Reference : Finding Suspicious Activities in Financial Transactions and Distributed Ledgers
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/33743
Finding Suspicious Activities in Financial Transactions and Distributed Ledgers
English
Camino, Ramiro Daniel mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
State, Radu mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Montero, Leandro mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Valtchev, Petko mailto [Université du Québec]
2017
Proceedings of the 17th IEEE International Conference on Data Mining Workshops (ICDMW 2017)
Yes
International
17th IEEE International Conference on Data Mining Workshops (ICDMW 2017)
18-11-2017
IEEE
New Orleans
USA
[en] Banks and financial institutions around the world must comply with several policies for the prevention of money laundering and in order to combat the financing of terrorism. Nowadays, there is a raise in the popularity of novel financial technologies such as digital currencies, social trading platforms and distributed ledger payments, but there is a lack of approaches to enforce the aforementioned regulations accordingly. Software tools are developed to detect suspicious transactions usually based on knowledge from experts in the domain, but as new criminal tactics emerge, detection mechanisms must be updated. Suspicious activity examples are scarce or nonexistent, hindering the use of supervised machine learning methods. In this paper, we describe a methodology for analyzing financial information without the use of ground truth. A user suspicion ranking is generated in order to facilitate human expert validation using an ensemble of anomaly detection algorithms. We apply our procedure over two case studies: one related to bank fund movements from a private company and the other concerning Ripple network transactions. We illustrate how both examples share interesting similarities and that the resulting user ranking leads to suspicious findings, showing that anomaly detection is a must in both traditional and modern payment systems.
http://hdl.handle.net/10993/33743

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Limited access
PID5004849.pdfPublisher postprint1.49 MBRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.