SIGCPR '96 Proceedings of the 1996 ACM SIGCPR/SIGMIS conference on Computer personnel research
Formal methods: state of the art and future directions
ACM Computing Surveys (CSUR) - Special ACM 50th-anniversary issue: strategic directions in computing research
Performance standards and evaluations in IR test collections: cluster-based retrieval models
Information Processing and Management: an International Journal
The anatomy of a large-scale hypertextual Web search engine
WWW7 Proceedings of the seventh international conference on World Wide Web 7
Extracting reputation in multi agent systems by means of social network topology
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Web usage mining: discovery and applications of usage patterns from Web data
ACM SIGKDD Explorations Newsletter
An auctioning reputation system based on anomaly
Proceedings of the 12th ACM conference on Computer and communications security
Netprobe: a fast and scalable system for fraud detection in online auction networks
Proceedings of the 16th international conference on World Wide Web
Different Aspects of Social Network Analysis
WI '06 Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence
Detecting Collusive Shill Bidding
ITNG '07 Proceedings of the International Conference on Information Technology
Recommending trusted online auction sellers using social network analysis
Expert Systems with Applications: An International Journal
Towards identity anonymization on graphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Preserving Privacy in Social Networks Against Neighborhood Attacks
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Inference of Online Auction Shills Using Dempster-Shafer Theory
ITNG '09 Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations
k-symmetry model for identity anonymization in social networks
Proceedings of the 13th International Conference on Extending Database Technology
Survey: Combating online in-auction fraud: Clues, techniques and challenges
Computer Science Review
Expert Systems with Applications: An International Journal
Identifying web sessions with simulated annealing
Expert Systems with Applications: An International Journal
Hi-index | 12.05 |
Due to the popularity of online auction markets, auction fraud has become common. Typically, fraudsters will create many accounts and then transact among these accounts to get a higher rating score. This is easy to do because of the anonymity and low fees of the online auction platform. A literature review revealed that previous studies focused on detection of abnormal rating behaviors but did not provide a ranking method to evaluate how dangerous the fraudsters are. Therefore, we propose a process which can provide a method to detect collusive fraud groups in online auctions. First, we implement a Web crawling agent to collect real auction cases and identify potential collusive fraud groups based on a k-core clustering algorithm. Second, we define a data cleaning process to remove the unrelated data. Third, we use the Page-Rank algorithm to discover the critical accounts of the groups. Fourth, we developed a ranking method for auction fraud evaluation. This method is an extension of the standard Page-Rank algorithm and combines the concepts of Web structure and risk evaluation. Finally, we conduct experiments using the Adaptive Neuro-Fuzzy Inference System (ANFIS) neural network and verify the performance of our method by applying it to real auction cases. In summary, we find that the proposed ranking method is effective in identifying potential collusive fraud groups.