SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
The International Journal Of Engineering And Science (IJES)
||Volume|| 3 ||Issue|| 01 || Pages || 43-47 || 2014 ||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805

An Multi-Variant Relational Model for Money Laundering
Identification using Time Series Data Set
1,

G.Krishnapriya M.C.A., M.Phil, 2, Dr.M.Prabakaran

1,

2,

Research Scholar, Bharathidasan University,Trichy-620001.
Assistant Professor, Department of Computer Science Government Arts College,
Ariyalur, Tamil Nadu, India.

-------------------------------------------------------ABSTRACT--------------------------------------------------Money laundering an unfair money transaction activity which threats the finance industries in higher rate. The
illegal commercial peoples and terrorist, transfers huge amount into a single or many accounts, and it follows a big chain of
accounts to reach the destination to which it has to be sent. Generally the financial banks enforce many restrictions to
transfer amounts between accounts where they are done between internal or external accounts of the country. Identifying
money laundering is a challenging task where the origin of transaction could not be identified easily when it follows a big
chain or transferred as number of small amounts. There are methods discussed, which detects MI based on amount
transferred and other factors. They suffer with the accuracy of MI detection and time complexity values. We propose a
relational model which uses multiple factors and metrics to detect the money laundering. The proposed method uses time
series data and identifies one-many and many-one relation between transactions to select vulnerable accounts. Identified
vulnerable accounts and transactions of those accounts are split into different time frames and analyzed at each time frame
to identify the presence of money laundering. The proposed method has produced higher accuracy in MI detection and has
less time complexity which improves the performance of the method proposed.

Index Terms: Network security, Money Laundering, Relational Model, Multi-Variant
----------------------------------------------------------------------------------------------------------------------- ---------------Date of Submission: 24 December 2013
Date of Acceptance: 10 January 2014
----------------------------------------------------------------------------------------------------------------------------- ----------

I.

INTRODUCTION:

Money Laundering represent the capability of the central government and the faith of the nation, as well as an
important measure fighting organized crimes and forestalling the flooding of nation-crossed corruptions. However, the
construction of an effective AML mechanism is just at its startup which is far from perfect. Money laundering threatens the
economic and social development of countries. The threat is due to the injection of illegal proceeds into the legitimate
financial system. Due to the high amount of transactions and the variety of money laundering tricks and techniques, it is
difficult for the authorities to detect money laundering and prosecute the wrongdoers. Thus, it is not only the amount of
transactions, but the ever changing characteristics of the methods used to launder money that are constantly being modified
by the fraudsters, which makes this problem interesting to study.
Money laundering (ML) is a process of disguising the illicit origin of "dirty" money and makes them appear
legitimate. It has been defined by Genzman as an activity that "knowingly engage in a financial transaction with the proceeds
of some unlawful activity with the intent of promoting or carrying on that unlawful activity or to conceal or disguise the
nature location, source, ownership, or control of these proceeds. Through money laundering, criminals try to convert
monetary proceeds derived from illicit activities into “clean” funds using a legal medium such as large investment or pension
funds hosted in retail or investment banks. This type of criminal activity is getting more and more sophisticated and seems to
have moved from the cliché of drug trafficking to financing terrorism and surely not forgetting personal gain. Today, ML is
the third largest “Business” in the world after Currency Exchange and Auto Industry. According to the United Nations
Office on Drug and Crime, worldwide value of laundered money in a year ranges from $500 billion to $1 trillion and from
this approximately $400-450 Billion is associated with drug trafficking. These figures are at times modest and are partially
fabricated using statistical models, as no one exactly knows the true value of money laundering, one can only forecast
according to the fraud that has already been exposed. Nowadays, it poses a serious threat not only to financial institutions but
also to the nations. Some risks faced by financial institutions can be listed as reputation risk, operational risk, concentration
risk and legal risk. At the society level, ML could provide the fuel for drug dealers, terrorists, arms dealers and other
criminals to operate and expand their criminal enterprises. Hence, the governments, financial regulators require financial
institutions to implement processes and procedures to prevent/detect money laundering as well as the financing of terrorism
and other illicit activities that money launderers are involved in. Therefore, anti-money laundering (AML) is of critical
significance to national financial stability and international security.

www.theijes.com

The IJES

Page 43
An Multi-Variant Relational Model for Money Laundering Identification using Time Series Data Set
The relational model is one which represents the transaction using relational concepts. For example in an
organization they maintain address of different employees and here the employee’s names have relation with the address of
the employee which shows the one-one relation. If we group the employees in form of department they work, then all
employees in the group are related with the department which shows the many –one relation. In case of money laundering
we can say that money laundering could follow one of the above discussed functional models.
Identifying the money laundering frauds using single feature will not be effective because at any point of time the
single valued attribute fails to identify the money laundering. We use multiple attributes to identify the money laundering.
Banks collect detailed personal information from their clients as well as information such as the relations between
clients and the association between clients and certain companies. Data mining systems are used to extract interesting and
valuable information from the large database. Relations among clients and companies, accompanied with monetary
transaction histories, could be used as effective indication of suspicious money laundering activities.

Related works:
Research on anti-money laundering based on core decision tree algorithm [9],presents a core decision tree
algorithm to identify money laundering activities. The clustering algorithm is the combination of BIRCH and K-means. In
this method, decision tree of data mining technology is applied to anti-money-laundering filed after research of money
laundering features. We select an appropriate identifying strategy to discover typical money laundering patterns and money
laundering rules. Consequently, with the core decision tree algorithm, we can identify abnormal transaction data more
effectively.
Laundering Sexual Deviance: Targeting Online Pornography through Anti-money Laundering [1], concentrates on
cyber-pornography/obscenity, which encompasses online publications or distribution of sexually explicit material in breach
of the English obscenity and indecency laws. After examining the major deficiencies of the attempts to restrict illegal
pornographic representations, the authors aim to highlight that the debate regarding their availability in the Internet era
neglects the lucrative nature of the circulation of such material, which can be also targeted through anti-money laundering.
Rising profits fuel the need to recycle the money back into the legal financial system, with a view to concealing their illegal
origin. Anti-money laundering laws require disclosure of any ¡suspicion¢ related to money laundering, thus opening another
door for law enforcement to reach the criminal.
Combining Digital Forensic Practices and Database Analysis as an Anti-Money Laundering Strategy for Financial
Institution [11], propose an anti-money laundering model by combining digital forensics practices along with database tools
and database analysis methodologies. As consequence, admissible Suspicious Activity Reports (SARs) can be generated,
based on evidence obtained from forensically analyzing database financial logs in compliance with Know-Your-Customer
policies for money laundering detection.
The State of Phishing Attacks, [12], discusses about phishing which is a kind of social-engineering attack where
criminals use spoofed email messages to trick people into sharing sensitive information or installing malware on their
computers. Victims perceive these messages as being associated with a trusted brand, while in reality they are only the work
of con artists. Rather than directly target the systems people use, phishing attacks target the people using the systems.
Phishing cleverly circumvents the vast majority of an organization's or individual's security measures. It doesn't matter how
many firewalls, encryption software, certificates, or two-factor authentication mechanisms an organization has if the person
behind the keyboard falls for a phish.
Event-based approach to money laundering data analysis and visualization [13], discusses crime specific event
patterns which are crucial in detecting potential relationships among suspects in criminal networks. However, current link
analysis tools commonly used in detection do not utilize such patterns for detecting various types of crimes. These analysis
tools usually provide generic functions for all types of crimes and heavily rely on the user's expertise on the domain
knowledge of the crime for successful detection. As a result, they are less effective in detecting patterns in certain crimes. In
addition, substantial effort is also required for analyzing vast amount of crime data and visualizing the structural views of the
entire criminal network. In order to alleviate these problems, an event-based approach to money laundering data analysis and
visualization is proposed.
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names [14], explore this unique
characteristic further, using heuristic clustering to group Bitcoin wallets based on evidence of shared authority, and then
using re-identification attacks (i.e., empirical purchasing of goods and services) to classify the operators of those clusters.
From this analysis, we characterize longitudinal changes in the Bitcoin market, the stresses these changes are placing on the
system, and the challenges for those seeking to use Bitcoin for criminal or fraudulent purposes at scale.
Concurrently with the Evaluating User Privacy in Bitcoin [2] applied a similar analysis, but focused more squarely
on privacy concerns. Unlike Ron and Shamir, their analysis attempts to account for the complexity of “change” accounts
which are central to how Bitcoin is used in practice.

Proposed Method:
The proposed money laundering identification method uses relational factors and other metrics, which has been
collected from the transactional data set. It has three stages namely: Preprocessing, Relational Mapping, Multi-Variant ML
Identification. We discuss each of the process in coming chapters.

www.theijes.com

The IJES

Page 44
An Multi-Variant Relational Model for Money Laundering Identification using Time Series Data Set

O-M

M-O

Relational Mapping

Multi-Variant
Relational Money
Laundering
Identification
Framework

Preprocessing

Money Laundering
Identification

Transactional Data
Set

Figure1: shows the proposed system architecture.

II.

PREPROCESSING:

The transactional data set has many attributes and the log size is heavier to process. The retrieved log will be a
noisy one to process, so that we remove the incomplete log to make it compatible for processing. The transactional log of
different banking sectors has different attribute set and different pattern. The preprocessor has a general pattern for
processing and the retrieved patterns are converted into the generalized form. Because an banking log may have the account
identity as the last attribute and the customer id as the first attribute in its log , but will differ in another bank log. The
converted transactional data sets are taken to the next stage of money laundering identification process.

Algorithm
Step 1: start
Step 2: read transactional data set Ts , Attribute set As.
Step3: initialize generalize pattern Tp.
Step 3: for each transaction Ti from Ts.
For each pattern p from Ts
Extract attribute Tp(Ai).
TP(Ai) = Ô(Ti(Ai)).//Ô-Index of the Attribute Ai.
If Ti € Ai then
Else
Ts = ø(Ti(Ts)).
End
End
End.
Step 4: end

www.theijes.com

The IJES

Page 45
An Multi-Variant Relational Model for Money Laundering Identification using Time Series Data Set

III.

RELATIONAL MAPPING:

The relational mapping is performed on the preprocessed data set. We separate the transactions which are distinct
to unique accounts. From the separated set of transactions, for each of the account identified we collect the set of accounts
linked to the particular account. We compute relational metrics as one-to-many which indicates the number of transactions
sent from this account and many-to-one specifies the number of account from where there is money transfer.
Algorithm:
Step1: start
Step2: initialize relational set Rs.
Step3: read transactional set Ts.
Step4: select distinct account DA from Ts.
DA = Õ(Ts).
Step5: for each account DAi from DA
Identify subset of transactions related to DAi.
STs = Ü(DA×DAi).
Identify relational mappings Im.
Im = Ø(STs).
Rs(i) = Im.
End.
Step6: stop.

IV.

MONEY LAUNDERING IDENTIFICATION:

The process of money laundering identification is performed based on Number of transactions and amount
transferred at each time frame. The transactional data set is a time series data which can be used to detect the money
laundering identification. The relational mappings generated at the previous stage are used as an input to this process. From
the relational mapping Rs , we split the transactions which is performed at each time frame TF. We compute the overall
amount transferred at one-to-many and many-to-one relations based on which the transaction is decided as a vulnerable one.
At any time frame if the number of transaction or the amount is higher than the Transactional Threshold TT, Transactional
Amount Threshold TAT then the transaction is considered as a vulnerable one. In one too many cases the Transactional
Threshold which implicates the maximum number of transactions can be performed at each time frame is considered with
the maximum cumulative amount based on TAT is used.
Algorithm:
Step1: start
Step2: initialize TAT, TF, TT.
TF=24 Hours.
TAT = 50,000.
TT = 100.
Step3: read Relational Mapping Rs.
Step4: split the transactions from Rs according to time frame TF.
TFT = $(Rs×Ts).
Step5: compute no. of outgoing transaction OT.
OT = ð(TFT).
Compute overall money transferred mt.
Mt = ΣOT(amount)1…N
If Mt> TAT then
Back Track the transaction using back propagation.
end
Step6: compute no. of incoming transaction IT.
IT = ð(TFT).
Compute overall money transferred mt.
Mt = ΣIT(amount)1…N
If Mt> TAT then
Forward Track the transaction using traversal.
End
Step7: stop.

V.

RESULTS AND DISCUSSION:

The proposed method has been evaluated using various transactional set collected from different banking
sectors and we have separated the accounts which are linked through different banks. Finally we have collected 5000
accounts from different banks having 10 million transactions. The proposed method has produced efficient results and
detection accuracy is also higher.

www.theijes.com

The IJES

Page 46
An Multi-Variant Relational Model for Money Laundering Identification using Time Series Data Set

Graph 1: shows the efficiency of identifying money laundering
The graph1 shows the efficiency of identifying money laundering with respect to number of transaction used. It is
clear that the efficiency is increased if the size of transaction is increased. The proposed methodology produces efficient
result by increasing the size of transaction.

VI.

CONCLUSION:

We analyze various methodologies to identify money laundering crime. We identify that all methods have scalable
in accuracy and efficiency. We proposed a multi variant relational model which uses time variant transactional data. The
proposed method has produced higher efficient results and with accurate findings. The proposed method has produced
results with less time complexity.

REFERENCES:
[1]
[2]
[3]

[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]

John Hunt. The new frontier of money laundering: how terrorist organizations use cyberlaundering to fund their activities, and
how governments are trying to stop them. Information & Communications Technology Law, 20(2):133{152, June 2011.
L I U Junqiang. Optimal Anonymization for Transac tion. Chinese Journal of Electronics, 20(2), 2011.
P.J. Lin, B. Samadi, Alan Cipolone, D.R. Jeske, Sean Cox, C. Rendon, Douglas Holt, and Rui Xiao. Development of a
synthetic data set generator for building and testing information discovery systems. In Information Technology: New
Generations, 2006. ITNG 2006. Third International Conference on, pages 707-712. IEEE, 2006.
C M Macal and M J North. Tutorial on agent-based modelling and simulation. Journal of Simulation, 4(3):151{162,
September 2010.
Dan Magnusson. The costs of implementing the anti-money laundering regulations in Sweden. Journal of Money Laundering
Control, 12(2):101{112, 2009.
J Pavon, M Arroyo, S Hassan, and C Sansores. Agent-based modelling and simulation for the analysis of social patterns.
Pattern Recognition Letters, 29(8):1039-1048, June 2008.
Agus Sudjianto, Sheela Nair, Ming Yuan, Aijun Zhang, Daniel Kern, and Fernando Cela-Daz. Statistical Methods for Fighting
Financial Crimes. Technometrics, 52(1):5{19, February 2010.
Yabo Xu, Ke Wang, Ada Wai-chee Fu, Hong Kong, and Philip S Yu. Anonymizing Transaction Databases for Publication.
International Journal, pages 767-775, 2008.
Rui Liu, Research on anti-money laundering based on core decision tree algorithm, IEEE Conference on Control and
Decisions , pp:4322-4335, 2011.
Odense, Laundering Sexual Deviance: Targeting Online Pornography through Anti-money Laundering, European Intelligence
and Security Informatics Conference, 2012.
Bucharest, Combining Digital Forensic Practices and Database Analysis as an Anti-Money Laundering Strategy for Financial
Institutions, Third International Conference on Emerging Intelligent Data and Web Technologies, 2012.
Jason Hong, The State of Phishing Attacks, Communications of the ACM, Vol. 55 No. 1, Pages 74-81, 2012.
Tat-Man Cheong, Event-based approach to money laundering data analysis and visualization, Proceedings of the 3rd
International Symposium on Visual Information Communication, ACM , 2010.
Sarah Meiklejohn, A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, ACM 2013.
E. Androulaki, G. Karame, M. Roeschlin, T. Scherer, and S. Capkun. Evaluating User Privacy in Bitcoin. In Proceedings of
Financial Cryptography 2013, 2013.
I. Miers, C. Garman, M. Green, and A. D. Rubin. Zerocoin: Anonymous Distributed E-Cash from Bitcoin. In Proceedings of
the IEEE Symposium on Security and Privacy, 2013.
T. Moore and N. Christin. Beware the Middleman: Empirica Analysis of Bitcoin-Exchange Risk. In Proceedings of Financial
Cryptography 2013, 2013.

www.theijes.com

The IJES

Page 47

Mais conteúdo relacionado

Mais procurados

Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPPhilippe Boivineau
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisCSCJournals
 
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...inventionjournals
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
White Paper: Identifying Fraud and Credit Risk in the Smallest of Small Busin...
White Paper: Identifying Fraud and Credit Risk in the Smallest of Small Busin...White Paper: Identifying Fraud and Credit Risk in the Smallest of Small Busin...
White Paper: Identifying Fraud and Credit Risk in the Smallest of Small Busin...claytonroot
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015Jörn Weber
 
Holiday Season Fraud Forecast
Holiday Season Fraud ForecastHoliday Season Fraud Forecast
Holiday Season Fraud ForecastZachary Shaw
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016thinkASG
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraudGraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraudNeo4j
 
GraphTalks Italy - Using graphs to fight financial fraud
GraphTalks Italy - Using graphs to fight financial fraudGraphTalks Italy - Using graphs to fight financial fraud
GraphTalks Italy - Using graphs to fight financial fraudNeo4j
 
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentUW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentAkshay Ajgaonkar
 
a-decade-of-phishing-wp-11-2016
a-decade-of-phishing-wp-11-2016a-decade-of-phishing-wp-11-2016
a-decade-of-phishing-wp-11-2016Eli Marcus
 
IBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementIBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementVirginia Fernandez
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsOilPriceInformationService
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)Kate Dalakova
 

Mais procurados (20)

Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WP
 
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior AnalysisOnline Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
 
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
Frauds in Indian Banking: Aspects, Reasons, Trend-Analysis and Suggestive Mea...
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
White Paper: Identifying Fraud and Credit Risk in the Smallest of Small Busin...
White Paper: Identifying Fraud and Credit Risk in the Smallest of Small Busin...White Paper: Identifying Fraud and Credit Risk in the Smallest of Small Busin...
White Paper: Identifying Fraud and Credit Risk in the Smallest of Small Busin...
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015
 
Holiday Season Fraud Forecast
Holiday Season Fraud ForecastHoliday Season Fraud Forecast
Holiday Season Fraud Forecast
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraudGraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
 
GraphTalks Italy - Using graphs to fight financial fraud
GraphTalks Italy - Using graphs to fight financial fraudGraphTalks Italy - Using graphs to fight financial fraud
GraphTalks Italy - Using graphs to fight financial fraud
 
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentUW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
 
a-decade-of-phishing-wp-11-2016
a-decade-of-phishing-wp-11-2016a-decade-of-phishing-wp-11-2016
a-decade-of-phishing-wp-11-2016
 
Jon handout 2
Jon handout 2Jon handout 2
Jon handout 2
 
Jon handout 3
Jon handout 3Jon handout 3
Jon handout 3
 
IBM Counter Financial Crimes Management
IBM Counter Financial Crimes ManagementIBM Counter Financial Crimes Management
IBM Counter Financial Crimes Management
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
 
Branney-Gant Research Paper
Branney-Gant Research PaperBranney-Gant Research Paper
Branney-Gant Research Paper
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
 

Destaque

Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source CreativitySara Cannon
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...Brian Solis
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Destaque (8)

Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source Creativity
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Semelhante a H030101043047

IRJET-Anti Money Laundering System to Detect Suspicious Account
IRJET-Anti Money Laundering System to Detect Suspicious AccountIRJET-Anti Money Laundering System to Detect Suspicious Account
IRJET-Anti Money Laundering System to Detect Suspicious AccountIRJET Journal
 
Detecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataDetecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataITIIIndustries
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...IRJET Journal
 
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Resurgent India
 
IRJET- Financial Fraud Detection along with Outliers Pattern
IRJET-  	  Financial Fraud Detection along with Outliers PatternIRJET-  	  Financial Fraud Detection along with Outliers Pattern
IRJET- Financial Fraud Detection along with Outliers PatternIRJET Journal
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...IRJET Journal
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptCapgemini
 
Claims Fraud Network Analysis
Claims Fraud Network AnalysisClaims Fraud Network Analysis
Claims Fraud Network AnalysisCogitate.us
 
Article the shifting face of cybercrime - paul wright
Article  the shifting face of cybercrime - paul wrightArticle  the shifting face of cybercrime - paul wright
Article the shifting face of cybercrime - paul wrightPaul Wright MSc
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSIRJET Journal
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
A rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detectionA rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detectionIJECEIAES
 
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNINGCREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNINGIRJET Journal
 
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...ijaia
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning TechniquesIRJET Journal
 
Taylor Amarel Upload - Liberty Global Asia Report
Taylor Amarel Upload - Liberty Global Asia ReportTaylor Amarel Upload - Liberty Global Asia Report
Taylor Amarel Upload - Liberty Global Asia ReportTaylor Scott Amarel
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Invest Northern Ireland
 
Vol 17 No 2 - July-December 2017
Vol 17 No 2 - July-December 2017Vol 17 No 2 - July-December 2017
Vol 17 No 2 - July-December 2017ijcsbi
 

Semelhante a H030101043047 (20)

West2016
West2016West2016
West2016
 
IRJET-Anti Money Laundering System to Detect Suspicious Account
IRJET-Anti Money Laundering System to Detect Suspicious AccountIRJET-Anti Money Laundering System to Detect Suspicious Account
IRJET-Anti Money Laundering System to Detect Suspicious Account
 
Detecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency DataDetecting Fraud Using Transaction Frequency Data
Detecting Fraud Using Transaction Frequency Data
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
 
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...Money Laundering  and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
Money Laundering and Its Fall-out - ROLE OF INFORMATION TECHNOLOGY IN ANTI M...
 
IRJET- Financial Fraud Detection along with Outliers Pattern
IRJET-  	  Financial Fraud Detection along with Outliers PatternIRJET-  	  Financial Fraud Detection along with Outliers Pattern
IRJET- Financial Fraud Detection along with Outliers Pattern
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
Claims Fraud Network Analysis
Claims Fraud Network AnalysisClaims Fraud Network Analysis
Claims Fraud Network Analysis
 
Article the shifting face of cybercrime - paul wright
Article  the shifting face of cybercrime - paul wrightArticle  the shifting face of cybercrime - paul wright
Article the shifting face of cybercrime - paul wright
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
A rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detectionA rule-based machine learning model for financial fraud detection
A rule-based machine learning model for financial fraud detection
 
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNINGCREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING
 
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
ADPP: A NOVEL ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKC...
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
 
Taylor Amarel Upload - Liberty Global Asia Report
Taylor Amarel Upload - Liberty Global Asia ReportTaylor Amarel Upload - Liberty Global Asia Report
Taylor Amarel Upload - Liberty Global Asia Report
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017
 
Vol 17 No 2 - July-December 2017
Vol 17 No 2 - July-December 2017Vol 17 No 2 - July-December 2017
Vol 17 No 2 - July-December 2017
 

Último

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

H030101043047

  • 1. The International Journal Of Engineering And Science (IJES) ||Volume|| 3 ||Issue|| 01 || Pages || 43-47 || 2014 || ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 An Multi-Variant Relational Model for Money Laundering Identification using Time Series Data Set 1, G.Krishnapriya M.C.A., M.Phil, 2, Dr.M.Prabakaran 1, 2, Research Scholar, Bharathidasan University,Trichy-620001. Assistant Professor, Department of Computer Science Government Arts College, Ariyalur, Tamil Nadu, India. -------------------------------------------------------ABSTRACT--------------------------------------------------Money laundering an unfair money transaction activity which threats the finance industries in higher rate. The illegal commercial peoples and terrorist, transfers huge amount into a single or many accounts, and it follows a big chain of accounts to reach the destination to which it has to be sent. Generally the financial banks enforce many restrictions to transfer amounts between accounts where they are done between internal or external accounts of the country. Identifying money laundering is a challenging task where the origin of transaction could not be identified easily when it follows a big chain or transferred as number of small amounts. There are methods discussed, which detects MI based on amount transferred and other factors. They suffer with the accuracy of MI detection and time complexity values. We propose a relational model which uses multiple factors and metrics to detect the money laundering. The proposed method uses time series data and identifies one-many and many-one relation between transactions to select vulnerable accounts. Identified vulnerable accounts and transactions of those accounts are split into different time frames and analyzed at each time frame to identify the presence of money laundering. The proposed method has produced higher accuracy in MI detection and has less time complexity which improves the performance of the method proposed. Index Terms: Network security, Money Laundering, Relational Model, Multi-Variant ----------------------------------------------------------------------------------------------------------------------- ---------------Date of Submission: 24 December 2013 Date of Acceptance: 10 January 2014 ----------------------------------------------------------------------------------------------------------------------------- ---------- I. INTRODUCTION: Money Laundering represent the capability of the central government and the faith of the nation, as well as an important measure fighting organized crimes and forestalling the flooding of nation-crossed corruptions. However, the construction of an effective AML mechanism is just at its startup which is far from perfect. Money laundering threatens the economic and social development of countries. The threat is due to the injection of illegal proceeds into the legitimate financial system. Due to the high amount of transactions and the variety of money laundering tricks and techniques, it is difficult for the authorities to detect money laundering and prosecute the wrongdoers. Thus, it is not only the amount of transactions, but the ever changing characteristics of the methods used to launder money that are constantly being modified by the fraudsters, which makes this problem interesting to study. Money laundering (ML) is a process of disguising the illicit origin of "dirty" money and makes them appear legitimate. It has been defined by Genzman as an activity that "knowingly engage in a financial transaction with the proceeds of some unlawful activity with the intent of promoting or carrying on that unlawful activity or to conceal or disguise the nature location, source, ownership, or control of these proceeds. Through money laundering, criminals try to convert monetary proceeds derived from illicit activities into “clean” funds using a legal medium such as large investment or pension funds hosted in retail or investment banks. This type of criminal activity is getting more and more sophisticated and seems to have moved from the cliché of drug trafficking to financing terrorism and surely not forgetting personal gain. Today, ML is the third largest “Business” in the world after Currency Exchange and Auto Industry. According to the United Nations Office on Drug and Crime, worldwide value of laundered money in a year ranges from $500 billion to $1 trillion and from this approximately $400-450 Billion is associated with drug trafficking. These figures are at times modest and are partially fabricated using statistical models, as no one exactly knows the true value of money laundering, one can only forecast according to the fraud that has already been exposed. Nowadays, it poses a serious threat not only to financial institutions but also to the nations. Some risks faced by financial institutions can be listed as reputation risk, operational risk, concentration risk and legal risk. At the society level, ML could provide the fuel for drug dealers, terrorists, arms dealers and other criminals to operate and expand their criminal enterprises. Hence, the governments, financial regulators require financial institutions to implement processes and procedures to prevent/detect money laundering as well as the financing of terrorism and other illicit activities that money launderers are involved in. Therefore, anti-money laundering (AML) is of critical significance to national financial stability and international security. www.theijes.com The IJES Page 43
  • 2. An Multi-Variant Relational Model for Money Laundering Identification using Time Series Data Set The relational model is one which represents the transaction using relational concepts. For example in an organization they maintain address of different employees and here the employee’s names have relation with the address of the employee which shows the one-one relation. If we group the employees in form of department they work, then all employees in the group are related with the department which shows the many –one relation. In case of money laundering we can say that money laundering could follow one of the above discussed functional models. Identifying the money laundering frauds using single feature will not be effective because at any point of time the single valued attribute fails to identify the money laundering. We use multiple attributes to identify the money laundering. Banks collect detailed personal information from their clients as well as information such as the relations between clients and the association between clients and certain companies. Data mining systems are used to extract interesting and valuable information from the large database. Relations among clients and companies, accompanied with monetary transaction histories, could be used as effective indication of suspicious money laundering activities. Related works: Research on anti-money laundering based on core decision tree algorithm [9],presents a core decision tree algorithm to identify money laundering activities. The clustering algorithm is the combination of BIRCH and K-means. In this method, decision tree of data mining technology is applied to anti-money-laundering filed after research of money laundering features. We select an appropriate identifying strategy to discover typical money laundering patterns and money laundering rules. Consequently, with the core decision tree algorithm, we can identify abnormal transaction data more effectively. Laundering Sexual Deviance: Targeting Online Pornography through Anti-money Laundering [1], concentrates on cyber-pornography/obscenity, which encompasses online publications or distribution of sexually explicit material in breach of the English obscenity and indecency laws. After examining the major deficiencies of the attempts to restrict illegal pornographic representations, the authors aim to highlight that the debate regarding their availability in the Internet era neglects the lucrative nature of the circulation of such material, which can be also targeted through anti-money laundering. Rising profits fuel the need to recycle the money back into the legal financial system, with a view to concealing their illegal origin. Anti-money laundering laws require disclosure of any ¡suspicion¢ related to money laundering, thus opening another door for law enforcement to reach the criminal. Combining Digital Forensic Practices and Database Analysis as an Anti-Money Laundering Strategy for Financial Institution [11], propose an anti-money laundering model by combining digital forensics practices along with database tools and database analysis methodologies. As consequence, admissible Suspicious Activity Reports (SARs) can be generated, based on evidence obtained from forensically analyzing database financial logs in compliance with Know-Your-Customer policies for money laundering detection. The State of Phishing Attacks, [12], discusses about phishing which is a kind of social-engineering attack where criminals use spoofed email messages to trick people into sharing sensitive information or installing malware on their computers. Victims perceive these messages as being associated with a trusted brand, while in reality they are only the work of con artists. Rather than directly target the systems people use, phishing attacks target the people using the systems. Phishing cleverly circumvents the vast majority of an organization's or individual's security measures. It doesn't matter how many firewalls, encryption software, certificates, or two-factor authentication mechanisms an organization has if the person behind the keyboard falls for a phish. Event-based approach to money laundering data analysis and visualization [13], discusses crime specific event patterns which are crucial in detecting potential relationships among suspects in criminal networks. However, current link analysis tools commonly used in detection do not utilize such patterns for detecting various types of crimes. These analysis tools usually provide generic functions for all types of crimes and heavily rely on the user's expertise on the domain knowledge of the crime for successful detection. As a result, they are less effective in detecting patterns in certain crimes. In addition, substantial effort is also required for analyzing vast amount of crime data and visualizing the structural views of the entire criminal network. In order to alleviate these problems, an event-based approach to money laundering data analysis and visualization is proposed. A Fistful of Bitcoins: Characterizing Payments Among Men with No Names [14], explore this unique characteristic further, using heuristic clustering to group Bitcoin wallets based on evidence of shared authority, and then using re-identification attacks (i.e., empirical purchasing of goods and services) to classify the operators of those clusters. From this analysis, we characterize longitudinal changes in the Bitcoin market, the stresses these changes are placing on the system, and the challenges for those seeking to use Bitcoin for criminal or fraudulent purposes at scale. Concurrently with the Evaluating User Privacy in Bitcoin [2] applied a similar analysis, but focused more squarely on privacy concerns. Unlike Ron and Shamir, their analysis attempts to account for the complexity of “change” accounts which are central to how Bitcoin is used in practice. Proposed Method: The proposed money laundering identification method uses relational factors and other metrics, which has been collected from the transactional data set. It has three stages namely: Preprocessing, Relational Mapping, Multi-Variant ML Identification. We discuss each of the process in coming chapters. www.theijes.com The IJES Page 44
  • 3. An Multi-Variant Relational Model for Money Laundering Identification using Time Series Data Set O-M M-O Relational Mapping Multi-Variant Relational Money Laundering Identification Framework Preprocessing Money Laundering Identification Transactional Data Set Figure1: shows the proposed system architecture. II. PREPROCESSING: The transactional data set has many attributes and the log size is heavier to process. The retrieved log will be a noisy one to process, so that we remove the incomplete log to make it compatible for processing. The transactional log of different banking sectors has different attribute set and different pattern. The preprocessor has a general pattern for processing and the retrieved patterns are converted into the generalized form. Because an banking log may have the account identity as the last attribute and the customer id as the first attribute in its log , but will differ in another bank log. The converted transactional data sets are taken to the next stage of money laundering identification process. Algorithm Step 1: start Step 2: read transactional data set Ts , Attribute set As. Step3: initialize generalize pattern Tp. Step 3: for each transaction Ti from Ts. For each pattern p from Ts Extract attribute Tp(Ai). TP(Ai) = Ô(Ti(Ai)).//Ô-Index of the Attribute Ai. If Ti € Ai then Else Ts = ø(Ti(Ts)). End End End. Step 4: end www.theijes.com The IJES Page 45
  • 4. An Multi-Variant Relational Model for Money Laundering Identification using Time Series Data Set III. RELATIONAL MAPPING: The relational mapping is performed on the preprocessed data set. We separate the transactions which are distinct to unique accounts. From the separated set of transactions, for each of the account identified we collect the set of accounts linked to the particular account. We compute relational metrics as one-to-many which indicates the number of transactions sent from this account and many-to-one specifies the number of account from where there is money transfer. Algorithm: Step1: start Step2: initialize relational set Rs. Step3: read transactional set Ts. Step4: select distinct account DA from Ts. DA = Õ(Ts). Step5: for each account DAi from DA Identify subset of transactions related to DAi. STs = Ü(DA×DAi). Identify relational mappings Im. Im = Ø(STs). Rs(i) = Im. End. Step6: stop. IV. MONEY LAUNDERING IDENTIFICATION: The process of money laundering identification is performed based on Number of transactions and amount transferred at each time frame. The transactional data set is a time series data which can be used to detect the money laundering identification. The relational mappings generated at the previous stage are used as an input to this process. From the relational mapping Rs , we split the transactions which is performed at each time frame TF. We compute the overall amount transferred at one-to-many and many-to-one relations based on which the transaction is decided as a vulnerable one. At any time frame if the number of transaction or the amount is higher than the Transactional Threshold TT, Transactional Amount Threshold TAT then the transaction is considered as a vulnerable one. In one too many cases the Transactional Threshold which implicates the maximum number of transactions can be performed at each time frame is considered with the maximum cumulative amount based on TAT is used. Algorithm: Step1: start Step2: initialize TAT, TF, TT. TF=24 Hours. TAT = 50,000. TT = 100. Step3: read Relational Mapping Rs. Step4: split the transactions from Rs according to time frame TF. TFT = $(Rs×Ts). Step5: compute no. of outgoing transaction OT. OT = ð(TFT). Compute overall money transferred mt. Mt = ΣOT(amount)1…N If Mt> TAT then Back Track the transaction using back propagation. end Step6: compute no. of incoming transaction IT. IT = ð(TFT). Compute overall money transferred mt. Mt = ΣIT(amount)1…N If Mt> TAT then Forward Track the transaction using traversal. End Step7: stop. V. RESULTS AND DISCUSSION: The proposed method has been evaluated using various transactional set collected from different banking sectors and we have separated the accounts which are linked through different banks. Finally we have collected 5000 accounts from different banks having 10 million transactions. The proposed method has produced efficient results and detection accuracy is also higher. www.theijes.com The IJES Page 46
  • 5. An Multi-Variant Relational Model for Money Laundering Identification using Time Series Data Set Graph 1: shows the efficiency of identifying money laundering The graph1 shows the efficiency of identifying money laundering with respect to number of transaction used. It is clear that the efficiency is increased if the size of transaction is increased. The proposed methodology produces efficient result by increasing the size of transaction. VI. CONCLUSION: We analyze various methodologies to identify money laundering crime. We identify that all methods have scalable in accuracy and efficiency. We proposed a multi variant relational model which uses time variant transactional data. The proposed method has produced higher efficient results and with accurate findings. The proposed method has produced results with less time complexity. REFERENCES: [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] John Hunt. The new frontier of money laundering: how terrorist organizations use cyberlaundering to fund their activities, and how governments are trying to stop them. Information & Communications Technology Law, 20(2):133{152, June 2011. L I U Junqiang. Optimal Anonymization for Transac tion. Chinese Journal of Electronics, 20(2), 2011. P.J. Lin, B. Samadi, Alan Cipolone, D.R. Jeske, Sean Cox, C. Rendon, Douglas Holt, and Rui Xiao. Development of a synthetic data set generator for building and testing information discovery systems. In Information Technology: New Generations, 2006. ITNG 2006. Third International Conference on, pages 707-712. IEEE, 2006. C M Macal and M J North. Tutorial on agent-based modelling and simulation. Journal of Simulation, 4(3):151{162, September 2010. Dan Magnusson. The costs of implementing the anti-money laundering regulations in Sweden. Journal of Money Laundering Control, 12(2):101{112, 2009. J Pavon, M Arroyo, S Hassan, and C Sansores. Agent-based modelling and simulation for the analysis of social patterns. Pattern Recognition Letters, 29(8):1039-1048, June 2008. Agus Sudjianto, Sheela Nair, Ming Yuan, Aijun Zhang, Daniel Kern, and Fernando Cela-Daz. Statistical Methods for Fighting Financial Crimes. Technometrics, 52(1):5{19, February 2010. Yabo Xu, Ke Wang, Ada Wai-chee Fu, Hong Kong, and Philip S Yu. Anonymizing Transaction Databases for Publication. International Journal, pages 767-775, 2008. Rui Liu, Research on anti-money laundering based on core decision tree algorithm, IEEE Conference on Control and Decisions , pp:4322-4335, 2011. Odense, Laundering Sexual Deviance: Targeting Online Pornography through Anti-money Laundering, European Intelligence and Security Informatics Conference, 2012. Bucharest, Combining Digital Forensic Practices and Database Analysis as an Anti-Money Laundering Strategy for Financial Institutions, Third International Conference on Emerging Intelligent Data and Web Technologies, 2012. Jason Hong, The State of Phishing Attacks, Communications of the ACM, Vol. 55 No. 1, Pages 74-81, 2012. Tat-Man Cheong, Event-based approach to money laundering data analysis and visualization, Proceedings of the 3rd International Symposium on Visual Information Communication, ACM , 2010. Sarah Meiklejohn, A Fistful of Bitcoins: Characterizing Payments Among Men with No Names, ACM 2013. E. Androulaki, G. Karame, M. Roeschlin, T. Scherer, and S. Capkun. Evaluating User Privacy in Bitcoin. In Proceedings of Financial Cryptography 2013, 2013. I. Miers, C. Garman, M. Green, and A. D. Rubin. Zerocoin: Anonymous Distributed E-Cash from Bitcoin. In Proceedings of the IEEE Symposium on Security and Privacy, 2013. T. Moore and N. Christin. Beware the Middleman: Empirica Analysis of Bitcoin-Exchange Risk. In Proceedings of Financial Cryptography 2013, 2013. www.theijes.com The IJES Page 47