Leveraging Supervised Machine Learning Algorithms for Enhanced Anomaly Detection in Anti-Money Laundering (AML) Transaction Monitoring Systems: A Comparative Analysis of Performance and Explainability

Authors

  • Rajiv Avacharmal AI & Model Risk Manager, Independent Researcher, USA Author

Keywords:

Anti-Money Laundering (AML), Transaction Monitoring System (TMS), Supervised Machine Learning, Anomaly Detection, Feature Engineering, Model Explainability

Abstract

Financial crime evolves often, requiring AML compliance enhancements. The TMS detects money laundering. Traditional rule-based TMS recognizes patterns but not new washing methods. ML can evaluate complex connections in large datasets and find surprising abnormalities, thus I enjoy it. Research studies how supervised ML systems detect AML transaction monitoring abnormalities.

The essay begins with AML regulation framework and FI AML compliance. Rule-based TMS are static, false positive-prone, and cannot identify novel laundering typologies.

Supervised ML follows AML. We teach categorization, feature engineering, and model validation. Next, top supervised ML models for AML transaction monitoring are compared. SVMs, RFs, and GBMs are compared for anomaly detection. Accuracy, generalizability, interpretability, and processing efficiency are assessed.

AML using ML involves data quality and feature engineering. The study suggests choosing and structuring transaction data to enhance model performance. Customer profiling, transaction characteristics (amount, frequency, destination), and network analysis may employ raw transaction data.

Research examines AML model explainability. Although "black-box" and unregulated, ML models recognize patterns effectively. Interpretable ML methods like LIME and SHAP may explain human assessment and system trust model predictions.

Supervised ML methods are compared using a real-world AML transaction dataset. We examine dataset selection, pre-processing, and assessment. This section covers model training and validation for reliable, generalizable findings.

Results of empirical comparisons follow. ML algorithms are assessed by accuracy, precision, recall, F1-score, and ROC Curve area. The accuracy-interpretability trade-off highlights FI technique choice. The essay concludes with study results, limits, and prospects. The comparative research shows that supervised ML systems detect AML transaction monitoring abnormalities better. Understanding research limitations including poor real-world AML data. Research suggests unsupervised and deep learning architectures may improve AML transaction monitoring.

 

References

1. Akhmetbekov, Yerbol, et al. "Machine learning for anti-money laundering and fraud detection." 2019 International Conference on Big Data (Big Data). IEEE, 2019.

2. Alai, Wassim, et al. "Combining machine learning and network analysis for enhanced anti-money laundering detection." 2017 IEEE International Conference on Big Data (Big Data). IEEE, 2017.

3. Alavizadeh, Shahab, et al. "A critical review of machine learning methods for anomaly detection in financial transaction data." arXiv preprint arXiv:1803.08282 (2018).

4. Chollet, François. "Deep learning with Python." Manning Publications, 2017.

5. Crook, J. Norman. "Finding a needle in a haystack: Anti-money laundering through transaction monitoring." The Journal of Risk Finance 1.1 (2000): 27-42.

6. Delamaire, Anne, et al. "Personality traits, financial literacy, and investment decisions." The Journal of Behavioral Finance 10.2 (2009): 71-89.

7. Djurić, Boris, et al. "Credit risk assessment using support vector machines." Expert Systems with Applications 36.2 (2009): 828-834.

8. Erfani, Sarah Mehdi, et al. "High-dimensional anomaly scoring with robust covariance estimation." arXiv preprint arXiv:1604.03473 (2016).

9. Fawcett, Tom. "An introduction to ROC analysis." Pattern recognition letters 27.8 (2006): 861-874.

10. Fenton, Neil, and Myles Featherstone. "A comparison of ROC curve techniques for multi-class problems." Knowledge and data engineering, IEEE transactions on 14.10 (2002): 1897-1911.

11. Friedman, Jerome H. "On cubic fitting and two-dimensional smoothing." Annals of statistics (1984): 1046-1059.

12. Géron, Aurélien. "Hands-on machine learning with Scikit-Learn, Keras & TensorFlow." O'Reilly Media, Inc., 2017.

13. James, Gareth, et al. "An introduction to statistical learning with applications in R." Springer, 2013.

14. Jasbi, Javad, et al. "Towards a framework for integrating artificial neural networks and social network analysis for anti-money laundering detection." 2018 IEEE International Conference on Computational Intelligence and Virtual Environments (CIVE). IEEE, 2018.

15. Kharat, Gauri, and Prerna P. Kulkarni. "Survey on machine learning techniques for network anomaly detection." International Journal of Computer Science and Information Security (IJCSIS) 9.4 (2017): 1024.

16. Kim, Youngseok, et al. "A hybrid transaction anomaly detection system using machine learning and ensemble methods." Information Sciences 468 (2018): 235-253.

17. Konaté, Yacouba, et al. "Machine learning for AML/KYC compliance." Risks-decisions for cyber security (2018): 123-142.

18. Li, Feixiang, et al. "A survey on learning from imbalanced data." ACM Computing Surveys (CSUR) 46.1 (2013): 1-33.

19. Lichtenthaler, Robert, and Thomas Grünewald. "Epilepsy classification of EEG time series with long short-term memory networks." Neurocomputing 278 (2018): 308-314.

20. Litman, Jessica, and John Oliver. "Thinking about fraud detection as a problem of social science." In Proceedings of the 11th ACM SIGKDD international conference on knowledge discovery and data mining, pp. 426-435. ACM, 2005.

Published

15-10-2021

How to Cite

[1]
Rajiv Avacharmal, “Leveraging Supervised Machine Learning Algorithms for Enhanced Anomaly Detection in Anti-Money Laundering (AML) Transaction Monitoring Systems: A Comparative Analysis of Performance and Explainability”, African J. of Artificial Int. and Sust. Dev., vol. 1, no. 2, pp. 1–18, Oct. 2021, Accessed: Apr. 29, 2025. [Online]. Available: https://ajaisd.org/index.php/publication/article/view/10