Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Temporal burstiness and collaborative camouflage aware fraud detection

Published: 01 March 2023 Publication History

Abstract

With the prosperity and development of the digital economy, many fraudsters have emerged on e-commerce platforms to fabricate fraudulent reviews to mislead consumers’ shopping decisions for profit. Moreover, in order to evade fraud detection, fraudsters continue to evolve and present the phenomenon of adversarial camouflage and collaborative attack. In this paper, we propose a novel temporal burstiness and collaborative camouflage aware method (TBCCA) for fraudster detection. Specifically, we capture the hidden temporal burstiness features behind camouflage strategy based on the time series prediction model, and identify highly suspicious target products by assigning suspicious scores as node priors. Meanwhile, a propagation graph integrating review collusion is constructed, and an iterative fraud confidence propagation algorithm is designed for inferring the label of nodes in the graph based on Loop Belief Propagation (LBP). Comprehensive experiments are conducted to compare TBCCA with state-of-the-art fraudster detection approaches, and experimental results show that TBCCA can effectively identify fraudsters in real review networks with achieving 6%–10% performance improvement than other baselines.

References

[1]
Agrawal M., Leela Velusamy R., Unsupervised spam detection in hyves using SALSA, in: Proceedings of the 4th international conference on frontiers in intelligent computing: theory and applications (FICTA) 2015, Springer, 2016, pp. 517–526.
[2]
Akoglu, L., Chandy, R., & Faloutsos, C. (2013). Opinion fraud detection in online reviews by network effects. In Proceedings of the international AAAI conference on web and social media, Vol. 7 (pp. 2–11).
[3]
Bhuyan M.H., Bhattacharyya D.K., Kalita J.K., Network anomaly detection: methods, systems and tools, Ieee Communications Surveys & Tutorials 16 (1) (2013) 303–336.
[4]
Byun H., Jeong S., Kim C.-k., SC-com: Spotting collusive community in opinion spam detection, Information Processing & Management 58 (4) (2021).
[5]
Chalapathy R., Chawla S., Deep learning for anomaly detection: A survey, 2019, arXiv preprint arXiv:1901.03407.
[6]
Chen, H., He, D., Zhu, S., & Yang, J. (2017). Toward detecting collusive ranking manipulation attackers in mobile app markets. In Proceedings of the 2017 ACM on Asia conference on computer and communications security (pp. 58–70).
[7]
Chen Z., Sun A., Anomaly detection on dynamic bipartite graph with burstiness, in: 2020 IEEE international conference on data mining (ICDM), IEEE, 2020, pp. 966–971.
[8]
Chino D.Y., Costa A.F., Traina A.J., Faloutsos C., VolTime: Unsupervised anomaly detection on users’ online activity volume, in: Proceedings of the 2017 SIAM international conference on data mining, SIAM, 2017, pp. 108–116.
[9]
Dou, Y., Liu, Z., Sun, L., Deng, Y., Peng, H., & Yu, P. S. (2020). Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In Proceedings of the 29th ACM international conference on information & knowledge management (pp. 315–324).
[10]
Dromard J., Roudière G., Owezarski P., Online and scalable unsupervised network anomaly detection method, IEEE Transactions on Network and Service Management 14 (1) (2016) 34–47.
[11]
Eswaran D., Günnemann S., Faloutsos C., Makhija D., Kumar M., Zoobp: Belief propagation for heterogeneous networks, Proceedings of the VLDB Endowment 10 (5) (2017) 625–636.
[12]
Fayazi A., Lee K., Caverlee J., Squicciarini A., Uncovering crowdsourced manipulation of online reviews, in: Proceedings of the 38th international ACM SIGIR conference on research and development in information retrieval, 2015, pp. 233–242.
[13]
Fei G., Mukherjee A., Liu B., Hsu M., Castellanos M., Ghosh R., Exploiting burstiness in reviews for review spammer detection, in: Proceedings of the international AAAI conference on web and social media, Vol. 7, 2013, pp. 175–184.
[14]
Feng, S., Banerjee, R., & Choi, Y. (2012). Syntactic stylometry for deception detection. In Proceedings of the 50th annual meeting of the association for computational linguistics (Volume 2: short papers) (pp. 171–175).
[15]
Feng, S., Xing, L., Gogar, A., & Choi, Y. (2012). Distributional footprints of deceptive product reviews. In Proceedings of the international AAAI conference on web and social media, Vol. 6 (pp. 98–105).
[16]
Günnemann, N., Günnemann, S., & Faloutsos, C. (2014). Robust multivariate autoregression for anomaly detection in dynamic product ratings. In Proceedings of the 23rd international conference on world wide web (pp. 361–372).
[17]
