Topology-Agnostic Detection of Temporal Money Laundering Flows in Billion-Scale Transactions (2309.13662v1)
Abstract: Money launderers exploit the weaknesses in detection systems by purposefully placing their ill-gotten money into multiple accounts, at different banks. That money is then layered and moved around among mule accounts to obscure the origin and the flow of transactions. Consequently, the money is integrated into the financial system without raising suspicion. Path finding algorithms that aim at tracking suspicious flows of money usually struggle with scale and complexity. Existing community detection techniques also fail to properly capture the time-dependent relationships. This is particularly evident when performing analytics over massive transaction graphs. We propose a framework (called FaSTMAN), adapted for domain-specific constraints, to efficiently construct a temporal graph of sequential transactions. The framework includes a weighting method, using 2nd order graph representation, to quantify the significance of the edges. This method enables us to distribute complex queries on smaller and densely connected networks of flows. Finally, based on those queries, we can effectively identify networks of suspicious flows. We extensively evaluate the scalability and the effectiveness of our framework against two state-of-the-art solutions for detecting suspicious flows of transactions. For a dataset of over 1 Billion transactions from multiple large European banks, the results show a clear superiority of our framework both in efficiency and usefulness.
- S.N. Welling “Smurfs, money laundering and the federal criminal law: The crime of structuring transactions” In Fla. Law 41, 1989, pp. 287–343 URL: https://uknowledge.uky.edu/law_facpub/344/
- R.I.M. Dunbar “Coevolution of neocortical size, group size and language in humans” In Behavioral and Brain Sciences 16.4 Cambridge University Press, 1993, pp. 681–694 DOI: 10.1017/S0140525X00032325
- M.E.J. Newman “Modularity and community structure in networks” In Proceedings of the National Academy of Sciences 103.23, 2006, pp. 8577–8582 DOI: 10.1073/pnas.0601602103
- “Fast unfolding of communities in large networks” In Journal of Statistical Mechanics: Theory and Experiment 2008.10 IOP Publishing, 2008, pp. P10008 DOI: 10.1088/1742-5468/2008/10/p10008
- Varun Chandola, Arindam Banerjee and Vipin Kumar “Anomaly Detection: A Survey” In ACM Comput. Surv. 41.3 New York, NY, USA: Association for Computing Machinery, 2009 DOI: 10.1145/1541880.1541882
- Leman Akoglu, Mary McGlohon and Christos Faloutsos “oddball: Spotting Anomalies in Weighted Graphs” In Advances in Knowledge Discovery and Data Mining Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 410–421
- “The Hadoop Distributed File System” In 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), 2010, pp. 1–10 DOI: 10.1109/MSST.2010.5496972
- “Resilient Distributed Datasets: A Fault-Tolerant Abstraction for in-Memory Cluster Computing” In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI’12 San Jose, CA: USENIX Association, 2012, pp. 2
- “Mathematical Formulation of Multilayer Networks” In Phys. Rev. X 3 American Physical Society, 2013, pp. 041022 DOI: 10.1103/PhysRevX.3.041022
- “Balanced Graph Partitioning with Apache Spark” In Euro-Par 2014: Parallel Processing Workshops Cham: Springer International Publishing, 2014, pp. 129–140
- “Path Problems in Temporal Graphs” In Proc. VLDB Endow. 7.9 VLDB Endowment, 2014, pp. 721–732 DOI: 10.14778/2732939.2732945
- Leman Akoglu, Hanghang Tong and Danai Koutra “Graph based anomaly detection and description: a survey” In Data Mining and Knowledge Discovery 29.3, 2015, pp. 626–688 DOI: 10.1007/s10618-014-0365-y
- Silu Huang, Ada Fu and Ruifeng Liu “Minimum Spanning Trees in Temporal Graphs”, 2015, pp. 419–430 DOI: 10.1145/2723372.2723717
- “GraphFrames: an integrated API for mixing graph and relational queries”, 2016, pp. 1–8 DOI: 10.1145/2960414.2960416
- “Detection of money laundering groups using supervised learning in networks”, 2016
- “Efficient Algorithms for Temporal Path Computation” In IEEE Transactions on Knowledge and Data Engineering 28, 2016, pp. 1–1 DOI: 10.1109/TKDE.2016.2594065
- Ashwin Paranjape, Austin R. Benson and Jure Leskovec “Motifs in Temporal Networks” In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining ACM, 2017 DOI: 10.1145/3018661.3018731
