor &ndash; Kia Halonen.</li>
+
<li>2nd Transaction - Alpha Cessor to Kia Halonen.</li>
 +
<br>
 
<li>We need to check the tramsaction as in the first message to alpha cessor all of them sent at a similar time , so we cant decide for sure who has sent the message .</li>
 
<li>We need to check the tramsaction as in the first message to alpha cessor all of them sent at a similar time , so we cant decide for sure who has sent the message .</li>
 
<li>We can find if their patterns and decide who can be the source.</li>
 
<li>We can find if their patterns and decide who can be the source.</li>
Line 90: Line 110:
 
<li>In the first question Timothy Gibson was involved there and she is involved here as well.</li>
 
<li>In the first question Timothy Gibson was involved there and she is involved here as well.</li>
 
</ul>
 
</ul>
 +
<p>[[File:Q4.15.JPG|600px|center]]</p>
 +
<p>[[File:Q4.16.JPG|600px|center]]</p>

Latest revision as of 03:23, 10 July 2018

Breaking-chain1.jpg

Overview

Data Preparation

Question 1

Question 2

Question 3

Question 4

Conclusion

BACK TO HOME

Observations and Analysis

  • The data for this is obtained from the other suspicious purchases details which was provided by the insider .
  • WE use that data and filtered all the transactions from the total dataset that we created based on the source and target node .
  • We then used this data to plot in gephi giving both static and dynamic plots.
  • We used modularity class for forming different clusters and gave betweenness centrality for the size of the nodes.
  • The edges are represented by the E-types .
  • Here Red is Purchases , purple is mails and green is calls.

 

Vishal Q4.1.JPG
Vishal Q4.2.JPG

Vishal Q4.4.JPG

We used the modularity class and we found that in this dataset also there is one node which has the maximum influence like Richard fox .Here also like the initial suspicious list there are some specific people who are involved with purchases.In this graph there are more than two people involved in purchases compared to last question.The smaller groups formd usually interact mainly within their clusters.

From the graph we can find that Aplha Chessor is the most influential node and after that it is Laure Pelkey. These two nodes are connected with a lot of other nodes not in their cluster. Gail Feindt is used as the main person for any kind of purchases. Most of the orders for the purchases is from Laura and Alpha who are the two most influential people in the network.

 

Example of Suspicious Activity:

  • Gail Fendt is not present in the suspicious list so we can analyse other nodes who are involved in purchase activities.
  • Vishal Q4.5.JPG

    Vishal Q4.6.JPG

We can tell from this picture Ben Wilensky has the highest betweenness and all the purchases also go through him. We find that there are orders to Gregory Russell which can make other nodes like Ben Wilensky be involved in suspicious transactions. Also there are purchase transaction from Alli Fowler to Ben Hilensky and some other purchase orders.

There is only one transaction for Carlos Morris from Laure Pelkey which is unusual as most of the purchase from her is sent to Gild Feint. 


 

Some transaction which are involved in suspicious transactions and can be shown as a temporal pattern are:

SAMPLE 1

  • 1st Transaction - Pearl Tran – Tyree Barreneche -
  • 2nd Transaction - Tyree Barrenche – Trevor web –

 

Vishal Q4.13.JPG

 


SAMPLE 2

  • 1st transaction - Timothy Gibson / Sherilyn Cooper / Lilla &ndash to Alpha Cessor
  • 2nd Transaction - Alpha Cessor to Kia Halonen.

  • We need to check the tramsaction as in the first message to alpha cessor all of them sent at a similar time , so we cant decide for sure who has sent the message .
  • We can find if their patterns and decide who can be the source.
  • Since Alpha Cessor I sinvolved in transaction all the others might also be involved in suspicious activites.
  • In the first question Timothy Gibson was involved there and she is involved here as well.

Q4.15.JPG

Q4.16.JPG