The Use of Contextual Information to Detection of Fraud on Online Auctions

Currently, Internet auction portals are an integral part of business activities on the Internet. Anyone can easily participate in online auctions, either as a seller or a buyer (bidder), and the total turnover on Internet auction portals represents billions of dollars. However, the amount of fraud in these Internet auctions is related to their popularity. To prevent discovery, fraudsters exhibit normal trading behaviors and disguise themselves as honest members. It is therefore not easy to detect fraud in online auctions. There are some papers and approaches dealing with this problem with varying results. Most of them concentrate on the selection of the attributes available within online auction portals and on computational methods for their processing. This study proposes extended the fraud detection approach by using certain contextual information whose origin is outside online auctions portals. The suggested model integrates information from auctions and relevant contextual information with the aim to evaluate the behavior of certain sellers in an online auction and determine whether it is legal or not. Experimental results show that this approach based on the use of contextual information from other Internet sources provides good results and enhances significantly the accuracy of detection of certain types of fraud in online auctions.

[1]  Haiping Xu,et al.  Model checking bidding behaviors in internet concurrent auctions , 2007, Comput. Syst. Sci. Eng..

[2]  Chaochang Chiu,et al.  A Proposed Data Mining Approach for Internet Auction Fraud Detection , 2007, PAISI.

[3]  Christopher Tucci,et al.  Fraudulent auctions on the Internet , 2006, Electron. Commer. Res..

[4]  Christos Faloutsos,et al.  Toward a Comprehensive Model in Internet Auction Fraud Detection , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[5]  Daniel Schwabe,et al.  Analysis of Fraudulent Activity in a Brazilian Auction Site , 2009 .

[6]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[7]  Christos Faloutsos,et al.  Detecting Fraudulent Personalities in Networks of Online Auctioneers , 2006, PKDD.

[8]  Jarrod Trevathan,et al.  Detecting Collusive Shill Bidding , 2007, Fourth International Conference on Information Technology (ITNG'07).

[9]  Philippe Smets,et al.  Belief functions: The disjunctive rule of combination and the generalized Bayesian theorem , 1993, Int. J. Approx. Reason..

[10]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[11]  Duen Horng Chau,et al.  Fraud Detection in Electronic Auction , 2005 .

[12]  Wen-Hsi Chang,et al.  Using clustering techniques to analyze fraudulent behavior changes in online auctions , 2010, 2010 International Conference on Networking and Information Technology.

[13]  Antony Bryant,et al.  Trust in Electronic Commerce Business Relationships , 2002, J. Electron. Commer. Res..

[14]  Li-Chang Hsu,et al.  A Study of E-Trust in Online Auctions , 2008 .

[15]  Richard E. Overill,et al.  Evaluation of Evidence in Internet Auction Fraud Investigations , 2010, IFIP Int. Conf. Digital Forensics.

[16]  Ladislav Beranek,et al.  The Usage of Contextual Discounting and Opposition in Determining the Trustfulness of Users in Online Auctions , 2012, J. Theor. Appl. Electron. Commer. Res..

[17]  Wen-Hsi Chang,et al.  A novel two-stage phased modeling framework for early fraud detection in online auctions , 2011, Expert Syst. Appl..

[18]  Jyun-Cheng Chiu,et al.  Detecting online auction inflated-reputation behaviors using Social Network Analysis , 2005 .

[19]  Judy E. Scott,et al.  A typology of complaints about eBay sellers , 2008, CACM.

[20]  Cecil Eng Huang Chua,et al.  Self-Regulation for Online Auctions: An Analysis , 2002, ICIS.

[21]  Wen-Hsi Chang,et al.  A Multiple-Phased Modeling Method to Identify Potential Fraudsters in Online Auctions , 2010, 2010 Second International Conference on Computer Research and Development.

[22]  Iren Valova,et al.  Identifying Suspicious Bidders Utilizing Hierarchical Clustering and Decision Trees , 2010, IC-AI.

[23]  Haiping Xu,et al.  Reasoning under Uncertainty for Shill Detection in Online Auctions Using Dempster-Shafer Theory , 2010, Int. J. Softw. Eng. Knowl. Eng..

[24]  Jarrod Trevathan,et al.  Secure Online English Auctions , 2006, SECRYPT.

[25]  Jarrod Trevathan Security, anonymity and trust in electronic auctions , 2005, CROS.

[26]  Haiping Xu,et al.  Combating online in-auction fraud: Clues, techniques and challenges , 2009, Comput. Sci. Rev..

[27]  W. Read,et al.  Detecting shill bidding in online English auctions , 2009 .

[28]  Haiping Xu,et al.  A Multi-State Bayesian Network for Shill Verification in Online Auctions , 2010, SEKE.

[29]  Yi Hu,et al.  Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems , 2005, Journal of Network and Systems Management.

[30]  Eric Lefevre,et al.  Belief functions contextual discounting and canonical decompositions , 2012, Int. J. Approx. Reason..

[31]  Byungtae Lee,et al.  Empirical analysis of online auction fraud: Credit card phantom transactions , 2010, Expert Syst. Appl..

[32]  Judy E. Scott,et al.  The Role of Reputation Systems in Reducing On-Line Auction Fraud , 2006, Int. J. Electron. Commer..

[33]  Dibyen Majumdar,et al.  Price comparison: A reliable approach to identifying shill bidding in online auctions? , 2012, Electron. Commer. Res. Appl..

[34]  Wen-Hsi Chang,et al.  An effective early fraud detection method for online auctions , 2012, Electron. Commer. Res. Appl..

[35]  Wen-Hsi Chang,et al.  An online auction fraud screening mechanism for choosing trading partners , 2010, 2010 2nd International Conference on Education Technology and Computer.

[36]  Makoto Yokoo,et al.  A false-name-proof double auction protocol for arbitrary evaluation values , 2003, AAMAS '03.

[37]  Christos Faloutsos,et al.  Netprobe: a fast and scalable system for fraud detection in online auction networks , 2007, WWW '07.