Detection of suspicious transactions with database forensics and theory of evidence

3Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The aim of enabling the use of illegally obtained money for legal purposes, while hiding the true source of the funds from government authorities has given rise to suspicious transactions. Illegal transactions are detected using data mining and statistical techniques with the input data like various suspicious reports or the data set of all transactions within a financial institution. The output obtained is the set of highly suspicious transactions or highly suspicious entities (e.g., persons, organizations, or accounts). In this paper, we propose a database forensics methodology to monitor database transactions through audit logs. The Rule-based Bayesian Classification algorithm is applied to determine undetected illegal transactions and predicting initial belief of the transactions to be suspicious. Dempster-Shafer’s theory of evidence is applied to combine different parameters of the transactions obtained through audit logs to verify the uncertainty and risk level of the suspected transactions. Thus a framework is designed and developed which can be used as a tool for the digital investigators.

Cite

CITATION STYLE

APA

Khanuja, H. K., & Adane, D. (2019). Detection of suspicious transactions with database forensics and theory of evidence. In Communications in Computer and Information Science (Vol. 969, pp. 419–430). Springer Verlag. https://doi.org/10.1007/978-981-13-5826-5_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free