HAMLET: A Transformer Based Approach for Money Laundering Detection

  • Conference paper
  • First Online:
Cyber Security, Cryptology, and Machine Learning (CSCML 2023)

Abstract

Money laundering has damaging economic, security, and social consequences, fueling criminal activities like terrorism, human and drug trafficking. Recent technological advancements have increased the complexity of laundering operations, prompting financial institutions to use more advanced Anti Money Laundering (AML) techniques. In particular, machine learning-based transaction monitoring can complement traditional rule-based systems, lowering the number of false positives and the need to manually review fraud alerts. In this paper, we present HAMLET, a scalable Deep Learning model for analyzing financial transactions and detecting money laundering patterns. HAMLET employs a hierarchical transformer enforcing an attention mechanism at the transaction and sequence level. By combining the two different levels, HAMLET can identify complex money laundering operations carried out through subsequent transactions. We experimentally evaluate HAMLET on a synthetic dataset simulating clients trading on international capital markets, showing that HAMLET outperforms state-of-the-art solutions in detecting fraudulent transactions. In the experiments, HAMLET achieves \(99\%\) precision in a binary classification scenario and up to \(95\%\) in a multi-class scenario with 5 different money laundering schemes. Lastly, we investigate the proposed model’s interpretability through a proxy method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 74.89
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 96.29
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alsuwailem, A.A.S., Saudagar, A.K.J.: Anti-money laundering systems: a systematic literature review. J. Money Laundering Control 23, 833–848 (2020)

    Article  Google Scholar 

  2. Black, H.C.: Black’s Law Dictionary, 9th edn. Thomson Reuters, St. Paul (2009)

    Google Scholar 

  3. Breiman, L.: Random forests. Mach. Learn. 45(1), 5–32 (2001)

    Article  MATH  Google Scholar 

  4. Brown, A., Tuor, A., Hutchinson, B., Nichols, N.: Recurrent neural network attention mechanisms for interpretable system log anomaly detection. ar**v e-prints ar**v:1803.04967 (2018)

  5. Carminati, M., Caron, R., Maggi, F., Epifani, I., Zanero, S.: BankSealer: an online banking fraud analysis and decision support system. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 380–394. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55415-5_32

    Chapter  Google Scholar 

  6. Carminati, M., Caron, R., Maggi, F., Epifani, I., Zanero, S.: BankSealer: a decision support system for online banking fraud analysis and investigation. Comput. Secur. 53, 175–186 (2015)

    Article  Google Scholar 

  7. Carminati, M., Polino, M., Continella, A., Lanzi, A., Maggi, F., Zanero, S.: Security evaluation of a banking fraud analysis system. ACM Trans. Priv. Secur. 21(3), 11:1–11:31 (2018). https://doi.org/10.1145/3178370

  8. Carminati, M., Santini, L., Polino, M., Zanero, S.: Evasion attacks against banking fraud detection systems. In: Egele, M., Bilge, L. (eds.) 23rd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2020, San Sebastian, Spain, 14–15 October 2020, pp. 285–300. USENIX Association (2020). https://www.usenix.org/conference/raid2020/presentation/carminati

  9. Carminati, M., Valentini, L., Zanero, S.: A supervised auto-tuning approach for a banking fraud detection system. In: Dolev, S., Lodha, S. (eds.) CSCML 2017. LNCS, vol. 10332, pp. 215–233. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60080-2_17

    Chapter  Google Scholar 

  10. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 15:1–15:58 (2009). https://doi.org/10.1145/1541880.1541882

  11. Das, S., Islam, M.R., Jayakodi, N.K., Doppa, J.R.: Active anomaly detection via ensembles: insights, algorithms, and interpretability (2019). https://arxiv.org/abs/1901.08930

  12. Devlin, J., Chang, M., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. In: Burstein, J., Doran, C., Solorio, T. (eds.) Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL-HLT 2019, Minneapolis, MN, USA, 2–7 June 2019 (Volume 1: Long and Short Papers), pp. 4171–4186. Association for Computational Linguistics (2019). https://doi.org/10.18653/v1/n19-1423

