Skip to main content

A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3917))

Abstract

Outlier detection is a key element for intelligent financial surveillance systems which intend to identify fraud and money laundering by discovering unusual customer behaviour pattern. The detection procedures generally fall into two categories: comparing every transaction against its account history and further more, comparing against a peer group to determine if the behavior is unusual. The later approach shows particular merits in efficiently extracting suspicious transaction and reducing false positive rate. Peer group analysis concept is largely dependent on a cross-datasets outlier detection model. In this paper, we propose a cross outlier detection model based on distance definition incorporated with the financial transaction data features. An approximation algorithm accompanied with the model is provided to optimize the computation of the deviation from tested data point to the reference dataset. An experiment based on real bank data blended with synthetic outlier cases shows promising results of our model in reducing false positive rate while enhancing the discriminative rate remarkably.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hawkins, D.: Identification of outliers. Chapman and Hall, London (1980)

    Book  MATH  Google Scholar 

  2. Faloutsos, C., Seeger Jr., B., T, C., Trainar, A.: Spatial join selectivity using power laws. In: Proc. SIGMOD, pp. 177–188 (2000)

    Google Scholar 

  3. Knorr, E., Ng, R.: Algorithms for mining distance-based outliers:Properties and computation. In: Kdd 1997, pp. 219–222 (1997)

    Google Scholar 

  4. Knorr, E.M., Ng, R.: Algorithms for mining distance-based outliers in large datasets. In: Proc. VLDB 1998, pp. 392–403 (1998)

    Google Scholar 

  5. Knorr, E., Ng, R.: Finding intentional knowledge of distancebased outliers. In: Proc. VLDB, pp. 211–222 (1999)

    Google Scholar 

  6. Knorr, E., Ng, R., Tucakov, V.: Distancebased outliers: Algorithms and applications. VLDB Journal 8, 237–253 (2000)

    Article  Google Scholar 

  7. Ramaswarmy, S., Rastogi, R., Kyuseok, S.: Efficient Algorithms for Mining Outliers from Large Datasets. In: SIGMOD 2000, pp. 93–104 (2000)

    Google Scholar 

  8. Traina, A., Traina, C., Papadimitriou, S., Faloutsos, C.: Tri-plots:Scalable tools for multidimensional data mining. In: Proc.KDD, pp. 184–193 (2001)

    Google Scholar 

  9. Spiros Papadimitriou.Cross-Outlier Detection, http://www.db.cs.cmu.edu/Pubs/Lib/sstd03cross/sstd03.pdf

  10. Ramaswarmy, S., Rastogi, R., Kyuseok, S.: Efficient Algorithms for Mining Outliers from Large Datasets. In: SIGMOD 2000, pp. 93–104 (2000)

    Google Scholar 

  11. Eltoz, L., Steinbach, U., Kumar, V.: A new shared nearest neighbor clusteing algoithm and its applications, AHPCRC, Tech. Rep, p. 134 (August 2002)

    Google Scholar 

  12. http://www.csie.ntu.edu.tw/~cjlin/libsvm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jun, T. (2006). A Cross Datasets Referring Outlier Detection Model Applied to Suspicious Financial Transaction Discrimination. In: Chen, H., Wang, FY., Yang, C.C., Zeng, D., Chau, M., Chang, K. (eds) Intelligence and Security Informatics. WISI 2006. Lecture Notes in Computer Science, vol 3917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734628_7

Download citation

  • DOI: https://doi.org/10.1007/11734628_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33361-6

  • Online ISBN: 978-3-540-33362-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics