No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe
No Result
View All Result
Corporate Compliance Insights
Home Financial Services

Advanced Analytics for Anti-Fraud and AML Systems

Top 15 Tools and Techniques

by Sanjukta Dhar
February 7, 2019
in Financial Services, Fraud
businesswoman holding projection of financial data

Detecting potentially fraudulent customers and transactions and projecting compelling visual insights have traditionally been a rule-based model plus BI game zone. In this era of high-velocity and voluminous data, we have gradually adopted machine learning and advanced analytics in this space. Sanjukta Dhar of Tata Consultancy Services deep dives into the 15 most prominent analytical tools and techniques that are becoming the optimal choices within financial crime and compliance technology.

Why Analytics?

Statistical models and techniques have long been used to predict anomalous transactions and fraudulent customers or to detect anomalous relationships within a financial system. With the gradual uptrend in the 4 Vs of big data (volume, veracity, variety and velocity), real-time fraud detection has been the need of the hour. In the area of financial crime and compliance, advanced analytics is widely used for the following well-defined purposes.

If we have to list the business objectives of today’s analytical systems, then the following should top the list:

  • analyzing huge volumes of data in real time
  • generating meaningful insights
  • visualizing intricate networks of entities and attributes and generating a graphical interface for it

Sample Financial Crime Use Case Candidates for Analytics

Payment fraud, identity theft, credit card fraud, money laundering transactions, insurance claim fraud, insider trading, terrorist financing, invoice fraud or trade-based money laundering

Let’s talk about some advanced analytical tools and techniques that can give our fraud detection or money-laundering detection systems a boost in terms of performance, accuracy and speed.

1. Technique: One-class support vector machine

Purpose: supervised approach, segregating outliers

Description: One-class support vector machine tries to segregate a majority of customer data or transactional data by maximizing the distance between the separator hyperplane and most of the data points. The rest of the data points remaining between the hyperplane and the origin are the outliers.

2. Technique: Binary logistic regression

Purpose: supervised approach, classifying transactions into fraudulent or nonfraudulent categories

Description: Logistic regression is based on the maximum likelihood premise. A logarithm of the odds ratio is plotted to derive the dependent variable, which is bounded between 0 and 1; hence, the target variable is binary, showing the likelihood of fraudulent transaction, with 0 depicting least and 1 depicting maximum likelihood.

3. Technique: Neural network

Purpose: supervised approach, classifying customers into fraudulent or nonfraudulent categories

Description: Neural network is a complex supervised learning technique capable of handling a large amount of noise. It takes various customer behavior/demographic/transaction profile data as input, extracts features, assigns weight in the hidden layer and generates a continuous variable as target score. Often referred to as a “black box” lacking substantial transparency and interpretability, this approach is very fast, but requires substantial training data.

4. Technique: Association rule analysis

Purpose: exploring the relationship between transaction/customer attributes for greater insight

Description: Association rule or affinity analysis seeks to establish implicit relationships between a few apparently unrelated parameters (e.g., transactions, customer attributes, external entities) in the form of “if antecedent, then consequent with minimum x% support and y% confidence.”

5. Technique: K means clustering

Purpose: unsupervised approach, grouping similar types of transactions/customers based on how similar their features are

Description: Clustering payment transaction data based on homogeneity in certain attributes. For example, data can be grouped together based on similarity of recency (time elapsed since last transaction), frequency (number of transactions per day/week/month) and monetary (average amount/max amount/min amount/median amount per customer ID per account) parameters, and also segregating dissimilar transaction data based on the same attributes.

6. Technique: Self-organizing maps (SOM)

Purpose: unsupervised approach, visualizing and clustering data based on unseen features

Description: SOM is a neural-network-based data visualizing technique capable of projecting high dimensional data on visualizations like U-matrix or a component plane to enable implicit relationship discovery.

7. Technique: Social network analytics

Purpose: visualizing related data

Description: Social network analytics explores complex, evolving, atypical networks to extract useful statistics within a network of connected entities using graph theory. By visualizing a network of connected entities where prior fraudulent entities are marked, the entity with highest probability of fraudulent actions can be identified.

8. Tool: Bloom filter

Purpose: optimized prediction and false positive reduction where dataset is huge (e.g., an enormous KYC alert management database)

Description: A Bloom filter is a memory efficient and faster way to predict if an entity is part of a set of entities. The beauty of this probabilistic data structure is that it will produce fewer false positives and it will predict 100 percent of the time if the element does not really exist in the set (i.e., 0 percent false negative).

9. Tool: Graph database

Purpose: Data visualization

Description: Graph databases enable real-time identification of fraud rings, provide correlation mining between linked entities and beneficial owners and offer a comprehensive visualization.

10. Technique: Behavioral analytics

Purpose: Predictive analytical technique

Description: Predict customer intent from subtle behavioral features (e.g., click speed, time spent in a webpage, IP address, products purchased online, surfing behavior, etc.).

11. Technique: Optical character recognition (OCR)

Purpose: predict anomalies in optical/scanned images

Description: Detect suspicious invoices/claims by learning from a series of PDF/scanned data sets and learning their features. There are a number of trainable machine learning libraries (e.g., Google tesseract, OpenCV, etc.) that offer built-in capabilities for feature extraction.

12. Technique: Benford’s law

Purpose: data exploration technique useful for identifying potentially fraudulent transaction data

Description: Hypothetical frequency distribution in five various orders that can be compared with any real-life frequency distribution to uncover potential sources of anomalies for farther investigation. May be suitable for accounting fraud.

13. Technique: Integrated device data surveillance

Purpose: data exploration technique useful for identifying potentially fraudulent transaction data

Description: Exploring unstructured device data collected from multiple customer access channels such as audio recording (from mobile phones), video footage (from CCTV, trader cameras), browser cookies, IP address, (from user machine) and carrier ID (network provider) for profiling the device used by a customer and performing subsequent anomaly detection.

14. Tool: Translytical database

Purpose: a new-age, big-data-enabled, real-time data storage analysis technique

Description: An amalgamated transactional storage and analytical database solution facilitating real-time storage, early warning indicators/insights and 3600 view.

15. Technique: News Analytics

Purpose: Proactive customer screening and negative news search and insight generation

Description: News analytics is an NLP/text-mining-based approach where public newsfeed data is ethically scraped and early insights about fraudulent/risky/anomalous customers are generated by extracting features from news data and running a segmentation/classification model on top of it. It is another sophisticated early warning alert mechanism for operations.

The Way Forward

While a number of modelling and data mining techniques are abundantly available in the market, we have to consider a number of factors, such as data imbalance (proportion of fraudulent vs. nonfraudulent data in the set), proportion of noise/outliers, model performance, model explainability, ensemble of supervised plus unsupervised models to enhance performance, availability of consolidated view of data (transactional plus analytical plus unstructured plus third party) while deploying them for the business case. Also, while rule-based systems are passé, there will still be scenarios where deploying a combination of rule-based systems, machine learning models and judgment-based approach will be the right choice. The solution lies in the right balance of choice and the availability of the right infrastructure.


Tags: AMLData AnalyticsMachine Learning
Previous Post

SEC’s Misguided “Solution” In Search Of A Problem

Next Post

Boards and Corporate Culture: SSGA Framework

Sanjukta Dhar

Sanjukta Dhar

Sanjukta Dhar leads the market and treasury risk management portfolio within the BFSI CRO Strategic Initiative of Tata Consultancy Services (TCS). Dhar has played the role of a business analyst, solution architect, SME and implementation lead across multiple financial risk management system implementations for major banks and financial services.

Related Posts

Phaxis 100 dollars

AML & KYC: Addressing Key Challenges for 2023 and Beyond

by Alex Roberto
March 16, 2023

(Sponsored) In today’s world, financial criminals are often a step ahead of regulators and financial institutions who struggle to effectively...

Paul Weiss Economic Sanctions and AML Developments 2022_f

Economic Sanctions and AML Developments

by Corporate Compliance Insights
March 15, 2023

Sanctions start high and stay high 2022 Year in Review Economic Sanctions and AML Developments What’s in this report from...

money laundering concept

It Takes a Village: Preventing FinCrime Means Everybody Needs Skin in the Game

by Samar Pratt
March 15, 2023

Banks bear the brunt of consequences for financial crimes amid a huge increase in anti-money laundering fines in 2022, making...

DALL·E 2023-02-16 13.18.43 - magritte style painting of robot looking into mirror

A Bot Isn’t Going to Take Your Place, But AI Will Make Your Job Harder

by Jennifer L. Gaskin
March 8, 2023

OpenAI’s splashy ChatGPT rollout has generated untold amounts of text, both directly and indirectly. While much of what’s been written...

Next Post
Boards and Corporate Culture: SSGA Framework

Boards and Corporate Culture: SSGA Framework

Compliance Job Interview Q&A

Jump to a Topic

AML Anti-Bribery Anti-Corruption Artificial Intelligence (AI) Automation Banking Board of Directors Board Risk Oversight Business Continuity Planning California Consumer Privacy Act (CCPA) Code of Conduct Communications Management Corporate Culture COVID-19 Cryptocurrency Culture of Ethics Cybercrime Cyber Risk Data Analytics Data Breach Data Governance DOJ Download Due Diligence Enterprise Risk Management (ERM) ESG FCPA Enforcement Actions Financial Crime Financial Crimes Enforcement Network (FinCEN) GDPR HIPAA Know Your Customer (KYC) Machine Learning Monitoring RegTech Reputation Risk Risk Assessment SEC Social Media Risk Supply Chain Technology Third Party Risk Management Tone at the Top Training Whistleblowing
No Result
View All Result

Privacy Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2022 Corporate Compliance Insights

No Result
View All Result
  • Home
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Career Connection
  • Events
    • Calendar
    • Submit an Event
  • Library
    • Whitepapers & Reports
    • eBooks
    • CCI Press & Compliance Bookshelf
  • Podcasts
  • Videos
  • Subscribe

© 2022 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT