A Dataset-Driven Validation of Structural Constraints in Network Traffic–Based Detection of Financial Crimes

Authors

Muhammad Nuraddeen Ado

Department of Cyber Security, ACETEL, National Open University of Nigeria, Abuja; Department. Of Information Sciences, Federal University, Dutsin-Ma; Katsina State (Nigeria)

Dr. Shafi’i M Abdulhamid

Department of Cyber Security, ACETEL, National Open University of Nigeria, Abuja; Department of Cyber Security, Community College Qatar, Doha; Department of Cyber Security, Federal University of Technology, Minna, Niger State (Nigeria, Qatar)

Prof. Idris Ismaila

Department of Cyber Security, ACETEL, National Open University of Nigeria, Abuja; Department of Cyber Security, Federal University of Technology, Minna, Niger State (Nigeria)

Article Information

DOI: 10.51244/IJRSI.2026.1313CS002

Subject Category: Computer Science

Volume/Issue: 13/13 | Page No: 13-29

Publication Timeline

Submitted: 2026-02-16

Accepted: 2026-02-22

Published: 2026-03-03

Abstract

Modern financial ecosystems are increasingly exposed to money laundering, fraud, phishing, and transaction obfuscation within encrypted and decentralized network environments. While prior research identifies detection challenges conceptually, limited work empirically validates how structural constraints manifest across real-world network datasets. This study presents a dataset-driven validation of structural constraints in network traffic–based detection of financial crime using three progressively scaled real-time datasets: NetTran3, NetTran4, and NetTran5. Quantitative analysis shows that encrypted traffic obscures 22.03% of transactions in NetTran3, rises to 39.29% in NetTran4, and declines to 18.24% in NetTran5, reflecting evolving encryption dynamics. Tumbling services—used for transaction obfuscation—are observed in 34.42%, 34.01%, and 40.22% of transactions, respectively, indicating increasing transactional fragmentation. Additional constraints include scalability pressure, cross-chain complexity, adversarial manipulation, and data imbalance. Rather than benchmarking detection algorithms, this study systematically evaluates how these infrastructural characteristics intensify detection difficulty as dataset size and complexity increase. The findings provide empirical grounding for literature-identified constraints and establish a structured foundation for advancing robust, scalable, and privacy-aware financial crime detection systems.

Keywords

Financial Crime Detection, Network Traffic Analysis

Downloads

References

1. B. Liu, Z. Zhang, X. Xu, and M. Luo, “A comprehensive study on anomaly detection in financial systems,” J. Netw. Comput. Appl., vol. 174, p. 102695, 2021. DOI: 10.1016/j.jnca.2020.102695. [Google Scholar] [Crossref]

2. A. Venčkauskas, R. Maskeliūnas, and R. Damaševičius, “Cryptographic methods in anomaly detection for blockchain systems,” Future Gener. Comput. Syst., vol. 134, p. 203214, 2024. DOI:10.1016/j.future.2023.103214. [Google Scholar] [Crossref]

3. M. Turner, A. Rigby, and T. Green, “Addressing scalability issues in fraud detection: A graph-based approach,” Pattern Recognit., vol. 115, p. 107968, 2020. DOI: 10.1016/j.patcog.2020.107968. [Google Scholar] [Crossref]

4. A. Jeyakumar, D. Nathan, and T. Sam, “Machine learning methods for detecting cryptocurrency-related financial crimes,” Comput. Secur., vol. 109, p. 102212, 2021. DOI: 10.1016/j.cose.2020.102212. [Google Scholar] [Crossref]

5. J. Kang and Q. Buu, “Privacy-preserving techniques in anomaly detection models,” J. Comput. Sci., vol. 147, p. 207345, 2024. DOI: 10.1016/j.jocs.2023.103456. [Google Scholar] [Crossref]

6. R. Pocher, F. Lemos, and K. Gupta, “Challenges in regulatory frameworks for cryptocurrency transactions,” Int. J. Finance, vol. 136, p. 409823, 2023. DOI: 10.1016/j.ijfin.2022.104823. [Google Scholar] [Crossref]

7. S. Nurmara, C. Lee, and D. Wong, “Advances in anomaly detection using ensemble learning techniques,” Inf. Syst., vol. 153, p. 103456, 2023. DOI: 10.1016/j.is.2022.102345. [Google Scholar] [Crossref]

8. F. N. Mauliddiah and W. Sun, “Implementing graph neural networks for detecting financial crimes,” Graph Theory Appl., vol. 12, p. 213245, 2023. DOI: 10.1016/j.gta.2023.123456. [Google Scholar] [Crossref]

9. C. Dumitrescu, R. Martin, and S. Andrei, “Novel approaches to address scalability in transaction analysis,” Distrib. Ledger Res., vol. 94, p. 211345, 2022. DOI: 10.1016/j.dlr.2022.102345. [Google Scholar] [Crossref]

10. D. Gabrielli, P. Ochoa, and H. Nguyen, “Federated learning applications in anomaly detection,” Artif. Intell. Rev., vol. 184, p.20385, 2024. DOI: 10.1016/j.airev.2023.103456. [Google Scholar] [Crossref]

12. A. Khan, F. Raza, and M. Qureshi, Privacy and scalability in blockchain-based financial systems,” Digit. Ledger J., vol. 120, p. 103456, 2023. DOI: 10.1016/j.dlj.2022.102345. [Google Scholar] [Crossref]

13. P. Ghosh, Z. Anwar, and T. Hussain, “Addressing imbalanced datasets in financial fraud detection,” Mach. Learn. Secur. Appl., vol. 45, p. 102345, 2023. DOI: 10.1016/j.mlsa.2022.102345. [Google Scholar] [Crossref]

14. https://drive.google.com/file/d/1qLVeSInr uY6a3-W5bm3ygTRFSnRJ3MY/view?usp=drive_link. [Google Scholar] [Crossref]

15. https://drive.google.com/file/d/1GdS3EcG pIUwKvkdOxJcGinIUwsby1LAO/view?u sp=drive_link. [Google Scholar] [Crossref]

16. https://drive.google.com/file/d/18nsR1g66 hQG3KxCNORtdfXFeiVHdguSC/view?u sp=drive_link. [Google Scholar] [Crossref]

17. Muhammad Nuraddeen Ado. (2025). Network Transaction Datasets [Data set]. Kaggle. https://doi.org/10.34740/KAGGLE/DSV/1 1300360 [Google Scholar] [Crossref]

Metrics

Views & Downloads

Similar Articles