Detection of Money Laundering Accounts Using Data Mining Techniques
Detection of Money Laundering Accounts Using Data Mining Techniques
net/publication/323834276
CITATIONS READS
0 3,846
2 authors:
All content following this page was uploaded by Shalini Puri on 02 June 2019.
[10] Liu Keyan, An improved Support vector Network Model for Anti-Money Laundering
Yu Tingting
[11] Assem Khalaf Ahmed, Data Mining Techniques for Anti Money Laundering
2
Allam El-Din,
Nashaat El Khamesy
[12] Mahesh Kharote, Data Mining Model for Money Laundering Detection in Financial Domain
V. P. Kshirsagar
[13] Andrea Fronzetti Using social network analysis to prevent money laundering
Colladon,
Elisa Remondi
J.J. Salermo,
P. S. Yu
[15] Ahmad Salehi, Data Mining Techniques for Anti Money Laundering
Mehdi Ghazanfari,
Mohammed Fathian.
[16] Zengan Gao and Mao A framework for data mining-based anti-money laundering research
Ye
B.Geerthana,
A.Rajalakshmi
[18] Ch. Suresh, A Hybrid Approach for Detecting Suspicious Accounts in Money
Laundering Using Data Mining Techniques
Dr. K. Thammi Reddy,
N. Sweta
3
[19] Nhien-An Le-Khac, A Heuristics Approach for Fast Detecting Suspicious Money Laundering
Sammer Markos and Cases in an Investment Bank
M-Tahar Kechadi
Balsa, Jo˜ao
4
9. clusters would be examined using Extracting
Customer Behavior
10. prefix-projection heavily reduces the size
of the projected data and leads to efficient
processing.
11. clusters the records into several sectors,
and then finds the correlation among these
sectors
high correction rate
[13] 1. Network Analytic Techniques reducing false positive rate 1. inefficiency
2. network-based approach with large data
enhancing detection rate
3. Social network analyisis sets can only
a high processing speed identify
4. RuleBased Classification approach satisfactory accuracy suspicious
5. ontology based expert system behaviour that is
6. Bayesian approach similar to that
7. fuzzy techniques observed in
8. sort and map relational data previous
9. predictive models: network metrics investigations.
predict risk profiles using social network
metrics
10. spot potential clusters of Criminals
11. visual analysis of the tacit links
existing among different companies
who share the same owner or
Representative
12. Relational approach
13. Study of relationship networks
14. Created a binary dependent variable
that has the value of one if either the
owner or the representatives were
involved in legal trials and has the
value of zero otherwise.
Increased accuracy
[15] 1. unsupervised data mining technique Increased performance
2. detect new patterns of money laundering
5
3. enhance learning models based on
classification method
improved efficiency
[17] 1. hash based technique high correction rate performance
2. graph theoretic approach reducing false positive rate issues
3. time variant approach using behavioral enhancing detection rate .
patterns to identify money laundering a high processing speed
4. transaction logs split into various time satisfactory accuracy
window and for each account specific to the
fund transfer the time value is split into
different time windows
5. And it generate the behavioral pattern of the
user’s.
6. The behavioral pattern specifies the method
of transfer between the accounts. Based on
the generated behavioral pattern it identifies
the suspicious account.
7. Frequent transactional data sets were
collected and the traversal path of the
suspicious transactions were identified using
graph theoretic approach
8. The traversal path gives the illegal
transactions between the agent and the
integrator.
1. effectively trim the
[18] 1. Hash based Association approach transaction database size less approapriate
2. Graph Theoretic Approach.
6
3. mining association rules at a much earlier stage of lack of good
4. identify the traversal path of the Laundered the iteration methods in
money 2. Reducing the choosing
parameters
5. identifying agent and integrator in the computational cost.
layering stage of Money Laundering 3. improves efficiency
6. finding correlation or patterns among dozens 4. successful in finding the
of fields in large databases agent and integrator in
7. construction of candidate set of item sets first the transaction path
identifying within this item set those item sets
that need the large item set requirement
8. The suspicious accounts of the layering stage
of the money laundering process are
identified by generating frequent
transactional datasets using Hash based
Association mining.
9. The generated frequent datasets will then be
used in the graph theoretic approach
10. to identify the traversal path of the suspicious
transactions
1. satisfies the needs of the
[19] 1. heuristics approach to improve the AML unit. System
performance for this solution 2. It can also improve efficiency not
2. combination of clustering and classification sufficient
significantly the
techniques for analysing ML patterns in an performance
international investment bank.
3. clustering algorithm is repetitively executed
to analysis transactions depending on the
characteristic of each transaction datasets.
4. one-step clustering approach basing on some
heuristics from AML experts to improve the
performance
5. divide the datasets into two kinds of
investors: corporate and individual as their
investment behaviours are different
6. two heuristics: suspicious screening and
suspicious initial centres to detect suspicious
cases
1. simplicity, efficiency 1. for
[20] 1. group clients in clusters and then generate 2. present in almost nominal
a set of classification rules every platform that attributes this
2. form groups of clients with similar implements and automates calculation can’t
characteristics and mutually exclusive the data mining process. be made.