Guo Z., Shen Y., Bashir A.K., Imran M., Kumar N., Zhang D., et al., Robust spammer detection using collaborative neural network in internet-of-things applications, IEEE Internet of Things Journal 8 (12) (2020) 9549–9558.
[18]
Guo Z., Tang L., Guo T., Yu K., Alazab M., Shalaginov A., Deep graph neural network-based spammer detection under the perspective of heterogeneous cyberspace, Future Generation Computer Systems 117 (2021) 205–218.
[19]
Guo Z., Yu K., Jolfaei A., Bashir A.K., Almagrabi A.O., Kumar N., Fuzzy detection system for rumors through explainable adaptive learning, IEEE Transactions on Fuzzy Systems 29 (12) (2021) 3650–3664.
[20]
Guo Z., Yu K., Jolfaei A., Ding F., Zhang N., Fuz-spam: label smoothing-based fuzzy detection of spammers in internet of things, IEEE Transactions on Fuzzy Systems (2021).
[21]
Hai, Z., Zhao, P., Cheng, P., Yang, P., Li, X.-L., & Li, G. (2016). Deceptive review spam detection via exploiting task relatedness and unlabeled data. In Proceedings of the 2016 conference on empirical methods in natural language processing (pp. 1817–1826).
[22]
Hamilton W., Ying Z., Leskovec J., Inductive representation learning on large graphs, Advances in Neural Information Processing Systems 30 (2017).
[23]
Hershkovitch Neiterman, E., Bitan, M., & Azaria, A. (2020). Multilingual deception detection by autonomous agents. In Companion proceedings of the web conference 2020 (pp. 480–484).
[24]
Hooi, B., Song, H. A., Beutel, A., Shah, N., Shin, K., & Faloutsos, C. (2016). Fraudar: Bounding graph fraud in the face of camouflage. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining (pp. 895–904).
[25]
Huang, M., Liu, Y., Ao, X., Li, K., Chi, J., Feng, J., et al. (2022). AUC-oriented Graph Neural Network for Fraud Detection. In Proceedings of the ACM web conference 2022 (pp. 1311–1321).
[26]
Jindal, N., & Liu, B. (2008). Opinion spam and analysis. In Proceedings of the 2008 international conference on web search and data mining (pp. 219–230).
[27]
Kumar S., Gao X., Welch I., Mansoori M., A machine learning based web spam filtering approach, in: 2016 IEEE 30th international conference on advanced information networking and applications (AINA), IEEE, 2016, pp. 973–980.
[28]
Li H., Chen Z., Liu B., Wei X., Shao J., Spotting fake reviews via collective positive-unlabeled learning, in: 2014 IEEE international conference on data mining, IEEE, 2014, pp. 899–904.
[29]
Li H., Fei G., Wang S., Liu B., Shao W., Mukherjee A., et al., Modeling review spam using temporal patterns and co-bursting behaviors, 2016, arXiv preprint arXiv:1611.06625.
[30]
Li, H., Fei, G., Wang, S., Liu, B., Shao, W., Mukherjee, A., et al. (2017). Bimodal distribution and co-bursting in review spam detection. In Proceedings of the 26th international conference on world wide web (pp. 1063–1072).
[31]
Li, F. H., Huang, M., Yang, Y., & Zhu, X. (2011). Learning to identify review spam. In Twenty-second international joint conference on artificial intelligence.
[32]
Li Y., Xie S., Liu X., Ying Q.F., Lau W.C., Chiu D.M., et al., Temporal graph representation learning for detecting anomalies in E-payment systems, in: 2021 international conference on data mining workshops (ICDMW), IEEE, 2021, pp. 983–990.
[33]
Liu J.-G., Guo Q., Zhang Y.-C., et al., Collective iteration behavior for online social networks, Physica A: Statistical Mechanics and its Applications 499 (2018) 490–497.
[34]
Liu Y., Pan S., Wang Y.G., Xiong F., Wang L., Chen Q., et al., Anomaly detection in dynamic graphs via transformer, IEEE Transactions on Knowledge and Data Engineering (2021).
[35]
Liu Y., Pang B., Wang X., Opinion spam detection by incorporating multimodal embedded representation into a probabilistic review graph, Neurocomputing 366 (2019) 276–283.
[36]
Liu H., Yang N., Yang Z., Lin J., Zhang Y., The impact of firm heterogeneity and awareness in modeling risk propagation on multiplex networks, Physica A: Statistical Mechanics and its Applications 539 (2020).
[37]
Liu B., Zhang L., A survey of opinion mining and sentiment analysis, in: Mining text data, Springer, 2012, pp. 415–463.
[38]
Liu C., Zhou N., Zhan X.-X., Sun G.-Q., Zhang Z.-K., Markov-based solution for information diffusion on adaptive social networks, Applied Mathematics and Computation 380 (2020).
[39]
Mukherjee, A., Kumar, A., Liu, B., Wang, J., Hsu, M., Castellanos, M., et al. (2013). Spotting opinion spammers using behavioral footprints. In Proceedings of the 19th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 632–640).
[40]
Noekhah S., binti Salim N., Zakaria N.H., Opinion spam detection: Using multi-iterative graph-based model, Information Processing & Management 57 (1) (2020).
[41]
Ott M., Choi Y., Cardie C., Hancock J.T., Finding deceptive opinion spam by any stretch of the imagination, 2011, arXiv preprint arXiv:1107.4557.
[42]
