Skip to main content

Handling Smurfing Through Big Data

  • Conference paper
  • First Online:
Big Data Analytics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 654))

Abstract

Money laundering is a worrying term for every country’s economy these days. Leading economists of all major developed and developing economies are concerned to devise methods to prevent it. The economy of a country is weakened by the impact of money laundering. Networks created between various banks in different countries facilitate online money transfer, which is turning the process of money laundering into digital money laundering. This promotes money launderers to perform wired transactions from anywhere. People involved in the process of money laundering are efficiently using online banking as their weapon. Evading the anti-money laundering agencies is becoming easier for them because of having online bank accounts. Such people are misusing technology. Therefore, it is restricting one’s own country’s economic progress. But with the help of recently developed technologies, we are able to prevent such illegal activities. Scrutinizing all the transactions and investigating them manually at financial intelligence units are cumbersome tasks because petabytes of transactions are taking place each day. Advanced technologies like Big Data enable us to detect the suspicious customers possibly involved in money laundering. In this paper, we have proposed a methodology using big data to detect smurfing; based on which, suspicious people involved in money laundering may be identified and appropriate action can be taken against them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Moser, M., Bohme, R., Breuker, D.: An enquiry into money laundering tools in the Bitcoin ecosystems. In: E-Crime Researchers Summit, pp. 1–14 (2013)

    Google Scholar 

  2. Lucian, R.D.: Money laundering economic and legal aspects. In: 2nd IEEE International Conference on Information and Financial Engineering, pp. 713–717 (2010)

    Google Scholar 

  3. Tejay, G.P.S.: Introduction to cyber crime in the digital economy minitrack. In: 45th Hawaii International Conference on System Science, pp. 30–40 (2012)

    Google Scholar 

  4. Flores, D.A., Angelopoulou, O., Self, R.J.: Combining digital forensic practices and database analysis as an anti money laundering strategy for financial institution. In: 3rd International Conference on Emerging Intelligent Data and Web Technologies, pp. 218–224 (2012)

    Google Scholar 

  5. Yang, C.C., Ng, T.D.: Terrorism and crime related weblog social network-link, content analysis and information visualisation. In: Intelligence and Security Informatics, IEEE, pp. 55–58

    Google Scholar 

  6. Didimo, W., Liotta, G., Montecchiani, F.: An advanced network visualization system for financial crime detection. In: IEEE Pacific Visualization Symposium, 1–4 Mar 2011, Hongkong, China, pp. 203–210 (2011)

    Google Scholar 

  7. Chen, Z., Van Khoa, L.D., Nazir, A., Teoh, E.N., Karupiah, E.K: Exploration of the effectiveness of expectation maximization algorithm for suspicious transaction detection in anti money laundering. In: IEEE Conference on Open System, Subang, Malaysia, 26–28 Oct, pp. 145–149 (2014)

    Google Scholar 

  8. Thangiah, M., Basri, S., Suliman, S.: A framework to detect cyber crime in the virtual environment. In: International Conference on Computer and Information Science, pp. 553–557 (2012)

    Google Scholar 

  9. Shu, M., Rui, L., Dancheng, L., Shuaizhen, Z.: Anti money laundering system based on main frame and SOA. In: 5th International Conference on Computational Intelligence and Communication Network, pp. 613–616 (2013)

    Google Scholar 

  10. Luna Dong, X., Srivastava, D.: Big data Integration. In: 29th International Conference on Data Engineering, pp. 1245–1248 (2013)

    Google Scholar 

  11. Leung, C.K., MacKinnon, R.K., Jiang, F.: Reducing the search space for big data mining for interesting patterns from uncertain data. In: IEEE Congress on Big Data, pp. 315–322 (2014)

    Google Scholar 

  12. Chen, H., Lin, T.Y., Zhang, Z., Zhong, J.: Parallel mining frequent patterns over big transactional data in extended MapReduce. In: IEEE International Conference on Granular Computing, pp. 43–48 (2013)

    Google Scholar 

  13. Tianqing, Z.: An outlier detection model based on cross datasets comparison for financial surveillance. In: Proceedings of th 2006 IEEE Asia Pacific Conference on Services Computing, pp. 601–604 (2006)

    Google Scholar 

  14. Patel, A.B., Birla, M., Nair, U.: Addressing big data problem using Hadoop and MapReduce. In: NIRMA University International Conference on Engineering, NUiCONE-2012, 6–8 Dec 2012, pp. 1–5 (2012)

    Google Scholar 

  15. Michalak, K., Korczak, J.: Graph mining approach to suspicious transaction Detection. In: Proceeding of the Federated Conference on Computer Science and Information System, pp. 69–75

    Google Scholar 

  16. Xuan, L., Pengzhu, Z.: An agent based anti-money laundering system architecture for financial supervision. In: International Conference on Wireless Communications, Networking and Mobile Computing, pp. 5472–5475 (2007)

    Google Scholar 

  17. Yang Qifeng, Feng Bin, Song Ping, “Study on Anti-Money Laundering service system of online payment based on Union-Bank mode”, International conference on wireless communications, networking and mobile computing, 2007, pp. 49–91

    Google Scholar 

  18. Berghel, H.: The Future Of Digital Money Laundering. August 2014, pp. 70–75 (2014)

    Google Scholar 

  19. Jutla, D.N., Bodorik, P., Ali, S.: Emerging privacy for big data apps with the unified modeling language. In: IEEE International Congress on Big data, pp. 38–45 (2013)

    Google Scholar 

  20. le Khac, N.A., Kechadi, M.T.: Application of data mining for anti money laundering detection: a case study. In: IEEE International Conference on Data Mining Workshops, pp. 577–584 (2010)

    Google Scholar 

  21. Bernard, K., Cassidy, A., Clark, M., Liu, K., Lobaon, K., McNeill, D., Brown, D.: Indentifying and tracking online financial services through web mining and latent semantic indexing. In: Proceedings of 2011 IEEE Systems and Information Engineering Design Symposium, University of virginia, 29 Apr 2011, pp. 158–163 (2011)

    Google Scholar 

  22. Umadevi, P.M.E., Divya, A.P.E.: Money laundering detection using TFA system. In: International Conference on Software Engineering and Mobile Application Modelling and Development, 19–21 Dec 2012, pp. 1–8 (2012)

    Google Scholar 

  23. Wang, S.N., Yang, J.G.: A money laundering risk evaluation method based on decision tree. In: Proceedings of the 6th International Conference on Machine Learning and Cybernetics, Hongkong, 19–22 Aug 2007, pp. 283–286

    Google Scholar 

  24. Bastia, S.: Next generation technologies to combat counterfeiting of electronic components. In: IEEE Transaction on Components and Packaging Technologies, vol. 25, No. 1, Mar 2002, pp. 175–176 (2002)

    Google Scholar 

  25. Sobolevsky, S., Sitko, I., et. al.: Money on the move: big data of bank card transactions as the new proxy for human mobility patterns and regional delineation. The case of residents and Foreign visitors in Spain. In: IEEE International Congress on Big Data, pp. 136–143 (2014)

    Google Scholar 

  26. Demchenko, Y., Grosso, P., de Laat, C., Membray, P.: Addressing big data issues in scientific data infrastructure. In: International Conference on Collaboration Technologies and Systems, pp. 48–55 (2013)

    Google Scholar 

  27. Song, Y., Alatorre, G., Mandagree, N., Singh, A.: Storage mining: where IT management meets big data analytics. In: IEEE International Congress on Big data, pp. 421–422 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akshay Chadha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Chadha, A., Kaur, P. (2018). Handling Smurfing Through Big Data. In: Aggarwal, V., Bhatnagar, V., Mishra, D. (eds) Big Data Analytics. Advances in Intelligent Systems and Computing, vol 654. Springer, Singapore. https://doi.org/10.1007/978-981-10-6620-7_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6620-7_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6619-1

  • Online ISBN: 978-981-10-6620-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics