Skip to main content

A Predictive Model for the Detection of Clients Suspicious Behavior

  • Conference paper
  • First Online:
  • 908 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13381))

Abstract

The purpose of this work is to identify the suspicious behavior of the clients of a financial institution. Financial institutions use rule-based systems to detect unusual transactions. These systems focus on individual transactions or simple transaction patterns. Due to this, the need arises to detect suspicious behavior using machine learning since many of the machine learning algorithms are designed to capture complex patterns. Descriptive analysis and predictive analysis are used to detect suspicious behavior. Within the descriptive analysis, outliers are sought in transactional movements. For the predictive analysis, we start from a set of alerts with the label of whether or not they were reported by the Compliance Unit. As a result of the descriptive model, a set of customers that have behaved in an unusual way is obtained and as a result of the predictive model, the alerts that should be reported are predicted. It is concluded that the techniques: descriptive analysis, descriptive analysis and the rule-based system can complement each other, since they focus on different aspects of the identification of unusual transactions and should not be considered as exclusive alternatives.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Adewumi, A.O., Akinyelu, A.A.: A survey of machine-learning and nature-inspired based credit card fraud detection techniques. Int. J. Syst. Assur. Eng. Manag. 8(2), 937–953 (2017). https://doi.org/10.1007/s13198-016-0551-y

    Article  Google Scholar 

  2. Sharif, O., Hoque, M.M., Kayes, A.S.M., Nowrozy, R., Sarker, I.H.: Detecting suspicious texts using machine learning techniques. Appl. Sci. 10(18), 1–23 (2020)

    Article  Google Scholar 

  3. Clarke, B., Fokoue, E., Zhang, H.H.: Principles and Theory for Data Mining and Machine Learning. Springer, New York (2009). https://doi.org/10.1007/978-0-387-98135-2

    Book  MATH  Google Scholar 

  4. Flach, P.: Machine Learning: The Art and Science of Algorithms that Make Sense of Data. Cambridge University Press, Cambridge (2012)

    Book  Google Scholar 

  5. Ross, I.: Exposing Fraud: Skills, Process and Practicalities. Wiley, Hoboken (2016)

    Google Scholar 

  6. Danenas, P.: Intelligent financial fraud detection and analysis: a survey of recent patents. Recent Patents Comput. Sci. 8(1), 13–23 (2015)

    Article  Google Scholar 

  7. More, R., Awati, C., Shirgave, S., Deshmukh, R., Patil, S.: Credit card fraud detection using supervised learning approach. Int. J. Sci. Technol. Res. 9, 216–219 (2021)

    Google Scholar 

  8. Bolton, R.J., Hand, D.J.: Statistical fraud detection: a review. Stat. Sci. 17(3), 235–255 (2020)

    MathSciNet  MATH  Google Scholar 

  9. Young, M.R.: Financial Fraud Prevention and Detection: Governance and Effective Practices. Wiley, Hoboken (2014)

    Google Scholar 

  10. Spann, D.D.: Fraud Analytics: Strategies and Methods for Detection and Prevention. Wiley, Hoboken (2013)

    Google Scholar 

  11. Baesens, B., Vlasselaer, V.V., Verbeke, W.: Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for Fraud Detection. Wiley, Hoboken (2015)

    Book  Google Scholar 

  12. Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, Burlington (2005)

    MATH  Google Scholar 

  13. Swamynathan, M.: Mastering Machine Learning with Python in Six Steps: A Practical Implementation Guide to Predictive Data Analytics Using Python. Apress, New York (2017)

    Google Scholar 

  14. Shmueli, G., Bruce, P.C., Gedeck, P., Patel, N.R.: Data Mining for Business Analytics: Concepts, Techniques and Applications in Python. Wiley, Hoboken (2020)

    Google Scholar 

  15. Vona, L.W.: Fraud Data Analytics Methodology: The Fraud Scenario Approach to Uncovering Fraud in Core Business Systems. Wiley, Hoboken (2017)

    Book  Google Scholar 

  16. Géron, A.: Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems. O’Reilly Media, Sebastopol (2019)

    Google Scholar 

  17. Bowles, M.: Machine Learning in Python: Essential Techniques for Predictive Analysis. Wiley, Hoboken (2015)

    Book  Google Scholar 

  18. Julian, D.: Designing Machine Learning Systems with Python: Design Efficient Machine Learning Systems that Give You More Accurate Results. Packt, Birmingham (2016)

    Google Scholar 

  19. Breiman, L.: Random forests. Mach. Learn. 45, 5–32 (2001). https://doi.org/10.1023/A:1010933404324

    Article  MATH  Google Scholar 

  20. Cutler, A., Cutler, D.R., Stevens, J.R.: Random forests. In: Zhang, C., Ma, Y. (eds.) Ensemble Machine Learning. Springer, Boston (2012). https://doi.org/10.1007/978-1-4419-9326-7_5

    Chapter  Google Scholar 

  21. Carmona, P., Climent, F., Momparler, A.: Predicting failure in the US banking sector: an extreme gradient boosting approach. Int. Rev. Econ. Finance 61, 304–323 (2019)

    Article  Google Scholar 

  22. Cervantes, J., Garcia-Lamont, F., Rodríguez-Mazahua, L., Lopez, A.: A comprehensive survey on support vector machine classification: applications, challenges and trends. Neurocomputing 408, 189–215 (2020)

    Article  Google Scholar 

  23. Dabbas, E.: Interactive Dashboards and Data Apps with Plotly and Dash: Harness the Power of a Fully Fledged Frontend Web Framework in Python - no JavaScript Required. Packt, Birmingham (2021)

    Google Scholar 

  24. Döble, M., Großmann, T.: Data Visualization with Python: Create an Impact with Meaningful Data Insights Using Interactive and Engaging Visuals. Packt, Birmingham (2019)

    Google Scholar 

  25. Layton, R.: Learning Data Mining with Python: Harness the Power of Python to Analyze Data and Create Insightful Predictive Models. Packt, Birmingham (2015)

    Google Scholar 

  26. Belorkar, A., Guntuku, S.C., Hora, S., Kumar, A.: Interactive Data Visualization with Python Second Edition: Present Your Data as an Effective and Compelling Story. Packt, Birmingham (2020)

    Google Scholar 

  27. Gorunescu, F.: Data Mining: Concepts, Models and Techniques. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19721-5

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marcelo Leon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Leon, M., Shagñay, F., Rivas, C., Echeverria, F. (2022). A Predictive Model for the Detection of Clients Suspicious Behavior. In: Gervasi, O., Murgante, B., Misra, S., Rocha, A.M.A.C., Garau, C. (eds) Computational Science and Its Applications – ICCSA 2022 Workshops. ICCSA 2022. Lecture Notes in Computer Science, vol 13381. Springer, Cham. https://doi.org/10.1007/978-3-031-10548-7_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-10548-7_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-10547-0

  • Online ISBN: 978-3-031-10548-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics