Robust Detection of Adaptive Spammers by Nash Reinforcement Learning

Online reviews provide product evaluations for customers to make decisions. Unfortunately, the evaluations can be manipulated using fake reviews (“spams”) by professional spammers, who have learned increasingly insidious and powerful spamming strategies by adapting to the deployed detectors. Spamming strategies are hard to capture, as they can be varying quickly along time, different across spammers and target products, and more critically, remained unknown in most cases. Furthermore, most existing detectors focus on detection accuracy, which is not well-aligned with the goal of maintaining the trustworthiness of product evaluations. To address the challenges, we formulate a minimax game where the spammers and spam detectors compete with each other on their practical goals that are not solely based on detection accuracy. Nash equilibria of the game lead to stable detectors that are agnostic to any mixed detection strategies. However, the game has no closed-form solution and is not differentiable to admit the typical gradient-based algorithms. We turn the game into two dependent Markov Decision Processes (MDPs) to allow efficient stochastic optimization based on multi-armed bandit and policy gradient. We experiment on three large review datasets using various state-of-the-art spamming and detection strategies and show that the optimization algorithm can reliably find an equilibrial detector that can robustly and effectively prevent spammers with any mixed spamming strategies from attaining their practical goal. Our code is available at https://github.com/YingtongDou/Nash-Detect.

[1]  Georgios Zervas,et al.  Fake It Till You Make It: Reputation, Competition, and Yelp Review Fraud , 2015, Manag. Sci..

[2]  Yiyu Yao,et al.  Cost-sensitive three-way email spam filtering , 2013, Journal of Intelligent Information Systems.

[3]  Philip S. Yu,et al.  Review Graph Based Online Store Review Spammer Detection , 2011, 2011 IEEE 11th International Conference on Data Mining.

[4]  Leman Akoglu,et al.  Collective Opinion Spam Detection: Bridging Review Networks and Metadata , 2015, KDD.

[5]  Yizheng Chen,et al.  Practical Attacks Against Graph-based Clustering , 2017, CCS.

[6]  Philip S. Yu,et al.  Securing Behavior-based Opinion Spam Detection , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[7]  Bernhard Koerber,et al.  IT works , 2006, LOG IN.

[8]  Abhinav Kumar,et al.  Spotting opinion spammers using behavioral footprints , 2013, KDD.

[9]  James Caverlee,et al.  Wide-Ranging Review Manipulation Attacks: Model, Empirical Study, and Countermeasures , 2019, CIKM.

[10]  Bo Li,et al.  Secure Network Release with Link Privacy , 2020, ArXiv.

[11]  Wei Chen,et al.  The influence of user-generated content on traveler behavior: An empirical investigation on the effects of e-word-of-mouth to hotel online bookings , 2011, Comput. Hum. Behav..

[12]  George Valkanas,et al.  The Impact of Fake Reviews on Online Visibility: A Vulnerability Assessment of the Hotel Industry , 2016, Inf. Syst. Res..

[13]  Binghui Wang,et al.  GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs , 2017, 2017 IEEE International Conference on Data Mining (ICDM).

[14]  Pushmeet Kohli,et al.  Adversarial Risk and the Dangers of Evaluating Against Weak Attacks , 2018, ICML.

[15]  Binghui Wang,et al.  Attacking Graph-based Classification via Manipulating the Graph Structure , 2019, CCS.

[16]  Michael Luca,et al.  Aggregation of Consumer Ratings: An Application to Yelp.com , 2012 .

[17]  Ben Y. Zhao,et al.  Automated Crowdturfing Attacks and Defenses in Online Review Systems , 2017, CCS.

[18]  Hyun Ah Song,et al.  FRAUDAR: Bounding Graph Fraud in the Face of Camouflage , 2016, KDD.

[19]  Sébastien Bubeck,et al.  Regret Analysis of Stochastic and Nonstochastic Multi-armed Bandit Problems , 2012, Found. Trends Mach. Learn..

[20]  Udi Weinsberg,et al.  Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social Networks , 2020, WWW.

[21]  Christos Faloutsos,et al.  Opinion Fraud Detection in Online Reviews by Network Effects , 2013, ICWSM.

[22]  Eduardo F. Morales,et al.  An Introduction to Reinforcement Learning , 2011 .

[23]  Anna Cinzia Squicciarini,et al.  Combating Crowdsourced Review Manipulators: A Neighborhood-Based Approach , 2018, WSDM.

[24]  Fabio Roli,et al.  Security Evaluation of Pattern Classifiers under Attack , 2014, IEEE Transactions on Knowledge and Data Engineering.

[25]  Michael L. Littman,et al.  Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.

[26]  Michael Luca Reviews, Reputation, and Revenue: The Case of Yelp.Com , 2016 .

[27]  Danai Koutra,et al.  Linearized and Single-Pass Belief Propagation , 2014, Proc. VLDB Endow..

[28]  Michael P. Wellman,et al.  Nash Q-Learning for General-Sum Stochastic Games , 2003, J. Mach. Learn. Res..

[29]  Bryan Hooi,et al.  FlowScope: Spotting Money Laundering Based on Graphs , 2020, AAAI.

[30]  Christos Faloutsos,et al.  Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective , 2014, 2014 IEEE International Conference on Data Mining.

[31]  Jun Zhao,et al.  Handling Cold-Start Problem in Review Spam Detection by Jointly Embedding Texts and Behaviors , 2017, ACL.

[32]  Philip S. Yu,et al.  Alleviating the Inconsistency Problem of Applying Graph Neural Network to Fraud Detection , 2020, SIGIR.

[33]  Christos Faloutsos,et al.  REV2: Fraudulent User Prediction in Rating Platforms , 2018, WSDM.

[34]  Xiaohui Liang,et al.  Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks , 2017, NDSS.

[35]  Arjun Mukherjee,et al.  What Yelp Fake Review Filter Might Be Doing? , 2013, ICWSM.

[36]  James Caverlee,et al.  TOmCAT: Target-Oriented Crowd Review Attacks and Countermeasures , 2019, ICWSM.

[37]  Anindya Ghose,et al.  Examining the Relationship Between Reviews and Sales: The Role of Reviewer Identity Disclosure in Electronic Markets , 2008, Inf. Syst. Res..

[38]  Michael I. Jordan,et al.  Loopy Belief Propagation for Approximate Inference: An Empirical Study , 1999, UAI.

[39]  Philip S. Yu,et al.  Review spam detection via temporal pattern discovery , 2012, KDD.

[40]  Hao Zhu,et al.  EnsemFDet: An Ensemble Approach to Fraud Detection based on Bipartite Graph , 2019, ArXiv.

[41]  Stephan Günnemann,et al.  Adversarial Attacks on Neural Networks for Graph Data , 2018, KDD.

[42]  Bogdan Carbunar,et al.  The Art and Craft of Fraudulent App Promotion in Google Play , 2019, CCS.

[43]  Philip S. Yu,et al.  Adversarial Attack and Defense on Graph Data: A Survey , 2018 .

[44]  Charles Elkan,et al.  The Foundations of Cost-Sensitive Learning , 2001, IJCAI.

[45]  Gordon Lin,et al.  Discovering Yelp Elites : Reifying Yelp Elite Selection Criterion , 2015 .