Skip to main content

A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination

  • Conference paper
Intelligence and Security Informatics (WISI 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3917))

Included in the following conference series:

  • 699 Accesses

Abstract

Outlier detection is a key element for intelligent financial surveillance systems which intend to identify fraud and money laundering by discovering unusual customer behaviour pattern. The detection procedures generally fall into two categories: comparing every transaction against its account history and further more, comparing against a peer group to determine if the behavior is unusual. The later approach shows particular merits in efficiently extracting suspicious transaction and reducing false positive rate. Peer group analysis concept is largely dependent on a cross-datasets outlier detection model. In this paper, we propose a cross outlier detection model based on distance definition incorporated with the financial transaction data features. An approximation algorithm accompanied with the model is provided to optimize the computation of the deviation from tested data point to the reference dataset. An experiment based on real bank data blended with synthetic outlier cases shows promising results of our model in reducing false positive rate while enhancing the discriminative rate remarkably.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Hawkins, D.: Identification of outliers. Chapman and Hall, London (1980)

    Book  MATH  Google Scholar 

  2. Faloutsos, C., Seeger Jr., B., T, C., Trainar, A.: Spatial join selectivity using power laws. In: Proc. SIGMOD, pp. 177–188 (2000)

    Google Scholar 

  3. Knorr, E., Ng, R.: Algorithms for mining distance-based outliers:Properties and computation. In: Kdd 1997, pp. 219–222 (1997)

    Google Scholar 

  4. Knorr, E.M., Ng, R.: Algorithms for mining distance-based outliers in large datasets. In: Proc. VLDB 1998, pp. 392–403 (1998)

    Google Scholar 

  5. Knorr, E., Ng, R.: Finding intentional knowledge of distancebased outliers. In: Proc. VLDB, pp. 211–222 (1999)

    Google Scholar 

  6. Knorr, E., Ng, R., Tucakov, V.: Distancebased outliers: Algorithms and applications. VLDB Journal 8, 237–253 (2000)

    Article  Google Scholar 

  7. Ramaswarmy, S., Rastogi, R., Kyuseok, S.: Efficient Algorithms for Mining Outliers from Large Datasets. In: SIGMOD 2000, pp. 93–104 (2000)

    Google Scholar 

  8. Traina, A., Traina, C., Papadimitriou, S., Faloutsos, C.: Tri-plots:Scalable tools for multidimensional data mining. In: Proc.KDD, pp. 184–193 (2001)

    Google Scholar 

  9. Spiros Papadimitriou.Cross-Outlier Detection, http://www.db.cs.cmu.edu/Pubs/Lib/sstd03cross/sstd03.pdf

  10. Ramaswarmy, S., Rastogi, R., Kyuseok, S.: Efficient Algorithms for Mining Outliers from Large Datasets. In: SIGMOD 2000, pp. 93–104 (2000)

    Google Scholar 

  11. Eltoz, L., Steinbach, U., Kumar, V.: A new shared nearest neighbor clusteing algoithm and its applications, AHPCRC, Tech. Rep, p. 134 (August 2002)

    Google Scholar 

  12. http://www.csie.ntu.edu.tw/~cjlin/libsvm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jun, T. (2006). A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination. In: Chen, H., Wang, FY., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds) Intelligence and Security Informatics. WISI 2006. Lecture Notes in Computer Science, vol 3917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734628_7

Download citation

  • DOI: https://doi.org/10.1007/11734628_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33361-6

  • Online ISBN: 978-3-540-33362-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics