Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1102120.1102156acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

An auctioning reputation system based on anomaly

Published: 07 November 2005 Publication History

Abstract

Existing reputation systems used by online auction houses do not address the concern of a buyer shopping for commodities - finding a good bargain. These systems do not provide information on the practices adopted by sellers to ensure profitable auctions. These practices may be legitimate, like imposing a minimum starting bid on an auction, or fraudulent, like using colluding bidders to inflate the final price in a practice known as shilling.We develop a reputation system to help buyers identify sellers whose auctions seem price-inflated. Our reputation system is based upon models that characterize sellers according to statistical metrics related to price inflation. We combine the statistical models with anomaly detection techniques to identify the set of suspicious sellers. The output of our reputation system is a set of values for each seller representing the confidence with which the system can say that the auctions of the seller are price-inflated.We evaluate our reputation system on 604 high-volume sellers who posted 37,525 auctions on eBay. Our system automatically pinpoints sellers whose auctions contain potential shill bidders. When we manually analyze these sellers' auctions, we find that many winning bids are at about the items' market values, thus undercutting a buyer's ability to find a bargain and demonstrating the effectiveness of our reputation system.

References

[1]
P. Bajari and A. Hortaçsu. The winner's curse, reserve prices, and endogenous entry: Empirical insights from eBay auctions. RAND Journal of Economics, 34(2):329--355, Summer 2003.
[2]
R. J. Bolton and D. J. Hand. Statistical fraud detection: A review. Statistical Science, 17(3):235--255, 2002.
[3]
R. Brause, T. Langsdorf, and M. Hepp. Neural data mining for credit card fraud detection. In 11th IEEE International Conference on Tools with Artificial Intelligence, pages 103--106, Chicago, IL, Nov. 1999.
[4]
U. Brinkmann and M. Seifert. `Face to Interface': Zum Problem der Vertrauenskonstitution im Internet am Beispiel von elektronischen Auktionen. Zeitschrift für Soziologie, 30(1):23--47, Feb. 2001.
[5]
P. Chaudhuri and W.-Y. Loh. Nonparametric estimation of conditional quantiles using quantile regression trees. Bernoulli, 8:561--576, 2002.
[6]
M. Chen and J. P. Singh. Computing and using reputations for Internet rating. In 3rd ACM Conference on Electronic Commerce (EC'01), pages 154--162, 2001.
[7]
C. Dellarocas. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In ACM Conference on Electronic Commerce, Minneapolis, MN, 2000.
[8]
C. Dellarocas. The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms. Management Science, 49(10):1407--1424, Oct. 2003.
[9]
S. Dewan and V. Hsu. Trust in electronic markets: Price discovery in generalist versus specialty online auctions. Working paper, available a http://databases.si.umich.edu/reputations/bib/papers/Dewan&Hsu.doc, University of Michigan, Ann Arbor, MI.
[10]
R. O. Duda, P. E. Hart, and D. G. Stork. Pattern Classification. John Wiley and Sons, Inc., New York, NY, 2nd edition, 2000.
[11]
eBay Inc. Policy: Seller shill bidding. Published online at http://pages.ebay.com/help/policies/seller-shill-bidding. html (last accessed May 4, 2005).
[12]
eBay Inc. First quarter 2005 financial results, April 2005.
[13]
Z. Hidvégi, W. Wang, and A. B. Whinston. Shill-proof fee (SPF) schedule: the sunscreen against seller self-collusion in online English auctions. Working paper, Emory University, Atlanta, GA.
[14]
D. Houser and J. Wooders. Reputation in auctions: Theory, and evidence from eBay. Journal of Economics and Management Strategy, 2004.
[15]
J. H. Kagel and D. Levin. Common Value Auctions and the Winner's Curse. Princeton University Press, 2002.
[16]
R. J. Kauffman and C. A. Wood. Running up the bid: detecting, predicting, and preventing reserve price shilling in online auctions. In International Conference on Electronic Commerce, Pittsburgh, PA, 2003.
[17]
R. Koenker and G. Bassett. Regression quantiles. Econometrica, 46:33--50, 1978.
[18]
C. Krügel, T. Toth, and E. Kirda. Service specific anomaly detection for network intrusion detection. In 17th ACM Symposium on Applied Computing (SAC'02), pages 201--208. ACM Press, 2002.
[19]
W. Lee. A data mining framework for constructing features and models for instrusion detection systems. PhD thesis, Columbia University, 1999.
[20]
W. Lee, S. J. Stolfo, and K. W. Mok. A data mining framework for building intrusion detection models. In IEEE Symposium on Security and Privacy, pages 120--132, Oakland, CA, 1999.
[21]
Y. Moreau, H. Verrelst, and J. Vandewalle. Detection of mobile phone fraud using supervised neural networks: A first prototype. In International Conference on Artificial Neural Networks (ICANN'97), pages 1065--1070, Lausanne, France, 1997. Springer-Verlag.
[22]
New York Attorney General. Shill bidding exposed in online auctions. Press release, Nov. 2004.
[23]
P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman. Reputation systems. Communications of the ACM, 43(12), 2000.
[24]
P. Resnick and R. Zeckhauser. Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system. In M. R. Baye, editor, The Economics of the Internet and E-Commerce, volume 11 of Advances in Applied Microeconomics. Elsevier Science, Amsterdam, Netherlands, 2002.
[25]
P. Resnick, R. Zeckhauser, J. Swanson, and K. Lockwood. The value of reputation on eBay: A controlled experiment. Working paper, available at http://www.si.umich.edu/~presnick/papers/postcards/, University of Michigan, Ann Arbor, MI.
[26]
J. A. Rice. Mathematical Statistics and Data Analysis. Duxbury Press, 2nd edition, 1994.
[27]
H. S. Shah, N. R. Joshi, A. Sureka, and P. R. Wurman. Mining eBay: Bidding strategies and shill detection. In Springer-Verlag, editor, 4th International Workshop on Mining Web Data for Discovering Usage Patterns and Profiles, Edmonton, Alberta, July 2003.

Cited By

View all
  • (2017)Systematic identification and analysis of different fraud detection approaches based on the strategy aheadInternational Journal of Knowledge-based and Intelligent Engineering Systems10.3233/KES-17035721:2(123-134)Online publication date: 23-Feb-2017
  • (2017)Real-time detection of shill bidding in online auctions: A literature reviewComputer Science Review10.1016/j.cosrev.2017.05.00125(1-18)Online publication date: Aug-2017
  • (2016)A Fuzzy Genetic Approach for Optimization of Online Auction Fraud DetectionFrontier Computing10.1007/978-981-10-0539-8_94(965-974)Online publication date: 20-Apr-2016
  • Show More Cited By

Index Terms

  1. An auctioning reputation system based on anomaly

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '05: Proceedings of the 12th ACM conference on Computer and communications security
    November 2005
    422 pages
    ISBN:1595932267
    DOI:10.1145/1102120
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 November 2005

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anomaly detection
    2. auction
    3. reputation system
    4. shilling

    Qualifiers

    • Article

    Conference

    CCS05
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 30 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)Systematic identification and analysis of different fraud detection approaches based on the strategy aheadInternational Journal of Knowledge-based and Intelligent Engineering Systems10.3233/KES-17035721:2(123-134)Online publication date: 23-Feb-2017
    • (2017)Real-time detection of shill bidding in online auctions: A literature reviewComputer Science Review10.1016/j.cosrev.2017.05.00125(1-18)Online publication date: Aug-2017
    • (2016)A Fuzzy Genetic Approach for Optimization of Online Auction Fraud DetectionFrontier Computing10.1007/978-981-10-0539-8_94(965-974)Online publication date: 20-Apr-2016
    • (2015)Two Step graph-based semi-supervised learning for online auction fraud detectionProceedings of the 2015th European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part III10.5555/3120539.3120551(165-179)Online publication date: 7-Sep-2015
    • (2015)Two Step graph-based semi-supervised Learning for Online Auction Fraud DetectionMachine Learning and Knowledge Discovery in Databases10.1007/978-3-319-23461-8_11(165-179)Online publication date: 29-Aug-2015
    • (2012)The usage of contextual discounting and opposition in determining the trustfulness of users in online auctionsJournal of Theoretical and Applied Electronic Commerce Research10.4067/S0718-187620120001000047:1(34-50)Online publication date: 1-Apr-2012
    • (2012)A dynamic reputation system with built-in attack resilience to safeguard buyers in e-marketACM SIGSOFT Software Engineering Notes10.1145/2237796.223780637:4(1-19)Online publication date: 16-Jul-2012
    • (2012)Combining ranking concept and social network analysis to detect collusive groups in online auctionsExpert Systems with Applications: An International Journal10.1016/j.eswa.2012.02.03939:10(9079-9086)Online publication date: 1-Aug-2012
    • (2011)Conditional Anomaly Detection with Soft Harmonic FunctionsProceedings of the 2011 IEEE 11th International Conference on Data Mining10.1109/ICDM.2011.40(735-743)Online publication date: 11-Dec-2011
    • (2011)Application of Fuzzy Logic in Preference Management for Detailed FeedbacksSoft Computing in Industrial Applications10.1007/978-3-642-20505-7_13(151-161)Online publication date: 2011
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media