Skip to main content

Application of Machine Analysis Algorithms to Automate Implementation of Tasks of Combating Criminal Money Laundering

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 858))

Abstract

The progress in IT gave people a bigger space for fraudulent activity. To help the analysis of criminal financial activity special software was invented. The problem is that the machine of money laundering becomes more sophisticated, but present ways of detecting such activities cannot match the level of fraud capabilities. The main objective in this case is finding methods to improve the available systems and designing new algorithms, understanding all principles that are used in money laundering. To accomplish this, all the steps in AML-systems should be revised or developed from the beginning, new tools should be included. This article gives an overview of the current situation with analysis of weaknesses in present AML-system versions and shows the examples of using machine learning.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Apache Spark. http://www.spark.apache.org/

  2. Kanhere, P., Khanuja, H.K.: A survey on outlier detection in financial transactions. Int. J. Comput. Appl. 17(108), 23–25 (2014)

    Google Scholar 

  3. Keller, J.M., Gray, M.R., Givens, J.A.: A fuzzy k-nearest neighbor algorithm. IEEE Trans. Syst. Man Cybern. 4(SMC-15), 580–585 (1985). https://doi.org/10.1109/tsmc.1985.6313426

    Article  Google Scholar 

  4. Kharote, M., Kshirsagar, V.: Data mining model for money laundering detection in financial domain. Int. J. Comput. Appl. 85(16), 61–64 (2014). https://doi.org/10.5120/14929-3337

    Article  Google Scholar 

  5. Mazeev, A., Semenov, A., Doropheev, D., et al.: Early performance evaluation of supervised graph anomaly detection problem implemented in Apache Spark. In: 3rd Ural Workshop on Parallel, Distributed, and Cloud Computing for Young Scientists (Ural-PDC). CEUR Workshop Proceedings, vol. 1990, Aachen, pp. 84–91 (2017)

    Google Scholar 

  6. Michalak, K., Korczak, J.: Graph mining approach to suspicious transaction detection. In: The Federated Conference on Computer Science and Information Systems, Szczecin, Poland, 18–21 September 2011

    Google Scholar 

  7. Moll, L.: Anti money laundering under real world conditions—finding relevant patterns. University of Zurich, Department of Informatics, Student-ID: 00-916-932 (2009)

    Google Scholar 

  8. Molloy, I., et al.: Graph analytics for real-time scoring of cross-channel transactional fraud. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 22–40. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_2

    Chapter  Google Scholar 

  9. The Emergence of AI Regtech Solutions For AML And Sanctions Compliance. https://www.whitecase.com/sites/whitecase/files/files/download/publications/rc_apr17_reprint_white.pdf

  10. Pozzolo, A.D., Caelen, O., Borgne, Y.-A.L., et al.: Learned lessons in credit card fraud detection from a practitioner perspective. Expert Syst. Appl. 41(10), 4915–4928 (2014)

    Article  Google Scholar 

  11. Another smart side of artificial intelligence. https://www.bai.org/banking-strategies/article-detail/another-smart-side-of-artificial-intelligence-quashing-the-compliance-crush

  12. Artificial Intelligence in KYC-AML: Enabling the Next Level of Operational Efficiency. https://www.celent.com/insights/567701809

  13. Semenov, A., Mazeev, A., Doropheev, D., et al.: Survey of common design approaches in AML software development. In: GraphHPC 2017 Conference (GraphHPC). CEUR Workshop Proceedings, vol. 1981, Aachen, pp. 1–9 (2017)

    Google Scholar 

  14. Machine Learning: Advancing AML Technology to Identify Enterprise Risk. http://files.acams.org/pdfs/AMLAdvisor/052015/Machine%20Learning%20-%20Advancing%20AML%20Technology%20to%20Identify%20Enterprise%20Risk.pdf

  15. Vidiasova, L., Kachurina, P., Cronemberger, F.: Smart cities prospects from the results of the world practice expert benchmarking. In: 6th International Young Scientists Conference in HPC and Simulation, YSC 2017. Procedia Computer Science, Kotka, Finland, 1–3 November 2017

    Google Scholar 

  16. Li, Z., Xiong, H., Liu, Y.: Detecting blackholes and volcanoes in directed networks. In: 2010 IEEE International Conference on Data Mining (2010)

    Google Scholar 

Download references

Acknowledgements

The research is being conducted with the finance support of the Ministry of Education and Science of the Russian Federation (Contract №14.578.21.0218) Unique ID for Applied Scientific Research (project) RFMEFI57816X0218. The data presented, the statements made, and the views expressed are solely the responsibility of the authors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aleksey Dobrotvorskiy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dorofeev, D., Khrestina, M., Usubaliev, T., Dobrotvorskiy, A., Filatov, S. (2018). Application of Machine Analysis Algorithms to Automate Implementation of Tasks of Combating Criminal Money Laundering. In: Alexandrov, D., Boukhanovsky, A., Chugunov, A., Kabanov, Y., Koltsova, O. (eds) Digital Transformation and Global Society. DTGS 2018. Communications in Computer and Information Science, vol 858. Springer, Cham. https://doi.org/10.1007/978-3-030-02843-5_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02843-5_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02842-8

  • Online ISBN: 978-3-030-02843-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics