The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
To Monitor and Detect Suspicious Transactions in a Financial Transaction System Through Database Forensic Audit and Rule-Based Outlier Detection Model
Abstract
The objective of this chapter is to monitor database transactions and provide information accountability to databases. It provides a methodology to retrieve and standardize different audit logs in a uniform XML format which are extracted from different databases. The financial transactions obtained through audit logs are then analyzed with database forensic audit. The transactions are examined, detected, and classified as per regulations and well-defined RBI antimony laundering rules to obtain outliers and suspicious transactions within audit logs. Bayesian network is used in this research to represent rule-based outlier detection model which identifies the risk level of the suspicious transactions.
Related Content
V. V. Devi Prasad Kotni, Sujit Kumar Patra, Sunil Kumar.
© 2024.
21 pages.
|
Adekunle Alexander Balogun, Gbenga Olorunmade.
© 2024.
15 pages.
|
Ashwani Sharma, Nitpal Singh Rathod.
© 2024.
15 pages.
|
Peterson K. Ozili.
© 2024.
11 pages.
|
Yusuf Olatunji Oyedeko, Adesola Trust Gbadebo.
© 2024.
15 pages.
|
Oladapo Fepetu, Pelumi Abdulmalik Adewumi.
© 2024.
21 pages.
|
Rifkatu Nghargbu.
© 2024.
16 pages.
|
|
|