Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
169 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Topology-Agnostic Detection of Temporal Money Laundering Flows in Billion-Scale Transactions (2309.13662v1)

Published 24 Sep 2023 in cs.LG, cs.SI, and q-fin.ST

Abstract: Money launderers exploit the weaknesses in detection systems by purposefully placing their ill-gotten money into multiple accounts, at different banks. That money is then layered and moved around among mule accounts to obscure the origin and the flow of transactions. Consequently, the money is integrated into the financial system without raising suspicion. Path finding algorithms that aim at tracking suspicious flows of money usually struggle with scale and complexity. Existing community detection techniques also fail to properly capture the time-dependent relationships. This is particularly evident when performing analytics over massive transaction graphs. We propose a framework (called FaSTMAN), adapted for domain-specific constraints, to efficiently construct a temporal graph of sequential transactions. The framework includes a weighting method, using 2nd order graph representation, to quantify the significance of the edges. This method enables us to distribute complex queries on smaller and densely connected networks of flows. Finally, based on those queries, we can effectively identify networks of suspicious flows. We extensively evaluate the scalability and the effectiveness of our framework against two state-of-the-art solutions for detecting suspicious flows of transactions. For a dataset of over 1 Billion transactions from multiple large European banks, the results show a clear superiority of our framework both in efficiency and usefulness.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (42)
  1. S.N. Welling “Smurfs, money laundering and the federal criminal law: The crime of structuring transactions” In Fla. Law 41, 1989, pp. 287–343 URL: https://uknowledge.uky.edu/law_facpub/344/
  2. R.I.M. Dunbar “Coevolution of neocortical size, group size and language in humans” In Behavioral and Brain Sciences 16.4 Cambridge University Press, 1993, pp. 681–694 DOI: 10.1017/S0140525X00032325
  3. M.E.J. Newman “Modularity and community structure in networks” In Proceedings of the National Academy of Sciences 103.23, 2006, pp. 8577–8582 DOI: 10.1073/pnas.0601602103
  4. “Fast unfolding of communities in large networks” In Journal of Statistical Mechanics: Theory and Experiment 2008.10 IOP Publishing, 2008, pp. P10008 DOI: 10.1088/1742-5468/2008/10/p10008
  5. Varun Chandola, Arindam Banerjee and Vipin Kumar “Anomaly Detection: A Survey” In ACM Comput. Surv. 41.3 New York, NY, USA: Association for Computing Machinery, 2009 DOI: 10.1145/1541880.1541882
  6. Leman Akoglu, Mary McGlohon and Christos Faloutsos “oddball: Spotting Anomalies in Weighted Graphs” In Advances in Knowledge Discovery and Data Mining Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 410–421
  7. “The Hadoop Distributed File System” In 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), 2010, pp. 1–10 DOI: 10.1109/MSST.2010.5496972
  8. “Resilient Distributed Datasets: A Fault-Tolerant Abstraction for in-Memory Cluster Computing” In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI’12 San Jose, CA: USENIX Association, 2012, pp. 2
  9. “Mathematical Formulation of Multilayer Networks” In Phys. Rev. X 3 American Physical Society, 2013, pp. 041022 DOI: 10.1103/PhysRevX.3.041022
  10. “Balanced Graph Partitioning with Apache Spark” In Euro-Par 2014: Parallel Processing Workshops Cham: Springer International Publishing, 2014, pp. 129–140
  11. “Path Problems in Temporal Graphs” In Proc. VLDB Endow. 7.9 VLDB Endowment, 2014, pp. 721–732 DOI: 10.14778/2732939.2732945
  12. Leman Akoglu, Hanghang Tong and Danai Koutra “Graph based anomaly detection and description: a survey” In Data Mining and Knowledge Discovery 29.3, 2015, pp. 626–688 DOI: 10.1007/s10618-014-0365-y
  13. Silu Huang, Ada Fu and Ruifeng Liu “Minimum Spanning Trees in Temporal Graphs”, 2015, pp. 419–430 DOI: 10.1145/2723372.2723717
  14. “GraphFrames: an integrated API for mixing graph and relational queries”, 2016, pp. 1–8 DOI: 10.1145/2960414.2960416
  15. “Detection of money laundering groups using supervised learning in networks”, 2016
  16. “Efficient Algorithms for Temporal Path Computation” In IEEE Transactions on Knowledge and Data Engineering 28, 2016, pp. 1–1 DOI: 10.1109/TKDE.2016.2594065
  17. Ashwin Paranjape, Austin R. Benson and Jure Leskovec “Motifs in Temporal Networks” In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining ACM, 2017 DOI: 10.1145/3018661.3018731
  18. Ingo Scholtes “When is a Network a Network?” In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining ACM, 2017 DOI: 10.1145/3097983.3098145
  19. “Community Detection Algorithm for Big Social Networks Using Hybrid Architecture” In Big Data Research 10, 2017, pp. 44–52 DOI: https://doi.org/10.1016/j.bdr.2017.10.003
  20. “Real-Time Constrained Cycle Detection in Large Dynamic Graphs” In Proc. VLDB Endow. 11.12 VLDB Endowment, 2018, pp. 1876–1888 DOI: 10.14778/3229863.3229874
  21. Paul Wagenseller, Feng Wang and Weili Wu “Size Matters: A Comparative Analysis of Community Detection Algorithms” In IEEE Transactions on Computational Social Systems 5.4, 2018, pp. 951–960 DOI: 10.1109/TCSS.2018.2875626
  22. “A comparative study on community detection methods in complex networks” In Journal of Intelligent & Fuzzy Systems 35, 2018, pp. 1–10 DOI: 10.3233/JIFS-17682
  23. “Anomaly Detection in Networks with Application to Financial Transaction Networks”, 2019 arXiv:1901.00402 [stat.AP]
  24. V.A. Traag, L. Waltman and N.J. Eck “From Louvain to Leiden: guaranteeing well-connected communities” In Scientific Reports 9.1, 2019, pp. 5233 DOI: 10.1038/s41598-019-41695-z
  25. “Time-Dependent Graphs: Definitions, Applications, and Algorithms” In Data Science and Engineering 4, 2019, pp. 1–15 DOI: 10.1007/s41019-019-00105-0
  26. “FlowScope: Spotting Money Laundering Based on Graphs” In Proceedings of the AAAI Conference on Artificial Intelligence 34.04, 2020, pp. 4731–4738 DOI: 10.1609/aaai.v34i04.5906
  27. “A Comprehensive Survey on Graph Anomaly Detection with Deep Learning” In IEEE Transactions on Knowledge and Data Engineering, 2021, pp. 1–1 DOI: 10.1109/TKDE.2021.3118815
  28. “Smurf-Based Anti-money Laundering in Time-Evolving Transaction Networks” In Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track Cham: Springer International Publishing, 2021, pp. 171–186
  29. Bogdan Dumitrescu, Andra Băltoiu and Ştefania Budulan “Anomaly Detection in Graphs of Bank Transactions for Anti Money Laundering Applications” In IEEE Access 10, 2022, pp. 47699–47714 DOI: 10.1109/ACCESS.2022.3170467
  30. “The geometry of suspicious money laundering activities in financial networks” In EPJ Data Science 11, 2022 DOI: 10.1140/epjds/s13688-022-00318-w
  31. “TDB: Breaking All Hop-Constrained Cycles in Billion-Scale Directed Graphs” In 2023 IEEE 39th International Conference on Data Engineering (ICDE), 2023, pp. 137–150 DOI: 10.1109/ICDE55515.2023.00018
  32. Financial Action Task Force (FATF) “FATF Black and Grey Lists” URL: https://www.fatf-gafi.org/en/countries/black-and-grey-lists.html
  33. NVB “Transaction Monitoring Netherlands: a unique step in the fight against money laundering and the financing of terrorism” URL: https://www.nvb.nl/english/transaction-monitoring-netherlands-a-unique-step-in-the-fight-against-money-laundering-and-the-financing-of-terrorism/
  34. BIIA “Singapore Banks To Share Information Voluntarily To Fight Money Laundering” URL: https://www.biia.com/singapore-banks-to-share-information-voluntarily-to-fight-money-laundering/
  35. BIS “BIS concludes Project Aurora, a proof of concept based on the use of data, technology and collaboration to combat money laundering across institutions and borders” URL: https://www.bis.org/about/bisih/topics/fmis/aurora.htm
  36. The United Nations Office Drugs and Crime (UNODC) “Money Laundering Overview” URL: https://www.unodc.org/unodc/en/money-laundering/overview.html
  37. Europol “Money Muling” URL: https://www.europol.europa.eu/operations-services-and-innovation/public-awareness-and-prevention-guides/money-muling
  38. Actu IA “The ACPR launches an experiment on data sharing to combat money laundering and terrorist financing” URL: https://www.actuia.com/english/the-acpr-launches-an-experiment-on-data-sharing-to-combat-money-laundering-and-terrorist-financing/
  39. iban.org “International Bank Account Number” URL: https://www.iban.org/
  40. Moody’s “UBOs: what they are, disclosure requirements, and the data challenge” URL: https://www.moodys.com/web/en/us/kyc/resources/insights/ubos-what-they-are-disclosure-requirements-data-challenge.html
  41. UnixTime.org “Unix Timestamp” URL: https://unixtime.org/
  42. Society Worldwide Interbank Financial Telecommunications (SWIFT) “What is an Ultimate Beneficial Owner” URL: https://www.swift.com/your-needs/financial-crime-cyber-security/know-your-customer-kyc/ultimate-beneficial-owner-ubo
Citations (1)

Summary

We haven't generated a summary for this paper yet.