Finding Suspicious Activities in Financial Transactions and Distributed Ledgers

Banks and financial institutions around the world must comply with several policies for the prevention of money laundering and in order to combat the financing of terrorism. Nowadays, there is a raise in the popularity of novel financial technologies such as digital currencies, social trading platforms and distributed ledger payments, but there is a lack of approaches to enforce the aforementioned regulations accordingly. Software tools are developed to detect suspicious transactions usually based on knowledge from experts in the domain, but as new criminal tactics emerge, detection mechanisms must be updated. Suspicious activity examples are scarce or nonexistent, hindering the use of supervised machine learning methods. In this paper, we describe a methodology for analyzing financial information without the use of ground truth. A user suspicion ranking is generated in order to facilitate human expert validation using an ensemble of anomaly detection algorithms. We apply our procedure over two case studies: one related to bank fund movements from a private company and the other concerning Ripple network transactions. We illustrate how both examples share interesting similarities and that the resulting user ranking leads to suspicious findings, showing that anomaly detection is a must in both traditional and modern payment systems.

[1]  Ammar Belatreche,et al.  Detecting Wash Trade in Financial Market Using Digraphs and Dynamic Programming , 2016, IEEE Transactions on Neural Networks and Learning Systems.

[2]  Véronique Van Vlasselaer,et al.  Fraud Analytics : Using Descriptive, Predictive, and Social Network Techniques:A Guide to Data Science for Fraud Detection , 2015 .

[3]  A. Schmidt Financial Markets and Trading: An Introduction to Market Microstructure and Trading Strategies , 2011 .

[4]  Charu C. Aggarwal,et al.  Data Clustering: Algorithms and Applications , 2014 .

[5]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[6]  Yi-Ren Yeh,et al.  Anomaly Detection Ensembles: In Defense of the Average , 2015, 2015 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT).

[7]  Bernhard Schölkopf,et al.  Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.

[8]  Martin Wattenberg,et al.  How to Use t-SNE Effectively , 2016 .

[9]  Geoffrey E. Hinton,et al.  Visualizing Data using t-SNE , 2008 .

[10]  Charu C. Aggarwal,et al.  Outlier Analysis , 2013, Springer New York.

[11]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[12]  Zhi-Hua Zhou,et al.  Isolation Forest , 2008, 2008 Eighth IEEE International Conference on Data Mining.

[13]  Ghassan O. Karame,et al.  Ripple: Overview and Outlook , 2015, TRUST.

[14]  Christopher Westphal Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies , 2008 .

[15]  Paul Schott Reference Guide to Anti-Money Laundering and Combating the Financing of Terrorism , 2006 .

[16]  William E. Winkler,et al.  Data quality and record linkage techniques , 2007 .

[17]  Kate Smith-Miles,et al.  A Comprehensive Survey of Data Mining-based Fraud Detection Research , 2010, ArXiv.