Money laundering regulatory risk evaluation using Bitmap Index-based Decision Tree

Abstract This paper proposes to evaluate the adaptability risk in money laundering using Bitmap Index-based Decision Tree (BIDT) technique. Initially, the Bitmap Index-based Decision Tree learning is used to induce the knowledge tree which helps to determine a company’s money laundering risk and improve scalability. A bitmap index in BIDT is used to effectively access large banking databases. In a BIDT bitmap index, account in a table is numbered in sequence with each key value, account number and a bitmap (array of bytes) used instead of a list of row ids. Subsequently, BIDT algorithm uses the “select” query performance to apply count and bit-wise logical operations on AND. Query result coincides exactly to build a decision tree and more precisely to evaluate the adaptability risk in the money laundering operation. For the root node, the main account of the decision tree, the population frequencies are obtained by simply counting the total number of “1” in the bitmaps constructed on the attribute to predict money laundering and evaluate the risk factor rate. The experiment is conducted on factors such as regulatory risk rate, false positive rate, and risk identification time.

[1]  Juan D. Velásquez,et al.  Characterization and detection of taxpayers with false invoices using data mining techniques , 2013, Expert Syst. Appl..

[2]  Felix C. Freiling,et al.  Secure Failure Detection and Consensus in TrustedPals , 2012, IEEE Transactions on Dependable and Secure Computing.

[3]  Weibing Peng,et al.  Research on Money Laundering Crime under Electronic Payment Background , 2011, J. Comput..

[4]  Xingrong Luo Suspicious Transaction Detection for Anti-Money Laundering , 2014 .

[5]  Richard J. Self,et al.  An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together , 2013, J. Internet Serv. Inf. Secur..

[6]  Vasilis Vassalos,et al.  Adaptive Join Operators for Result Rate Optimization on Streaming Inputs , 2010, IEEE Transactions on Knowledge and Data Engineering.

[7]  Kate Smith-Miles,et al.  Resilient Identity Crime Detection , 2012, IEEE Transactions on Knowledge and Data Engineering.

[8]  K. Badran,et al.  DESIGN OF A MONITOR FOR DETECTING MONEY LAUNDERING AND TERRORIST FINANCING , 2015 .

[9]  Ivica Simonovski,et al.  Role of banks as entity in the system for prevention of money laundering in the Macedonia , 2012 .

[10]  Malte Möser,et al.  An inquiry into money laundering tools in the Bitcoin ecosystem , 2013, 2013 APWG eCrime Researchers Summit.

[11]  R. V. Siva Balan,et al.  Money Laundering Identification on Banking Data Using Probabilistic Relational Audit Sequential Pattern , 2015 .

[12]  Masoumeh Zareapoor,et al.  Analysis of Credit Card Fraud Detection Techniques: based on Certain Design Criteria , 2012 .

[13]  V. Jayasree,et al.  A REVIEW ON DATA MINING IN BANKING SECTOR , 2013 .

[14]  R. V. Siva Balan,et al.  Data Mining in Banking and its Applications-a Review , 2013, J. Comput. Sci..

[15]  M. Laxmaiah,et al.  AN APPROACH TO EVALUATE AGGREGATE QUERIES EFFICIENTLY USING PRIORITY QUEUE TECHNIQUE , 2013 .

[16]  A. Govardhan,et al.  A Compressed Bitmap Vector Method to Assess Aggregate Queries Competently , 2013 .