Graph mining approach to suspicious transaction detection

作者: Krzysztof Michalak , Jerzy Korczak

DOI:

关键词:

摘要: Suspicious transaction detection is used to report banking transactions that may be connected with criminal activities. Obviously, perpetrators of acts strive make the as innocent-looking possible. Because activities such money laundering involve complex organizational schemes, machine learning techniques based on individual analysis perform poorly when applied suspicious detection. In this paper, we propose a new method for mining graphs. The proposed in paper builds model subgraphs contain transactions. our parametrized using fuzzy numbers which represent parameters and detected. transferring through variable number accounts representing also respect some structural features. contrast other graph methods isomorphisms are match data model, matching structures.

参考文章(5)
Błażej Oleszkiewicz, Jerzy Korczak, Modelling of Data Warehouse Dimensions for AML Systems Prace Naukowe Uniwersytetu Ekonomicznego we Wrocławiu. pp. 146- 159 ,(2009)
Edwin M. Truman, Peter Reuter, Chasing Dirty Money: The Fight Against Anti-Money Laundering Peterson Institute Press: All Books. ,(2004)
Thomas Fetz, Johannes Jäger, David Köll, Günther Krenn, Heimo Lessmann, Michael Oberguggenberger, Rudolf F. Stark, Fuzzy Models in Geotechnical Engineering and Construction Management Computer-aided Civil and Infrastructure Engineering. ,vol. 14, pp. 93- 106 ,(1999) , 10.1007/3-540-26847-2_12
Oğuzhan Hasançebi, Fuat Erbatur, Evaluation of crossover techniques in genetic algorithm based optimum structural design Computers & Structures. ,vol. 78, pp. 435- 448 ,(2000) , 10.1016/S0045-7949(00)00089-4
Jinghui Zhong, Xiaomin Hu, Jun Zhang, Min Gu, Comparison of Performance between Different Selection Strategies on Simple Genetic Algorithms computational intelligence for modelling, control and automation. ,vol. 2, pp. 1115- 1121 ,(2005) , 10.1109/CIMCA.2005.1631619