Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A suspicious financial transaction detection model using ML and risk-based approach
Author(s):
1. L. Vijay Kumar: School of Computer Science and Engineering Malla Reddy Engineering College for Women (UGC-Autonomous), Maisammaguda, Hyderabad , Telangana.India
2. Mala Sai Spurthi: School of Computer Science and Engineering Malla Reddy Engineering College for Women (UGC-Autonomous), Maisammaguda, Hyderabad , Telangana.India
3. Vsirikapally vinshitha: School of Computer Science and Engineering Malla Reddy Engineering College for Women (UGC-Autonomous), Maisammaguda, Hyderabad , Telangana.India
4. Yalagala soumya varshitha: School of Computer Science and Engineering Malla Reddy Engineering College for Women (UGC-Autonomous), Maisammaguda, Hyderabad , Telangana.India
Abstract:
The detection of suspicious financial transactions has been a critical focus in the financial industry for decades. Traditionally, financial institutions employed rule-based systems for identifying potentially fraudulent activities. These systems rely on predefined thresholds and patterns, such as large transactions or frequent deposits, to flag suspicious activities. While effective to some extent, traditional systems face significant limitations. They often generate a high rate of false positives, requiring manual intervention to review flagged transactions. Additionally, these systems struggle to adapt to evolving fraud patterns, making them less effective in detecting sophisticated financial crimes. The growing complexity and volume of financial transactions in the digital era have heightened the need for advanced detection mechanisms. Traditional systems fail to address the dynamic nature of financial fraud, leading to inefficiencies in preventing financial losses. This creates a pressing need for a more adaptable, accurate, and scalable approach to detecting suspicious transactions. The lack of adaptability in traditional methods, combined with the significant financial and reputational risks posed by undetected fraud, underscores the necessity of a more robust detection framework. The goal is to enhance the ability to detect anomalous patterns in financial data with minimal false positives while maintaining efficiency and scalability. This approach aims to capture subtle anomalies in transaction data that deviate from normal patterns, enabling the identification of suspicious activities. The integration of a risk-based framework ensures that the model considers contextual factors, reducing false alarms and prioritizing high-risk transactions for further analysis. This system addresses the limitations of traditional methods, providing a sophisticated, adaptive, and reliable tool for combating financial fraud.
Page(s): 798-805
DOI: DOI not available
Published: Journal: International Journal of Communication Networks and Information Security, Volume: 16, Issue: 05, Year: 2024
Keywords:
Transaction data , Predefined thresholds , False alarms , Rulebased systems
References:
[1] Singh K.,Best P. .2019 .Anti-money laundering: Using data visualization to identify suspicious activity. International Journal of Accounting Information Systems, 34 : 100418.
[2] Whisker J.,Lokanan M. E. .2019 .Anti-money laundering and counter-terrorist financing threats posed by mobile money. Journal of Money Laundering Control, 22(1) : 158-172.
[3] Dobrowolski Z.,Sułkowski Ł. .2019 .Implementing a sustainable model for anti-money laundering in the United Nations development goals. Sustainability, 12(1) : 244.
[4] Maitland Irwin Samantha,Raymond Choo A.,Liu K. K.,L. K. K. .2011 .An analysis of money laundering and terrorism financing typologies. Journal of Money Laundering Control, 15(1) : 85-111.
[5] Uthayakumar J.,Vengattaraman J.,Dhavachelvan T. P. .2022 .Swarm intelligence based classification rule induction (CRI) framework for qualitative and quantitative approach: An application of bankruptcy prediction and credit risk analysis. Journal of King, 32(6) : 647-657.
[6] KOFIU. .2017 .Risk-Based Approach (RBA) Processing Standards for AML/CFT in Financial Investment Businesses. , : .
[7] Lee C.-J.,Lee J.-C. .2013 .Experiences and methodology of Korea's anti-money laundering system deployment and development. Knowledge Sharing Program: KSP Modularization., : .
[8] Pavlidis G. .2023 .The dark side of anti-money laundering: Mitigating the unintended consequences of FATF standards. Journal of Economic Criminology, 100040 : .
[9] Celik K. .2021 .Impact of the FATF Recommendations and their Implementation on Financial Inclusion: Insights from Mutual Evaluations and National Risk Assessments. , : .
Citations
Citations are not available for this document.
0

Citations

0

Downloads

7

Views