Actionable Objective Optimization for Suspicious Behavior Detection on Large Bipartite Graphs

We have been spotting massive suspicious behaviors on bipartite graph-based applications such as social networks and e-commercial platforms. Existing detection methods estimate the suspiciousness score of source users (e.g., followers, buyers) assuming that the behavioral patterns of suspicious source users (e.g., botnet followers, bully buyers) lead to abnormal high density in the graphs. A serious issue when putting the methods into real use is the false positives – the platforms cannot automatically suspend the source users just based on their suspiciousness scores. In this work, we revisit the problem of suspicious behavior detection from the perspective of the target users (e.g., followees, sellers), and provide them an effective and actionable solution using big behavior data analytics. We propose a novel method called Actionable Objective Optimization in which the variables are the target users’ decisions rather than source users’ scores. Experimental results show that our proposed actionable method consistently outperforms the state-of-the-art methods.

[1]  Charalampos E. Tsourakakis The K-clique Densest Subgraph Problem , 2015, WWW.

[2]  Christos Faloutsos,et al.  BIRDNEST: Bayesian Inference for Ratings-Fraud Detection , 2015, SDM.

[3]  Justin Zhan,et al.  Uncovering Suspicious Activity From Partially Paired and Incomplete Multimodal Data , 2017, IEEE Access.

[4]  Jianzhong Li,et al.  Mining Frequent Subgraph Patterns from Uncertain Graph Data , 2010, IEEE Transactions on Knowledge and Data Engineering.

[5]  Christos Faloutsos,et al.  Suspicious Behavior Detection: Current Trends and Future Directions , 2016, IEEE Intelligent Systems.

[6]  Christos Faloutsos,et al.  DenseAlert: Incremental Dense-Subtensor Detection in Tensor Streams , 2017, KDD.

[7]  Christos Faloutsos,et al.  CatchSync: catching synchronized behavior in large directed graphs , 2014, KDD.

[8]  Samir Khuller,et al.  On Finding Dense Subgraphs , 2009, ICALP.

[9]  Venkatesan Guruswami,et al.  CopyCatch: stopping group attacks by spotting lockstep behavior in social networks , 2013, WWW.

[10]  Dimitrios M. Thilikos,et al.  Evaluating Cooperation in Communities with the k-Core Structure , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.

[11]  Christos Faloutsos,et al.  CoreScope: Graph Mining Using k-Core Analysis — Patterns, Anomalies and Algorithms , 2016, 2016 IEEE 16th International Conference on Data Mining (ICDM).

[12]  Sankar Virdhagriswaran,et al.  Camouflaged fraud detection in domains with complex relationships , 2006, KDD '06.

[13]  Christos Faloutsos,et al.  HoloScope: Topology-and-Spike Aware Fraud Detection , 2017, CIKM.

[14]  Christos Faloutsos,et al.  Spotting Suspicious Behaviors in Multimodal Data: A General Metric and Algorithms , 2016, IEEE Transactions on Knowledge and Data Engineering.

[15]  Charalampos E. Tsourakakis,et al.  Denser than the densest subgraph: extracting optimal quasi-cliques with quality guarantees , 2013, KDD.

[16]  Yousef Saad,et al.  Dense Subgraph Extraction with Application to Community Detection , 2012, IEEE Transactions on Knowledge and Data Engineering.

[17]  Huan Liu,et al.  Online Social Spammer Detection , 2014, AAAI.

[18]  Hyun Ah Song,et al.  FRAUDAR: Bounding Graph Fraud in the Face of Camouflage , 2016, KDD.

[19]  Jure Leskovec,et al.  Community Interaction and Conflict on the Web , 2018, WWW.

[20]  Soroush Vosoughi,et al.  Rumor Gauge , 2017, ACM Trans. Knowl. Discov. Data.

[21]  Chao Liu,et al.  Mining Behavior Graphs for "Backtrace" of Noncrashing Bugs , 2005, SDM.

[22]  Silvio Lattanzi,et al.  Efficient Densest Subgraph Computation in Evolving Graphs , 2015, WWW.

[23]  Christos Faloutsos,et al.  D-Cube: Dense-Block Detection in Terabyte-Scale Tensors , 2017, WSDM.

[24]  Christopher M. Danforth,et al.  Temporal Patterns of Happiness and Information in a Global Social Network: Hedonometrics and Twitter , 2011, PloS one.

[25]  Christos Faloutsos,et al.  Netprobe: a fast and scalable system for fraud detection in online auction networks , 2007, WWW '07.

[26]  Christos Faloutsos,et al.  Opinion Fraud Detection in Online Reviews by Network Effects , 2013, ICWSM.

[27]  Christos Faloutsos,et al.  MultiAspectForensics: Pattern Mining on Large-Scale Heterogeneous Networks with Tensor Analysis , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.

[28]  Krishna P. Gummadi,et al.  Understanding and combating link farming in the twitter social network , 2012, WWW.

[29]  Aristides Gionis,et al.  Top-k overlapping densest subgraphs , 2016, Data Mining and Knowledge Discovery.

[30]  Christos Faloutsos,et al.  EigenSpokes: Surprising Patterns and Scalable Community Chipping in Large Graphs , 2010, PAKDD.

[31]  Christos Faloutsos,et al.  Inferring lockstep behavior from connectivity pattern in large graphs , 2016, Knowledge and Information Systems.

[32]  Nitesh V. Chawla,et al.  Multi-Type Itemset Embedding for Learning Behavior Success , 2018, KDD.

[33]  Emmanuel Müller,et al.  Focused clustering and outlier detection in large attributed graphs , 2014, KDD.

[34]  Fenglong Ma,et al.  Discovering social spammers from multiple views , 2017, Neurocomputing.

[35]  Christos Faloutsos,et al.  Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective , 2014, 2014 IEEE International Conference on Data Mining.