Dynamic Approach for Detection of Suspicious Transactions in Money Laundering

  • Authors

    • Anagha A Rao
    • Kanchana V
    2018-07-15
    https://doi.org/10.14419/ijet.v7i3.10.15619
  • Anti Money Laundering, Directed Acyclic Graph, Graphical Theoretic Approach, Hash Based Technique, Money laundering,
  • In the previous year, India has been among the most active nations in venturing up the battle against money laundering and related financial and security issues. The effort that likely got the most consideration was “demonetization†approach which intended to evacuate around 85% of the aggregate illegal cash available for use. To survey India's overall anti-money laundering (AML) system, it's more essential to center on the fundamental legitimate structure set up. In this paper, the proposed methodology is to analyze the user transactions and characterize based on their behavior of transactions. Then it focuses on the characterized transactions and obtains the connectivity among different accounts. To predict the suspicious transactions, we examine the log or trends found in previous years transactions of the user. By comparing the obtained data with the previous data, we will be able to predict suspicious transactions, providing the details are moved for further investigation.

     

     


     
  • References

    1. [1] Umadevi, P., & Divya, E. (2012). Money laundering detection using TFA system.

      [2] Salehi, A., Ghazanfari, M., & Fathian, M. (2017). Data Mining Techniques for Anti Money Laundering. International Journal of Applied Engineering Research, 12(20), 10084-10094.

      [3] http://timesofindia.indiatimes.com

      [4] http:// www.newsbytesapp.com

      [5] www.rbi.org.in

      [6] Pankaj Richhariya, Prashant K Singh, EnduDuneja. A Survey on financial fraud detection methodologies. In International Journal of commerce business and management 2012.

      [7] R. Corywatkins, K. Michaelreynolds, Ron Demara. Tracking Dirty Proceeds: Exploring Data Mining Techniques as to Investigate Money Laundering. In police practice and research 2003.

      [8] J.S.Park, M.S.Chen, and P.S.Yu. An effective hash-based algorithm for mining association rules. In Proc. 1995 ACM-SIGMOD Int.Conf.Management of Data (SIGMOD’95), pages 175-186, San Jose, CA, May 1995.

      [9] J.Han and M. Kamber, Data Mining: Concepts and Techniques. Morgan Kaufmann publishers, 2nd Eds., Nov 2005.

      [10] Liu Keyan and Yu Tingting,â€An improved Support vector Network Model for Anti-Money Laundering, International conference on Management of e-commerce and-Government.

      [11] Yang Qifeng, Feng Bin, Song Ping. Study on Anti Money Laundering Service System of Online Payment based on Union-Bank mode. IEEE Computer Society 2007.

      [12] Sreekumar Pulakkazhy and R.V.S.Balan,â€Data Mining in Banking and its applications –A Reviewâ€, Journal of computer science 2013.G.

      [13] Xingrong Luo,†Suspicious transaction detection for Anti Money Launderingâ€, International Journal of Security and Its Applications 2014.

      [14] Alexandre C, & Balsa, J. (2016). Integrating client profiling in an anti-money laundering multi-agent based system. In New Advances in Information Systems and Technologies (pp. 931-941). Springer, Cham.

      [15] G. Krishnapriya, Dr.M.Prabakaran â€Money laundering analysis based on Time variant Behavioral transaction patterns using Data mining†Journal of Theoretical and Applied Information Technology 2014.

      [16] Nhien An Le Khac, Sammermarkos, M. O'Neill, A. Brabazon and M-taharkechadi. An investigation into Data Mining approaches for Anti Money Laundering. In International conference on Computer Engineering & Applications 2009.

      [17] Nhien An Le Khac, M. Taharkechadi. Application of Data mining for Anti-Money Detection: A case study. IEEE International conference on Data mining workshops 2010.

      [18] Nhien An Le Khac, Sammermarkos, M.Teharkechadi,. A data mining-based solution for detecting suspicious money laundering cases in an investment bank. IEEE Computer society 2010.

      [19] Denys A.Flores, Olga Angelopoulou, Richard J. Self,†Design of a Monitor for Detecting Money Laundering and Terrorist Financingâ€, International Journal of Computer Networks and Applications 2014.

      [20] Lopez-Rojas, E. A., & Axelsson, S. (2012, May). Money laundering detection using synthetic data. In The 27th annual workshop of the Swedish Artificial Intelligence Society (SAIS); 14-15 May 2012; Orebro; Sweden (No. 071, pp. 33-40). Linkoping University Electronic Press.

      [21] Bipin Nair B J, A Recommended Classification Approach for Multilevel E-commerce Marketing Using Decision Tree Method International Journal of Computer Technology & Applications, ISSN: 2229-6093, Volume 5 Issue 2, March-April 2014.

      [22] Suresh, C., Reddy, K. T., &Sweta, N. (2016). A Hybrid Approach for Detecting Suspicious Accounts in Money Laundering Using Data Mining Techniques.

      [23] Ahalya, C. S., Abin, K. O., & Kanchana, V. (2017, May). Building up an information archive for putting away pesticide data. In Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2017 2nd IEEE International Conference on (pp. 2125-2128). IEEE

      [24] Ganesha, K., Dhanush, S., & Raj, S. S. (2017, March). An approach to fuzzy process mining to reduce patient waiting time in a hospital. In Innovations in Information, Embedded and Communication Systems (ICIIECS), 2017 International Conference on (pp. 1-6). IEEE.

  • Downloads

  • How to Cite

    A Rao, A., & V, K. (2018). Dynamic Approach for Detection of Suspicious Transactions in Money Laundering. International Journal of Engineering & Technology, 7(3.10), 10-13. https://doi.org/10.14419/ijet.v7i3.10.15619