DEEP LEARNING MODEL FOR DETECTING TERROR FINANCING PATTERNS IN FINANCIAL TRANSACTIONS
DOI:
https://doi.org/10.60087/jklst.vol3.n3.p.288-296Abstract
Terror financing remains a critical threat to global security, with illicit actors continually adapting their methods to evade detection. Traditional financial monitoring systems often struggle to identify the complex and covert patterns associated with terror-related transactions due to their reliance on predefined rules and statistical thresholds. This study introduces advanced deep learning models designed to detect terror financing patterns within vast datasets of financial transactions. We developed and evaluated several neural network architectures, including Convolutional Neural Networks (CNNs) and Long Short-Term Memory networks (LSTMs), to capture both spatial and temporal transaction features. The models were trained and tested on a dataset comprising anonymized financial transactions labeled for suspicious activities related to terror financing. Our deep learning models demonstrated superior performance over conventional machine learning approaches, achieving higher accuracy, precision, and recall in identifying suspicious transactions. Notably, the LSTM-based model excelled in detecting sequential transaction patterns indicative of layering and integration stages commonly used in terror financing. The results underscore the potential of deep learning techniques in enhancing the capabilities of financial institutions and regulatory bodies to combat terror financing. Implementing such models can lead to more proactive and effective monitoring systems that adapt to evolving illicit financing strategies.
Downloads
References
Abakarim, Y., Lahby, M., & Attioui, A. (2018, October). An efficient real-time model for credit card fraud detection based on deep learning. In Proceedings of the 12th International Conference on Intelligent Systems: Theories and Applications (pp. 1–7). https://doi.org/10.1145/3289402.3289530
Abdi, H., & Williams, L. J. (2010). Principal component analysis. Wiley Interdisciplinary Reviews: Computational Statistics, 2(4), 433–459. https://doi.org/10.1002/wics.101
Arora, V., Leekha, R. S., Lee, K., & Kataria, A. (2020, October). Facilitating user authorization from imbalanced data logs of credit cards using artificial intelligence. Mobile Information Systems, 2020, 1–13. https://doi.org/10.1155/2020/8885269
Balogun, A. O., Basri, S., Abdulkadir, S. J., & Hashim, A. S. (2019, July). Performance analysis of feature selection methods in software defect prediction: A search method approach. Applied Sciences, 9(13), 2764. https://doi.org/10.3390/app9132764
Bandaranayake, B. (2014, December). Fraud and corruption control at education system level: A case study of the Victorian Department of Education and Early Childhood Development in Australia. Journal of Cases in Educational Leadership, 17(4), 34–53. https://doi.org/10.1177/1555458914549669
Błaszczyński, J., de Almeida Filho, A. T., Matuszyk, A., Szeląg, M., & Słowiński, R. (2021). Auto loan fraud detection using dominance-based rough set approach versus machine learning methods. Expert Systems with Applications, 163, Article 113740. https://doi.org/10.1016/j.eswa.2020.113740
Branco, B., Abreu, P., Gomes, A. S., Almeida, M. S. C., Ascensão, J. T., & Bizarro, P. (2020). Interleaved sequence RNNs for fraud detection. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (pp. 3101–3109). https://doi.org/10.1145/3394486.3403361
Cartella, F., Anunciacao, O., Funabiki, Y., Yamaguchi, D., Akishita, T., & Elshocht, O. (2021). Adversarial attacks for tabular data: Application to fraud detection and imbalanced data. arXiv. https://arxiv.org/abs/2101.08030
Lad, S. S., & Adamuthe, A. C. (2021, December). Malware classification with improved convolutional neural network model. International Journal of Computer Network and Information Security, 12(6), 30–43. https://doi.org/10.5815/ijcnis.2020.06.03
Dornadula, V. N., & Geetha, S. (2019, January). Credit card fraud detection using machine learning algorithms. Procedia Computer Science, 165, 631–641. https://doi.org/10.1016/j.procs.2020.01.057
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Journal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online)
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2024 All rights reserved by the respective authors and JKLST.