{"id":"graph-pathfinding-routing","slug":"graph-pathfinding-routing","title":"Graph Pathfinding and Routing","description":"A cryptocurrency forensics team is tracing stolen funds. The theft happened three weeks ago. Since then, the funds have moved through 23 intermediate wallets, two mixing services, four exchange deposit addresses, and a c","category":"investigation","tags":["investigation","real-time","compliance","blockchain"],"lastModified":"2026-02-05","source_ref":"content/modules/graph-pathfinding-routing.md","url":"/developers/graph-pathfinding-routing","htmlPath":"/developers/graph-pathfinding-routing","jsonPath":"/api/docs/modules/graph-pathfinding-routing","markdownPath":"/api/docs/modules/graph-pathfinding-routing?format=markdown","checksum":"4e85a120ce213205acfed7a14d9cf8ec943219b836b516d6b625dc728874f514","headings":[{"id":"overview","text":"Overview","level":2},{"id":"key-features","text":"Key Features","level":2},{"id":"use-cases","text":"Use Cases","level":2},{"id":"integration","text":"Integration","level":2}],"markdown":"# Graph Pathfinding and Routing\n\n## Overview\n\nA cryptocurrency forensics team is tracing stolen funds. The theft happened three weeks ago. Since then, the funds have moved through 23 intermediate wallets, two mixing services, four exchange deposit addresses, and a cross-chain bridge before landing in addresses linked to a known criminal group. Finding that path manually would take days. The pathfinding module finds it in seconds, ranks every alternative route, and flags which intermediaries sit on known sanctions lists.\n\nThe Graph Pathfinding and Routing module delivers advanced path discovery capabilities across multi-million node graphs. Seven integrated pathfinding algorithms discover optimal routes, rank alternative paths, and enforce business constraints during navigation. This applies across fund flow tracing, criminal network connection discovery, compliance-aware transfer validation, and supply chain analysis.\n\n```mermaid\nflowchart LR\n    SRC[Source Node] --> ALG[Pathfinding Engine]\n    ALG --> SP[Shortest Path]\n    ALG --> KSP[K-Shortest Paths]\n    ALG --> BD[Bidirectional Search]\n    ALG --> CR[Constrained Routing]\n    ALG --> MC[Multi-Criteria]\n    ALG --> TD[Time-Dependent]\n    SP --> RANK[Path Ranking]\n    KSP --> RANK\n    BD --> RANK\n    CR --> RANK\n    MC --> RANK\n    TD --> RANK\n    RANK --> DST[Destination Node]\n    RANK --> RPT[Investigation Report]\n```\n\n## Key Features\n\n- Seven routing algorithms including shortest path, heuristic-guided search, bidirectional search, K-shortest paths, constrained routing, multi-criteria optimisation, and time-dependent routing\n- High routing success rate finding valid paths even with complex constraint configurations\n- 15+ path constraint types including node exclusion, required waypoints, edge type filtering, weight thresholds, and temporal constraints\n- Bidirectional search significantly reducing pathfinding time by searching from both endpoints simultaneously\n- Alternative route discovery through the K-shortest paths algorithm with diversity scoring and similarity filtering\n- Constraint-based routing enforcing required waypoints, forbidden zones, edge restrictions, and multi-criteria optimisation\n- Multi-criteria path scoring combining weight, hop count, risk, trust, diversity, and custom metrics\n- Time-dependent routing handling graphs where edge weights vary over time for realistic temporal modelling\n- Pareto-optimal solution discovery for balanced multi-objective decision making\n- Path ranking with configurable scoring models and explainable results\n- Automatic algorithm selection based on graph properties and query characteristics\n- Custom heuristic functions for domain-specific acceleration of path search\n\n## Use Cases\n\n- **Fund Flow Tracing**: Cryptocurrency forensics teams trace fund movements through complex transaction networks, identifying paths through mixing services and exchanges\n- **Criminal Network Connection Discovery**: Law enforcement investigators find connections between suspects through relationship graphs with configurable relationship type constraints\n- **Logistics Route Optimisation**: Companies optimise delivery routes with time-dependent routing that accounts for traffic patterns and temporal constraints\n- **Compliance-Aware Routing**: Financial institutions find compliant transfer paths that satisfy regulatory constraints including sanctioned entity avoidance and required intermediary verification\n\n## Integration\n\n- Connects with the Neo4j graph analysis layer for path computation across investigation and operational data\n- Compatible with investigation platforms for automated target prioritisation based on path analysis\n- Supports real-time path queries through typed APIs with configurable timeouts\n- Node-level access controls ensure traversals respect security permissions\n- Multi-tenant graph isolation prevents cross-tenant path discovery\n- Automatic redaction of sensitive node properties in path results\n- Compliance with GDPR, SOC 2, ISO 27001, and CCPA data protection standards\n\n**Last Reviewed:** 2026-02-05\n**Last Updated:** 2026-04-14\n"}