Abstract
The purpose of this work is to identify the suspicious behavior of the clients of a financial institution. Financial institutions use rule-based systems to detect unusual transactions. These systems focus on individual transactions or simple transaction patterns. Due to this, the need arises to detect suspicious behavior using machine learning since many of the machine learning algorithms are designed to capture complex patterns. Descriptive analysis and predictive analysis are used to detect suspicious behavior. Within the descriptive analysis, outliers are sought in transactional movements. For the predictive analysis, we start from a set of alerts with the label of whether or not they were reported by the Compliance Unit. As a result of the descriptive model, a set of customers that have behaved in an unusual way is obtained and as a result of the predictive model, the alerts that should be reported are predicted. It is concluded that the techniques: descriptive analysis, descriptive analysis and the rule-based system can complement each other, since they focus on different aspects of the identification of unusual transactions and should not be considered as exclusive alternatives.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Adewumi, A.O., Akinyelu, A.A.: A survey of machine-learning and nature-inspired based credit card fraud detection techniques. Int. J. Syst. Assur. Eng. Manag. 8(2), 937–953 (2017). https://doi.org/10.1007/s13198-016-0551-y
Sharif, O., Hoque, M.M., Kayes, A.S.M., Nowrozy, R., Sarker, I.H.: Detecting suspicious texts using machine learning techniques. Appl. Sci. 10(18), 1–23 (2020)
Clarke, B., Fokoue, E., Zhang, H.H.: Principles and Theory for Data Mining and Machine Learning. Springer, New York (2009). https://doi.org/10.1007/978-0-387-98135-2
Flach, P.: Machine Learning: The Art and Science of Algorithms that Make Sense of Data. Cambridge University Press, Cambridge (2012)
Ross, I.: Exposing Fraud: Skills, Process and Practicalities. Wiley, Hoboken (2016)
Danenas, P.: Intelligent financial fraud detection and analysis: a survey of recent patents. Recent Patents Comput. Sci. 8(1), 13–23 (2015)
More, R., Awati, C., Shirgave, S., Deshmukh, R., Patil, S.: Credit card fraud detection using supervised learning approach. Int. J. Sci. Technol. Res. 9, 216–219 (2021)
Bolton, R.J., Hand, D.J.: Statistical fraud detection: a review. Stat. Sci. 17(3), 235–255 (2020)
Young, M.R.: Financial Fraud Prevention and Detection: Governance and Effective Practices. Wiley, Hoboken (2014)
Spann, D.D.: Fraud Analytics: Strategies and Methods for Detection and Prevention. Wiley, Hoboken (2013)
Baesens, B., Vlasselaer, V.V., Verbeke, W.: Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for Fraud Detection. Wiley, Hoboken (2015)
Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, Burlington (2005)
Swamynathan, M.: Mastering Machine Learning with Python in Six Steps: A Practical Implementation Guide to Predictive Data Analytics Using Python. Apress, New York (2017)
Shmueli, G., Bruce, P.C., Gedeck, P., Patel, N.R.: Data Mining for Business Analytics: Concepts, Techniques and Applications in Python. Wiley, Hoboken (2020)
Vona, L.W.: Fraud Data Analytics Methodology: The Fraud Scenario Approach to Uncovering Fraud in Core Business Systems. Wiley, Hoboken (2017)
Géron, A.: Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems. O’Reilly Media, Sebastopol (2019)
Bowles, M.: Machine Learning in Python: Essential Techniques for Predictive Analysis. Wiley, Hoboken (2015)
Julian, D.: Designing Machine Learning Systems with Python: Design Efficient Machine Learning Systems that Give You More Accurate Results. Packt, Birmingham (2016)
Breiman, L.: Random forests. Mach. Learn. 45, 5–32 (2001). https://doi.org/10.1023/A:1010933404324
Cutler, A., Cutler, D.R., Stevens, J.R.: Random forests. In: Zhang, C., Ma, Y. (eds.) Ensemble Machine Learning. Springer, Boston (2012). https://doi.org/10.1007/978-1-4419-9326-7_5
Carmona, P., Climent, F., Momparler, A.: Predicting failure in the US banking sector: an extreme gradient boosting approach. Int. Rev. Econ. Finance 61, 304–323 (2019)
Cervantes, J., Garcia-Lamont, F., Rodríguez-Mazahua, L., Lopez, A.: A comprehensive survey on support vector machine classification: applications, challenges and trends. Neurocomputing 408, 189–215 (2020)
Dabbas, E.: Interactive Dashboards and Data Apps with Plotly and Dash: Harness the Power of a Fully Fledged Frontend Web Framework in Python - no JavaScript Required. Packt, Birmingham (2021)
Döble, M., Großmann, T.: Data Visualization with Python: Create an Impact with Meaningful Data Insights Using Interactive and Engaging Visuals. Packt, Birmingham (2019)
Layton, R.: Learning Data Mining with Python: Harness the Power of Python to Analyze Data and Create Insightful Predictive Models. Packt, Birmingham (2015)
Belorkar, A., Guntuku, S.C., Hora, S., Kumar, A.: Interactive Data Visualization with Python Second Edition: Present Your Data as an Effective and Compelling Story. Packt, Birmingham (2020)
Gorunescu, F.: Data Mining: Concepts, Models and Techniques. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19721-5
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Leon, M., Shagñay, F., Rivas, C., Echeverria, F. (2022). A Predictive Model for the Detection of Clients Suspicious Behavior. In: Gervasi, O., Murgante, B., Misra, S., Rocha, A.M.A.C., Garau, C. (eds) Computational Science and Its Applications – ICCSA 2022 Workshops. ICCSA 2022. Lecture Notes in Computer Science, vol 13381. Springer, Cham. https://doi.org/10.1007/978-3-031-10548-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-031-10548-7_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-10547-0
Online ISBN: 978-3-031-10548-7
eBook Packages: Computer ScienceComputer Science (R0)