Identifying Potentially Illicit Money Laundering and Terrorism Financing Transactions Through Machine Learning Techniques DOI: https://doi.org/10.33093/ijomfa.2025.6.2.9
Main Article Content
Abstract
Financial institutions worldwide face significant challenges in detecting and preventing illicit financial activities, such as money laundering and terrorism financing. Traditional rule-based methods often generate high false positive rates, increasing manual verification efforts and higher operational costs. This research explores machine learning techniques to enhance the detection of suspicious transactions. Several algorithms, including K-Nearest Neighbors, Decision Tree, Random Forest, Logistic Regression, Support Vector Machine, and Naïve Bayes, are applied and evaluated using a dataset from a financial institution. After a comprehensive performance assessment, the Random Forest model is the most effective, exhibiting the highest accuracy of 0.9333 in identifying suspicious transactions while minimising false positives. These findings highlight the potential of integrating machine learning into financial crime prevention protocols. It serves as a guide for practitioners to predict suspicious transactions in financial institutions based on previous patterns of transactions. It also helps financial institutions to reduce compliance costs, which are typically higher than those of standard rule-based systems. However, this work presents a suspicious transaction prediction paradigm from prior behaviour with no transparency in features and with high accuracy and zero false positives, as with the Financial Action Task Force (FATF) promotion of new Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) initiatives.
Article Details
References
Alexandre, C., & Balsa, J. (2016). Integrating Client Profiling in an Anti-Money Laundering Multi-Agent Based System. https://doi.org/10.1007/978-3-319-31232-3_88
Bank Negara Malaysia. (2001). LAWS OF MALAYSIA Anti-Money Laundering, Anti-Terrorism Financing and Proceeds of Unlawful Activities Act 2001 Date of Royal Assent.
Bank Negara Malaysia. (2019, December 31). Malaysia’s AML/CFT Regime.
Bhavsar, H., & Ganatra, A. (2012). A Comparative Study of Training Algorithms for Supervised Machine Learning. International Journal of Soft Computing and Engineering (IJSCE), 2.
Breiman, L. (2001). Random Forests. Machine Learning, 45(1), 5–32. https://doi.org/10.1023/A:1010933404324
Burkart, N., & Huber, M. F. (2021). A Survey on the Explainability of Supervised Machine Learning. In Journal of Artificial Intelligence Research (Vol. 70).
Cervantes, J., García-Lamont, F., Rodríguez, L., & Lopez-Chau, A. (2020). A comprehensive survey on support vector machine classification: Applications, challenges and trends. Neurocomputing, 408. https://doi.org/10.1016/j.neucom.2019.10.118
Chen, S., Webb, G., Liu, L., & Ma, X. (2019). A novel selective naïve Bayes algorithm. Knowledge-Based Systems, 192, 105361. https://doi.org/10.1016/j.knosys.2019.105361
Chen, Z., Le, D. V.-K., Teoh, E., Nazir, A., Karuppiah, E., & Lam, K. (2018). Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: a review. Knowledge and Information Systems, 57. https://doi.org/10.1007/s10115-017-1144-z
Chong, A. Y. W., Khaw, K. W., Yeong, W. C., & Chuah, W. X. (2023). Customer Churn Prediction of Telecom Company Using Machine Learning Algorithms. Journal of Soft Computing and Data Mining, 4(2), 1–22. https://doi.org/10.30880/jscdm.2023.04.02.001
Deng, X., Joseph, V. R., Sudjianto, A., & Wu, C.-F. (2009). Active Learning Through Sequential Design, With Applications to Detection of Money Laundering. Journal of the American Statistical Association, 104, 969–981. https://doi.org/10.1198/jasa.2009.ap07625
Dietterich, T. (2000). An Experimental Comparison of Three Methods for Constructing Ensembles of Decision Trees: Bagging, Boosting, and Randomization. Mach. Learn., 40. https://doi.org/10.1023/A:1007607513941
Estabrooks, A., Jo, D. T., & Japkowicz, N. (2004). A Multiple Resampling Method for Learning from Imbalanced Data Sets. Computational Intelligence, 20, 18–36. https://doi.org/10.1111/j.0824-7935.2004.t01-1-00228.x
Financial Action Task Force. (2022, March). FATF Recommendations. Financial Action Task Force. https://www.fatfgafi.org/publications/fatfrecommendations/documents/fatf-recommendations.html
Gandhi, H., Tandon, K., Gite, S., Pradhan, B., & Alamri, A. (2024). Navigating the Complexity of Money Laundering: Anti-money Laundering Advancements with AI/ML Insights. International Journal on Smart Sensing and Intelligent Systems, 17(1). https://doi.org/10.2478/ijssis-2024-0024
Gao, Z., & Ye, M. (2007). A framework for data mining-based anti-money laundering research. Journal of Money Laundering Control, 10. https://doi.org/10.1108/13685200710746875
Gregorutti, B., Michel, B., & Saint-Pierre, P. (2017). Correlation and variable importance in random forests. Statistics and Computing, 27(3), 659–678. https://doi.org/10.1007/s11222-016-9646-1
Grint, R., O’Driscoll, C., & Paton, S. (2017). New Technologies and Anti-Money Laundering Compliance. https://www.fca.org.uk/publication/research/new-technologies-in-aml-final-report.pdf
Heidarinia, N., Harounabadi, A., & Sadeghzadeh, M. (2014). An Intelligent Anti-Money Laundering Method for Detecting Risky Users in the Banking Systems. International Journal of Computer Applications, 97, 35–39. https://doi.org/10.5120/17141-7780
Hu, L., Chen, J., Vaughan, J., Aramideh, S., Yang, H., Wang, K., Sudjianto, A., & Nair, V. N. (2021). Supervised Machine Learning Techniques: An Overview with Applications to Banking. International Statistical Review, 89(3), 573–604. https://doi.org/10.1111/insr.12448
IMF Staff. (2023). IMF policy paper 2023 review of the fund’s anti-money laundering and combating the financing of terrorism strategy. http://www.imf.org/external/pp/ppindex.aspx
Jadhav, S. D., & Channe, H. P. (2013). Comparative Study of K-NN, Naive Bayes and Decision Tree Classification Techniques. International Journal of Science and Research (IJSR) ISSN, 5, 1842–1845. www.ijsr.net
Jiang, T., Gradus, J., & Rosellini, A. (2020). Supervised Machine Learning: A Brief Primer. Behavior Therapy, 51. https://doi.org/10.1016/j.beth.2020.05.002
Jullum, M., Løland, A., Huseby, R., Ånonsen, G., & Lorentzen, J. (2020). Detecting money laundering transactions with machine learning. Journal of Money Laundering Control, ahead-of-print. https://doi.org/10.1108/JMLC-07-2019-0055
Koehrsen, W. (2024). Precision and Recall: How to evaluate your classification model. https://builtin.com/data-science/precision-and-recall#:~:text=In%20machine%20learning%2C%20precision%20and,falling%20into%20a%20single%20class.
Li, G., & Qin, Y. (2024). An Exploration of the Application of Principal Component Analysis in Big Data Processing. Applied Mathematics and Nonlinear Sciences, 9. https://doi.org/10.2478/amns-2024-0664
Narkhede, S. (2018, May 9). Understanding Confusion Matrix. Towards Data Science. https://towardsdatascience.com/understanding-confusion-matrix-a9ad42dcfd62
Ngai, E. W. T., Hu, Y., Wong, Y. H., Chen, Y., & Sun, X. (2011). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision Support Systems, 50(3), 559–569. https://doi.org/https://doi.org/10.1016/j.dss.2010.08.006
Nhu, V.-H., Shirzadi, A., Shahabi, H., Singh, S. K., Al-Ansari, N., Clague, J. J., Jaafari, A., Chen, W., Miraki, S., Dou, J., Luu, C., Górski, K., Thai Pham, B., Nguyen, H. D., & Ahmad, B. Bin. (2020). Shallow Landslide Susceptibility Mapping: A Comparison between Logistic Model Tree, Logistic Regression, Naïve Bayes Tree, Artificial Neural Network, and Support Vector Machine Algorithms. International Journal of Environmental Research and Public Health, 17(8). https://doi.org/10.3390/ijerph17082749
Omoseebi, A., Ola, G., & Tyler, J. (2025). Rule-Based Systems in AML.
Osisanwo, F. Y., Akinsola, J. E. T., Awodele O., Hinmikaiye, J. O., Olakanmi, O., & Akinjobi, J. (2017). Supervised Machine Learning Algorithms: Classification and Comparison. International Journal of Computer Trends and Technology, 48, 128–138. http://www.ijcttjournal.org
Plakandaras, B., Gogas, P., Papadimitriou, T., & Tsamardinos, I. (2022). Credit Card Fraud Detection with Automated Machine Learning Systems. Applied Artificial Intelligence, 36. https://doi.org/10.1080/08839514.2022.2086354
Ramentol, E., Caballero, Y., Bello, R., & Herrera, F. (2011). SMOTE-RSB *: A hybrid preprocessing approach based on oversampling and undersampling for high imbalanced datasets using SMOTE and rough sets theory. Knowledge and Information Systems, 33. https://doi.org/10.1007/s10115-011-0465-6
Sarmah, J., & Sarma, S. (2016). Decision Tree based Supervised Word Sense Disambiguation for Assamese. International Journal of Computer Applications, 141, 42–48. https://doi.org/10.5120/ijca2016909488
Savage, D., Wang, Q., Chou, P., Zhang, X., & Yu, X. (2016). Detection of money laundering groups using supervised learning in networks. https://doi.org/10.48550/arXiv.1608.00708
Soofi, A., & Awan, A. (2017). Classification Techniques in Machine Learning: Applications and Issues. Journal of Basic & Applied Sciences, 13, 459–465. https://doi.org/10.6000/1927-5129.2017.13.76
Statista. (2021). Number of online transactions in Malaysia 2020, by payment method. https://www.statista.com/statistics/907694/malaysia-online-transaction-number-by-payment-method/
Sudjianto, A., Nair, S., Yuan, M., Zhang, A., Kern, D. A., & Cela-Díaz, F. (2010). Statistical Methods for Fighting Financial Crimes. Technometrics, 52, 19–5. https://api.semanticscholar.org/CorpusID:34785896
Zhang, H., Jiang, L., & Yu, L. (2021). Attribute and instance weighted naive Bayes. Pattern Recognition, 111, 107674. https://doi.org/10.1016/j.patcog.2020.107674