Documente Academic
Documente Profesional
Documente Cultură
1, February 2017 9
Abstract--- Money laundering refers to activities that which offenders effort to conceal the true origin and
disguise money receive through illegal operations and make ownership of the proceeds of their criminal activity.
them legitimate. It leaves serious consequence that may lead ML behavioral patterns and ML detection framework
to economy corruption. One such problem consisting large features are essential to ML, but traditional research focuses
amounts of money transferring through various accounts by on legislative considerations and compliance requirements. All
the same person or entity is Money Laundering. Money the method to identify the money laundering to focus on the
laundering scheme is quite a complex procedure. It receipts
neighbor transferring in the pattern. So challenges are often
some empathetic of the deposit transporting actions at many
made to their high false positive rate (FPR) and inefficiency
phases. Detecting money laundering activities is a challenging with large data sets. Detection money laundering is the most
task due we propose a risk model framework in Structural important task for the enforcement directors and finance
Money Laundering based on Risk Evolution Detection
ministry also.
Framework (SMLRDF). The connection deceitful deal trails a
sequence of connected money laundering arrangements, Complete money laundering, offenders attempt to adapt
structural money laundering uses sequence matching, social financial profits resulting from illegal doings into a
network investigation, and multifaceted happening processing, permissible intermediate such as important speculation or
case-based examination. The context that put on case discount annuity funds presented in retail or speculation banks. This
approaches to increasingly lessen the input data set to a type of corruption is receiving more and additional erudite and
knowingly minor size. The context images the summary data appears to consume enthused from the chestnut of medication
to discovery couples of communications through common trading to backing intimidation and confidently not over
qualities and performances that are possibly complicated in looking individual gain.
ML actions. It then applies a clustering method to detect Though those rule-based schemes have certain pattern
potential Money Laundering (ML groups), then the risk model credit capabilities, they do not have knowledge or
is used to create a valid and accurate transaction scoring simplification aptitudes and container only competition
system to be utilized in an ML prevention system. SMLRDF- designs that they previously know. As novel ML arrangements
dependent risk modeling, which captures the hidden, and industrialized, numerous of these answers were powerless to
dynamic, relations among none-transacted entities. SMLRDF expose them, as long as offenders with new streets to avoid
has components to collect data, run them against business detection and the law. Likewise, the money washing groups
rules and evolution models, run detection algorithms and use have numerous relatives and business among them. The
social network analysis to connect potential participants. problematic is the measurement of suggestion and amount of
Keywords--- Money Laundering, Risk Framework, Risk traversal happening among source and terminus so that the
Evolution Detection, Structural Estimation. foundation of washing might not be recognized.
Irregularity discovery replicas analyze purchaser conduct their frequency [14]. Other methods that complement these
and deal behavior, unique usual patterns from irregularities basic security measures are based on checking every customer
that might designate a high-risk drive [5]. Talented of against a blacklist originating from previous investigated cases
observing all types of exchange cleaning doings, an and a white list to e.g. avoid mistakes when faced with persons
irregularity discovery organization can save up through the with the same name. Unfortunately, these and other methods
altering appearance of this class of corruption by determining have proved to be insufficient [15].
new heights of deception and other doubtful doings impartial
as they appear [6]. Happening a combination of gathering and III. PROPOSED SYSTEM
organization methods for examining ML decorations in an The proposed method involves three stages, Which
universal speculation bank. Includes Preprocessing of Data in Framework, ML Dynamic
Consumer conduct in speculation actions is complexs Risk Model, and Money Laundering Identification. The
incenumerous influences effect it, likewise show that by structure generates a network representation of all matching
selecting appropriate scopes, modest DM practices can be transactions. Then applies a clustering method to find
functional composed to detect mistrustful ML belongings in suspicious ML communities within the network. It then uses
speculation doings [10]. Hence, in this paper, present a one- network-based algorithms to filter out unnecessary accounts
step clustering approach basing on some heuristics from AML and operations. Finally, the extracted communities are
experts to improve the performance of our previous solution in rearranged, sorted and returned as the output of the
the term of running time [13]. framework.
Somenecessary countermeasures against money laundering
have been proposed, including basic statistical analysis which
constrains the amount of the transactions as well as restricting
Data Pre-
Money Processing ML dynamic Money
Laundering
Transactio Risk Model
n Identification
Data repository
system through sender account, is called placement. banks. Finally, we have collected 6000 accounts from
Intermediate accounts are retransferring the funds for to make different banks having 12 million transactions. The proposed
safe the source of funds is called layering. The receiver report method has produced efficientresults and detection accuracy is
gives funds as clean money called integration. The framework also higher.
works as receiving the input data and matching transactions
ML Detection Accuracy
searching. The similarity in deposit and withdrawal amounts
are common attributes for financial (matching) transactions.
