DATA MINING TECHNIQUES FOR ANTI MONEY LAUNDERING

David Chuparkoski

Abstract


Money Laundering is the process of creating the appearance that large amounts of money obtained from serious crimes, such as drug trafficking or terrorist activity, originated from a legitimate source. Through money laundering, the launderer transforms the monetary proceeds derived from criminal activity into funds with an apparently legal source. The system that works against Money laundering is Anti-Money Laundering (AML) system. The existing system for Anti-Money Laundering accepts the bulk of data and converts it to large volumes reports that are tedious and topsy-turvy for a person to read without any help of software. To develop a structure to research in datamining, we create a taxonomy that combines research on patterns of observed fraud schemes with an appreciation of areas that benefit from a productive application of data mining. The aim of this study was to review research conducted in the field of fraud detection with an emphasis on detecting honey laundering and examine deficiencies based on data mining techniques. Which include a set of predefined rules and threshold values. In addition to this approach, data mining techniques are very convenient to detest money laundering patterns and detect unusual behavior. Therefore, unsupervised data mining technique will be more effective to detect new patterns of money laundering and can be crucial to enhance learning models based on classification methods. Of course, the development of new methods will be very useful to increase the accuracy of performance.


Keywords


Financial Fraud, Fraud Detection, Money Laundering Detection, Data Mining, Anomaly Detection

Full Text:

PDF

References


Bhattacharyya, Siddhartha, Sanjeev Jha, Kurian Tharakunnel, and J Christopher Westland. 2011. 'Data mining for credit card fraud: A comparative study,' Decision Support Systems, 50: 602-13.

Bindu, PV, P Santhi Thilagam, and Deepesh Ahuja. 2017. 'Discovering suspicious behavior in multilayer social networks,' Computers in Human Behavior.

Cao, Dang Khoa, and Phuc Do. 2012. 'Applying data mining in money laundering detection for the Vietnamese banking industry.' in, Intelligent Information and Database Systems (Springer).

Colladon, Andrea Fronzetti, and Elisa Remondi. 2017. 'Using social network analysis to prevent money laundering,' Expert Systems with Applications, 67: 49-58.

Dreżewski, Rafał, Jan Sepielak, and Wojciech Filipkowski. 2012. 'System supporting money laundering detection,' Digital Investigation, 9: 8-21.

2015. 'The application of social network analysis algorithms in a system supporting money laundering detection,' Information Sciences, 295: 18-32.

Efstathios Kirkos, Charalambos Spathis, Yannis Manolopoulos. 2007, "Data Mining techniques for the detection of fraudulent financial statements." Journal: Expert Systems with Applications, Volume 32, Issue 4, pp. 995–1003.

Fire, Michael, Roy Goldschmidt, and Yuval Elovici. 2014. 'Online social networks: threats and solutions,' IEEE Communications Surveys & Tutorials, 16: 2019-36.

Gao, Shijia, and Dongming Xu. 2009. 'Conceptual modeling and development of an intelligent agent-assisted decision support system for anti-money laundering,' Expert Systems with Applications, 36: 1493-504.

Glen L. Gray ., Roger S. Debreceny. (2014). A taxonomy to guide research on the application of data mining to fraud detection in financial statement audits. Journal: International Journal of Accounting Information Systems, Volume 15, Issue 4, Pp 357– 380.

Han, Jiawei, Micheline Kamber, and Jian Pei. 2011. Data mining: concepts and techniques: concepts and techniques (Elsevier).

“International trade and trading operations” (“Меѓународна трговија и трговско работење”). Prof. D-r Ljupcho Stojcheski, Assoc. D-r Ivana Stojchevska. Publisher: MCSP, Skopje 2019.

Keyan, Liu, and Yu Tingting. 2011. "An improved support-vector network model for anti-money laundering." In Management of e-Commerce and e-Government (ICMeCG), 2011 Fifth International Conference on, 193-96. IEEE.

Khan, Nida S, Asma S Larik, Quratulain Rajput, and Sajjad Haider. 2013. 'A Bayesian approach for suspicious financial activity reporting,' International Journal of Computers and Applications, 35.

Khanuja, Harmeet Kaur, and Dattatraya S Adane. 2014. 'Forensic Analysis for Monitoring Database Transactions.' in, Security in Computing and Communications (Springer).

Le Khac, Thien An, and M Kechadi. 2010. "Application of data mining for anti-money laundering detection: A case study." In Data Mining Workshops (ICDMW), 2010 IEEE International Conference on, 577-84. IEEE.

Michalak, Krzysztof, and Jerzy Korczak. 2011. "Graph mining approach to suspicious transaction detection." In Computer Science and Information Systems (FedCSIS), 2011 Federated Conference on, 69-75. IEEE.

Umadevi, P, and E Divya. 2012. "Money laundering detection using TFA system." In Software Engineering and Mobile Application Modelling and Development (ICSEMA 2012), International Conference on, 1-8. IET.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.