Stock Market Fraud Detection, A Probabilistic Approach

Authors

Abstract:

In order to have a fair market condition, it is crucial that regulators continuously monitor the stock market for possible fraud and market manipulation. There are many types of fraudulent activities defined in this context. In our paper we will be focusing on "front running". According to Association of Certified Fraud Examiners, front running is a form of insider information and thus is very difficult to detect. Front running is committed by brokerage firm employees when they are informed of a customer's large transaction request that could potentially change the price by a substantial amount. The fraudster then places his own order before that of the customer to enjoy the low price. Once the customer's order is placed and the prices are increased he will sell his shares and makes profit. Detecting front running requires not only statistical analysis, but also domain knowledge and filtering. For example, the authors learned from Tehran's Over The Counter (OTC) stock exchange officials that fraudsters may use cover-up accounts to hide their identity. Or they could delay selling their shares to avoid suspicion.  Before being able to present the case to a prosecutor, the analyst needs to determine whether predication exists. Only then, can he start testing and interpreting the collected data. Due to large volume of daily trades, the analyst needs to rely on computer algorithms to reduce the suspicious list. One way to do this is by assigning a risk score to each transaction. In our work we build two filters that determine the risk of each transaction based on the amount of statistical abnormality. We use the Chebyshev inequality to determine anomalous transactions. In the first phase we focus on detecting a large transaction that changes market price significantly. We then look at transactions around it to find people who made profit as a consequence of that large transaction. We tested our method on two different stocks the data for which was kindly provided to us by Tehran Exchange Market. The officials confirmed we were able to detect the fraudster. 

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

A probabilistic approach to fraud detection in telecommunications

In this paper, a method for telecommunications fraud detection is proposed. The method is based on the user profiling utilizing the Latent Dirichlet Allocation (LDA). Fraudulent behavior is detected with use of a threshold-type classification algorithm, allocating the telecommunication accounts into one of two classes: fraudulent account and non-fraudulent account. The paper provides also a met...

full text

Analyzing Stock Market Fraud Cases Using a Linguistics-Based Text Mining Approach

The paper proposes a linguistics-based text mining approach to demonstrate the process of extracting financial concepts from the Security Exchange Commission (SEC) litigation releases (LR). The proposed approach presents the extracted information as a knowledge base to be used in market monitoring surveillance systems. Also, it facilitates users’ acquisition, maintenance and access to financial...

full text

A Dynamical Approach to Stock Market fluctuations

The recent turbulence on the world’s stock markets has reinvigorated the attack on classical economic models of stock market fluctuations. The key problem is determining a dynamic model, which is consistent with observed fluctuations and which reflects investor behavior. Here, we use a novel equation-free approach developed in nonlinear dynamics literature to identify the salient statistical fe...

full text

A Bayesian Approach for a Stock Market Instability Index: Application to the Korean Stock Market

Recently, Kim and others (2009) proposed a stock market instability index ( SMII ) and a corresponding p-value using a nonparametric model fitted to a stable period. However, this SMII has failed to explain the 2008 global financial market crisis because its data-driven approach relies excessively on data from the stable period upon which it is based. To resolve this problem, this study conside...

full text

Fraud Detection in Communications Networks Using Neural and Probabilistic Methods

Fraud detection refers to the attempt to detect illegitimate usage of a communications network. Three methods to detect fraud are presented. Firstly, a feed-forward neural network based on supervised learning is used to learn a discriminative function to classify subscribers using summary statistics. Secondly, Gaussian mixture model is used to model the probability density of subscribers’ past ...

full text

Fraud detection in communication networks using neural and probabilistic methods

Fraud detection refers to the attempt to detect illegitimate usage of a communications network. Three methods to detect fraud are presented. Firstly, a feed-forward neural network based on supervised learning is used to learn a discriminative function to classify subscribers using summary statistics. Secondly, Gaussian mixture model is used to model the probability density of subscribers’ past ...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 17  issue 1

pages  3- 14

publication date 2020-06

By following a journal you will be notified via email when a new issue of this journal is published.

Keywords

No Keywords

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023