用户名: 密码: 验证码:
基于银行机构客户账户的可疑洗钱交易行为识别研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
洗钱既可以是独立的犯罪行为,也可以是其他犯罪(如:贩毒)的下游犯罪,甚至还可以是其他犯罪行为(如:恐怖活动)的上游犯罪。洗钱不仅影响国家的经济发展,同时还会助长社会犯罪风气、动摇国家机器、损害国家形象。随着经济全球化的发展和国际金融市场的完善,反洗钱逐渐成为国际金融领域的重要课题。而数据报告制度是反洗钱的基础。不管是美国的FinCen还是中国人民银行的反洗钱监测分析中心,分析和监测的基础数据都来自于数据报告制度提交的大额和可疑交易报告。我国现行的数据报告制度存在标准模糊、易规避、自适应能力低下、数据海量等问题。本文的主要目的就是要在现行数据报告制度的基础上,提出一种基于银行账户交易数据的不易规避、标准明确且动态变化、人工智能化的可疑交易行为识别方法,这对完善我国反洗钱数据报告制度具有相当重要的意义,同时也符合国际反洗钱研究的发展方向。
     本文的研究力图吸收和发展国内外有关可疑洗钱交易行为识别的最新研究成果,在分析我国现行数据报告制度应用现状和研究成果的基础上,以银行机构客户账户为基础,利用数据挖掘技术进行可疑交易行为识别研究。
     论文首先分析了我国现行反洗钱工作的基本程序,并指出数据报告制度是反洗钱工作的基础和灵魂,从而确定本文的研究意义和研究价值;接着对我国现行的数据报告制度进行了较为详细的分析,主要是“弊”方面的分析,提出本研究的必要性;文章的重点在于在详细分析比较多种欺诈研究算法的基础上,提出最适合可疑交易行为识别的聚类算法和孤立点探测算法,并利用基于统计的孤立点探测技术、LOF算法和改进的网格聚类算法对银行机构客户账户进行偶然可疑行为和惯常可疑行为的识别研究。论文最后通过C++编程对采自银行的真实交易数据进行实验分析。
     本研究最主要的贡献在于:基于改进的网格聚类算法和交易金额离散系数、交易频率、现金/入账金额比率、现金/出账金额比率等四个变量,对银行机构客户账户洗钱的可疑性程度进行排序,为反洗钱监测分析中心选择重点监测对象提供理论依据。
The crime of Money Laundering (ML) can be an independent criminal behavior, and can also be predicate crime and lower crime of other criminal activities. Therefore, ML will not only have an impact on the country's economic development, but also will encourage criminals, threaten national stability and do harm to nations' images. With the development of economic globalization and international financial markets, Anti-money Laundering (AML) becomes an important topic of international financial field. Meanwhile, Suspicious Activity Report (SAR) system is considered as the foundation of Anti-money Laundering. Both in FinCen and China Anti-Money Laundering Monitoring & Analyzing Center, the Large and Suspicious Transactions used for analyzing are supplied by SAR system. The current SAR system adopted by China has such limitations as fuzzy criterions, less of adaptive abilities, easy to avoid and massive data, etc. The main purpose of this paper is to put forward an automatic and dynamic suspicious transactional activities recognition method which is difficult to avoid and easy to measure. All of these are based on current SAR system and bank accounts. This is rather significant for the development of SAR system and accord with the future research direction of AML.
    The up-to-minute research results of suspicious transaction activities recognition at home and abroad are greatly accepted and developed in this thesis. Base on the analysis of current SAR system in China, it does research on suspicious activities recognition via data mining. In this process, Outlier Detection Technology, Grid-based clustering algorithm and LOF algorithm have been applied.
    Firstly, the current AML procedures in China are analyzed. At the same
引文
[1] 边肇祺.模式识别(第二版)[M].北京:清华大学出版社.2000:123-150
    [2] 常树民.金融业反洗钱问题研究.江西财经大学硕士学位论文.2004:20-30
    [3] 陈辉金,韩元杰.数据挖掘和信息融合在保险业欺诈识别中的应用.计算机与现代化.2005(9):110-112
    [4] 陈建.信用卡的反欺诈管理.中国信用卡.2005(8):20-24
    [5] 樊爽文.支付交易监测浅析.金融会计.2003(2):28-29
    [6] 封文丽.中国反洗钱体系的构建策略.华南金融研究.2002,17(6):11-14
    [7] 高增安,翁丽芳.国际贸易可疑洗钱行为研究述评.工作论文.2006
    [8] 高增安.反洗钱可疑交易行为报告制度评析.工作论文.2006
    [9] 郭红玉.反洗钱的经济学思考.中国金融.2003(3):26-27
    [10] 郭金生.提高基层央行反洗钱效率浅析.济南金融.2004(6):21-22
    [11] 胡秋灵,姚文辉,宋晓萌.聚类分析方法在反洗钱应用中的优先序研究.华南金融电脑.2005(11):84-87
    [12] 黄守坤.异常数据挖掘及在经济欺诈发现中的应用.统计与决策.2003(4):32-33
    [13] 康建卓,康宇航.经济全球化背景下我国反洗钱控制制度设计初探.华东经济管理.2004,18(2):145-147
    [14] 龙明开.基于“决策树”的银行业洗钱和反洗钱分析.科技广场.2006(3):44-45
    [15] 李琛.构建于大型机台和数据挖掘技术的反洗钱系统.武汉大学工程硕士学位论文.2005:47-64
    [16] 李莉霞.我国反洗钱问题研究.广西师范大学硕士学位论文.2004:24-31
    [17] 梁英武.支付交易与反洗钱[M].北京:中国金融出版社,2003:47-86
    [18] 林仪昌.洗钱的国际公害与反洗钱.福建金融.1997(9):48
    [19] 林升铿.反洗钱的统计监测与信息报告.2005(6):48-50
    [20] 刘源.运用聚类数据挖掘技术预防电信业中的欺诈行为.吉林大学硕士学位论文.2005:55-78
    [21] 刘祥明.电信客户欺诈预测系统研究及应用.重庆大学硕士学位论文.2005:30-41
    [22] 刘凌云.基于数据挖掘的银行信用风险管理办法研究.广东工业大学硕士学位论文.2004:38-54
    [23] 刘辉.基于贝叶斯分类技术的电信客户欺诈分析.西南交通大学硕士学位论文.2005:20-25
    [24] 刘清福,曹军.当前可疑支付交易调查中存在的问题及建议.武汉金融.2005(12):32-33
    [25] 卢正鼎,王琼.基于相似度的离群模式发现模型.华中科技大学学报(自然科学版).2005,33(1):22-25
    [26] 孙小林,卢正鼎.基于反洗钱应用的一种有效的增量聚类算法.华中科技大学学报(自然科学版).2004,32(11):85-87
    [27] 孙莹莹,姚文辉.数据挖掘技术在反洗钱系统中的应用.华南金融电脑.2004(4):81-83
    [28] 孙小林.金融数据挖掘中的增量聚类算法及应用研究.华中科技大学硕士学位论文.2004:17-41
    [29] 谭德彬,陈藻.基于数据挖掘技术的银行反洗钱系统.中国金融电脑.2003(7):33-35
    [30] 汤俊.基于客户行为模式识别的反洗钱数据监测和分析体系.中南财经政法大学学报.2005(4):62-69
    [31] 汤俊.自适应反洗钱辅助信息系统开发框架设计.管理学报.2005,2(增刊1):28-30
    [32] 徐加根.洗钱行为的特征分析.西南金融.2004(12):50-51
    [33] 徐远纯,柳炳祥,盛昭翰.一种基于粗集的欺诈风险分析方法.计算机应用.2004,24(1):20-22
    [34] 徐志春,肖伟平,何宏.数据开采技术在反洗钱系统中的应用.湖南工程学院学报.2003,13(3):64-67
    [35] 薛庆宏,杨秀萍.反洗钱中可疑支付交易的识别.中国金融.2006(1):62
    [36] 许峰.我国金融机构反洗钱行为的博弈分析.上海金融.2004(12):25-27
    [37] 杨胜刚,王鹏,贺学会.决策树算法在反洗钱领域中的应用研究.湖南大学学报(社会科学版).2006,20(1):65-71
    [38] 杨胜刚,何靖.反洗钱领域大额与可疑信息报告制度的经济学分析.金融研究.2004(10):113-119
    [39] 杨胜刚,王鹏.基于数据挖掘技术的人民币反洗钱系统设计.财经理论与实践.2005,26(138):105-109
    [40] 杨红玉.反“洗钱”与中国金融监管制度研究.河北大学硕士学位论文.2004:32-41
    [41] 张成虎,李时.基于AI技术的反洗钱系统设计.中国金融电脑.2005(3):44-47
    [42] 张昭涛.数据挖掘聚类算法研究.西南交通大学硕士学位论文.2005:21-29
    [43] 邹蜀宁.中国反洗钱问题探析.中国海洋大学硕士学位论.2003:9-16
    [44] 张自力.国际反洗钱可疑交易报告制度改革:英国的实践与启示.上海金融学院学报.2006(2):55-71
    [45] 张炎.知识发现在金融反洗钱领域中的应用研究.合肥工业大学硕士学位论文.2004:4-8
    [46] 朱宝明.我国银行业反洗钱的成本与收益分析.金融研究.2004(4):57-65
    [47] 朱宝明.银行业反洗钱中信息不对称与信息披露的例证分析.国际金融研究.2004(4):65-69
    [48] 中国新闻网.中国反沈钱如何运作[EB/OL] www.chinanews.com.cn/n/2003-02-19/26/274152.html.
