Detecting money laundering transactions with machine learning

The purpose of this paper is to develop, describe and validate a machine learning model for prioritising which financial transactions should be manually investigated for potential money laundering. The model is applied to a large data set from Norway’s largest bank, DNB.,A supervised machine learning model is trained by using three types of historic data: “normal” legal transactions; those flagged as suspicious by the bank’s internal alert system; and potential money laundering cases reported to the authorities. The model is trained to predict the probability that a new transaction should be reported, using information such as background information about the sender/receiver, their earlier behaviour and their transaction history.,The paper demonstrates that the common approach of not using non-reported alerts (i.e. transactions that are investigated but not reported) in the training of the model can lead to sub-optimal results. The same applies to the use of normal (un-investigated) transactions. Our developed method outperforms the bank’s current approach in terms of a fair measure of performance.,This research study is one of very few published anti-money laundering (AML) models for suspicious transactions that have been applied to a realistically sized data set. The paper also presents a new performance measure specifically tailored to compare the proposed method to the bank’s existing AML system.

[1]  Pengzhu Zhang,et al.  Sequence Matching for Suspicious Activity Detection in Anti-Money Laundering , 2008, ISI Workshops.

[2]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[3]  Eibe Frank,et al.  Accelerating the XGBoost algorithm using GPU computing , 2017, PeerJ Comput. Sci..

[4]  E. DeLong,et al.  Comparing the areas under two or more correlated receiver operating characteristic curves: a nonparametric approach. , 1988, Biometrics.

[5]  A. Raftery,et al.  Strictly Proper Scoring Rules, Prediction, and Estimation , 2007 .

[6]  Anthony C. Atkinson,et al.  The use of prior information in very robust regression for fraud detection , 2018 .

[7]  John R. Walker How Big is Global Money Laundering , 1999 .

[8]  G. Brier VERIFICATION OF FORECASTS EXPRESSED IN TERMS OF PROBABILITY , 1950 .

[9]  Yoshua Bengio,et al.  Algorithms for Hyper-Parameter Optimization , 2011, NIPS.

[10]  Yong Hu,et al.  The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature , 2011, Decis. Support Syst..

[11]  Xinwei Deng,et al.  Active Learning Through Sequential Design, With Applications to Detection of Money Laundering , 2009 .

[12]  S. Garavaglia,et al.  A SMART GUIDE TO DUMMY VARIABLES : FOUR APPLICATIONS AND A MACRO , 1998 .

[13]  Tianqi Chen,et al.  XGBoost: A Scalable Tree Boosting System , 2016, KDD.

[14]  Robert Tibshirani,et al.  The Elements of Statistical Learning: Data Mining, Inference, and Prediction, 2nd Edition , 2001, Springer Series in Statistics.

[15]  David J. Hand,et al.  Statistical fraud detection: A review , 2002 .

[16]  João Balsa,et al.  Client Profiling for an Anti-Money Laundering System , 2015, ArXiv.

[17]  Zengan Gao,et al.  A framework for data mining‐based anti‐money laundering research , 2007 .

[18]  H. Zou,et al.  Regularization and variable selection via the elastic net , 2005 .

[19]  Agus Sudjianto,et al.  Statistical Methods for Fighting Financial Crimes , 2010, Technometrics.

[20]  Dionysios S. Demetis Fighting money laundering with technology: A case study of Bank X in the UK , 2018, Decis. Support Syst..

[21]  Philippe Pierre Pebay,et al.  Formulas for robust, one-pass parallel computation of covariances and arbitrary-order statistical moments. , 2008 .

[22]  Niall M. Adams,et al.  Transaction aggregation as a strategy for credit card fraud detection , 2009, Data Mining and Knowledge Discovery.

[23]  Xinghuo Yu,et al.  Detection of money laundering groups using supervised learning in networks , 2016, ArXiv.

[24]  Paul Schott Reference Guide to Anti-Money Laundering and Combating the Financing of Terrorism , 2006 .

[25]  Andrea Fronzetti Colladon,et al.  Using social network analysis to prevent money laundering , 2021, Expert Syst. Appl..