Abstract
Anti-money laundering(AML) compliance is having deeply effects on the culture, organization, and technology of Fiancial institutions(FIs). One of the most critical research issues in AML is how to efficiently and adaptively allocate limited AML resource to analyze suspicious transactions to achieve maximal AML rewards. In this paper, a novel Adaptive AML Resource Allocation Model(AAMLRAM) based on Semi-Markov Decision Process (SMDP) is proposed to allocate AML resources optimally in AML resource allocation domain to analyze the suspicious transaction report sent from FIs. Based on our proposed AAMLRAM, AML resource allocation domain can achieve maximal AML rewards, taking into account not only the incomes of identifying the suspicious transaction but also the cost resulted from AML resource occupation as well. Extensive simulations are conducted to demonstrate that our proposed model can achieve higher AML resource allocation domain system reward compared to traditional approach based on the Greedy resource allocation algorithms. Performance comparisons with various AML resource allocation schemes are also provided.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Geiger, H., Wuensch, O.: The fight against moneylaundering: an economic analysis of a cost-benefit paradoxon. J. Money Laund. Control 10(1), 91–105 (2007)
Harvey, J.: Compliance and reporting issues arising for financial institutions from money laundering regulations: a preliminary cost benefit study. J. Money Laund. Control 7, 333–346 (2004)
Saunders, A., Cornett, M.M.: Financial Institutions Management: A Risk Management Approach, 6th edn. McGraw-Hill, New York (2008)
Harvey, J.: An evaluation of money laundering policies. J. Money Laund. Control 8, 339–345 (2005)
Sathye, M.: Estimating the cost of compliance of AMLCTF for financial institutions in Australia. J. Financ. Crime 15, 347–363 (2008)
Tang, J., Yin, J.: Developing an intelligent data discriminating system of anti-money laundering based on SVM. In: International Conference on Machine Learning and Cybernetics (2005)
Salerno, J.J., Yu, P.S.: Applying data mining in investigating money laundering crimes. In: Conference: Knowledge Discovery and Data Mining, pp. 747–752 (2003)
Kaboudan, M.A.: Biologically inspired algorithms for financial modelling. Genet. Program. Evolvable Mach. 7, 285–286 (2006)
Zhu, H., Du, S., Gao, Z., Dong, M., Cao, Z.: A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks. IEEE Trans. Parall. Distrib. Syst. 25, 22–32 (2013)
Du, S., Zhu, H., Li, X., Ota, K., Dong, M.: MixZone in motion: achieving dynamically cooperative location privacy protection in delay-tolerant networks. IEEE Trans. Veh. Technol. 62, 4565–4575 (2013)
Zhu, H., Lin, X., Rongxing, L., Fan, Y.: SMART: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans. Veh. Technol. 58, 4628–4639 (2009)
Federal Financial Institutions Examination Council, Bank Secrecy Act/ Anti-Money Laundering Examination Manual (2010)
Ramjee, R., Towsley, D., Nagarajan, R.: On optimal call admission control in cellular networks. Wirel. Netw. 3(1), 29–41 (1997)
Acknowledgement
This work was supported in part by the National High Technology Research and Development Program of China(863 Program, Grant No: 2015AA01A705), the National Social Science Foundation of China (Grant NO. 12XJY028) and China Postdoctoral Science Foundation (Grant No. 2013M541014). Hongbin Liang is the corresponding author.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Hong, X., Liang, H., Gao, Z. (2015). Adaptive Resource Allocation for Anti-money Laundering Based on SMDP. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-21837-3_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21836-6
Online ISBN: 978-3-319-21837-3
eBook Packages: Computer ScienceComputer Science (R0)