    [49] 华夏经纬.http://www.huaxia.com/2004年11月16日
    [50] Abel A. S. and Gerson J. S. All Practitioners-Not Just Auditors-need to Understand How Regulators Expect Them to Help. Journal of Accountancy. 2001, 191(6): 26-31
    [51] Barse, E., Kvarnstrom, H., and Jonsson, E. Synthesizing Test Data for Fraud Detection System. Proc. Of the 19th Annual Computer Security Applications Conference. 2003: 384-395
    [52] De Boyrie, M. E., Pak, S. J., and Zdanowicz, J. The impact of Switzerland's money laundering law on capital flows through abnormal pricing in international trade. Applied Financial Economics. 2005, 15: 217-230
    [53] De Boyrie, M. E., Pak, S. J., and Zdanowicz, J. Estimating the magnitude of capital flight due to abnormal pricing in international trade: The Russia-USA case. Accounting Forum. 2005, 29: 249-270
    [54] Fawcett, T. and Provost, F. Adaptive Fraud Detection. Data Mining and Knowledge Discovery. 1997, 1(3): 291-316
    [55] Gao, Z. and Ye, M. A Framework for Data Mining-Based Anti-Money Laundering Research. submitted to Journal of Money Laundering Control.2006
    [56] Gao, Z. and Weng, L. Transfer Price-based Money Laundering in International Trade. Proceedings of 2006 International Conference on Management Science and Engineering. Harbin Institute of Technology Press. 2006: 1128-1132
    [57] Gao, Z. Comments on Anti-Money Laundering Suspicious Activity Report Regime. Proceedings of 2006 International Conference on Public Administration. University of Electronic Science and Technology of China Press. 2006: 970-975
    [58] Goldberg, H. G. and Wong, R. W. H. Restructuring Transactional Data for Link Analysis in the FinCEN AI System". Proceedings of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis.AAAI Press, Menlo Park, C.A. 1998
    [59] Goldberg, H. G. and Senator, T. E. Restructuring Database for Knowledge Discovery by Consolidation and Link Formation. Proceedings of the First International Conference on Knowledge Discovery in Database (KDD-95)". AAAI Press, Menlo Park, Calif. 1995: 136-141
    [60] Han. J, Huang. Y, Cercone. N. Data Mining: An Overview from database perspective. IEEE Transaction on knowledge and data engineering. 1996, 8(6): 1-40
    [61] Hand, D. J. Data Mining: Statistics and More?. The American Statistician. 1998, 52(2): 112-118
    [62] Han, J. and Kamber, M. Data Mining: Concepts and Technique. Morgan Kaufmann Publishers. 2001
    [63] Hampton M.P. Christensen J. Offshore Pariahs? Small Island Economies, Tax Havens, and the Re-configuration of Global Finance. World Development. 2002, 30(9): 1658-1673
    [64] Howard, F. Taxation and Money Laundering: A Personal View. Journal of Money Laundering Control. 2002, 5(4): 323-324
    [65] Johnson, J. Australia: Attitudes to Extending the Scope of Anti-Money Laundering Legislation. Journal of Money Laundering Control. 2001, 5(1): 16-24
    [66] Klerks, P. The Network Paradigm Applied to Criminal Organizations: Theoretical Nitpicking or a Relevant Doctrine for Investigators? Recent Developments in the Netherlands. Connections. 2001, 24(3): 53-65
    [67] Kovalerchuk, B. and Vityaev, E. Detecting Patterns of Fraudulent Behavior in Forensic Accouting. 'Palade, V., Howlett, R. J., and Jain, L. C'. (EDS). KES 2003, LNAT. Springer-Verlag, Berlin Heidellberg. 2003, 2773: 502-509
    [68] Kingdon, J. AI Fights Money Laundering. IEEE Intelligent System. 2004, 5/6: 87-89
    [69] Kishima, K. Japan's Efforts in the Global Fight Against Money Laundering and Terrorist Financing. Journal of Money Laundering Control. 2004, 7(3): 261-263\
