FraudVis: Understanding Unsupervised Fraud Detection Algorithms

Discovering fraud user behaviors is vital to keeping online websites healthy. Fraudsters usually exhibit grouping behaviors, and researchers have effectively leveraged this behavior to design unsupervised algorithms to detect fraud user groups. In this work, we propose a visualization system, FraudVis, to visually analyze the unsupervised fraud detection algorithms from temporal, intra-group correlation, inter-group correlation, feature selection, and the individual user perspectives. FraudVis helps domain experts better understand the algorithm output and the detected fraud behaviors. Meanwhile, FraudVis also helps algorithm experts to fine-tune the algorithm design through the visual comparison. By using the visualization system, we solve two real-world cases of fraud detection, one for a social video website and another for an e-commerce website. The results on both cases demonstrate the effectiveness of FraudVis in understanding unsupervised fraud detection algorithms.

[1]  Rossano Schifanella,et al.  A Large-Scale Study of User Image Search Behavior on the Web , 2015, CHI.

[2]  Venkatesan Guruswami,et al.  CopyCatch: stopping group attacks by spotting lockstep behavior in social networks , 2013, WWW.

[3]  Christos Faloutsos,et al.  CatchSync: catching synchronized behavior in large directed graphs , 2014, KDD.

[4]  Qing Chen,et al.  DropoutSeer: Visualizing learning patterns in Massive Open Online Courses for dropout reasoning and prediction , 2016, 2016 IEEE Conference on Visual Analytics Science and Technology (VAST).

[5]  Silvia Miksch,et al.  EVA: Visual Analytics to Identify Fraudulent Events , 2018, IEEE Transactions on Visualization and Computer Graphics.

[6]  Gianluca Stringhini,et al.  Detecting spammers on social networks , 2010, ACSAC '10.

[7]  Christos Faloutsos,et al.  Inferring Strange Behavior from Connectivity Pattern in Social Networks , 2014, PAKDD.

[8]  Gang Wang,et al.  Unsupervised Clickstream Clustering for User Behavior Analysis , 2016, CHI.

[9]  Tong Zhang,et al.  Crowd Fraud Detection in Internet Advertising , 2015, WWW.

[10]  Rose Yu,et al.  GLAD: group anomaly detection in social media analysis , 2014, ACM Trans. Knowl. Discov. Data.

[11]  Christos Faloutsos,et al.  Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective , 2014, 2014 IEEE International Conference on Data Mining.

[12]  Dawei Zhao,et al.  Linking social network accounts by modeling user spatiotemporal habits , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).

[13]  Barnabás Póczos,et al.  Group Anomaly Detection using Flexible Genre Models , 2011, NIPS.

[14]  Ji Hwan Park,et al.  C2A: Crowd consensus analytics for virtual colonoscopy , 2016, 2016 IEEE Conference on Visual Analytics Science and Technology (VAST).

[15]  Zi Huang,et al.  A temporal context-aware model for user behavior modeling in social media systems , 2014, SIGMOD Conference.

[16]  Kannan Srinivasan,et al.  Modeling Online Browsing and Path Analysis Using Clickstream Data , 2004 .

[17]  David J. Hand,et al.  Statistical fraud detection: A review , 2002 .

[18]  Barnabás Póczos,et al.  Hierarchical Probabilistic Models for Group Anomaly Detection , 2011, AISTATS.

[19]  Yang Wang,et al.  Patterns and Sequences: Interactive Exploration of Clickstreams to Understand Common Visitor Paths , 2017, IEEE Transactions on Visualization and Computer Graphics.

[20]  David R. Thomas,et al.  A General Inductive Approach for Analyzing Qualitative Evaluation Data , 2006 .

[21]  Gang Wang,et al.  Northeastern University , 2021, IEEE Pulse.

[22]  Geoffrey E. Hinton,et al.  Visualizing Data using t-SNE , 2008 .

[23]  Christos Faloutsos,et al.  Opinion Fraud Detection in Online Reviews by Network Effects , 2013, ICWSM.

[24]  Christos Faloutsos,et al.  EigenSpokes: Surprising Patterns and Scalable Community Chipping in Large Graphs , 2010, PAKDD.

[25]  Christopher Krügel,et al.  Framing Dependencies Introduced by Underground Commoditization , 2015, WEIS.

[26]  Virgílio A. F. Almeida,et al.  Characterizing user behavior in online social networks , 2009, IMC '09.

[27]  Sylvain Sénécal,et al.  Consumers' decision-making process and their online shopping behavior: a clickstream analysis , 2005 .

[28]  Daniel Davies,et al.  Network Explorer: Design, Implementation, and Real World Deployment of a Large Network Visualization Tool , 2016, AVI.

[29]  Surya B. Yadav,et al.  A computational model for financial reporting fraud detection , 2011, Decis. Support Syst..

[30]  Vern Paxson,et al.  Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse , 2013, USENIX Security Symposium.

[31]  Lin Lu,et al.  Mining Significant Usage Patterns from Clickstream Data , 2005, WEBKDD.

[32]  Qiang Cao,et al.  Uncovering Large Groups of Active Malicious Accounts in Online Social Networks , 2014, CCS.

[33]  Tong Zhao,et al.  It's about time! Modeling customer behaviors as the secretary problem in daily deal websites , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).