You are here: Home Contents V20 N2 V20N2_Majadi.html
Personal tools

Detecting Collusive Seller Shill Bidding Using Social Network Analysis

 

 

Full text
View
Purchase

Source
Journal of Information Systems Security
Volume 20, Number 2 (2024)
Pages 111139
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
Nazia Majadi — Noakhali Science and Technology University, Bangladesh
Jarrod Trevathan — Griifith University, Australia
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

Shill bidding involves a seller introducing fake bids into her own online auction to force an innocent bidder to pay an inflated price. Detecting shill bidders becomes increasingly difficult if a seller colludes with other vendors or controls multiple seller accounts to perpetrate the scam. Multiple seller collusive shill bidding distributes the fraud onus among the conspiring sellers to reduce suspicion on any particular individual seller account. There are existing proposals that examine a series of auctions for evidence of collusive seller and bidder behaviour. However, if shill bidding is not detected while an auction is underway, the victim will likely face monetary loss – as it may take some time before the offending parties are traced. Therefore, it is desirable to extend multiple seller collusive shill bidding techniques to operate in real-time during an auction to prevent the fraud from running its course. This paper proposes a real-time algorithm utilising social network metrics to identify fraudulent seller accounts involved with multiple seller collusive shill bidding practices. The algorithm builds a social network graph from the auction data set to analyse suspicious interactions between sellers and bidders. Auction participants are given a social rating based on their associations. Behaviour is examined during different stages of an auction to produce evidence of collusive shill bidding. Experimental analysis on a synthetically generated auction data set shows that the algorithm can identify in real-time potential parties involved in multiple seller collusive shill bidding.

 

 

Keywords

Shill Bidding, Collusive Shill Bidding Agent, Centrality Metrics, Live Shill Score, Social Network Analysis, Social Rating.

 

 

References

Albert, M. R. (2002). E-Buyer Beware: Why online auction fraud should be regulated. American Business Law Journal, 39 (4), pp. 575–644.

Anowar, F., and Sadaoui, S. (2021). Incremental Learning Framework for Real-world Fraud Detection Environment. Computational Intelligence, 37, pp. 635–656.

Balingit R., Trevathan J., Lee Y., Read W. (2009). A software tool for collecting data from online auctions. In: Proceedings the 6th International Conference on Information Technology: New Generations. Las Vegas, USA: IEEE, pp. 922–927.

Berenek, L., Tlusty, P., and Remes, R. (2010). An online auction trust model for based on the contextual information, In: Proceedings of the Workshop on the Theory of Belief Functions. Brest, France, pp. 1–6.

Berenek, L., and Knizek, J. (2013). The use of contextual information to detection of fraud on online auctions. Journal of Internet Banking and Commerce, 18(3), pp. 1–18.

Butelho, J., and Antunes, C. (2011). Combining social network analysis with semi-supervised clustering: A case study on fraud detection, In: Proceedings of Mining Data Semantics (MDS) in conjunction with SIGKDD, San Diego, USA: Citeseer.

Chang, W., and Chang, J. S. (2011) A novel two-stage phased modeling framework for early fraud detection in online auctions. Expert Systems Application, 38(9), pp.11244–11260.

Chau, D. H., Pandit, S., and Faloutos, C. (2006). Detecting fraudulent personalities in networks of online auctioneers. In: European Conference on Principles of Data Mining and Knowledge Discovery. Lecture Notes in Computer Science. vol. 4213, Springer, pp. 103–114.

Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., and Chau, M. (2004). Crime data mining: A general framework and some examples. Computer, 37(4), pp. 50–56.

Chiu, C., Ku, Y., Lie, T., and Chen, Y. (2011). Internet auction fraud detection using social network analysis and classification tree approaches. International Journal of Electronic Commerce, 15(3), pp. 123–147.

Chua, C. E. H., and Wareham, J. (2004). Fighting internet auction fraud: An assessment and proposal, Computer, 37(10), pp. 31–37.

DeFigueiredo, D. B., and Barr, E. T. (2005). Trustdavis: A non-exploitable online reputation system. In: Proceedings of 7th IEEE International Conference on E-Commerce Technology. Munich, Germany: IEEE, pp. 274–283.

Dong, F., Shatz, S. M., and Xu, H. (2009a). Combating online in-auction fraud: Clues, techniques and challenges, Computer Science Review, 3(4), pp. 245–258.

Dong, F., Shatz, S. M., Xu, H. (2009b). Inference of online auction shills using dempster-shafer theory. In: Proceedings of the 6th International Conference on Information Technology: New Generations. Las Vegas, USA: IEEE, pp. 908–914.

Ford, B. J., Xu, H., Valova, I. (2012). A real-time self-adaptive classifier for identifying suspicious bidders in online auctions. Journal of Computers, 56 (5), pp. 646–663.

Ford, B. J., Xu, H., Bates, C. K., Shatz, S. M. (2009). Model-based specification of flexible and complex bidding strategies in agent-based online auctions. In: Proceeding of the 6th International Conference on Information Technology: New Generations. Las Vegas, USA: IEEE, pp. 894–900.

Fisher, N., Trevathan, J., and Gray, H. (2019). Detecting Shill Bidding Using eBay's 30-Day Bid Summary. International Journal of Cyber-Security and Digital Forensics, 8(2), 120-134.

Goel, A., Xu, H., Shatz, S. M. (2010). A multi-state bayesian network for shill verification in online auctions. In: Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering, San Francisco, USA, pp. 279–285.

Haythornthwaite, C. (1996). Social Network Analysis: An approach and technique for the study of information exchange. Library and Information Science Research, 18(4), pp. 323–342.

Jamshidi, S. and Hashemi, M. R. (2012). An efficient data enrichment scheme for fraud detection using social network analysis. In: Proceedings of the 6th International Symposium on Telecommunications. Tehran, Iran: IEEE, pp. 1082–1087.

Kauffman, R. J., and Wood, C. A. (2003). Running up the Bid: Detecting, Predicting and Preventing reserve price shilling in online auctions. In: Proceedings of the 5th International Conference on Electronic Commerce. Pennsylvania, USA: ACM, pp. 259–265.

Kleinberg, J. (1999). Authoritative sources in a hyperlinked environment, Journal of the ACM, 46(5), pp. 604–632.

Krebs, V.E. (2002) Mapping networks of terrorist cells. Connections. 24(3), pp. 43–52.

Lei, B., Zhang, H., Chen, H., Liu, L., Wang, D. (2012). A k-means clustering based algorithm for shill bidding recognition in online auction. In: Proceedings of the 24th Chinese Control and Decision Conference, Taiyuan, China: IEEE, pp. 939–943.

Lin, S. J., Jheng, Y. Y., Yu, C. H. (2012). Combining ranking concept and social network analysis to detect collusive groups in online auctions. Expert System Applications, 39 (10), pp. 9079–9086.

Mahootiha, M., Golpayegani, A. H., Sadeghian, B. (2021). Designing a new method for detecting money laundering based on social network analysis. In: Proceedings of the 26th International Computer Conference, Computer Society of Iran, pp. 1-7.

Majadi, N., and Trevathan, J. (2018). A real-time detection algorithm for identifying shill bidders in multiple online auctions, In: Proceedings of the 51st Hawaii International Conference on System Sciences. Hawaii, USA: IEEE, pp. 3831–3840.

Majadi, N., Trevathan, J., and Gray, H. (2018). A run-time algorithm for detecting shill bidding in online auctions. Journal of Theoretical and Applied Electronic Commerce Research, 13(3), pp. 17–49.

Majadi, N., Trevathan, J., Gray, H., Estivill-Castro, V., and Bergmann, N. (2017). Real-time detection of shill bidding in online auctions: A literature review, Computer Science Review, 25, pp. 1–18.

Majadi, N., Trevathan, J., and Bergmann, N. (2016). uAuction: Analysis, design and implementation of a secure online auction system. In: Proceedings of the 14th IEEE International Conference on Dependable, Autonomic and Secure Computing. Auckland, New Zealand: IEEE, pp. 278–285.

Mitchell, J. C. (1969). Social networks in urban situations: Analyses of personal relationships in central African towns. Manchester: Manchester University Press.

Morzy, M. (2008). New algorithms for mining the reputation of participants of online auctions. Algorithmica, 52(1), pp. 95–112.

Pandit, S., Chau, D. H., Wang, S., Faloutsos, C. (2007). Netprobe: A fast and scalable system for fraud detection in online auction networks. In: Proceedings of the 16th International Conference on World Wide Web. New York, USA: ACM, pp. 201–210.

Patel, R., Xu, H., Goel, A. (2007). Real-time trust management in agent based online auction systems. In: Proceedings of the 19th International Conference on Software Engineering and Knowledge Engineering. Boston, USA: Citeseer, pp. 244–250.

Sadaoui, S., Wang, X., Qi, D. (2015). A real-time monitoring framework for online auctions frauds. Current Approaches in Applied Artificial Intelligence. Lecture Notes in Computer Science, vol. 9101, Springer, pp. 97–108.

Sadaoui, S., Wang, X. (2016). A dynamic stage-based fraud monitoring framework of multiple live auctions. Applied Intelligence, 46(1), pp. 1–17.

Shah, H. S., Joshi, N. R., Sureka, A., Wurman, P. R. (2002). Mining eBay: Bidding strategies and shill detection. In: International Workshop on Mining Web Data for Discovering Usage Patterns and Profiles. Edmonton, Canada: Springer, pp. 17–34.

Site 1. (2022). Mitigating and detecting financial fraud with social network analysis and graph database, Retrieved from: https://resources.zaloni.com/blog/mitigating-detecting-financial-fraud-with-social-network-analysis-and-graph-database (Last Accessed on January 2022)

Site 2. (2022). Social network analysis: Centrality measures, Lecture Note by Donglei Du, Retrieved from: http://www2.unb.ca/~ddu/6634/Lecture_notes/Lecture_4_
centrality_measure.pdf (Last Accessed on January 2022)

Šubelj, L., Furlan, S., and Bajek, M. (2011). An expert system for detecting automobile insurance fraud using social network analysis. Expert Systems with Applications, 38(1), pp. 1039 –1052.

Trevathan, J. (2018). Getting into the mind of an “in-auction” fraud perpetrator. Computer Science Review, 27, 2018, pp. 1–15.

Trevathan, J., and Read, W. (2005). Detecting Shill Bidding in Online English Auctions. Handbook of Research on Social and Organizational Liabilities in Information Security. USA: IGI Press, pp. 446–470.

Trevathan, J., and Read, W. (2007). Investigating shill bidding behaviour involving colluding bidders. Journal of Computers, 2(10), pp. 63–75.

Trevathan, J., & Read, W. (2021). Detecting Multiple Seller Collusive Shill Bidding. Electronic Commerce Research and Applications, 101066.

Tsang, S., Koh, Y. S., Dobbie, G., Alam, S. (2014a). SPAN: Finding collaborative frauds in online auctions. Knowledge-Based Systems,71, pp. 389–408.

Tsang, S., Koh, Y. S., Dobbie, G., Alam, S. (2014b). Detecting online auction shilling frauds using supervised learning. Expert Systems with Applications, 41(6), pp. 3027–3040.

Wang, J.-C., and Chiu, C.-C. (2008). Recommending trusted online auction sellers using social network analysis. Expert Systems with Applications, 34(3), pp. 1666–1679.

Wang, J.-C., and Chiu, C.-Q. (2005). Detecting online auction inflated-reputation behaviors using social network analysis. In: Annual conference of the North American association for computational social and organizational science, Citeseer.

Wasserman, S., and Faust, K. (1994). Social network analysis: Methods and applications, New York: Cambridge University Press.

Xu, H., Bates, C. K., and Shatz, S. M. (2009). Real-time model checking for shill detection in live online auctions, In: Proceedings of International Conference on Software Engineering Research and Practice. USA, pp. 134–140.

Xu, H., Shatz, S. M., Bates, C. K. (2008). A framework for agent-based trust management in online auctions. In: Proceedings of the 5th International Conference on Information Technology: New Generations. Las Vegas, USA: IEEE, pp. 149–155.

Xu, H., and Cheng, Y. T. (2007). Model Checking Bidding Behaviors in Internet Concurrent Auctions. International Journal of Computer System Science & Engineering, 22(4), pp. 179 –191.

Xu, J.J., and Chen, H. (2004). Fighting organized crimes: Using shortest-path algorithms to identify associations in criminal networks. Decision Support Systems, 38(3), pp. 473–487.

Yanchun, Z., Wei, Z., and Changhai, Y. (2011). Detection of feedback reputation fraud in Taobao using social network theory. In: International Joint Conference on Service Sciences, Taipei, Taiwan: IEEE, pp. 188–192.

Yoshida, T., Ohwada, H. (2010). Shill bidder detection for online auctions. In: Pacific Rim International Conference on Artificial Intelligence. Daegu, Korea: Springer, pp. 351–358.

Yu, C. -H., and Lin, S. -J. (2008). Parallel crawling and capturing for online auction. In: Yang et al. (ed), Proceedings of International Conference on Intelligence and Security Informatics. Lecture Notes in Computer Science, 5075, Springer, pp. 455–466.