Document Type : Original Article

Authors

1 Professor of Operations Management and Decision Sciences, Faculty of Management, University of Tehran, Tehran, Iran

2 MSc. in Industrial Management, Faculty of Management University of Tehran, Tehran, Iran

3 Assistant Prof., Amin Police University, Tehran, Iran

4 Ph.D. student of Industrial Management, Faculty of Management University of Tehran, Tehran, Iran.

Abstract

Nowadays, money laundering has become a serious threat to the world economy. Traditional methods of Anti Money Laundering (AML) are costly and inefficient. Recently, data mining techniques have been developed and have been considered as appropriate methods to detect money laundering activities. The purpose of this research is to detect money laundering suspicious cases which might need more detailed scrutiny using data mining algorithms with real banking transaction datasets. CRISP-DM would be used as the research methodology, the statistical population would be the banking transactions and samples would be the transactions of one of the bank branches. For this purpose, two main approaches are used. In the first approach, using the k-means algorithm, financial transactions of banking accounts are clustered. Then, using anomaly detection techniques, abnormal transactions that might be suspicious of money laundering and need to be scrutinized in more detail have been detected. In the second approach, a novel technique using Benford’s law and GANs algorithm has been introduced. It can detect financial accounts that used concocted amounts in their transactions and might be suspicious of financial fraud and money laundering. The first approach can identify accounts with outliers in their transactions with an accuracy of about 93%, and the second approach can identify suspicious accounts that do not use professional methods to hide fake figures in their transactions with an accuracy of about 60%. to recognize correctly.

Keywords

Main Subjects

Ahmed, M.; Mahmood, A. N. & Islam, M. R. (2016). A survey of anomaly detection techniques in financial domain. Future Generation Computer Systems55, 278-288.
 Alexandre, C. R., & Balsa, J. (2023). Incorporating machine learning and a risk-based strategy in an anti-money laundering multiagent system. Expert Systems with Applications, 217, 119500.
 Álvarez-Jareño, J. A.; Badal-Valero, E., & Pavía, J. M. (2017). Using machine learning for financial fraud detection in the accounts of companies investigated for money laundering. Economics Department, Universitat Jaume I, Castellón (Spain).
 Asadi, M. (2015). Detection of money laundering in the banking system using genetic algorithms and neural networks. International Conference on New Research in Engineering Sciences. Tehran. (in Persian)
 Azar, A., & Khadivar, A. (2014). Application of multivariate statistical analysis in management. Tehran: Negahe Danesh. (in Persian)
 Badal-Valero, E.; Alvarez-Jareño, J. A., & Pavía, J. M. (2018). Combining Benford’s Law and machine learning to detect money laundering. An actual Spanish court case. Forensic science international, 282, 24-34.
 Berkhin, P. (2006). A survey of clustering data mining techniques. In Grouping multidimensional data (pp. 25-71). Springer, Berlin, Heidelberg.
 Bhattacharya, S.; Xu, D. & Kumar, K. (2011). An ANN-based auditor decision support system using Benford's law. Decision support systems, 50(3), 576-584.
 Busta, B., & Weinberg, R. (1998). Using Benford’s Law and neural networks as a review procedure. Managerial Auditing Journal. 13(6), 356-366.
 Diekmann, A. (2007). Not the first digit! using benford's law to detect fraudulent scientif ic data. Journal of Applied Statistics, 34(3), 321-329.
 Didimo, W.; Liotta, G., & Montecchiani, F. (2014). Network visualization for financial crime detection. Journal of Visual Languages & Computing, 25(4), 433-451.
 Durtschi, C.; Hillison, W. & Pacini, C. (2004). The effective use of Benford’s law to assist in detecting fraud in accounting data. Journal of forensic accounting, 5(1), 17-34.
 Farshadinia, M. & Basiri Ghaemi Pasand, A. (2016). Proposing a novel method to detect money laundering using data mining, 11th International Conference on Accounting and Management and 7th Conference on Entrepreneurship and Open Innovation. Tehran, Mehr Ishraq. (in Persian)
 Fiore, U.; De Santis, A.; Perla, F.; Zanetti, P. & Palmieri, F. (2019). Using generative adversarial networks for improving classification effectiveness in credit card fraud detection. Information Sciences, 479, 448-455.
 Ghazanfari, M.; Alizadeh, S. & Teymour Pour, B. (2008). Data mining and knowledge discovery. Tehran: Iran University of Science and Technology. (in Persian)
 Goodfellow, I.; Pouget-Abadie, J.; Mirza, M.; Xu, B.; Warde-Farley, D.; Ozair, S., ... & Bengio, Y. (2014). Generative adversarial nets. Advances in neural information processing systems. 2672-2680.
 Huang, S. M.; Yen, D. C.; Yang, L. W. & Hua, J. S. (2008). An investigation of Zipf's Law for fraud detection. Decision Support Systems, 46(1), 70-83.
 James, G.; Witten, D.; Hastie, T. & Tibshirani, R. (2013). An introduction to statistical learning, 112, New York: springer.
 Jantani, M. (2017). Identifying the role of money control systems in preventing electronic money laundering on the website of the Court of Audit. Studies of Economy, Financial Management and Accounting, 3(2/2), 69-61. (in Persian)
 Kiani, R. & Montazeri, M. (2015). An overview on anomaly detection methods. International Conference on Research in Science and Technology. Tehran, Karin Conference. (in Persian)
 Kumar, A.; Das, S. & Tyagi, V. (2020). Anti money laundering detection using Naïve Bayes classifier. IEEE International Conference on Computing, Power and Communication Technologies, 568-572.
 Lokanan, M. E. (2022). Predicting Money Laundering Using Machine Learning and Artificial Neural Networks Algorithms in Banks. Journal of Applied Security Research, 1-25.
 Martínez-Sánchez, J. F.; Cruz-García, S. & Venegas-Martínez, F. (2020). Money laundering control in Mexico: a risk management approach through regression trees (data mining). Journal of Money Laundering Control. 23(2), 427-439.
 Masjidi, A. (2015). Electronic money laundering and a case study of data mining methods in its prevention of that. International Conference on Applied Research in Information Technology, Computer and Telecommunications. Torbat-e Heydarieh, Khorasan Razavi Telecommunication Company. (in Persian)
 Nigrini, M. J. (1996). A taxpayer compliance application of Benford's law. The Journal of the American Taxation Association, 18(1), 72.
 Pearson, K. (1901). LIII. On lines and planes of closest fit to systems of points in space. The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, 2(11), 559-572.
 Raschka, S. & Mirjalili, V. (2017). Python machine learning. Packt Publishing Ltd.
 Salehi, A. & Ghazanfari, M. (2014). Introducing and reviewing the data mining methods to identify money laundering in electronic banking. The Second National Conference on Applied Research in Computer Science and Information Technology. Tehran. University of Applied Science and Technology. (in Persian)
 Sarraf, F. & Heidari, B. (1394). The need for proper implementation of internal control, auditing and training. Fourth National Conference and Second International Conference on Accounting and Management. Tehran. (in Persian)
 Seddighi, A. & Sajedinejad, A. (2009). A Deep Learning Approach to Fraud Detection in Financial Payment Services. Journal of Information Management, 5(1). 166-182. (in Persian)
 Suresh, C.; Reddy, K. T. & Sweta, N. (2016). A hybrid approach for detecting suspicious accounts in money laundering using data mining techniques. International Journal of Information Technology and Computer Science, 8(5), 37-43.
 Taghva, M.; Mansouri, T.; Feizi, K. & Akhgar, B. (2016). Fraud Detection in Credit Card Transactions; Using Parallel Processing of Anomalies in Big Data. Journal of Information Technology Management, 8(3), 477-498. (in Persian)
 Zhang, Y. & Trubey, P. (2019). Machine learning and sampling scheme: An empirical study of money laundering detection. Computational Economics, 54(3), 1043-1063.
CAPTCHA Image