  13. Dumitrescu, B., Baltoiu, A., Budulan, S.: Anomaly detection in graphs of bank transactions for anti money laundering applications. IEEE Access 10, 47699–47714 (2022)

    Article  Google Scholar 

  14. FATF: FATF (2022). https://www.fatf-gafi.org/faq/moneylaundering/. Accessed 06 June 2022

  15. Fincen: Money Laundering phase (2022). https://www.fincen.gov/history-anti-money-laundering-laws. Accessed 06 June 2022

  16. Hariri, S., Kind, M.C., Brunner, R.J.: Extended isolation forest. IEEE Trans. Knowl. Data Eng. 33(4), 1479–1489 (2021)

    Article  Google Scholar 

  17. Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735–1780 (1997)

    Article  Google Scholar 

  18. Huang, S., et al.: Hitanomaly: hierarchical transformers for anomaly detection in system log. IEEE Trans. Netw. Serv. Manag. 17(4), 2064–2076 (2020)

    Article  Google Scholar 

  19. IMF: IMF (2022). https://www.imf.org/en/Home. Accessed 06 June 2022

  20. Jensen, R., Iosifidis, A.: Qualifying and raising anti-money laundering alarms with deep learning. Expert Syst. Appl. 214, 119037 (2023)

    Article  Google Scholar 

  21. Jensen, R.I.T., Iosifidis, A.: Fighting money laundering with statistics and machine learning. IEEE Access 11, 8889–8903 (2023)

    Article  Google Scholar 

  22. Jullum, M., Løland, A., Huseby, R.B., Ånonsen, G., Lorentzen, J.: Detecting money laundering transactions with machine learning. J. Money Laundering Control 23, 173–186 (2020)

    Article  Google Scholar 

  23. Kute, D.V., Pradhan, B., Shukla, N., Alamri, A.M.: Deep learning and explainable artificial intelligence techniques applied for detecting money laundering-a critical review. IEEE Access 9, 82300–82317 (2021)

    Article  Google Scholar 

  24. Labanca, D., Primerano, L., Markland-Montgomery, M., Polino, M., Carminati, M., Zanero, S.: Amaretto: an active learning framework for money laundering detection. IEEE Access 10, 41720–41739 (2022)

    Article  Google Scholar 

  25. Labanca, D., Primerano, L., Markland-Montgomery, M., Polino, M., Carminati, M., Zanero, S.: Amaretto Dataset - A Synthetic Capital Market Dataset (2022). https://github.com/necst/amaretto_dataset. Accessed 06 June 2022

  26. Labib, N.M., Rizka, M.A., Shokry, A.E.M.: Survey of machine learning approaches of anti-money laundering techniques to counter terrorism finance. In: Ghalwash, A.Z., El Khameesy, N., Magdi, D.A., Joshi, A. (eds.) Internet of Things—Applications and Future. LNNS, vol. 114, pp. 73–87. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-3075-3_5

    Chapter  Google Scholar 

  27. Le-Khac, N., Kechadi, M.T.: Application of data mining for anti-money laundering detection: a case study. In: Fan, W., et al. (eds.) The 10th IEEE International Conference on Data Mining Workshops, ICDMW 2010, Sydney, Australia, 13 December 2010, pp. 577–584. IEEE Computer Society (2010). https://doi.org/10.1109/ICDMW.2010.66

  28. Liu, F.T., Ting, K.M., Zhou, Z.: Isolation forest. In: Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), Pisa, Italy, 15–19 December 2008, pp. 413–422. IEEE Computer Society (2008). https://doi.org/10.1109/ICDM.2008.17

  29. Luo, T., Nagarajan, S.G.: Distributed anomaly detection using autoencoder neural networks in WSN for IoT. In: 2018 IEEE International Conference on Communications, ICC 2018, Kansas City, MO, USA, 20–24 May 2018, pp. 1–6. IEEE (2018). https://doi.org/10.1109/ICC.2018.8422402

