A Survey on Outlier Detection in Financial Transactions

Outlier detection is a very important concept in the data mining. It is useful in data analysis. Nowadays, a direct mapping can be found between the data outliers and real world anomalies. Hence the outlier detection techniques can be applied to detect the abnormal activities in the real world. Outlier detection has been researched within various application domains and knowledge disciplines. This survey provides an overview of existing outlier detection techniques that can be applied in the financial domain. It mainly focuses on the idea of detecting the suspicious or outlier financial transactions.

[1]  Nida Sadaf Khan,et al.  A Bayesian Approach for Suspicious Financial Activity Reporting , 2013 .

[2]  Phuc Do,et al.  Applying Data Mining in Money Laundering Detection for the Vietnamese Banking Industry , 2012, ACIIDS.

[3]  VARUN CHANDOLA,et al.  Outlier Detection : A Survey , 2007 .

[4]  Stefan Axelsson,et al.  Money Laundering Detection using Synthetic Data , 2012 .

[5]  Vivek Kshirsagar,et al.  Data Mining Model for Money Laundering Detection in Financial Domain , 2014 .

[6]  Deysy Galeana Perez,et al.  Outlier Detection Applying an Innovative User Transaction Modeling with Automatic Explanation , 2011, 2011 IEEE Electronics, Robotics and Automotive Mechanics Conference.

[7]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[8]  Sajjad Haider,et al.  Clustering based anomalous transaction reporting , 2011, WCIT.

[9]  Sajjad Haider,et al.  Suspicious activity reporting using dynamic bayesian networks , 2011, WCIT.

[10]  Harmeet Kaur Khanuja,et al.  Forensic Analysis for Monitoring Database Transactions , 2014, SSCC.

[11]  Guang Dong,et al.  Research on Money Laundering Detection Based on Improved Minimum Spanning Tree Clustering and Its Application , 2009, 2009 Second International Symposium on Knowledge Acquisition and Modeling.

[12]  Nida Sadaf Khan,et al.  Ontology Based Expert-System for Suspicious Transactions Detection , 2014, Comput. Inf. Sci..

[13]  Shamik Sural,et al.  Detection of intrusive activity in databases by combining multiple evidences and belief update , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.

[14]  Zengan Gao,et al.  Application of Cluster-Based Local Outlier Factor Algorithm in Anti-Money Laundering , 2009, 2009 International Conference on Management and Service Science.