3. K-means algorithm 3. obtain better results
when dealing with
7
4. uses squared Euclidean distance to continuous numerical
calculate proximity attributes in comparison
with nominal attribute use
4. produced good
results for both the cluster
evaluation metrics and
generated rules.
5. build clusters that
represent risk groups and
rules both more
discriminating and with a
wider coverage, regarding
the profiles’ attributes
Table 2. methodologies used, results and limitations
2. Conclusions [2] J. Han and M. Kamber, Data Mining: Concept and
Techniques. Morgan Kaufmann publishers, 2nd Eds., Nov.
The proposed system examines the efficiency of the existing 2005.
anti money laundering techniques by identifying the [3] J. Tang, J. Yin, Developing an intelligent data
suspicious accounts in the layering stage of money laundering discriminating system of anti-money laundering based on
process These accounts have the highest possibility of being SVM, Proceedings of the Four International Conference
suspicious as there are involved in huge amount of on Machine Learning and Cybernetics, Guangzhou, Aug.
transactions frequently. The solution proposed here is highly 2005. pp. 3453-3457.
advantageous over the existing anti-money laundering rules. [4] Z. Zang, J.J. Salermo and P. S. Yu, Applying Data
Further enhancement: With the chaining of accounts, we can mining in Investigating Money Laundering Crimes,
further develop a system which identifies the sure relation SIGKDD’03, Washington DC, USA, August 2003, pp.
between these identified suspicious accounts using concepts 747-752.
like ontology. The relation between these accounts can give [5] NhienAn Le Khac, SammerMarkos, M. O'Neill, A.
us additional information like whether the involved criminal Brabazon and M-TaharKechadi. An investigation into
people are belonging to same occupation or to the same Data
location etc. The frequent accounts should not be the only Mining approaches for Anti Money Laundering. In
criteria for finding out the suspicious transaction as there may International conference on Computer Engineering &
be a case when the transaction does not occur frequently but Applications 2009.
even then they are illegal. To trace out such cases additional [6] Nhien An Le Khac, M.Teharkechadi. Application of
parameters have to be considered. Data mining for Anti-money Detection: A case study.
IEEE International conference on Data mining workshops
2010.
Acknowledgment [7] Nhien An Le Khac, SammerMarkos,M.Teharkechadi,.
A data mining based solution for detecting suspicious
I acknowledge the management, HOD, faculties and of money laundering cases in an investment bank. IEEE
coordinator computer science & engineering department for Computer society 2010.
providing the Research assistantship to carry out the above [8] J.Han and M. Kamber, Data Mining: Concepts and
work. Techniques. Morgan Kaufmann publishers, 2nd Eds., Nov
2005
References [9] Senator, T. E., Goldberg, H. G., Wooton, J., Cottini, M.
A., Khan, A. F. U., Klinger, C. D., Llamas, W. M.,
[1] R. C. Watkins et al, Exploring Data Mining technologies Marrone, M. P., Wong, R. W. H., 1995. Financial Crimes
as Tool to Investigate Money Laundering. Journal of Enforcement Network AI System (FAIS) Identifying
Policing Practice and Research: An International Journal. Potential Money Laundering from Reports of Large Cash
Vol. 4, No. 2, January 2003, pp. 163-178. Transactions. AI magazine.
8
[16] Zengan Gao and Mao Ye. A framework for data
[10] Liu Keyan, Yu Tingting. An improved Support vector mining-based anti-money laundering research
Network Model for Anti-Money Laundering [17] R.Chandni, G. Deepa Sakthi, B.Geerthana,
[11] Assem Khalaf Ahmed, Allam El-Din, Nashaat El A.Rajalakshmi. A Graph Based Approach to Identify the
Khamesy. Data Mining Techniques for Anti Money Suspicious Accounts by Implementing the Hash Based
Laundering Association Mining
[12] Mahesh Kharote, V. P. Kshirsagar. Data Mining Model [18] Ch. Suresh, Dr. K. Thammi Reddy, N. Sweta. A
for Money Laundering Detection in Financial Domain Hybrid Approach for Detecting Suspicious Accounts in
[13] Andrea Fronzetti Colladon, Elisa Remondi. Using Money Laundering Using Data Mining Techniques
social network analysis to prevent money undering [19] Nhien-An Le-Khac, Sammer Markos and M-Tahar
[14] Z. Zang, J.J. Salermo,P. S. Yu. Applying Data mining Kechadi A Heuristics Approach for Fast Detecting
in Investigating Money Laundering Crimes Suspicious Money Laundering Cases in an Investment
[15] Ahmad Salehi, Mehdi Ghazanfari, Mohammed Bank
Fathian. Data Mining Techniques for Anti Money [20] Alexandre, Claudio Balsa, Jo˜ao Client Profiling for
Laundering an Anti-Money Laundering System