Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1242572.1242600acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
Article

Netprobe: a fast and scalable system for fraud detection in online auction networks

Published: 08 May 2007 Publication History

Abstract

Given a large online network of online auction users and their histories of transactions, how can we spot anomalies and auction fraud? This paper describes the design and implementation of NetProbe, a system that we propose for solving this problem. NetProbe models auction users and transactions as a Markov Random Field tuned to detect the suspicious patterns that fraudsters create, and employs a Belief Propagation mechanism to detect likely fraudsters. Our experiments show that NetProbe is both efficient and effective for fraud detection. We report experiments on synthetic graphs with as many as 7,000 nodes and 30,000 edges, where NetProbe was able to spot fraudulent nodes with over 90% precision and recall, within a matter of seconds. We also report experiments on a real dataset crawled from eBay, with nearly 700,000 transactions between more than 66,000users, where NetProbe was highly effective at unearthing hidden networks of fraudsters, within a realistic response time of about 6 minutes. For scenarios where the underlying data is dynamic in nature, we propose IncrementalNetProbe, which is an approximate, but fast, variant of NetProbe. Our experiments prove that Incremental NetProbe executes nearly doubly fast as compared to NetProbe, while retaining over 99% of its accuracy.

References

[1]
Auctionbytes: ebay auction fraud spawns vigilantism trend. http://www.auctionbytes.com/cab/abn/y02/m10/i12/s01, 2002.
[2]
S. Brin and L. Page. The anatomy of a large-scale hypertextual web search engine. In WWW, 1998.
[3]
D. H. Chau and C. Faloutsos. Fraud detection in electronic auction. In European Web Mining Forum at ECML/PKDD, 2005.
[4]
D. H. Chau, S. Pandit, and C. Faloutsos. Detecting fraudulent personalities in networks of online auctioneers. In Proc. ECML/PKDD, 2006.
[5]
C. Chua and J. Wareham. Fighting internet auction fraud: An assessment and proposal. In Computer, volume 37 no. 10, pages 31-37, 2004.
[6]
ebay inc. announces third quarter 2006 financial results. http: //biz.yahoo.com/bw/061018/20061018005916.html?.v=1, October 2006.
[7]
ebay: Avoiding fraud. http://pages.ebay.com/securitycenter/avoiding fraud.html, 2006.
[8]
Federal trade commission: Internet auctions: A guide for buyers and sellers. http: //www.ftc.gov/bcp/conline/pubs/online/auctions.htm, 2004.
[9]
Z. Gyongyi, H. G. Molina, and J. Pedersen. Combating web spam with trustrank. In VLDB, 2004.
[10]
Internet fraud complaint center: Ic3 2004 internet fraud -- crime report. http://www.ifccfbi.gov/strategy/statistics.asp, 2005.
[11]
J. Kleinberg. Authoritative sources in a hyperlinked environment. In Proc. 9th ACM-SIAM Symposium on Discrete Algorithms, 1998.
[12]
S. R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins. Extracting large-scale knowledge bases from the web. VLDB, pages 639--650, 1999.
[13]
M. Melnik and J. Alm. Does a seller's ecommerce reputation matter? evidence from ebay auctions. Journal of Industrial Economics, 50:337--49, 2002.
[14]
J. Neville and D. Jensen. Collective classification with relational dependency networks. In 2nd Multi-Relational Data Mining Workshop, SIGKDD, 2003.
[15]
J. Neville, . Simsek, D. Jensen, J. Komoroske, K. Palmer, and H. Goldberg. Using relational knowledge discovery to prevent securities fraud. In Proc. SIGKDD, 2005.
[16]
J. Pei, D. Jiang, and A. Zhang. On mining cross-graph quasi-cliques. In KDD, pages 228--238, 2005.
[17]
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation systems. Communications of the ACM, 43, 2000.
[18]
P. Resnick, R. Zeckhauser, J. Swanson, and K. Lockwood. The value of reputation on ebay: A controlled experiment, 2003.
[19]
G. Siganos, M. Faloutsos, P. Faloutsos, and C. Faloutsos. Power-laws and the AS-level internet topology. IEEE/ACM Transactions on Networking, 11(4):514--524, 2003.
[20]
Usa today: How to avoid online auction fraud. http://www.usatoday.com/tech/columnist/2002/05/07/yaukey.htm, 2002.
[21]
W. Wang, C. Wang, Y. Zhu, B. Shi, J. Pei, X. Yan, and J. Han. Graphminer: a structural pattern-mining system for large disk-based graph databases and its applications. In SIGMOD Conference, pages 879--881, 2005.
[22]
X. Yan and J. Han. gspan: Graph-based substructure pattern mining. In ICDM, pages 721--724, 2002.
[23]
X. Yan, X. J. Zhou, and J. Han. Mining closed relational graphs with connectivity constraints. In KDD, pages 324--333, 2005.
[24]
J. S. Yedidia, W. T. Freeman, and Y. Weiss. Understanding belief propagation and its generalizations. Exploring AI in the new millennium, pages 239--269, 2003.
[25]
Z. Zeng, J. Wang, L. Zhou, and G. Karypis. Coherent closed quasi-clique discovery from large dense graph databases. In KDD, pages 797--802, 2006.

