Skip to main content

Integrating Client Profiling in an Anti-money Laundering Multi-agent Based System

  • Conference paper
  • First Online:
New Advances in Information Systems and Technologies

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 444))

  • 3206 Accesses

Abstract

Continuing previous work by the authors, where an Anti-Money Laundering (AML) agent-based system was introduced, we now provide some detail on one of the elements of this system—the learning component. The system we are developing focuses on how a financial institution, a bank, can obtain better results in AML initiatives. More specifically, we’re trying to improve the suspicious transaction signaling process and the subsequent final decision. For this, it is critical to model client behavior, having a clear definition of the different client profiles. Having available a real world data set of bank transactions, we explain in this contribution how some data-mining techniques were used in order to build the needed client profiles, and how the results obtained can be integrated in the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Alexandre, C., Balsa, J.: A multiagent based approach to money laundering detection and prevention. In: Loiseau, S., Filipe, J., Duval, B., van den Herik, H.J. (eds.) Proceedings of the International Conference on Agents and Artificial Intelligence. vol. 1, pp. 230–235. SciTePress, Lisbon (2015a), http://www.scitepress.org/portal/PublicationsDetail.aspx?ID=pJRstwtoDBg=t=1

  2. Alexandre, C., Balsa, J.: Client profiling for an anti-money laundering system. CoRR abs/1510.00878 (2015b), http://arxiv.org/abs/1510.00878

  3. Arthur, D., Vassilvitskii, S.: K-means++: The advantages of careful seeding. In: Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms. pp. 1027–1035. Society for Industrial and Applied Mathematics, Philadelphia, PA, USA (2007)

    Google Scholar 

  4. Calinski, T., Harabasz, J.: A dendrite method for cluster analysis. Communications in Statistics-Simulation and Computation 3(1), 1–27 (1974)

    Google Scholar 

  5. Canas, V.: O Crime de Branqueamento: Regime de Prevenção e de Repressão. Coimbra (2004)

    Google Scholar 

  6. Castellar, J.C.: Lavagem de Dinheiro - A Questão do Bem Jurídico. Rio de Janeiro (2004)

    Google Scholar 

  7. Chang, W.H., Chang, J.S.: Using clustering techniques to analyze fraudulent behavior changes in online auctions. In: Networking and Information Technology (ICNIT), 2010 International Conference on. pp. 34–38 (June 2010)

    Google Scholar 

  8. Cohen, W.W.: Fast effective rule induction. In: Proceedings of the Twelfth International Conference on Machine Learning. pp. 115–123. Morgan Kaufmann (1995)

    Google Scholar 

  9. Demazeau, Y.: From interactions to collective behaviour in agent-based systems. In: Proceedings of the 1st. European Conference on Cognitive Science. Saint-Malo. pp. 117–132 (1995)

    Google Scholar 

  10. Gao, S., Xu, D.: Real-time exception management decision model (rtemdm): Applications in intelligent agent-assisted decision support in logistics and anti-money laundering domains. In: System Sciences (HICSS), 2010 43rd Hawaii International Conference on. pp. 1–10 (Jan 2010)

    Google Scholar 

  11. Gao, S., Xu, D., Wang, H., Wang, Y.: Intelligent anti-money laundering system. In: Service Operations and Logistics, and Informatics, 2006. SOLI ‘06. IEEE International Conference on. pp. 851–856 (June 2006)

    Google Scholar 

  12. Hamerly, G., Elkan, C.: Alternatives to the k-means algorithm that find better clusterings. In: Proceedings of the Eleventh International Conference on Information and Knowledge Management. pp. 600–607. ACM, New York, NY, USA (2002)

    Google Scholar 

  13. Kingdon, J.: Ai fights money laundering. Intelligent Systems, IEEE 19(3), 87–89 (May 2004)

    Google Scholar 

  14. Le-Khac, N.A., Kechadi, M.: Application of data mining for anti-money laundering detection: A case study. In: Data Mining Workshops (ICDMW), 2010 IEEE International Conference on. pp. 577–584 (Dec 2010)

    Google Scholar 

  15. Le-Khac, N.A., Markos, S., Kechadi, M.T.: Towards a new data mining-based approach for anti-money laundering in an international investment bank. In: Digital Forensics and Cyber Crime - First International ICST Conference (ICDF2C). pp. 77–84. Springer, Albany, NY, USA (2009)

    Google Scholar 

  16. Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (1993)

    Google Scholar 

  17. Sabau, A.S.: Survey of clustering based financial fraud detecton research. Informatica Economica 16(1) (mar 2012)

    Google Scholar 

  18. Schott, P.A.: Reference Guide to Anti-Money Laundering and Combating the Financing of Terrorism: Second Edition and Supplement on Special Recommendation IX. The World Bank and The International Monetary Fund, Washington DC, second edn. (2006)

    Google Scholar 

  19. Tang, J., Yin, J.: Developing an intelligent data discriminating system of anti-money laundering based on svm. In: Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on. vol. 6, pp. 3453–3457 (Aug 2005)

    Google Scholar 

  20. UNODC: United nations office on drugs and crime - annual report 2014. Online (2014), https://www.unodc.org/documents/AnnualReport2014/Annual_Report_2014_WEB.pdf, accessed on jul. 10,2015

  21. Wagner, S., Wagner, D.: Comparing clusterings – an overview. Tech. Rep. 2006-04, Universität Karlsruhe (TH) (2007), http://digbib.ubka.uni-karlsruhe.de/volltexte/1000011477

  22. Wooldridge, M.: An Introduction to Multiagent Systems. Wiley Publishing, Chichester, UK, 2nd edn. (2009)

    Google Scholar 

  23. Xuan, L., Pengzhu, Z.: An agent based anti-money laundering system architecture for financial supervision. In: Wireless Communications, Networking and Mobile Computing, 2007. International Conference on. pp. 5472–5475 (Sept 2007)

    Google Scholar 

  24. Xuan, L., Pengzhu, Z.: A scan statistics based suspicious transactions detection model for anti-money laundering (aml) in financial institutions. In: International Conference on Multimedia Communications, 2010. pp. 210–213 (Aug 2010)

    Google Scholar 

  25. Zhang, Z.M., Salerno, J.J., Yu, P.S.: Applying data mining in investigating money laundering crimes. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp. 747–752. KDD ‘03, ACM, New York, NY, USA (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Claudio Alexandre .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Alexandre, C., Balsa, J. (2016). Integrating Client Profiling in an Anti-money Laundering Multi-agent Based System. In: Rocha, Á., Correia, A., Adeli, H., Reis, L., Mendonça Teixeira, M. (eds) New Advances in Information Systems and Technologies. Advances in Intelligent Systems and Computing, vol 444. Springer, Cham. https://doi.org/10.1007/978-3-319-31232-3_88

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31232-3_88

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31231-6

  • Online ISBN: 978-3-319-31232-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics