Research Article
BibTex RIS Cite
Year 2022, , 854 - 873, 01.09.2022
https://doi.org/10.35378/gujs.854725

Abstract

References

  • [1] Pourhabibi, T., Ong, K-L., Kam, H. B., and Boo, L. Y., "Fraud detection: A systematic literature review of graph-based anomaly detection approaches", Decision Support Systems, 133: 113303, (2020).
  • [2] Zhou, H., Sun, G., Fu, S., Wang, L., Hu, J., and Gao, Y., “Internet Financial Fraud Detection Based on a Distributed Big Data Approach With Node2vec”, IEEE Access, 9: 43378-43386, (2021).
  • [3] Jabbar, M. A., Deekshatulu, B. L., and Chandra, P., "Classification of Heart Disease Using K- Nearest Neighbor and Genetic Algorithm", Procedia Technology, 10: 85-94, (2013).
  • [4] Taheri, S. and Mammadov, M., “Learning the naive Bayes classifier with optimization models”, International Journal of Applied Mathematics and Computer Science, 23(4): 787–795, (2013).
  • [5] Drezewski, R., Sepielak, J., and Filipkowski, W., “The application of social network analysis algorithms in a system supporting money laundering detection”, Information Sciences, 295: 18-32, (2015).
  • [6] Bridle, J. S., “Probabilistic Interpretation of Feedforward Classifi-cation Network Outputs, with Relationships to Statistical Pattern Recognition”, Neurocomputing—Algorithms, Architectures and Applications, F. Fogelman-Soulie and J. Herault, eds., NATO ASI Series F68, Berlin, Springer-Verlag, 227-236, (1989).
  • [7] https://www.unodc.org/unodc/en/money-laundering/globalization.html. Access date: 12.11.2019.
  • [8] https://blog.revolut.com/money-laundering-what-is-it-and-why-should-we-care/. Access date: 20.11.2019.
  • [9] https://www.fatf-gafi.org/faq/moneylaundering/. Access date: 18.11.2019.
  • [10] Internet: OECD (2014), "Combating money laundering", in Illicit Financial Flows from Developing Countries: Measuring OECD Responses, OECD Publishing, Paris, (2014). DOI: https://doi.org/10.1787/9789264203501-5-en. Access date: 20.11.2019.
  • [11] Schneider, F. and Windischbauer, U., “Money Laundering: Some Facts”, European Journal of Law and Economics, 26, 387-404, (2008).
  • [12] http://www.antimoneylaundering.gov.ie/en/AMLCU/Pages/. Access date: 2.12.2019.
  • [13] Huang, D., Mu, D., Yang, L. and Cai, X., "CoDetect: Financial Fraud Detection with Anomaly Feature Detection", IEEE Access, 6, 19161-19174, (2018).
  • [14] Wagner, D., “Latent representations of transaction network graphs in continuous vector spaces as features for money laundering detection”, Becker, M. (Hrsg.), SKILL 2019 - Studierendenkonferenz Informatik, Gesellschaft für In-formatik e.V., Bonn, 143-154, (2019).
  • [15] Internet: Khosla, M., Anand, A., and Setty, V., “A Comprehensive Comparison of Unsupervised Network Representation Learning Methods”, CoRR abs/1903.07902/, 2019, arXiv: 1903.07902, URL: http://arxiv.org/abs/1903.07902
  • [16] Sadgali, I., Sael, N. and Benabbou, F., “Performance of machine learning techniques in the detection of financial frauds”, Procedia Computer Science, 148, 45 – 54, (2019).
  • [17] Dionysios, S. D., “Fighting money laundering with technology: A case study of Bank X in the UK”, Decision Support Systems, 105, 96-107 (2018).
  • [18] Wu, J, Liu, J., Chen, W., Huang, H., Zheng, Z., and Zhang, Y., "Detecting Mixing Services via Mining Bitcoin Transaction Network with Hybrid Motifs", IEEE Transactions on Systems, Man, and Cybernetics: Systems, 1-13, (2021).
  • [19] Ketenci, U. G., Kurt, T., Önal, S., Erbi̇l, C., Aktürkoǧlu, S. and İlhan, H. Ş., "A Time-Frequency Based Suspicious Activity Detection for Anti-Money Laundering", IEEE Access, 9: 59957-59967, (2021).
  • [20] Bellomarini, L., Laurenza, E., and Sallinger, E., “Rule-based anti-money laundering in financial intelligence units: experience and vision”, In International Joint Conference on Rules and Reasoning, (2020).
  • [21] Grover, A. and Leskovec, J., “Node2vec: Scalable feature learning for networks”, In ACM SIGKDD, 855–864, (2016).
  • [22] Khan, S. H., Hayat, M., Bennamoun, M., Sohel, F. A. and Togneri, R.,"Cost-Sensitive Learning of Deep Feature Representations From Imbalanced Data", IEEE Transactions on Neural Networks and Learning Systems, 29(8): 3573-3587, (2018).
  • [23] Ghorbanzadeh, O., Rostamzadeh, H., Blaschke, T. et al. “A new GIS-based data mining technique using an adaptive neuro-fuzzy inference system (ANFIS) and k-fold cross-validation approach for land subsidence susceptibility mapping”, Nat Hazards 94, 497–517 (2018). DOI: https://doi.org/10.1007/s11069-018-3449-y
  • [24] Gholinejad, S., Naeini, A. A. and Amiri-Simkooei, A., "Robust Particle Swarm Optimization of RFMs for High-Resolution Satellite Images Based on K-Fold Cross-Validation", IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 12, 2594-2599, (2019).
  • [25] Lopez-Rojas, E., Elmir, A., and Axelsson, S., “Paysim : A financial mobile money simulator for fraud detection”, In 28th European Modeling and Simulation Symposium, EMSS 2016, Dime University of Genoa, 249–255, (2016).
  • [26] Santos, M. S., Soares, J. P., Abreu, P. H., Araujo H. and Santos, J., "Cross-Validation for Imbalanced Datasets: Avoiding Overoptimistic and Overfitting Approaches [Research Frontier]", IEEE Computational Intelligence Magazine, 13, 59-76, (2018).
  • [27] Seo, J-H. and Kim, Y-H., “Machine-Learning Approach to Optimize SMOTE Ratio in Class Imbalance Dataset for Intrusion Detection”, Computational Intelligence and Neuroscience, (2018).
  • [28] Tharwat, A., Mahdi, H., Elhoseny, M. and Hassanien, A. E., “Recognizing human activity in mobile crowdsensing environment using optimized k-NN algorithm”, Expert Systems with Application, 107, 32-44, (2018).

Money Laundering Detection with Node2Vec

Year 2022, , 854 - 873, 01.09.2022
https://doi.org/10.35378/gujs.854725

Abstract

The widespread use of computing technology has been changing relationships among people in societies. Criminals are aware of the power of the technology so that many criminal activities involve more computing systems. Money laundering has been a significant criminal activity within financial computing systems for many decades. The dynamic nature of information systems has reduced the effectiveness of existing money laundering detection mechanisms that is an important challenge for societies. In this paper, we consider machine learning algorithms as complementary solutions to existing money laundering detection mechanisms. We have focused on graph-based representation of data with Node2Vec to have better classification results for money laundering detections with machine learning algorithms. Our experimental analyses show that Node2Vec enable us to select the most convenient machine learning algorithm for money laundering detections.

References

  • [1] Pourhabibi, T., Ong, K-L., Kam, H. B., and Boo, L. Y., "Fraud detection: A systematic literature review of graph-based anomaly detection approaches", Decision Support Systems, 133: 113303, (2020).
  • [2] Zhou, H., Sun, G., Fu, S., Wang, L., Hu, J., and Gao, Y., “Internet Financial Fraud Detection Based on a Distributed Big Data Approach With Node2vec”, IEEE Access, 9: 43378-43386, (2021).
  • [3] Jabbar, M. A., Deekshatulu, B. L., and Chandra, P., "Classification of Heart Disease Using K- Nearest Neighbor and Genetic Algorithm", Procedia Technology, 10: 85-94, (2013).
  • [4] Taheri, S. and Mammadov, M., “Learning the naive Bayes classifier with optimization models”, International Journal of Applied Mathematics and Computer Science, 23(4): 787–795, (2013).
  • [5] Drezewski, R., Sepielak, J., and Filipkowski, W., “The application of social network analysis algorithms in a system supporting money laundering detection”, Information Sciences, 295: 18-32, (2015).
  • [6] Bridle, J. S., “Probabilistic Interpretation of Feedforward Classifi-cation Network Outputs, with Relationships to Statistical Pattern Recognition”, Neurocomputing—Algorithms, Architectures and Applications, F. Fogelman-Soulie and J. Herault, eds., NATO ASI Series F68, Berlin, Springer-Verlag, 227-236, (1989).
  • [7] https://www.unodc.org/unodc/en/money-laundering/globalization.html. Access date: 12.11.2019.
  • [8] https://blog.revolut.com/money-laundering-what-is-it-and-why-should-we-care/. Access date: 20.11.2019.
  • [9] https://www.fatf-gafi.org/faq/moneylaundering/. Access date: 18.11.2019.
  • [10] Internet: OECD (2014), "Combating money laundering", in Illicit Financial Flows from Developing Countries: Measuring OECD Responses, OECD Publishing, Paris, (2014). DOI: https://doi.org/10.1787/9789264203501-5-en. Access date: 20.11.2019.
  • [11] Schneider, F. and Windischbauer, U., “Money Laundering: Some Facts”, European Journal of Law and Economics, 26, 387-404, (2008).
  • [12] http://www.antimoneylaundering.gov.ie/en/AMLCU/Pages/. Access date: 2.12.2019.
  • [13] Huang, D., Mu, D., Yang, L. and Cai, X., "CoDetect: Financial Fraud Detection with Anomaly Feature Detection", IEEE Access, 6, 19161-19174, (2018).
  • [14] Wagner, D., “Latent representations of transaction network graphs in continuous vector spaces as features for money laundering detection”, Becker, M. (Hrsg.), SKILL 2019 - Studierendenkonferenz Informatik, Gesellschaft für In-formatik e.V., Bonn, 143-154, (2019).
  • [15] Internet: Khosla, M., Anand, A., and Setty, V., “A Comprehensive Comparison of Unsupervised Network Representation Learning Methods”, CoRR abs/1903.07902/, 2019, arXiv: 1903.07902, URL: http://arxiv.org/abs/1903.07902
  • [16] Sadgali, I., Sael, N. and Benabbou, F., “Performance of machine learning techniques in the detection of financial frauds”, Procedia Computer Science, 148, 45 – 54, (2019).
  • [17] Dionysios, S. D., “Fighting money laundering with technology: A case study of Bank X in the UK”, Decision Support Systems, 105, 96-107 (2018).
  • [18] Wu, J, Liu, J., Chen, W., Huang, H., Zheng, Z., and Zhang, Y., "Detecting Mixing Services via Mining Bitcoin Transaction Network with Hybrid Motifs", IEEE Transactions on Systems, Man, and Cybernetics: Systems, 1-13, (2021).
  • [19] Ketenci, U. G., Kurt, T., Önal, S., Erbi̇l, C., Aktürkoǧlu, S. and İlhan, H. Ş., "A Time-Frequency Based Suspicious Activity Detection for Anti-Money Laundering", IEEE Access, 9: 59957-59967, (2021).
  • [20] Bellomarini, L., Laurenza, E., and Sallinger, E., “Rule-based anti-money laundering in financial intelligence units: experience and vision”, In International Joint Conference on Rules and Reasoning, (2020).
  • [21] Grover, A. and Leskovec, J., “Node2vec: Scalable feature learning for networks”, In ACM SIGKDD, 855–864, (2016).
  • [22] Khan, S. H., Hayat, M., Bennamoun, M., Sohel, F. A. and Togneri, R.,"Cost-Sensitive Learning of Deep Feature Representations From Imbalanced Data", IEEE Transactions on Neural Networks and Learning Systems, 29(8): 3573-3587, (2018).
  • [23] Ghorbanzadeh, O., Rostamzadeh, H., Blaschke, T. et al. “A new GIS-based data mining technique using an adaptive neuro-fuzzy inference system (ANFIS) and k-fold cross-validation approach for land subsidence susceptibility mapping”, Nat Hazards 94, 497–517 (2018). DOI: https://doi.org/10.1007/s11069-018-3449-y
  • [24] Gholinejad, S., Naeini, A. A. and Amiri-Simkooei, A., "Robust Particle Swarm Optimization of RFMs for High-Resolution Satellite Images Based on K-Fold Cross-Validation", IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 12, 2594-2599, (2019).
  • [25] Lopez-Rojas, E., Elmir, A., and Axelsson, S., “Paysim : A financial mobile money simulator for fraud detection”, In 28th European Modeling and Simulation Symposium, EMSS 2016, Dime University of Genoa, 249–255, (2016).
  • [26] Santos, M. S., Soares, J. P., Abreu, P. H., Araujo H. and Santos, J., "Cross-Validation for Imbalanced Datasets: Avoiding Overoptimistic and Overfitting Approaches [Research Frontier]", IEEE Computational Intelligence Magazine, 13, 59-76, (2018).
  • [27] Seo, J-H. and Kim, Y-H., “Machine-Learning Approach to Optimize SMOTE Ratio in Class Imbalance Dataset for Intrusion Detection”, Computational Intelligence and Neuroscience, (2018).
  • [28] Tharwat, A., Mahdi, H., Elhoseny, M. and Hassanien, A. E., “Recognizing human activity in mobile crowdsensing environment using optimized k-NN algorithm”, Expert Systems with Application, 107, 32-44, (2018).
There are 28 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Computer Engineering
Authors

Mehmet Çağlayan This is me

Şerif Bahtiyar 0000-0003-0314-2621

Publication Date September 1, 2022
Published in Issue Year 2022

Cite

APA Çağlayan, M., & Bahtiyar, Ş. (2022). Money Laundering Detection with Node2Vec. Gazi University Journal of Science, 35(3), 854-873. https://doi.org/10.35378/gujs.854725
AMA Çağlayan M, Bahtiyar Ş. Money Laundering Detection with Node2Vec. Gazi University Journal of Science. September 2022;35(3):854-873. doi:10.35378/gujs.854725
Chicago Çağlayan, Mehmet, and Şerif Bahtiyar. “Money Laundering Detection With Node2Vec”. Gazi University Journal of Science 35, no. 3 (September 2022): 854-73. https://doi.org/10.35378/gujs.854725.
EndNote Çağlayan M, Bahtiyar Ş (September 1, 2022) Money Laundering Detection with Node2Vec. Gazi University Journal of Science 35 3 854–873.
IEEE M. Çağlayan and Ş. Bahtiyar, “Money Laundering Detection with Node2Vec”, Gazi University Journal of Science, vol. 35, no. 3, pp. 854–873, 2022, doi: 10.35378/gujs.854725.
ISNAD Çağlayan, Mehmet - Bahtiyar, Şerif. “Money Laundering Detection With Node2Vec”. Gazi University Journal of Science 35/3 (September 2022), 854-873. https://doi.org/10.35378/gujs.854725.
JAMA Çağlayan M, Bahtiyar Ş. Money Laundering Detection with Node2Vec. Gazi University Journal of Science. 2022;35:854–873.
MLA Çağlayan, Mehmet and Şerif Bahtiyar. “Money Laundering Detection With Node2Vec”. Gazi University Journal of Science, vol. 35, no. 3, 2022, pp. 854-73, doi:10.35378/gujs.854725.
Vancouver Çağlayan M, Bahtiyar Ş. Money Laundering Detection with Node2Vec. Gazi University Journal of Science. 2022;35(3):854-73.