Cited By

View all
  • (2025)Beyond Homophily: Neighborhood Distribution-guided Graph Convolutional NetworksExpert Systems with Applications10.1016/j.eswa.2024.125274259(125274)Online publication date: Jan-2025
  • (2024)The impact of information technology governance according to the COBIT on performanceInternational Journal of ADVANCED AND APPLIED SCIENCES10.21833/ijaas.2024.03.01411:3(127-136)Online publication date: Mar-2024
  • (2024)Graph Memory Neural Network with Adaptive Message Passing MechanismProceedings of the 2024 8th International Conference on High Performance Compilation, Computing and Communications10.1145/3675018.3675778(1-6)Online publication date: 7-Jun-2024
  • Show More Cited By

Index Terms

  1. Netprobe: a fast and scalable system for fraud detection in online auction networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WWW '07: Proceedings of the 16th international conference on World Wide Web
    May 2007
    1382 pages
    ISBN:9781595936547
    DOI:10.1145/1242572
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 May 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. belief propagation
    2. bipartite cores
    3. fraud detection
    4. markov random fields

    Qualifiers

    • Article

    Conference

    WWW'07
    Sponsor:
    WWW'07: 16th International World Wide Web Conference
    May 8 - 12, 2007
    Alberta, Banff, Canada

    Acceptance Rates

    Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)51
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 19 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Beyond Homophily: Neighborhood Distribution-guided Graph Convolutional NetworksExpert Systems with Applications10.1016/j.eswa.2024.125274259(125274)Online publication date: Jan-2025
    • (2024)The impact of information technology governance according to the COBIT on performanceInternational Journal of ADVANCED AND APPLIED SCIENCES10.21833/ijaas.2024.03.01411:3(127-136)Online publication date: Mar-2024
    • (2024)Graph Memory Neural Network with Adaptive Message Passing MechanismProceedings of the 2024 8th International Conference on High Performance Compilation, Computing and Communications10.1145/3675018.3675778(1-6)Online publication date: 7-Jun-2024
    • (2024)Graph Contrastive Learning via Interventional View GenerationProceedings of the ACM Web Conference 202410.1145/3589334.3645687(1024-1034)Online publication date: 13-May-2024
    • (2024)Enhancing Heterophilic Graph Neural Network Performance Through Label Propagation in K-Nearest Neighbor Graphs2024 IEEE International Conference on Big Data and Smart Computing (BigComp)10.1109/BigComp60711.2024.00060(337-344)Online publication date: 18-Feb-2024
    • (2024)An Efficient Control Chart for Monitoring Unweighted Networks With Overlapping CommunitiesIEEE Access10.1109/ACCESS.2024.335707712(13488-13501)Online publication date: 2024
    • (2024)Self-attention empowered graph convolutional network for structure learning and node embeddingPattern Recognition10.1016/j.patcog.2024.110537153(110537)Online publication date: Sep-2024
    • (2024)You are your friendsComputers and Security10.1016/j.cose.2023.103519136:COnline publication date: 1-Feb-2024
    • (2024)Real-time anomaly detection in sky quality meter data using probabilistic exponential weighted moving averageInternational Journal of Data Science and Analytics10.1007/s41060-024-00535-8Online publication date: 20-Apr-2024
    • (2024)Semantic-enhanced graph neural networks with global context representationMachine Learning10.1007/s10994-024-06523-0113:10(7761-7781)Online publication date: 29-Apr-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media