Detecting problematic transactions in a consumer-to-consumer e-commerce network

作者: Naoki Masuda , Naoki Masuda , Ryusuke Chiba , Shun Kodate , Shun Kodate

DOI: 10.1007/S41109-020-00330-X

关键词:

摘要: Providers of online marketplaces are constantly combatting against problematic transactions, such as selling illegal items and posting fictive items, exercised by some their users. A typical approach to detect fraud activity has been analyze registered user profiles, user's behavior, texts attached individual transactions the user. However, this traditional may be limited because malicious users can easily conceal information. Given background, network indices have exploited for detecting frauds in various transaction platforms. In present study, we analyzed networks an consumer-to-consumer marketplace which a seller corresponding buyer connected directed edge. We constructed egocentric each several hundreds fraudulent those similar number normal calculated eight local based on up connectivity between neighbors focal node. Based descriptive analysis these indices, fed twelve features that from random forest classifiers with aim distinguishing engaged one four types transactions. found classifier accurately distinguished classification performance did not depend type transaction.

参考文章(47)
Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, Shiqiang Yang, Inferring Strange Behavior from Connectivity Pattern in Social Networks pacific-asia conference on knowledge discovery and data mining. pp. 126- 138 ,(2014) , 10.1007/978-3-319-06608-0_11
Calton Pu, Steve Webb, Observed Trends in Spam Construction Techniques: A Case Study of Spam Evolution. conference on email and anti-spam. ,(2006)
Véronique Van Vlasselaer, Cristián Bravo, Olivier Caelen, Tina Eliassi-Rad, Leman Akoglu, Monique Snoeck, Bart Baesens, APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions decision support systems. ,vol. 75, pp. 38- 48 ,(2015) , 10.1016/J.DSS.2015.04.013
Ross Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel J. G. van Eeten, Michael Levi, Tyler Moore, Stefan Savage, Measuring the Cost of Cybercrime workshop on the economics of information security. pp. 265- 300 ,(2013) , 10.1007/978-3-642-39498-0_12
Leman Akoglu, Mary McGlohon, Christos Faloutsos, OddBall: spotting anomalies in weighted graphs knowledge discovery and data mining. ,vol. 6119, pp. 410- 421 ,(2010) , 10.1007/978-3-642-13672-6_40
James Franklin, The elements of statistical learning : data mining, inference,and prediction The Mathematical Intelligencer. ,vol. 27, pp. 83- 85 ,(2005) , 10.1007/BF02985802
Richard A Olshen, Charles J Stone, Leo Breiman, Jerome H Friedman, Classification and regression trees ,(1983)
Richard J. Bolton, David J. Hand, Foster Provost, Leo Breiman, Richard J. Bolton, David J. Hand, Statistical Fraud Detection: A Review Statistical Science. ,vol. 17, pp. 235- 255 ,(2002) , 10.1214/SS/1042727940
Phiradet Bangcharoensap, Hayato Kobayashi, Nobuyuki Shimizu, Satoshi Yamauchi, Tsuyoshi Murata, Two Step graph-based semi-supervised Learning for Online Auction Fraud Detection european conference on machine learning. pp. 165- 179 ,(2015) , 10.1007/978-3-319-23461-8_11
Shing-Han Li, David C. Yen, Wen-Hui Lu, Chiang Wang, Identifying the signs of fraudulent accounts using data mining techniques Computers in Human Behavior. ,vol. 28, pp. 1002- 1013 ,(2012) , 10.1016/J.CHB.2012.01.002