Vector support machines and classification trees for detecting suspicious operations of money laundering

Authors

  • Marlon Efraín Gracia Granados

DOI:

https://doi.org/10.21501/21454086.2904

Keywords:

Classification trees, Vector Support, Metrics, Precision, Financial entities, False positives, Money laundering, Unusual operations, Suspicious operations, Detection.

Abstract

Money laundering is a crime that brings a large number of negative consequences to society in general. Anti-money laundering systems have been developed to mitigate this problem in financial institutions, which is where it is mainly presented. This causes a new problem: the false positives obtained from these systems, which represent financial losses for the financial entities, as well as time and focus, since they do not deal with the real unusual operations. The main detection methods of unusual operations of money laundering found in the literature are evaluated to determine which techniques offer the best results and from these generate a new model that improves the registered indicators. From a process of review and replication of anomalies detection methodologies found in the literature, a new model that presents better metrics when classifying operations as normal and unusual could be generated, this may represent way to reduce the false positive rates in their anti-money laundering systems in financial institutions.

Downloads

Download data is not yet available.

References

B. Buchanan, “Money laundering a global obstacle”, Res. Int. Bus. Finance, vol. 18, no. 1, pp. 115-127, April. 2004. DOI: https://doi.org/10.1016/j.ribaf.2004.02.001

Congreso de Colombia, “Ley 599 de 2000, Art. 323”, Diario Oficial no. 44.097, julio 24 de 2000. Recuperado de https://www.wipo.int/edocs/lexdocs/laws/es/co/co028es.pdf

B. Unger et al., The amounts and effects of money laundering, Ministry of Finance, 2006.

UNODC, “Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes”. United Nations Office on Drugs and Crime, 2011.

J. Walker and B. Unger, “Measuring global money laundering: the Walker gravity model”, Review of Law & Economics, vol. 5, no. 2, pp. 821-853, 2009.

M. Levi, “Money Laundering and Its Regulation”, Annals of the American Academy of Political and Social Science, vol. 582, no 1, pp. 181-194, January. 2002. DOI: https://doi.org/10.1177/000271620258200113

F. A. T. Force, “The forty recommendations”, 2003.

B. Bartlett, “The negative effects of money laundering on economic development”, The Asian Development Bank Regional Technical Assistance Project No. 5967, 2002.

P. J. Quirk, “Money laundering: muddying the macroeconomy”, Finance Dev., vol. 34, pp. 7-9, 1997. Retrieved from https://www.imf.org/external/pubs/ft/fandd/1997/03/pdf/quirk.pdf

R. Menon and S. Kuman, «Understanding the role of technology in anti money laundering compliance», Infosys Technol. Ltd, vol. 1, pp. 2-4, 2005.

DOWJONES, AML Survey Results from Dow Jones Risk & Compliance & ACAMS, 2011.

Z. Gao and M. Ye, “A framework for data mining based anti money laundering research”, Journal of Money Laundering Control, vol. 10, no. 2, pp. 170-179, 2007. DOI: https://doi.org/10.1108/13685200710746875

N. A. L. Khac and M. T. Kechadi, “Application of Data Mining for Anti money Laundering Detection: A Case Study”, in 2010 IEEE International Conference on Data Mining Workshops, 2010, pp. 577-584.

K. D. Rohit and D. B. Patel, “Review On Detection of Suspicious Transaction In Anti Money Laundering Using Data Mining Framework”, International Journal for Innovative Research in Science & Technology, vol. 1, no. 8, pp. 129-133, 2015.

P. Baldi, S. Brunak, Y. Chauvin, C. A. Andersen, and H. Nielsen, “Assessing the accuracy of prediction algorithms for classification: an overview”, Bioinformatics, vol. 16, no. 5, pp. 412-424, 2000. DOI: https://academic.oup.com/bioinformatics/article/16/5/412/192336

T. Fawcett, “An introduction to ROC analysis”, Pattern Recognit. Lett., vol. 27, no. 8, pp. 861-874, 2006. DOI: https://doi.org/10.1016/j.patrec.2005.10.010

C. Liu, P. M. Berry, T. P. Dawson, and R. G. Pearson, “Selecting thresholds of occurrence in the prediction of species distributions”, Ecography, vol. 28, no. 3, pp. 385-393, 2005. DOI: https://doi.org/10.1111/j.0906-7590.2005.03957.x

S. Raza and S. Haider, “Suspicious activity reporting using dynamic bayesian networks”, Procedia Computer Science, vol. 3, pp. 987-991, 2011. DOI: https://doi.org/10.1016/j.procs.2010.12.162

L.T. Lv, N. Ji, and J.L. Zhang, “A RBF neural network model for anti money laundering”, International Conference on Wavelet Analysis and Pattern Recognition, 2008. ICWAPR ’08, 2008, vol. 1, pp. 209-215. DOI: 10.1109/ICWAPR.2008.4635778

J. Tang and J. Yin, “Developing an intelligent data discriminating system of anti money laundering based on SVM”, in Proceedings of 2005 International Conference on Machine Learning and Cybernetics, 2005, vol. 6, pp. 3453-3457. DOI: 10.1109/ICMLC.2005.1527539

M. F. Jiang, S. S. Tseng, and C. M. Su, “Two phase clustering process for outliers detection”, Pattern Recognition Letters, vol. 22, no. 6–7, pp. 691-700, may 2001. DOI: https://doi.org/10.1016/S0167-8655(00)00131-8

Z. Chen, L. D. V. Khoa, A. Nazir, E. N. Teoh, and E. K. Karupiah, “Exploration of the effectiveness of expectation maximization algorithm for suspicious transaction detection in anti money laundering”, in IEEE Conference on Open Systems (ICOS), 2014, pp. 145-149. DOI: 10.1109/UEMCON.2016.7777919

X. Liu, P. Zhang, and D. Zeng, “Sequence matching for suspicious activity detection in anti money laundering”, in Intelligence and Security Informatics, Springer, 2008, pp. 50-61. DOI: 10.1007/978-3-540-69304-8_6

J. Friedman, T. Hastie, and R. Tibshirani, The elements of statistical learning, vol. 1. Springer series in statistics Springer, Berlin, 2001.

Q. Wei and R. L. Dunbrack Jr, “The role of balanced training and testing data sets for binary classifiers in bioinformatics”, PloS One, vol. 8, no. 7, p. e67863, 2013. DOI: https://doi.org/10.1371/journal.pone.0067863

N. V. Chawla, “C4. 5 and imbalanced data sets: investigating the effect of sampling method, probabilistic estimate, and decision tree structure”, in Proceedings of the ICML, 2003, DOI: https://doi.org/10.1007/978-3-540-69304-8_6

N. Japkowicz, “Learning from imbalanced data sets: a comparison of various strategies”, in AAAI workshop on learning from imbalanced data sets, 2000, vol. 68, pp. 10-15. Retrieved from https://pdfs.semanticscholar.org/1af9/6acae07b1e141f98f3df973eaf9e0a9226fb.pdf

C. Drummond and R. C. Holte, “C4. 5, class imbalance, and cost sensitivity: why under sampling beats over sampling”, in Workshop on learning from imbalanced datasets II, 2003, vol. 11. Retrieved from https://pdfs.semanticscholar.org/144b/bbafe2f0876c23295019b6e380c9fe4feda3.pdf

Published

2019-07-05

How to Cite

Gracia Granados, M. E. (2019). Vector support machines and classification trees for detecting suspicious operations of money laundering. Lámpsakos, 1(21), 26–38. https://doi.org/10.21501/21454086.2904

Issue

Section

Articles of scientific and technological research