INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIV, Issue XII, December 2025
Financial fraud encompasses a broad range of deceptive practices, including identity theft, credit card fraud, and
embezzlement. The digital age has witnessed an escalation in Cyber fraud, exploiting vulnerabilities in online
transactions and electronic banking systems. As fraudsters continually evolve their tactics, financial institutions
must adapt and employ advanced technologies to stay ahead in the ongoing battle against fraudulent activities.
Terrorism Financing involves providing funds to support terrorist activities. Tracking and preventing such
transactions are crucial for national security. Terrorist organizations often exploit financial networks to move
money discreetly, necessitating robust mechanisms to identify and disrupt these channels. The interconnected
nature of the global financial system makes it imperative to enhance measures that can effectively recognize
patterns associated with terrorism financing.
Combating financial crimes often involves leveraging machine learning algorithms for anomaly detection within
streaming financial datasets. However, as revealed by Ado, M.N et al, (2023) in the study titled “Comparative
Analysis of Financial Fraud Techniques in Nigeria: Unveiling Expert-Based Hacking and Social Engineering
Strategies” it was found that all perpetrators of these financial crimes engage in various forms of layering
activities. Consequently, this study aims to investigate several methods for detecting layering activities within
financial datasets, with the goal of identifying the most effective approach for layering detection.
Layering:
In the context of financial transactions, layering is a sophisticated pre-laundering technique that involves the
deliberate and systematic structuring of multiple financial transactions, often exploiting mechanisms such as
currency exchange, to obscure the origin and ownership of funds. In Nigeria, layerers exploit subsidies allocated
by financial institutions, such as the USD subsidy allocated by the Central Bank of Nigeria (CBN) to account
holders, by converting funds from NGN to USD through a series of complex transactions. This process creates
layers of financial activity, making it difficult for authorities to trace the source of the funds and identify potential
illicit activities.
To achieve this objective, the study employs Systematic Detection based on the layering activities and
specifications highlighted in the previous study, utilizing extracted features for Systematic Detection on a dataset
titled SFinDSet, which contains information on layerers.
To evaluate the performance and accuracy of the Systematic Detection model, the output is compared with the
results obtained from various machine learning classification algorithms, including One-Class SVM and
Isolation Forest, as well as clustering algorithms such as Online k-Means and hierarchical clustering.
By comparing the effectiveness of these different approaches, the study aims to recommend a more reliable
architecture for the detection of financial crimes in streaming data. This approach allows for a comprehensive
assessment of the various methods and their suitability for detecting layering activities, thereby enhancing the
overall effectiveness of financial crime detection systems.
Systematic Detection
In the realm of financial crimes mitigation, data assumes a compelling narrative, awaiting articulation through a
concise and persuasive voice. As Stephen Few suggests, the information embedded in data becomes truly
meaningful when structured adeptly, facilitating pattern identification that, in turn, narrates a compelling story
about specific user behaviors. In the context of this research, the process of Systematic Detection unfolds through
the meticulous structuring of pertinent data. This structured approach serves as the key to unveiling intricate
patterns within financial transactions, ultimately empowering the identification and interpretation of meaningful
insights that contribute to a comprehensive understanding of user behaviors in the context of money laundering,
fraud, and terrorism financing.
Systematic Detection involves the processes for identification of an instance through the step-wise reduction of
the system’s specifics and mechanics. Such processes include extraction of recurring structures, configurations,
or regularities within a set of data, observations, or information. It entails discerning meaningful patterns or
Page 1383