A Real-Time Self-Adaptive Classifier for Identifying Suspicious Bidders in Online Auctions

With the significant increase of available item listings in popular online auction houses nowadays, it becomes nearly impossible to manually investigate the large amount of auctions and bidders for shill bidding activities, which are a major type of auction fraud in online auctions. Automated mechanisms such as data mining techniques were proved to be necessary to process this type of increasing workload. In this paper, we first present a framework of Real-Time Self-Adaptive Classifier (RT-SAC) for identifying suspicious bidders in online auctions using an incremental neural network approach. Then, we introduce a clustering module that characterizes bidder behaviors in measurable attributes and uses a hierarchical clustering mechanism to create training datasets. The neural network in RT-SAC is initialized with the training datasets, which consist of labeled historical auction data. Once initialized, the network can be trained incrementally to gradually adapt to new bidding data in real time, and thus, it supports efficient detection of suspicious bidders in online auctions. Finally, we utilize a case study to demonstrate how parameters in RT-SAC can be tuned for optimal operations and how our approach can be used to effectively identify suspicious online bidders in real time.

[1]  Haiping Xu,et al.  Real-Time Model Checking for Shill Detection in Live Online Auctions , 2009, Software Engineering Research and Practice.

[2]  Khaled Rasheed,et al.  Classification of genomic islands using decision trees and their ensemble algorithms , 2010, BMC Genomics.

[3]  J. Wooders,et al.  Reputation in Auctions: Theory, and Evidence from Ebay , 2006 .

[4]  Tao Li,et al.  On combining multiple clusterings , 2004, CIKM '04.

[5]  Erol Gelenbe,et al.  An Approximate Model for Bidders in Sequential Automated Auctions , 2009, KES-AMSTA.

[6]  Dibyen Majumdar,et al.  Price comparison: A reliable approach to identifying shill bidding in online auctions? , 2012, Electron. Commer. Res. Appl..

[7]  DeGross Errata Notes: User Heterogeneity and Its Impact on Electronic Auction Market Design: An Empirical Exploration , 2004 .

[8]  Towards Reliable Reputations for Dynamic Networked Systems , 2008, 2008 Symposium on Reliable Distributed Systems.

[9]  Robert P. Goldman,et al.  Self-adaptive software for hard real-time environments , 1999, IEEE Intell. Syst..

[10]  Tao Li,et al.  On combining multiple clusterings: an overview and a new perspective , 2010, Applied Intelligence.

[11]  Ashish Sureka,et al.  Mining for bidding strategies on ebay , 2003 .

[12]  Haiping Xu,et al.  Combating online in-auction fraud: Clues, techniques and challenges , 2009, Comput. Sci. Rev..

[13]  Ashish Sureka,et al.  Mining eBay: Bidding Strategies and Shill Detection , 2002, WEBKDD.

[14]  尹麗莎 Fraud Detection for Internet Auctions: A Data Mining Approach , 2008 .

[15]  Nello Cristianini,et al.  An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .

[16]  Christopher D. Manning,et al.  Introduction to Information Retrieval , 2010, J. Assoc. Inf. Sci. Technol..

[17]  Keinosuke Fukunaga,et al.  Introduction to statistical pattern recognition (2nd ed.) , 1990 .

[18]  Haiping Xu,et al.  A Multi-State Bayesian Network for Shill Verification in Online Auctions , 2010, SEKE.

[19]  Geoffrey Robson Multiple outlier detection and cluster analysis of multivariate normal data , 2003 .

[20]  Shing Chung Josh Wong,et al.  Urban traffic flow prediction using a fuzzy-neural approach , 2002 .

[21]  César Rego,et al.  A classification of online bidders in a private value auction: evidence from eBay , 2007 .

[22]  Erol Gelenbe Analysis of single and networked auctions , 2009, TOIT.

[23]  Iren Valova,et al.  Identifying Suspicious Bidders Utilizing Hierarchical Clustering and Decision Trees , 2010, IC-AI.

[24]  Jennie Si,et al.  Subset-based training and pruning of sigmoid neural networks , 1999, Neural Networks.

[25]  Hervé Abdi,et al.  A NEURAL NETWORK PRIMER , 1994 .

[26]  Sanghyun Park,et al.  Microarray Data Classifier Consisting of k-Top-Scoring Rank-Comparison Decision Rules With a Variable Number of Genes , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[27]  Cihan H. Dagli,et al.  Hybrid approach to the Japanese candlestick method for financial forecasting , 2009, Expert Syst. Appl..

[28]  Martti Juhola,et al.  Neural network modelling of word production in Finnish: coding semantic and non-semantic features , 2006, Neural Computing & Applications.

[29]  Pavel Pudil,et al.  Introduction to Statistical Pattern Recognition , 2006 .

[30]  Jyun-Cheng Chiu,et al.  Detecting online auction inflated-reputation behaviors using Social Network Analysis , 2005 .

[31]  Erol Gelenbe,et al.  Performance of Auctions and Sealed Bids , 2009, EPEW.

[32]  Erol Gelenbe,et al.  Analysing Bidder Performance in Randomised and Fixed-Deadline Automated Auctions , 2010, KES-AMSTA.

[33]  Haiping Xu,et al.  Reasoning under Uncertainty for Shill Detection in Online Auctions Using Dempster-Shafer Theory , 2010, Int. J. Softw. Eng. Knowl. Eng..

[34]  MengChu Zhou,et al.  Optimizing Operator–Agent Interaction in Intelligent Adaptive Interface Design: A Conceptual Framework , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[35]  Jarrod Trevathan,et al.  Secure Online English Auctions , 2006, SECRYPT.

[36]  Martin A. Riedmiller,et al.  A direct adaptive method for faster backpropagation learning: the RPROP algorithm , 1993, IEEE International Conference on Neural Networks.

[37]  J. Livingston How Valuable Is a Good Reputation? A Sample Selection Model of Internet Auctions , 2005, Review of Economics and Statistics.

[38]  Jason W. Osborne,et al.  The power of outliers (and why researchers should ALWAYS check for them) , 2004 .

[39]  R. Kauffman,et al.  Running up the Bid: Modeling Seller Opportunism in Internet Auctions , 2000 .

[40]  C. Q. Lee,et al.  The Computer Journal , 1958, Nature.

[41]  Christos Faloutsos,et al.  Detecting Fraudulent Personalities in Networks of Online Auctioneers , 2006, PKDD.

[42]  Joseph Engelberg,et al.  eBay's proxy bidding: A license to shill , 2009 .

[43]  D. M. Vilathgamuwa,et al.  Implementation of an artificial-neural-network-based real-time adaptive controller for an interior permanent-magnet motor drive , 2003 .

[44]  Chaochang Chiu,et al.  A Proposed Data Mining Approach for Internet Auction Fraud Detection , 2007, PAISI.

[45]  Haiping Xu,et al.  An Empirical Evaluation on the Relationship Between Final Auction Price and Shilling Activity in Online Auctions , 2010, SEKE.

[46]  Gabor Karsai,et al.  Self-adaptive software for signal processing , 1998, CACM.