Algorithm 120
Detection Accuracy %
Input: Transactional Framework TFW 100
80
Output: Preprocessed TFWL. 60
Step1: for each transaction Tn from TFW 40
Classify separate Qualities framework and add to quality 20
list Ql. 0
QL = 1 (()())
End.
Step2: for each Transactional Dataset TD from TFW
Number of Transactions
If1 ()())then
TFW = TFW .
Graph 1: Shows the Efficiency of Identifying Money
End
Laundering
Step4: stop.
The graph 1 demonstrates the abilityto detect money
B. ML Dynamic Risk Model laundering onsome transaction used. It is clear that the
The dynamic risk model incorporates the static attributes, effectivenessis increased if the size of the transactionis
such as static profiles and dynamic social connection attributes increased. The proposed methodology produces an efficient
of the senders and recipients of the transaction. Consequently, result by increasing the size of the operation.
our risk model consists of a dynamic component and a static
element. MLS are identified, AND from input data streams
relevant attributes are collected and given to the detection ML Detection Efficiency
algorithms.
100
90
Detection Accuracy %
REFERENCES
[1] R. Soltani, U.T. Nguyen, Y. Yang, M. Faghani, A. Yagoub and A. An,
A new algorithm for money laundering detection based on structural
similarity, Conference on Ubiquitous Computing, Electronics & Mobile
Communication IEEE Annual, Pp. 1-7, 2016.
[2] Joined, Fatf-gafi.org-Financial Action Task Force (FATF), Fatf-
gafi.org, 2016.[Online]. Available: http://www.Fatf-gafi.org.
[3] J. Huang, H. Sun, J. Han, H. Deng, Y. Sun and Y. Liu, SHRINK: a
structural clustering algorithm for detecting hierarchical communities in
networks, Proceedings of the 19th ACM international conference on
Information and knowledge management, Pp. 219-228, 2010.
[4] C. Phua, V. Lee, K. Smith and R. Gayler, A comprehensive survey of
data mining-based fraud detection research, arXiv preprint
arXiv:1009.6119, 2010.
[5] C. Alexandre and J. Balsa, A multiagent-based approach to money
laundering detection and prevention, Proceedings of the International
Conference on Agents and Artificial Intelligence, Pp. 230-235, 2015.
[6] U.N.O. on Drugs and Crime, Unodc annual report 2014, accessed,
2015.
[7] E. Androulaki, G.O. Karame, M. Roeschlin, T. Scherer and S. Capkun,
Evaluating user privacy in bitcoin, International Conference on
Financial Cryptography and Data Security, Pp. 34-51, 2013.
[8] I. Miers, C. Garman, M. Green and A.D. Rubin, Zerocoin: Anonymous
distributed e-cash from bitcoin, IEEE Symposium on Security and
Privacy (SP), Pp. 397-411, 2013.
[9] S. Raza and S. Haider, Suspicious activity reporting using dynamic
Bayesian networks, World Conference on Information Technology,
Vol. 3, Pp. 987-991, 2011.
[10] S. Wang, A comprehensive survey of data mining-based accounting-
fraud detection research, International Conference on Intelligent
Computation Technology and Automation, Vol. 1, Pp. 50-53, 2010.
[11] G. Zengan, Application of cluster-based local oulier factor algorithm in
anti-money laundering, International Conference on Management and
Service Science, Pp 1-4, 2009.
[12] A. Antoniou and G. Sinha, Laundering Sexual Deviance: Targeting
Online Pornography through Anti-Money Laundering, Intelligence and
Security Informatics Conference (EISIC), Pp. 91-98, 2012.
[13] D.A. Flores, O. Angelopoulou and R.J. Self, Combining digital forensic
practices and database analysis as an anti-money laundering strategy for
financial institutions, Emerging Intelligent Data and Web Technologies
(EIDWT), Pp. 218-224, 2012.
[14] R. Liu, X.L. Qian, S. Mao and S.Z. Zhu, Research on anti-money
laundering based on core decision tree algorithm, International
Conference on Control and Decision, Pp. 4322-4325, 2011.
[15] N.A.L. Khac, A data mining-based solution for detecting suspicious
money laundering cases in an investment bank, Second International
Conference on Advances in Databases Knowledge and Data
Application, Pp. 235-240, 2010.