Rayana, S., & Akoglu, L. (2015). Collective opinion spam detection: Bridging review networks and metadata. In Proceedings of the 21th ACM Sigkdd international conference on knowledge discovery and data mining (pp. 985–994).
[43]
Ren Y., Zhu H., Zhang J., Dai P., Bo L., Ensemfdet: An ensemble approach to fraud detection based on bipartite graph, in: 2021 IEEE 37th international conference on data engineering (ICDE), IEEE, 2021, pp. 2039–2044.
[44]
Shi, F., Cao, Y., Shang, Y., Zhou, Y., Zhou, C., & Wu, J. (2022). H2-FDetector: A GNN-based Fraud Detector with Homophilic and Heterophilic Connections. In Proceedings of the ACM web conference 2022 (pp. 1486–1494).
[45]
Tang S., Jin L., Cheng F., Fraud detection in online product review systems via heterogeneous graph transformer, IEEE Access 9 (2021) 167364–167373.
[46]
Tian Y., Mirzabagheri M., Tirandazi P., Bamakan S.M.H., A non-convex semi-supervised approach to opinion spam detection by ramp-one class SVM, Information Processing & Management 57 (6) (2020).
[47]
Veličković, P., Cucurull, G., Casanova, A., Romero, A., Liò, P., & Bengio, Y. (2018). Graph Attention Networks. In International conference on learning representations.
[48]
Wan J., Lai Z., Li J., Zhou J., Gao C., Robust facial landmark detection by multiorder multiconstraint deep networks, IEEE Transactions on Neural Networks and Learning Systems 33 (5) (2021) 2181–2194.
[49]
Wan J., Lai Z., Liu J., Zhou J., Gao C., Robust face alignment by multi-order high-precision hourglass network, IEEE Transactions on Image Processing 30 (2020) 121–133.
[50]
Wan J., Lai Z., Shen L., Zhou J., Gao C., Xiao G., et al., Robust facial landmark detection by cross-order cross-semantic deep network, Neural Networks 136 (2021) 233–243.
[51]
Wang B., Gong N.Z., Fu H., GANG: Detecting fraudulent users in online social networks via guilt-by-association on directed graphs, in: 2017 IEEE international conference on data mining (ICDM), IEEE, 2017, pp. 465–474.
[52]
Wang Z., Hu R., Chen Q., Gao P., Xu X., ColluEagle: collusive review spammer detection using Markov random fields, Data Mining and Knowledge Discovery 34 (6) (2020) 1621–1641.
[53]
Wang, L., Li, P., Xiong, K., Zhao, J., & Lin, R. (2021). Modeling Heterogeneous Graph Network on Fraud Detection: A Community-based Framework with Attention Mechanism. In Proceedings of the 30th ACM international conference on information & knowledge management (pp. 1959–1968).
[54]
Wang, X., Lyu, D., Li, M., Xia, Y., Yang, Q., Wang, X., et al. (2021). APAN: Asynchronous propagation attention network for real-time temporal graph embedding. In Proceedings of the 2021 international conference on management of data (pp. 2628–2638).
[55]
Wang G., Xie S., Liu B., Philip S.Y., Review graph based online store review spammer detection, in: 2011 IEEE 11th international conference on data mining, IEEE, 2011, pp. 1242–1247.
[56]
Wu Z., Cao J., Wang Y., Wang Y., Zhang L., Wu J., hPSD: A hybrid PU-learning-based spammer detection model for product reviews, IEEE Transactions on Cybernetics 50 (4) (2018) 1595–1606.
[57]
Wu, Y., Lian, D., Xu, Y., Wu, L., & Chen, E. (2020). Graph convolutional networks with markov random field reasoning for social spammer detection. In Proceedings of the AAAI conference on artificial intelligence, Vol. 34 (pp. 1054–1061).
[58]
Xie, S., Wang, G., Lin, S., & Yu, P. S. (2012). Review spam detection via temporal pattern discovery. In Proceedings of the 18th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 823–831).
[59]
Yang, J., & Leskovec, J. (2011). Patterns of temporal variation in online media. In Proceedings of the fourth ACM international conference on web search and data mining (pp. 177–186).
[60]
Ye J., Akoglu L., Discovering opinion spammer groups by network footprints, in: Joint European conference on machine learning and knowledge discovery in databases, Springer, 2015, pp. 267–282.
[61]
Yedidia J.S., Freeman W.T., Weiss Y., et al., Understanding belief propagation and its generalizationsing belief propagation and its generalizations, in: Exploring artificial intelligence in the new millennium, Vol. 8, 2003, pp. 0018–9448. 236-239.
[62]
Yu S., Xia F., Sun Y., Tang T., Yan X., Lee I., Detecting outlier patterns with query-based artificially generated searching conditions, IEEE Transactions on Computational Social Systems 8 (1) (2020) 134–147.
[63]
Zhang W., Du Y., Yoshida T., Wang Q., DRI-RCNN: An approach to deceptive review identification using recurrent convolutional neural network, Information Processing & Management 54 (4) (2018) 576–592.
[64]
Zheng H., Xue M., Lu H., Hao S., Zhu H., Liang X., et al., Smoke screener or straight shooter: Detecting elite sybil attacks in user-review social networks, 2017, arXiv preprint arXiv:1709.06916.

Cited By

View all
  • (2024)Revisiting graph-based fraud detection in sight of heterophily and spectrumProceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence and Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence and Fourteenth Symposium on Educational Advances in Artificial Intelligence10.1609/aaai.v38i8.28773(9214-9222)Online publication date: 20-Feb-2024
  • (2024)ChatGPT paraphrased product reviews can confuse consumers and undermine their trust in genuine reviews. Can you tell the difference?Information Processing and Management: an International Journal10.1016/j.ipm.2024.10384261:6Online publication date: 1-Nov-2024
  • (2024)Fraud risk assessment in car insurance using claims graph features in machine learningExpert Systems with Applications: An International Journal10.1016/j.eswa.2024.124109251:COnline publication date: 24-Jul-2024
  • Show More Cited By

Index Terms

  1. Temporal burstiness and collaborative camouflage aware fraud detection
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Information Processing and Management: an International Journal
        Information Processing and Management: an International Journal  Volume 60, Issue 2
        Mar 2023
        1443 pages

        Publisher

        Pergamon Press, Inc.

        United States

        Publication History

        Published: 01 March 2023

        Author Tags

        1. Fraudster detection
        2. Temporal burstiness
        3. Collaborative camouflage
        4. ARIMA model
        5. Pairwise Markov Random Field

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 13 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Revisiting graph-based fraud detection in sight of heterophily and spectrumProceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence and Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence and Fourteenth Symposium on Educational Advances in Artificial Intelligence10.1609/aaai.v38i8.28773(9214-9222)Online publication date: 20-Feb-2024
        • (2024)ChatGPT paraphrased product reviews can confuse consumers and undermine their trust in genuine reviews. Can you tell the difference?Information Processing and Management: an International Journal10.1016/j.ipm.2024.10384261:6Online publication date: 1-Nov-2024
        • (2024)Fraud risk assessment in car insurance using claims graph features in machine learningExpert Systems with Applications: An International Journal10.1016/j.eswa.2024.124109251:COnline publication date: 24-Jul-2024
        • (2024)Determining the best feature combination through text and probabilistic feature analysis for GPT-2-based mobile app review detectionApplied Intelligence10.1007/s10489-023-05201-354:2(1219-1246)Online publication date: 1-Jan-2024
        • (2023)Fraud detection on multi-relation graphs via imbalanced and interactive learningInformation Sciences: an International Journal10.1016/j.ins.2023.119153642:COnline publication date: 26-Jul-2023
        • (2023)Detecting malicious reviews and users affecting social reviewing systemsComputers and Security10.1016/j.cose.2023.103407133:COnline publication date: 1-Oct-2023
        • (2023)FAI: A Fraudulent Account Identification SystemArtificial Intelligence10.1007/978-981-99-9119-8_23(253-257)Online publication date: 22-Jul-2023

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media