    [70] Latimer, P. Reporting suspicions of money laundering and 'whistleblowing': the legal and other implications for intermediaries and their advisers. Journal of Financial Crime. 2002, 10(1): 23-29
    [71] Lambert, A. The Carribean Anti-Money Laundering Program. Journal of Money Laundering Control. 2001, 5(2): 158-161
    [72] M.M. Breunig, H. P. Kriegel, Raymond T. Ng, Jorg Sander. LOF: Identifying Density-Based Local Outliers. Proc. ACM SIGMOD 2000 Int. Conf On Management of Data Dalles, TX. 2000
    [73] Maylam, S. Prosecution for Money Laundering in the UK. Journal of Financial Crime. 2002, 10(2): 157-158
    [74] Ping, H. The Suspicious Transactions Reporting System. Journal of Money Laundering Control, 2005, 8(3): 252-259
    [75] Phua, C., Lee, V., Smith, K., and Gayler, R. A Comprehensive Survey of Data Mining-Based Fraud Detection Research. Available at www.bsys.monash.edu.au
    [76] Philippsohn, S. Money Laundering on the Internet. Computer&Security. 2001(20): 485-490
    [77] Papadimitriou, S., Kitagawa, H., Phillip B.Gibbons and Faloutsos, C. "LOCI: Fast Outlier Detection Using the Local Correlation Integral". http://www.Intei-research.net/Publications/Pittsburgh/08162002132599.pdf1
    [78] Rahn, R. W. "Why the War on Money Laundering Should Be Aborted". in Syverson, P. (ed.). 2001, LNCS 2339: 149-155
    [79] R E Bell. Discretion and Decision Making in Money Laundering Prosecutions. Journal of Money Laundering Control. 2001, 5(1): 42-51
    [80] Ricardo M. Alba. Evolution of Methods of Money Laundering in Latin America. Journal of Financial Crime. 2002, 10(2): 137-140
    [81] Senator, T. E., Goldberg, H. G., and Wooton, J. The Financial Crimes Enforcement Network AI System (FAIS): Identifying Potential Money Laundering from Reports of Large Cash Transactions. AI Magazine. 1995, 16(4): 21-39
    [82] Scholkopf, B., Platt, J. C., Taylor, J. S., and Smola, A. L. Estimating the Support of a High-Dimensional Distribution. Neural Computation. 2001, 13(7): 1443-1471
    [83] Tang, J. and Yin, J. Developing an Intelligent Data Discriminating System of Antimony Laundering Based on SVM. Proc. of the Fourth International Conference on Machine Learning and Cybernetics. Guangzhou. 2005: 3453-3457
    [84] The SAR Activity Review, By the Numbers, Issue 5, February 2006.
    [85] Vikram, A., Chennuru, S., Rao, H. R., and Upadhyaya, S. A Solution Architecture for Financial Institutions to Handle Illegal Activities: a Neural Networks Approach. Proc. of the 37th Hawaii International Conference on System Sciences-2004. 2004
    [86] Xanthaki, H. Lawyers' Duties under the Draft EU Money Laundering Directive: Is Confidentiality a Thing of the Past? Journal of Money Laundering Control. 2001, 5(2): 103-114
    [87] Xu, J. J. and Chen, H. Fighting Organized Crimes: Using Shortest-Path Algorithms to Identify Associations in Criminal Networks. Decision Support Systems. 2004, 38: 473-487
    [88] Yaniv, G. Tax Evasion, Risky Laundering, and Optimal Deterrence Policy. International Tax and Public Finance. 1999, 6(1):27-38
    [89] Zdanowicz, J. S. Detecting money laundering and terrorist financing via data mining. Communications of the ACM 2004, 47 (5): 53-55
    
    [90] Zdanowicz, J. S. Who's watching our back door? Business Accents 2004, 1(1): 27-29
    [91] Zhang, Z., Salerno, J. J., and Yu, P. S. Applying Data Mining in Investigating Money Laundering Crimes. SIGKDD'03. Washingdon, DC. 2003: 747-752

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700