Vector support machines and classification trees for detecting suspicious operations of money laundering
DOI:
https://doi.org/10.21501/21454086.2904Keywords:
Classification trees, Vector Support, Metrics, Precision, Financial entities, False positives, Money laundering, Unusual operations, Suspicious operations, Detection.Abstract
Money laundering is a crime that brings a large number of negative consequences to society in general. Anti-money laundering systems have been developed to mitigate this problem in financial institutions, which is where it is mainly presented. This causes a new problem: the false positives obtained from these systems, which represent financial losses for the financial entities, as well as time and focus, since they do not deal with the real unusual operations. The main detection methods of unusual operations of money laundering found in the literature are evaluated to determine which techniques offer the best results and from these generate a new model that improves the registered indicators. From a process of review and replication of anomalies detection methodologies found in the literature, a new model that presents better metrics when classifying operations as normal and unusual could be generated, this may represent way to reduce the false positive rates in their anti-money laundering systems in financial institutions.Downloads
References
B. Buchanan, “Money laundering a global obstacle”, Res. Int. Bus. Finance, vol. 18, no. 1, pp. 115-127, April. 2004. DOI: https://doi.org/10.1016/j.ribaf.2004.02.001
Congreso de Colombia, “Ley 599 de 2000, Art. 323”, Diario Oficial no. 44.097, julio 24 de 2000. Recuperado de https://www.wipo.int/edocs/lexdocs/laws/es/co/co028es.pdf
B. Unger et al., The amounts and effects of money laundering, Ministry of Finance, 2006.
UNODC, “Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes”. United Nations Office on Drugs and Crime, 2011.
J. Walker and B. Unger, “Measuring global money laundering: the Walker gravity model”, Review of Law & Economics, vol. 5, no. 2, pp. 821-853, 2009.
M. Levi, “Money Laundering and Its Regulation”, Annals of the American Academy of Political and Social Science, vol. 582, no 1, pp. 181-194, January. 2002. DOI: https://doi.org/10.1177/000271620258200113
F. A. T. Force, “The forty recommendations”, 2003.
B. Bartlett, “The negative effects of money laundering on economic development”, The Asian Development Bank Regional Technical Assistance Project No. 5967, 2002.
P. J. Quirk, “Money laundering: muddying the macroeconomy”, Finance Dev., vol. 34, pp. 7-9, 1997. Retrieved from https://www.imf.org/external/pubs/ft/fandd/1997/03/pdf/quirk.pdf
R. Menon and S. Kuman, «Understanding the role of technology in anti money laundering compliance», Infosys Technol. Ltd, vol. 1, pp. 2-4, 2005.
DOWJONES, AML Survey Results from Dow Jones Risk & Compliance & ACAMS, 2011.
Z. Gao and M. Ye, “A framework for data mining based anti money laundering research”, Journal of Money Laundering Control, vol. 10, no. 2, pp. 170-179, 2007. DOI: https://doi.org/10.1108/13685200710746875
N. A. L. Khac and M. T. Kechadi, “Application of Data Mining for Anti money Laundering Detection: A Case Study”, in 2010 IEEE International Conference on Data Mining Workshops, 2010, pp. 577-584.
K. D. Rohit and D. B. Patel, “Review On Detection of Suspicious Transaction In Anti Money Laundering Using Data Mining Framework”, International Journal for Innovative Research in Science & Technology, vol. 1, no. 8, pp. 129-133, 2015.
P. Baldi, S. Brunak, Y. Chauvin, C. A. Andersen, and H. Nielsen, “Assessing the accuracy of prediction algorithms for classification: an overview”, Bioinformatics, vol. 16, no. 5, pp. 412-424, 2000. DOI: https://academic.oup.com/bioinformatics/article/16/5/412/192336
T. Fawcett, “An introduction to ROC analysis”, Pattern Recognit. Lett., vol. 27, no. 8, pp. 861-874, 2006. DOI: https://doi.org/10.1016/j.patrec.2005.10.010
C. Liu, P. M. Berry, T. P. Dawson, and R. G. Pearson, “Selecting thresholds of occurrence in the prediction of species distributions”, Ecography, vol. 28, no. 3, pp. 385-393, 2005. DOI: https://doi.org/10.1111/j.0906-7590.2005.03957.x
S. Raza and S. Haider, “Suspicious activity reporting using dynamic bayesian networks”, Procedia Computer Science, vol. 3, pp. 987-991, 2011. DOI: https://doi.org/10.1016/j.procs.2010.12.162
L.T. Lv, N. Ji, and J.L. Zhang, “A RBF neural network model for anti money laundering”, International Conference on Wavelet Analysis and Pattern Recognition, 2008. ICWAPR ’08, 2008, vol. 1, pp. 209-215. DOI: 10.1109/ICWAPR.2008.4635778
J. Tang and J. Yin, “Developing an intelligent data discriminating system of anti money laundering based on SVM”, in Proceedings of 2005 International Conference on Machine Learning and Cybernetics, 2005, vol. 6, pp. 3453-3457. DOI: 10.1109/ICMLC.2005.1527539
M. F. Jiang, S. S. Tseng, and C. M. Su, “Two phase clustering process for outliers detection”, Pattern Recognition Letters, vol. 22, no. 6–7, pp. 691-700, may 2001. DOI: https://doi.org/10.1016/S0167-8655(00)00131-8
Z. Chen, L. D. V. Khoa, A. Nazir, E. N. Teoh, and E. K. Karupiah, “Exploration of the effectiveness of expectation maximization algorithm for suspicious transaction detection in anti money laundering”, in IEEE Conference on Open Systems (ICOS), 2014, pp. 145-149. DOI: 10.1109/UEMCON.2016.7777919
X. Liu, P. Zhang, and D. Zeng, “Sequence matching for suspicious activity detection in anti money laundering”, in Intelligence and Security Informatics, Springer, 2008, pp. 50-61. DOI: 10.1007/978-3-540-69304-8_6
J. Friedman, T. Hastie, and R. Tibshirani, The elements of statistical learning, vol. 1. Springer series in statistics Springer, Berlin, 2001.
Q. Wei and R. L. Dunbrack Jr, “The role of balanced training and testing data sets for binary classifiers in bioinformatics”, PloS One, vol. 8, no. 7, p. e67863, 2013. DOI: https://doi.org/10.1371/journal.pone.0067863
N. V. Chawla, “C4. 5 and imbalanced data sets: investigating the effect of sampling method, probabilistic estimate, and decision tree structure”, in Proceedings of the ICML, 2003, DOI: https://doi.org/10.1007/978-3-540-69304-8_6
N. Japkowicz, “Learning from imbalanced data sets: a comparison of various strategies”, in AAAI workshop on learning from imbalanced data sets, 2000, vol. 68, pp. 10-15. Retrieved from https://pdfs.semanticscholar.org/1af9/6acae07b1e141f98f3df973eaf9e0a9226fb.pdf
C. Drummond and R. C. Holte, “C4. 5, class imbalance, and cost sensitivity: why under sampling beats over sampling”, in Workshop on learning from imbalanced datasets II, 2003, vol. 11. Retrieved from https://pdfs.semanticscholar.org/144b/bbafe2f0876c23295019b6e380c9fe4feda3.pdf
Downloads
Published
How to Cite
Issue
Section
License
In accordance with national and international copyrights, as well as publishing policies of "Fundación Universitaria Luis Amigó" and its Journal "Lámpsakos" (indexed with ISSN : 2145-4086), I (we ) hereby manifest:1. The desire to participate as writers and submit to the rules established by the magazine publishers.
2. The commitment not to withdraw the manuscript until the journal finishes the editing process of the ongoing issue.
3. That article is original and unpublished and has not been nominated or submitted together in another magazine; therefore, the rights of the article in evaluation have not been assigned in advance and they do not weigh any lien or limitation for use.
4. The absence of conflict of interest with commercial institution or association of any kind
5. The incorporation of the quotes and references from other authors, tending to avoid plagiarism. Accordingly, the author affirms that the paper being published do not violate copyright, intellectual property or privacy rights of third parties. Morover, if necessary there is a way of demonstrating the respective permits original copyright to the aspects or elements taken from other documents such as texts of more than 500 words, tables, graphs, among others. In the event of any claim or action by a third party regarding copyright on the article, the author (s) will assume full responsibility and come out in defense of the rights herein assigned. Therefore, for all purposes, the Journal "Lámpsakos" of the "Fundación Universitaria Luis Amigó" acts as a third party in good faith.
6. In the event of the publication of the article, the authors free of charge and on an exclusive basis the integrity of the economic rights and the right to print, reprint and reproduction in any form and medium, without any limitation as to territory is concerned, in favor of the Journal "Lámpsakos" of the "Fundación Universitaria Luis Amigó".