Transaction Monitoring for Crypto: Rules-Based vs ML-Based Approaches
Should your crypto transaction monitoring use fixed rules, machine learning, or both? Here's a technical comparison with real-world detection performance data.

Transaction monitoring is the control that operates continuously after onboarding — scanning every transaction for patterns that may indicate money laundering, terrorist financing, fraud, or sanctions evasion. For crypto firms, the volume, velocity, and diversity of transactions make monitoring both more critical and more challenging than in traditional finance.
A medium-sized crypto exchange processing 500,000 transactions daily must evaluate each transaction against risk rules, behavioral baselines, and counterparty risk indicators — in real time. The monitoring system must distinguish between legitimate trading activity and genuinely suspicious behavior. Getting this distinction wrong in either direction is costly: too many false positives bury the compliance team in noise; too few alerts let real threats pass undetected.
The choice between rules-based monitoring, machine learning-based monitoring, or a hybrid approach is one of the most consequential technical decisions a crypto compliance team will make.
Rules-Based Monitoring
How It Works
Rules-based monitoring evaluates each transaction against a predefined set of conditions. If a transaction matches a rule, it generates an alert. Rules are typically structured as IF-THEN conditions with specific thresholds.
Common rules for crypto transaction monitoring include structuring detection (multiple transactions just below reporting thresholds within a defined time window), velocity rules (transaction frequency exceeding the customer's historical baseline), geographic rules (transactions involving addresses associated with high-risk jurisdictions), counterparty rules (transactions with addresses flagged by blockchain analytics providers as associated with mixers, darknet markets, or sanctioned entities), and amount rules (transactions exceeding predefined dollar thresholds for the customer's risk tier).
Strengths
Rules-based monitoring is transparent. Every alert can be traced to a specific rule with a specific threshold. This transparency is valuable for regulators — when an examiner asks 'why did you flag this transaction?' the answer is precise: 'Rule 7B triggered because the customer conducted 4 transactions of $9,800 each within 24 hours, which matches our structuring detection rule.'
Rules-based monitoring is also predictable. You know exactly what will and will not trigger an alert. This predictability enables systematic tuning — if a rule generates too many false positives, you can adjust the threshold. If it generates too few alerts, you can tighten the conditions.
Weaknesses
Rules-based monitoring catches what you anticipate. If you have a rule for structuring, you will catch structuring. If you do not have a rule for a specific typology — for example, chain-hopping through three different blockchains to obscure the origin of funds — you will not catch it until you write that rule.
Sophisticated actors study rules. If an exchange's structuring detection rule triggers at 5 transactions below $10,000 within 24 hours, a sophisticated launderer will conduct 4 transactions below $10,000 within 24 hours. Rules are static defenses against dynamic adversaries.
Rules-based systems also struggle with the scale of crypto. A medium-sized exchange may need hundreds of rules to cover all relevant typologies. Each rule generates alerts. The combined alert volume can overwhelm investigation teams — particularly when rules interact in ways that generate redundant alerts on the same transaction.
Machine Learning-Based Monitoring
How It Works
ML-based monitoring uses statistical models trained on historical transaction data to identify patterns associated with illicit activity. Rather than evaluating transactions against predefined rules, ML models evaluate transactions against learned patterns — detecting anomalies that deviate from the expected behavior for a given customer, transaction type, or market condition.
ML approaches used in crypto transaction monitoring include supervised learning (models trained on labeled data where known suspicious transactions are marked as positive examples), unsupervised learning (models that identify statistical anomalies without labeled examples), and graph analysis (models that evaluate the network structure of transactions — identifying clusters, circular patterns, and hub-and-spoke structures that may indicate laundering networks).
Strengths
ML-based monitoring catches patterns that rules cannot anticipate. A supervised model trained on thousands of confirmed SAR cases can identify transactions that share subtle characteristics with known suspicious activity — even if those characteristics do not match any specific rule. An unsupervised model can identify customers whose behavior is statistically anomalous relative to their peer group — even if no specific rule has been written for that behavior.
ML models also adapt. As new data becomes available — new SARs, new typologies, new market conditions — models can be retrained to incorporate the latest intelligence. This adaptability is particularly valuable in crypto, where laundering techniques evolve rapidly.
Weaknesses
ML models are less transparent than rules. When an ML model generates an alert, the answer to 'why was this flagged?' may be 'the model identified this transaction as anomalous based on 47 weighted features.' This is less satisfying to regulators than a specific rule with a specific threshold. The 'black box' concern is real and must be addressed through explainability tools that can identify the primary features driving each alert.
ML models require data. A supervised model needs labeled training data — confirmed suspicious transactions and confirmed legitimate transactions. New exchanges without historical SAR data may not have enough labeled examples to train an effective supervised model. Unsupervised models are more suitable for early-stage exchanges because they do not require labeled data, but they may generate more false positives until they accumulate enough transaction history to establish reliable baselines.
ML models also require ongoing maintenance. Model drift — where a model's performance degrades as the underlying data distribution changes — is a real concern. Crypto markets change rapidly. A model trained on 2024 transaction data may not perform well on 2026 transaction data, because trading patterns, token popularity, and market structure have all shifted.
The Hybrid Approach
Why Both
The most effective crypto transaction monitoring systems use both rules and ML — not as alternatives but as complementary layers. Rules catch the known, defined typologies: structuring, threshold exceedances, sanctioned counterparties. ML catches the unknown, emerging typologies: novel laundering techniques, behavioral anomalies, network patterns that do not match any predefined rule.
The hybrid architecture typically works as follows: rules-based monitoring operates as the first layer, catching transactions that match known patterns. ML-based monitoring operates as the second layer, evaluating transactions that pass the rules layer for anomalies that rules do not cover. Network analysis operates as a third layer, evaluating the graph structure of transaction relationships across your user base.
Alerts from all three layers are consolidated into a single alert management queue, where investigators triage, investigate, and resolve each alert. The investigation outcome — confirmed suspicious, confirmed legitimate, or requires additional information — feeds back into the ML model as training data, improving its performance over time.
Implementation Priorities
For exchanges at different stages of maturity, the implementation priority differs. Early-stage exchanges (under 50,000 users) should start with rules-based monitoring covering the core typologies, supplemented by a basic anomaly detection model. Growth-stage exchanges (50,000-500,000 users) should add supervised ML models trained on their own SAR data, graph analysis for network patterns, and more sophisticated behavioral baselines. Mature exchanges (over 500,000 users) should implement the full hybrid stack with continuous model retraining, real-time graph analysis, and automated feature engineering that adapts to changing market conditions.
Crypto Transaction Monitoring FAQ
- Should I use rules or ML for crypto transaction monitoring?
- Both. Rules catch known typologies with transparency that regulators appreciate. ML catches unknown patterns that rules miss. The hybrid approach provides the most comprehensive coverage.
- How many rules does a typical crypto monitoring system need?
- A comprehensive system typically requires 50-200 rules covering structuring, velocity, geographic risk, counterparty risk, amount thresholds, and crypto-specific typologies (mixer use, chain-hopping, privacy coin conversion).
- What is model drift and how do I address it?
- Model drift occurs when an ML model's performance degrades because the data distribution changes over time. Address it through regular model retraining (quarterly at minimum), monitoring of model performance metrics, and periodic independent validation.
- Can I explain ML model alerts to regulators?
- Yes, with proper tooling. Explainability tools (SHAP values, feature importance rankings) can identify the primary factors driving each alert. The key is translating model outputs into language that investigators and examiners can understand.
- What is graph analysis in crypto monitoring?
- Graph analysis evaluates the network structure of transaction relationships — identifying clusters of connected accounts, circular transaction patterns, hub-and-spoke structures, and funnel accounts. It is particularly effective for detecting coordinated laundering networks.
Relevant Articles
How to Build a Crypto AML Program
The AML program framework.
May 12, 2026
What Is Crypto Risk Management?
Where monitoring fits in the broader risk framework.
May 10, 2026
Crypto KYC in Brazil
Market-specific monitoring considerations.
Apr 17, 2026
What is deepidv?
Not everyone loves compliance — but we do. deepidv is the AI-native verification engine and agentic compliance suite built from scratch. No third-party APIs, no legacy stack. We verify users across 211+ countries in under 150 milliseconds, catch deepfakes that liveness checks miss, and let honest users through while keeping bad actors out.
Learn More
