Detecting shill bidding in online English auctions

Shill bidding is where spurious bids are introduced into an auction to drive up the final price for the seller, thereby defrauding legitimate bidders. While shilling is recognized as a problem, presently there is little or no established means of defense against shills. This chapter presents an algorithm to detect the presence of shill bidding in online auctions. It observes bidding patterns over a series of auctions, providing each bidder a score indicating the likelihood of his/her potential involvement in shill behavior. The algorithm has been tested on data obtained from a series of realistic simulated auctions, and commercial online auctions. The algorithm is able to prune the search space required to detect which bidders are likely to be shills. This has significant practical and legal implications for commercial online auctions where shilling is considered a major threat. This chapter presents a framework for a feasible solution, which acts as a detection mechanism and a deterrent.

[1]  Manoj Kumar,et al.  Internet Auctions , 1998, USENIX Workshop on Electronic Commerce.

[2]  Paul F. Syverson,et al.  Fair On-Line Auctions without Special Trusted Parties , 1999, Financial Cryptography.

[3]  Andrew B. Whinston,et al.  Shill bidding in multi-round online auctions , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[4]  Ashish Sureka,et al.  Mining for bidding strategies on ebay , 2003 .

[5]  Robert J. Kauffman,et al.  AN INVESTIGATION OF PREMIUM BIDDING IN ONLINE AUCTIONS , 2003 .

[6]  Aart Kraay,et al.  Government Matters III : Governance Indicators for 1996-2002 , 2003 .

[7]  Andrew B. Whinston,et al.  Shill-Proof Fee Schedule: The Sunscreen against Seller Self-Collusion in Online English Auctions , 2004 .

[8]  Fahui Wang Geographic Information Systems and Crime Analysis , 2004 .

[9]  Jarrod Trevathan,et al.  Design issues for electronic auctions , 2005, ICETE.

[10]  Jarrod Trevathan Security, anonymity and trust in electronic auctions , 2005, CROS.

[11]  Jarrod Trevathan,et al.  RAS: a system for supporting research in online auctions , 2006, CROS.

[12]  Jarrod Trevathan,et al.  An Anonymous and Secure Continuous Double Auction Scheme , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[13]  Yun Wang,et al.  Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior , 2006, Int. J. Bus. Data Commun. Netw..

[14]  Hamid R. Nemati International Journal of Information Security and Privacy , 2007 .