- Ingo Scholtes “When is a Network a Network?” In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining ACM, 2017 DOI: 10.1145/3097983.3098145
- “Community Detection Algorithm for Big Social Networks Using Hybrid Architecture” In Big Data Research 10, 2017, pp. 44–52 DOI: https://doi.org/10.1016/j.bdr.2017.10.003
- “Real-Time Constrained Cycle Detection in Large Dynamic Graphs” In Proc. VLDB Endow. 11.12 VLDB Endowment, 2018, pp. 1876–1888 DOI: 10.14778/3229863.3229874
- Paul Wagenseller, Feng Wang and Weili Wu “Size Matters: A Comparative Analysis of Community Detection Algorithms” In IEEE Transactions on Computational Social Systems 5.4, 2018, pp. 951–960 DOI: 10.1109/TCSS.2018.2875626
- “A comparative study on community detection methods in complex networks” In Journal of Intelligent & Fuzzy Systems 35, 2018, pp. 1–10 DOI: 10.3233/JIFS-17682
- “Anomaly Detection in Networks with Application to Financial Transaction Networks”, 2019 arXiv:1901.00402 [stat.AP]
- V.A. Traag, L. Waltman and N.J. Eck “From Louvain to Leiden: guaranteeing well-connected communities” In Scientific Reports 9.1, 2019, pp. 5233 DOI: 10.1038/s41598-019-41695-z
- “Time-Dependent Graphs: Definitions, Applications, and Algorithms” In Data Science and Engineering 4, 2019, pp. 1–15 DOI: 10.1007/s41019-019-00105-0
- “FlowScope: Spotting Money Laundering Based on Graphs” In Proceedings of the AAAI Conference on Artificial Intelligence 34.04, 2020, pp. 4731–4738 DOI: 10.1609/aaai.v34i04.5906
- “A Comprehensive Survey on Graph Anomaly Detection with Deep Learning” In IEEE Transactions on Knowledge and Data Engineering, 2021, pp. 1–1 DOI: 10.1109/TKDE.2021.3118815
- “Smurf-Based Anti-money Laundering in Time-Evolving Transaction Networks” In Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track Cham: Springer International Publishing, 2021, pp. 171–186
- Bogdan Dumitrescu, Andra Băltoiu and Ştefania Budulan “Anomaly Detection in Graphs of Bank Transactions for Anti Money Laundering Applications” In IEEE Access 10, 2022, pp. 47699–47714 DOI: 10.1109/ACCESS.2022.3170467
- “The geometry of suspicious money laundering activities in financial networks” In EPJ Data Science 11, 2022 DOI: 10.1140/epjds/s13688-022-00318-w
- “TDB: Breaking All Hop-Constrained Cycles in Billion-Scale Directed Graphs” In 2023 IEEE 39th International Conference on Data Engineering (ICDE), 2023, pp. 137–150 DOI: 10.1109/ICDE55515.2023.00018
- Financial Action Task Force (FATF) “FATF Black and Grey Lists” URL: https://www.fatf-gafi.org/en/countries/black-and-grey-lists.html
- NVB “Transaction Monitoring Netherlands: a unique step in the fight against money laundering and the financing of terrorism” URL: https://www.nvb.nl/english/transaction-monitoring-netherlands-a-unique-step-in-the-fight-against-money-laundering-and-the-financing-of-terrorism/
- BIIA “Singapore Banks To Share Information Voluntarily To Fight Money Laundering” URL: https://www.biia.com/singapore-banks-to-share-information-voluntarily-to-fight-money-laundering/
- BIS “BIS concludes Project Aurora, a proof of concept based on the use of data, technology and collaboration to combat money laundering across institutions and borders” URL: https://www.bis.org/about/bisih/topics/fmis/aurora.htm
- The United Nations Office Drugs and Crime (UNODC) “Money Laundering Overview” URL: https://www.unodc.org/unodc/en/money-laundering/overview.html
- Europol “Money Muling” URL: https://www.europol.europa.eu/operations-services-and-innovation/public-awareness-and-prevention-guides/money-muling
- Actu IA “The ACPR launches an experiment on data sharing to combat money laundering and terrorist financing” URL: https://www.actuia.com/english/the-acpr-launches-an-experiment-on-data-sharing-to-combat-money-laundering-and-terrorist-financing/
- iban.org “International Bank Account Number” URL: https://www.iban.org/
- Moody’s “UBOs: what they are, disclosure requirements, and the data challenge” URL: https://www.moodys.com/web/en/us/kyc/resources/insights/ubos-what-they-are-disclosure-requirements-data-challenge.html
- UnixTime.org “Unix Timestamp” URL: https://unixtime.org/
- Society Worldwide Interbank Financial Telecommunications (SWIFT) “What is an Ultimate Beneficial Owner” URL: https://www.swift.com/your-needs/financial-crime-cyber-security/know-your-customer-kyc/ultimate-beneficial-owner-ubo