  30. Peters, M.E., et al.: Deep contextualized word representations. CoRR abs/1802.05365 (2018). https://arxiv.org/abs/1802.05365

  31. Ribeiro, M.T., Singh, S., Guestrin, C.: “Why should I trust you?”: explaining the predictions of any classifier. In: Krishnapuram, B., Shah, M., Smola, A.J., Aggarwal, C.C., Shen, D., Rastogi, R. (eds.) Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, 13–17 August 2016, pp. 1135–1144. ACM (2016). https://doi.org/10.1145/2939672.2939778

  32. Rodríguez, J.F., Papale, M., Carminati, M., Zanero, S.: A natural language processing approach for financial fraud detection. In: Demetrescu, C., Mei, A. (eds.) Proceedings of the Italian Conference on Cybersecurity (ITASEC 2022), Rome, Italy, 20–23 June 2022. CEUR Workshop Proceedings, vol. 3260, pp. 135–149. CEUR-WS.org (2022). https://ceur-ws.org/Vol-3260/paper10.pdf

  33. Savage, D., Wang, Q., Zhang, X., Chou, P., Yu, X.: Detection of money laundering groups: supervised learning on small networks. In: The Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, San Francisco, California, USA, 4–9 February 2017, AAAI Technical Report, vol. WS-17. AAAI Press (2017). https://aaai.org/ocs/index.php/WS/AAAIW17/paper/view/15101

  34. Tiwari, M., Gepp, A., Kumar, K.: A review of money laundering literature: the state of research in key areas. Pac. Account. Rev. (2020)

    Google Scholar 

  35. Van Vlasselaer, V., Verbeke, W.: Fraud Analytics Using Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for Fraud Detection. SAS Institute Inc., Wiley (2015). https://books.google.it/books?id=daNmjwEACAAJ

  36. Vaswani, A., et al.: Attention is all you need, pp. 5998–6008 (2017). https://proceedings.neurips.cc/paper/2017/hash/3f5ee243547dee91fbd053c1c4a845aa-Abstract.html

  37. Veeramachaneni, K., Arnaldo, I., Korrapati, V., Bassias, C., Li, K.: AI2: training a big data machine to defend. In: 2nd IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2016, IEEE International Conference on High Performance and Smart Computing, HPSC 2016, and IEEE International Conference on Intelligent Data and Security, IDS 2016, New York, NY, USA, 9–10 April 2016, pp. 49–54. IEEE (2016). https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.79

  38. Villalobos, M., Silva, E.: A statistical and machine learning model to detect money laundering: an application (2017)

    Google Scholar 

  39. Wang, M., Xu, L., Guo, L.: Anomaly detection of system logs based on natural language processing and deep learning, pp. 140–144 (2018). https://doi.org/10.1109/ICFSP.2018.8552075

  40. Williams, G.J., Baxter, R.A., He, H., Hawkins, S., Gu, L.: A comparative study of RNN for outlier detection in data mining. In: Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), Maebashi City, Japan, 9–12 December 2002, pp. 709–712. IEEE Computer Society (2002). https://doi.org/10.1109/ICDM.2002.1184035

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Maria Paola Tatulli , Tommaso Paladini , Mario D’Onghia , Michele Carminati or Stefano Zanero .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tatulli, M.P., Paladini, T., D’Onghia, M., Carminati, M., Zanero, S. (2023). HAMLET: A Transformer Based Approach for Money Laundering Detection. In: Dolev, S., Gudes, E., Paillier, P. (eds) Cyber Security, Cryptology, and Machine Learning. CSCML 2023. Lecture Notes in Computer Science, vol 13914. Springer, Cham. https://doi.org/10.1007/978-3-031-34671-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-34671-2_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-34670-5

  • Online ISBN: 978-3-031-34671-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation