Abstract
Money laundering is a worrying term for every country’s economy these days. Leading economists of all major developed and developing economies are concerned to devise methods to prevent it. The economy of a country is weakened by the impact of money laundering. Networks created between various banks in different countries facilitate online money transfer, which is turning the process of money laundering into digital money laundering. This promotes money launderers to perform wired transactions from anywhere. People involved in the process of money laundering are efficiently using online banking as their weapon. Evading the anti-money laundering agencies is becoming easier for them because of having online bank accounts. Such people are misusing technology. Therefore, it is restricting one’s own country’s economic progress. But with the help of recently developed technologies, we are able to prevent such illegal activities. Scrutinizing all the transactions and investigating them manually at financial intelligence units are cumbersome tasks because petabytes of transactions are taking place each day. Advanced technologies like Big Data enable us to detect the suspicious customers possibly involved in money laundering. In this paper, we have proposed a methodology using big data to detect smurfing; based on which, suspicious people involved in money laundering may be identified and appropriate action can be taken against them.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Moser, M., Bohme, R., Breuker, D.: An enquiry into money laundering tools in the Bitcoin ecosystems. In: E-Crime Researchers Summit, pp. 1–14 (2013)
Lucian, R.D.: Money laundering economic and legal aspects. In: 2nd IEEE International Conference on Information and Financial Engineering, pp. 713–717 (2010)
Tejay, G.P.S.: Introduction to cyber crime in the digital economy minitrack. In: 45th Hawaii International Conference on System Science, pp. 30–40 (2012)
Flores, D.A., Angelopoulou, O., Self, R.J.: Combining digital forensic practices and database analysis as an anti money laundering strategy for financial institution. In: 3rd International Conference on Emerging Intelligent Data and Web Technologies, pp. 218–224 (2012)
Yang, C.C., Ng, T.D.: Terrorism and crime related weblog social network-link, content analysis and information visualisation. In: Intelligence and Security Informatics, IEEE, pp. 55–58
Didimo, W., Liotta, G., Montecchiani, F.: An advanced network visualization system for financial crime detection. In: IEEE Pacific Visualization Symposium, 1–4 Mar 2011, Hongkong, China, pp. 203–210 (2011)
Chen, Z., Van Khoa, L.D., Nazir, A., Teoh, E.N., Karupiah, E.K: Exploration of the effectiveness of expectation maximization algorithm for suspicious transaction detection in anti money laundering. In: IEEE Conference on Open System, Subang, Malaysia, 26–28 Oct, pp. 145–149 (2014)
Thangiah, M., Basri, S., Suliman, S.: A framework to detect cyber crime in the virtual environment. In: International Conference on Computer and Information Science, pp. 553–557 (2012)
Shu, M., Rui, L., Dancheng, L., Shuaizhen, Z.: Anti money laundering system based on main frame and SOA. In: 5th International Conference on Computational Intelligence and Communication Network, pp. 613–616 (2013)
Luna Dong, X., Srivastava, D.: Big data Integration. In: 29th International Conference on Data Engineering, pp. 1245–1248 (2013)
Leung, C.K., MacKinnon, R.K., Jiang, F.: Reducing the search space for big data mining for interesting patterns from uncertain data. In: IEEE Congress on Big Data, pp. 315–322 (2014)
Chen, H., Lin, T.Y., Zhang, Z., Zhong, J.: Parallel mining frequent patterns over big transactional data in extended MapReduce. In: IEEE International Conference on Granular Computing, pp. 43–48 (2013)
Tianqing, Z.: An outlier detection model based on cross datasets comparison for financial surveillance. In: Proceedings of th 2006 IEEE Asia Pacific Conference on Services Computing, pp. 601–604 (2006)
Patel, A.B., Birla, M., Nair, U.: Addressing big data problem using Hadoop and MapReduce. In: NIRMA University International Conference on Engineering, NUiCONE-2012, 6–8 Dec 2012, pp. 1–5 (2012)
Michalak, K., Korczak, J.: Graph mining approach to suspicious transaction Detection. In: Proceeding of the Federated Conference on Computer Science and Information System, pp. 69–75
Xuan, L., Pengzhu, Z.: An agent based anti-money laundering system architecture for financial supervision. In: International Conference on Wireless Communications, Networking and Mobile Computing, pp. 5472–5475 (2007)
Yang Qifeng, Feng Bin, Song Ping, “Study on Anti-Money Laundering service system of online payment based on Union-Bank mode”, International conference on wireless communications, networking and mobile computing, 2007, pp. 49–91
Berghel, H.: The Future Of Digital Money Laundering. August 2014, pp. 70–75 (2014)
Jutla, D.N., Bodorik, P., Ali, S.: Emerging privacy for big data apps with the unified modeling language. In: IEEE International Congress on Big data, pp. 38–45 (2013)
le Khac, N.A., Kechadi, M.T.: Application of data mining for anti money laundering detection: a case study. In: IEEE International Conference on Data Mining Workshops, pp. 577–584 (2010)
Bernard, K., Cassidy, A., Clark, M., Liu, K., Lobaon, K., McNeill, D., Brown, D.: Indentifying and tracking online financial services through web mining and latent semantic indexing. In: Proceedings of 2011 IEEE Systems and Information Engineering Design Symposium, University of virginia, 29 Apr 2011, pp. 158–163 (2011)
Umadevi, P.M.E., Divya, A.P.E.: Money laundering detection using TFA system. In: International Conference on Software Engineering and Mobile Application Modelling and Development, 19–21 Dec 2012, pp. 1–8 (2012)
Wang, S.N., Yang, J.G.: A money laundering risk evaluation method based on decision tree. In: Proceedings of the 6th International Conference on Machine Learning and Cybernetics, Hongkong, 19–22 Aug 2007, pp. 283–286
Bastia, S.: Next generation technologies to combat counterfeiting of electronic components. In: IEEE Transaction on Components and Packaging Technologies, vol. 25, No. 1, Mar 2002, pp. 175–176 (2002)
Sobolevsky, S., Sitko, I., et. al.: Money on the move: big data of bank card transactions as the new proxy for human mobility patterns and regional delineation. The case of residents and Foreign visitors in Spain. In: IEEE International Congress on Big Data, pp. 136–143 (2014)
Demchenko, Y., Grosso, P., de Laat, C., Membray, P.: Addressing big data issues in scientific data infrastructure. In: International Conference on Collaboration Technologies and Systems, pp. 48–55 (2013)
Song, Y., Alatorre, G., Mandagree, N., Singh, A.: Storage mining: where IT management meets big data analytics. In: IEEE International Congress on Big data, pp. 421–422 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chadha, A., Kaur, P. (2018). Handling Smurfing Through Big Data. In: Aggarwal, V., Bhatnagar, V., Mishra, D. (eds) Big Data Analytics. Advances in Intelligent Systems and Computing, vol 654. Springer, Singapore. https://doi.org/10.1007/978-981-10-6620-7_44
Download citation
DOI: https://doi.org/10.1007/978-981-10-6620-7_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6619-1
Online ISBN: 978-981-10-6620-7
eBook Packages: EngineeringEngineering (R0)