Simulating and classifying behavior in adversarial environments based on action-state traces: an application to money laundering

Many business applications involve adversarial relationships in which both sides adapt their strategies to optimize their opposing benefits. One of the key characteristics of these applications is the wide range of strategies that an adversary may choose as they adapt their strategy dynamically to sustain benefits and evade authorities. In this paper, we present a novel way of approaching these types of applications, in particular in the context of Anti-Money Laundering. We provide a mechanism through which diverse, realistic and new unobserved behavior may be generated to discover potential unobserved adversarial actions to enable organizations to preemptively mitigate these risks. In this regard, we make three main contributions. (a) Propose a novel behavior-based model as opposed to individual transactions-based models currently used by financial institutions. We introduce behavior traces as enriched relational representation to represent observed human behavior. (b) A modelling approach that observes these traces and is able to accurately infer the goals of actors by classifying the behavior into money laundering or standard behavior despite significant unobserved activity. And (c) a synthetic behavior simulator that can generate new previously unseen traces. The simulator incorporates a high level of flexibility in the behavioral parameters so that we can challenge the detection algorithm. Finally, we provide experimental results that show that the learning module (automated investigator) that has only partial observability can still successfully infer the type of behavior, and thus the simulated goals, followed by customers based on traces - a key aspiration for many applications today.

[1]  E. Takáts,et al.  A Theory of 'Crying Wolf': The Economics of Money Laundering Enforcement , 2007, SSRN Electronic Journal.

[2]  Stefan Axelsson,et al.  Money Laundering Detection using Synthetic Data , 2012 .

[3]  Yu-To Chen,et al.  Fuzzy Computing Applications for Anti-Money Laundering and Distributed Storage System Load Monitoring , 2011 .

[4]  P. Jaccard,et al.  Etude comparative de la distribution florale dans une portion des Alpes et des Jura , 1901 .

[5]  Vipin Kumar,et al.  Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.

[6]  이주현,et al.  7 , 1871, Testament d'un patriote exécuté.

[7]  Andrea Fronzetti Colladon,et al.  Using social network analysis to prevent money laundering , 2021, Expert Syst. Appl..

[8]  Craig A. Knoblock,et al.  PDDL-the planning domain definition language , 1998 .

[9]  Max Welling,et al.  Modeling Relational Data with Graph Convolutional Networks , 2017, ESWC.

[10]  Jason Kingdon,et al.  AI Fights Money Laundering , 2004, IEEE Intell. Syst..

[11]  Wil M. P. van der Aalst,et al.  Process Mining , 2016, Springer Berlin Heidelberg.

[12]  Santiago Ontan'on,et al.  An overview of distance and similarity functions for structured data , 2020, Artificial Intelligence Review.

[13]  Dietrich Wettschereck,et al.  Relational Instance-Based Learning , 1996, ICML.

[14]  E. Takáts,et al.  A Theory of “Crying Wolf”; The Economics of Money Laundering Enforcement , 2007 .

[15]  Sajjad Haider,et al.  Clustering based anomalous transaction reporting , 2011, WCIT.

[16]  Zhiyuan Chen,et al.  Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: a review , 2018, Knowledge and Information Systems.

[17]  Su-nan Wang,et al.  A Money Laundering Risk Evaluation Method Based on Decision Tree , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[18]  Pierre Sens,et al.  Stream Processing of Healthcare Sensor Data: Studying User Traces to Identify Challenges from a Big Data Perspective , 2015, ANT/SEIT.

[19]  Lin-Tao Lv,et al.  A RBF neural network model for anti-money laundering , 2008, 2008 International Conference on Wavelet Analysis and Pattern Recognition.

[20]  Toyotaro Suzumura,et al.  Scalable Graph Learning for Anti-Money Laundering: A First Look , 2018, ArXiv.

[21]  Sajjad Haider,et al.  Suspicious activity reporting using dynamic bayesian networks , 2011, WCIT.

[22]  Kim-Kwang Raymond Choo,et al.  Modelling of money laundering and terrorism financing typologies , 2012 .

[23]  Nada Lavrač,et al.  Relational Data Mining , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[24]  Ted E. Senator,et al.  The FinCEN Artificial Intelligence System: Identifying Potential Money Laundering from Reports of Large Cash Transactions , 1995, IAAI.

[25]  Lee Sael,et al.  Procedia Computer Science , 2015 .

[26]  T. Yalcinoz,et al.  Implementing soft computing techniques to solve economic dispatch problem in power systems , 2008, Expert Syst. Appl..

[27]  Raquel Fuentetaja The CBP planner , 2011 .

[28]  C. Humby,et al.  Process Mining: Data science in Action , 2014 .

[29]  Charu C. Aggarwal,et al.  Outlier Detection for Temporal Data: A Survey , 2014, IEEE Transactions on Knowledge and Data Engineering.

[30]  Nida Sadaf Khan,et al.  Ontology Based Expert-System for Suspicious Transactions Detection , 2014, Comput. Inf. Sci..

[31]  Habib Hamam,et al.  Artificial Intelligence Review , 2019, Advanced Methodologies and Technologies in Artificial Intelligence, Computer Simulation, and Human-Computer Interaction.

[32]  Zuraidah Mohd Sanusi,et al.  Money Laundering Risk: From the Bankers’ and Regulators Perspectives☆ , 2015 .

[33]  Waleed Alhosani,et al.  Anti-Money Laundering , 2016 .

[34]  Xingrong Luo Suspicious Transaction Detection for Anti-Money Laundering , 2014 .