Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/3120676.3120692guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Detecting fraudulent personalities in networks of online auctioneers

Published: 18 September 2006 Publication History
  • Get Citation Alerts
  • Abstract

    Online auctions have gained immense popularity by creating an accessible environment for exchanging goods at reasonable prices. Not surprisingly, malevolent auction users try to abuse them by cheating others. In this paper we propose a novel method, 2-Level Fraud Spotting (2LFS), to model the techniques that fraudsters typically use to carry out fraudulent activities, and to detect fraudsters preemptively. Our key contributions are: (a) we mine user level features (e.g., number of transactions, average price of goods exchanged, etc.) to get an initial belief for spotting fraudsters, (b) we introduce network level features which capture the interactions between different users, and (c) we show how to combine both these features using a Belief Propagation algorithm over a Markov Random Field, and use it to detect suspicious patterns (e.g., unnaturally close-nit groups of people that trade mainly among themselves). Our algorithm scales linearly with the number of graph edges. Moreover, we illustrate the effectiveness of our algorithm on a real dataset collected from a large online auction site.

    References

    [1]
    Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. In: Seventh international conference on World Wide Web, vol. 7, pp. 107-117 (1998)
    [2]
    Chau, D.H., Faloutsos, C.: Fraud detection in electronic auction. In: European Web Mining Forum at ECML/PKDD (2005)
    [3]
    Chua, C., Wareham, J.: Fighting internet auction fraud: An assessment and proposal. Computer 37(10), 31-37 (2004)
    [4]
    eBbay 2006 1Q financial results (2006), http://investor.ebay.com/releases.cfm
    [5]
    Federal trade commission: Internet auctions: A guide for buyers and sellers (2004), http://www.ftc.gov/bcp/conline/pubs/online/auctions.htm
    [6]
    Gyongyi, Z., Molina, H.G., Pedersen, J.: Combating web spam with TrustRank. In: VLDB, pp. 576-587 (2004)
    [7]
    IC3 2004 internet fraud - crime report (2005), http://www.ifccfbi.gov/strategy/statistics.asp
    [8]
    Kleinberg, J.: Authoritative sources in a hyperlinked environment. ACM (JACM) 46, 604-632 (1999)
    [9]
    Melnik, M., Alm, J.: Does a seller's ecommerce reputation matter? Evidence from eBay auctions. Industrial Economics 50, 337-349 (2002)
    [10]
    Msnbc: Man arrested in huge ebay fraud (2003), http://msnbc.msn.com/id/3078461/
    [11]
    Neville, J., Jensen, D.: Collective classification with relational dependency networks. In: 2nd Multi-Relational Data Mining Workshop, 9th ACM SIGKDD, pp. 77-91 (2003)
    [12]
    Neville, J., Simsek, Jensen, D., Komoroske, J., Palmer, K., Goldberg, H.: Using relational knowledge discovery to prevent securities fraud. In: 11th ACM SIGKDD, pp. 449-458 (2005)
    [13]
    Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation systems. Communications of the ACM 43, 45-48 (2000)
    [14]
    Resnick, P., Zeckhauser, R., Swanson, J., Lockwood, K.: The value of reputation on eBay: A controlled experiment (2003)
    [15]
    USA Today: How to avoid online auction fraud (2002), http://www.usatoday.com/tech/columnist/2002/05/07/yaukey.htm
    [16]
    Yedidia, J.S., Freeman, W.T., Weiss, Y.: Understanding belief propagation and its generalizations. Exploring artificial intelligence in the new millennium, 239-269 (2003)

    Cited By

    View all
    • (2017)Anomalous Reviews Owing to Referral IncentiveProceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 201710.1145/3110025.3110100(313-316)Online publication date: 31-Jul-2017
    • (2016)Extracting and reasoning about implicit behavioral evidences for detecting fraudulent online transactions in e-CommerceDecision Support Systems10.1016/j.dss.2016.04.00386:C(109-121)Online publication date: 1-Jun-2016
    • (2015)Two Step graph-based semi-supervised learning for online auction fraud detectionProceedings of the 2015th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part III10.5555/3120539.3120551(165-179)Online publication date: 7-Sep-2015
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ECMLPKDD'06: Proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases
    September 2006
    658 pages
    ISBN:3540453741
    • Editors:
    • Johannes Fürnkranz,
    • Tobias Scheffer,
    • Myra Spiliopoulou

    Sponsors

    • Pascal
    • Google Inc.
    • Humboldt Univ.: Humboldt-Universität zu Berlin
    • Strato AG: Strato AG
    • IBM: IBM

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 18 September 2006

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)Anomalous Reviews Owing to Referral IncentiveProceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 201710.1145/3110025.3110100(313-316)Online publication date: 31-Jul-2017
    • (2016)Extracting and reasoning about implicit behavioral evidences for detecting fraudulent online transactions in e-CommerceDecision Support Systems10.1016/j.dss.2016.04.00386:C(109-121)Online publication date: 1-Jun-2016
    • (2015)Two Step graph-based semi-supervised learning for online auction fraud detectionProceedings of the 2015th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part III10.5555/3120539.3120551(165-179)Online publication date: 7-Sep-2015
    • (2015)Automated Attacks on Compression-Based ClassifiersProceedings of the 8th ACM Workshop on Artificial Intelligence and Security10.1145/2808769.2808778(69-80)Online publication date: 16-Oct-2015
    • (2015)TrueViewProceedings of the 24th International Conference on World Wide Web10.1145/2736277.2741655(787-797)Online publication date: 18-May-2015
    • (2014)CatchSyncProceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining10.1145/2623330.2623632(941-950)Online publication date: 24-Aug-2014
    • (2014)Local context selection for outlier ranking in graphs with multiple numeric node attributesProceedings of the 26th International Conference on Scientific and Statistical Database Management10.1145/2618243.2618266(1-12)Online publication date: 30-Jun-2014
    • (2013)On the hardness of evading combinations of linear classifiersProceedings of the 2013 ACM workshop on Artificial intelligence and security10.1145/2517312.2517318(77-86)Online publication date: 4-Nov-2013
    • (2013)A probability-based trust prediction model using trust-message passingProceedings of the 22nd International Conference on World Wide Web10.1145/2487788.2487867(161-162)Online publication date: 13-May-2013
    • (2013)A KDD-Based Methodology to Rank Trust in e-Commerce SystemsProceedings of the 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) - Volume 0110.1109/WI-IAT.2013.211(577-584)Online publication date: 17-Nov-2013
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media