Advertisement

Detecting Fraud in Internet Auction Systems

  • Yanlin Peng
  • Linfeng Zhang
  • Yong Guan
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 306)

Abstract

Fraud compromises the thriving Internet auction market. Studies have shown that fraudsters often manipulate their reputations through sophisticated collusions with accomplices, enabling them to defeat the reputation-based feedback systems that are used to combat fraud. This paper presents an algorithm that can identify colluding fraudsters in real time. Experiments with eBay transaction data show that the algorithm has low false negative and false positive rates. Furthermore, the algorithm can identify fraudsters who are innocent at the time of the data collection, but engage in fraudulent transactions soon after they accumulate good feedback ratings.

Keywords

Internet auctions fraud detection 

References

  1. 1.
    S. Ba, A. Whinston and H. Zhang, Building trust in online auction markets through an economic incentive mechanism, Decision Support Systems, vol. 35(3), pp. 273–286, 2003.CrossRefGoogle Scholar
  2. 2.
    B. Bhargava, Y. Zhong and Y. Lu, Fraud formalization and detection, Proceedings of the Fifth International Conference on Data Warehousing and Knowledge Discovery, pp. 330–339, 2003.CrossRefGoogle Scholar
  3. 3.
    M. Calkins, My reputation always had more fun than me: The failure of eBay’s feedback model to effectively prevent online auction fraud, Richmond Journal of Law and Technology, vol. VII(4), 2001.Google Scholar
  4. 4.
    D. Chakrabarti, Y. Zhan and C. Faloutsos, R-MAT: A recursive model for graph mining, Proceedings of the SIAM International Conference on Data Mining, 2004.Google Scholar
  5. 5.
    D. Chau and C. Faloutsos, Fraud detection in electronic auctions, Proceedings of the European Web Mining Forum, 2005.Google Scholar
  6. 6.
    D. Chau, S. Pandit and C. Faloutsos, Detecting fraudulent personalities in networks of online auctioneers, Proceedings of the Tenth European Conference on Principles and Practice of Knowledge Discovery in Databases, pp. 103–114, 2006.CrossRefGoogle Scholar
  7. 7.
    D. Gibson, R. Kumar and A. Tomkins, Discovering large dense subgraphs in massive graphs, Proceedings of the Thirty-First International Conference on Very Large Data Bases, pp. 721–732, 2005.Google Scholar
  8. 8.
    D. Houser and J. Wodders, Reputation in auctions: Theory and evidence from eBay, Journal of Economics and Management Strategy, vol. 15(2), pp. 353–369, 2006.CrossRefGoogle Scholar
  9. 9.
    Internet Crime Complaint Center, Internet Crime Report 2006 (www.ic3.gov/media/annualreport/2006_IC3Report.pdf), 2006.Google Scholar
  10. 10.
    R. Kumar, P. Raghavan, S. Rajagopalan and A. Tomkins, Trawling the web for cyber communities, Computer Networks, vol. 31(11-16), pp. 1481–1493, 1999.CrossRefGoogle Scholar
  11. 11.
    S. Pandit, D. Chau, S. Wang and C. Faloutsos, Netprobe: A fast and scalable system for fraud detection in online auction networks, Proceedings of the Sixteenth International Conference on the World Wide Web, pp. 201–210, 2007.Google Scholar
  12. 12.
    M. Zhou and F. Hwang, PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing, IEEE Transactions on Parallel and Distributed Systems, vol. 18(4), pp. 460–473, 2007.CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2009

Authors and Affiliations

  • Yanlin Peng
  • Linfeng Zhang
  • Yong Guan

There are no affiliations available

Personalised recommendations