Advertisement

Two Step graph-based semi-supervised Learning for Online Auction Fraud Detection

  • Phiradet BangcharoensapEmail author
  • Hayato Kobayashi
  • Nobuyuki Shimizu
  • Satoshi Yamauchi
  • Tsuyoshi Murata
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9286)

Abstract

We analyze a social graph of online auction users and propose an online auction fraud detection approach. In this paper, fraudsters are those who participate in their own auction in order to drive up the final price. They tend to frequently bid in auctions hosted by fraudulent sellers, who work in the same collusion group. Our graph-based semi-supervised learning approach for online auction fraud detection is based on this social interaction of fraudsters. Auction users and their transactions are represented as a social interaction graph. Given a small set of known fraudsters, our aim was to detect more fraudsters based on the hypothesis that strong edges between fraudsters frequently exist in online auction social graphs. Detecting fraudsters who work in collusion with known fraudsters was our primary goal. We also found that weighted degree centrality is a distinct feature that separates fraudsters and legitimate users. We actively used this fact to detect fraud. To this end, we extended the modified adsorption model by incorporating the weighted degree centrality of nodes. The results, from real world data, show that by integrating the weighted degree centrality to the model can significantly improve accuracy.

Keywords

Online auction fraud detection Graph-based semi-supervised learning Weighted degree centrality 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akoglu, L., McGlohon, M., Faloutsos, C.: oddball: spotting anomalies in weighted graphs. In: Zaki, M.J., Yu, J.X., Ravindran, B., Pudi, V. (eds.) PAKDD 2010. LNCS, vol. 6119, pp. 410–421. Springer, Heidelberg (2010) CrossRefGoogle Scholar
  2. 2.
    Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Mining and Knowledge Discovery, 1–63 (2014)Google Scholar
  3. 3.
    Chapelle, O., Schölkopf, B., Zien, A.: Semi-supervised learning. MIT, Cambridge (2010) Google Scholar
  4. 4.
    Chau, D.H., Pandit, S., Faloutsos, C.: Detecting fraudulent personalities in networks of online auctioneers. In: Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol. 4213, pp. 103–114. Springer, Heidelberg (2006) CrossRefGoogle Scholar
  5. 5.
    Chau, D.H., Nachenberg, C., Wilhelm, J., Wright, A., Faloutsos, C.: Polonium: tera-scale graph mining and inference for malware detection. In: SIAM International Conference on Data Mining (SDM), pp. 131–142 (2011)Google Scholar
  6. 6.
    Dong, F., Shatz, S.M., Xu, H.: Combating online in-auction fraud: Clues, techniques and challenges. Computer Science Review 3(4), 245–258 (2009)CrossRefGoogle Scholar
  7. 7.
    Järvelin, K., Kekäläinen, J.: IR evaluation methods for retrieving highly relevant documents. In: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2000, pp. 41–48. ACM, New York (2000)Google Scholar
  8. 8.
    Lin, S.J., Jheng, Y.Y., Yu, C.H.: Combining ranking concept and social network analysis to detect collusive groups in online auctions. Expert Systems with Applications 39(10), 9079–9086 (2012)CrossRefGoogle Scholar
  9. 9.
    McGlohon, M., Bay, S., Anderle, M.G., Steier, D.M., Faloutsos, C.: Snare: a link analytic system for graph labeling and risk detection. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2009, pp. 1265–1274. ACM, New York (2009)Google Scholar
  10. 10.
    Mislove, A., Viswanath, B., Gummadi, K.P., Druschel, P.: You are who you know: inferring user profiles in online social networks. In: Proceedings of the 3rd ACM International Conference on Web Search and Data Mining, WSDM 2010, pp. 251–260. ACM, New York (2010)Google Scholar
  11. 11.
    Pandit, S., Chau, D.H., Wang, S., Faloutsos, C.: Netprobe: a fast and scalable system for fraud detection in online auction networks. In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, pp. 201–210. ACM, New York (2007)Google Scholar
  12. 12.
    Rubin, S., Christodorescu, M., Ganapathy, V., Giffin, J.T., Kruger, L., Wang, H., Kidd, N.: An auctioning reputation system based on anomaly. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, pp. 270–279. ACM, New York (2005)Google Scholar
  13. 13.
    Shah, H.S., Joshi, N.R., Sureka, A., Wurman, P.R.: Mining ebay: bidding strategies and shill detection. In: Zaïane, O.R., Srivastava, J., Spiliopoulou, M., Masand, B. (eds.) WebKDD 2003. LNCS (LNAI), vol. 2703, pp. 17–34. Springer, Heidelberg (2003) CrossRefGoogle Scholar
  14. 14.
    Talukdar, P.P., Crammer, K.: New regularized algorithms for transductive learning. In: Buntine, W., Grobelnik, M., Mladenić, D., Shawe-Taylor, J. (eds.) ECML PKDD 2009, Part II. LNCS, vol. 5782, pp. 442–457. Springer, Heidelberg (2009) CrossRefGoogle Scholar
  15. 15.
    Talukdar, P.P., Pereira, F.: Experiments in graph-based semi-supervised learning methods for class-instance acquisition. In: Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics, ACL 2010, pp. 1473–1481. Association for Computational Linguistics (2010)Google Scholar
  16. 16.
    Tsang, S., Koh, Y.S., Dobbie, G., Alam, S.: Detecting online auction shilling frauds using supervised learning. Expert Systems with Applications 41(6), 3027–3040 (2014)CrossRefGoogle Scholar
  17. 17.
    Viswanath, B., Post, A., Gummadi, K.P., Mislove, A.: An analysis of social network-based sybil defenses. SIGCOMM Comput. Commun. Rev. 40(4), 363–374 (2010)CrossRefGoogle Scholar
  18. 18.
    Vlasselaer, V.V., Akoglu, L., Eliassi-Rad, T., Snoeck, M., Baesens, B.: Guilt-by-constellation: fraud detection by suspicious clique memberships. In: 2015 48th Hawaii International Conference on System Sciences (HICSS), pp. 918–927 (2015)Google Scholar
  19. 19.
    Yoshida, T., Ohwada, H.: Shill bidder detection for online auctions. In: Zhang, B.-T., Orgun, M.A. (eds.) PRICAI 2010. LNCS, vol. 6230, pp. 351–358. Springer, Heidelberg (2010) CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Phiradet Bangcharoensap
    • 1
    Email author
  • Hayato Kobayashi
    • 2
  • Nobuyuki Shimizu
    • 2
  • Satoshi Yamauchi
    • 2
  • Tsuyoshi Murata
    • 1
  1. 1.Tokyo Institute of TechnologyMeguroJapan
  2. 2.Yahoo Japan CorporationMinatoJapan

Personalised recommendations