Loading...
Please wait, while we are loading the content...
Similar Documents
Graph mining approach to suspicious transaction detection.
| Content Provider | CiteSeerX |
|---|---|
| Author | Michalak, Krzysztof Korczak, Jerzy |
| Abstract | Abstract—Suspicious transaction detection is used to report banking transactions that may be connected with criminal activities. Obviously, perpetrators of criminal acts strive to make thetransactionsasinnocent-lookingaspossible.Becauseactivities such as money laundering may involve complex organizational schemes, machine learning techniques based on individual transactions analysis may perform poorly when applied to suspicious transaction detection. In this paper, we propose a new machine learning method for mining transaction graphs. The method proposed in this paper builds a model of subgraphs that may contain suspicious transactions. The model used in our method is parametrized using fuzzy numbers which represent parameters of transactions and of the transaction subgraphs to be detected. Because money laundering may involve transferring money through a variable number of accounts the model representing transaction subgraphs is also parametrized with respect to some structural features. In contrast to some other graph mining methods in which graph isomorphisms are used to match data to the model, in our method we perform a fuzzy matching of graph structures. I. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Suspicious Transaction Detection Graph Mining Approach Transaction Subgraphs Money Laundering Structural Feature Individual Transaction Analysis Fuzzy Matching New Machine Learning Method Complex Organizational Scheme Criminal Act Abstract Suspicious Transaction Detection Fuzzy Number Variable Number Transaction Graph Criminal Activity Graph Structure Suspicious Transaction Graph Isomorphism |
| Content Type | Text |
| Resource Type | Article |