A burst-based unsupervised method for detecting review spammer groups

Abstract With the development of e-commerce, online shopping has become a part of people's life. As customers often refer to online product reviews for shopping, sellers often collude with review spammers in writing fake reviews to promote or demote target products. In particular, spammers working in groups are more harmful than individual attacks. To detect such spammer groups, previous researchers proposed some frequent item mining based algorithms and graph-based algorithms. In this paper, we propose a method called GSDB (Group Spam Detection algorithm based on review Burst). Our algorithm first locates target products attacked by spammers by detecting the abnormality of product rating distribution. As group spammers usually post many fake reviews within a short period, we design a burst-based algorithm that discovers candidate spammer groups in reviewbursts using the Kernel Density Estimation algorithm. As some innocent reviewers may coincidently review during the burst period, we formulate a variety of individual spam indicators to measure the spamicity of the reviewers to isolate the candidate spammer groups. Finally, we design a series of group spam indicators to measure and classify the spamicity of spammer groups. Experimental results show that our proposed GSDB algorithm outperforms state-of-the-art algorithms.

[1]  Qi Zhang,et al.  An unsupervised topic-sentiment joint probabilistic model for detecting deceptive reviews , 2018, Expert Syst. Appl..

[2]  Xin Fan,et al.  PHG: A Three-Phase Algorithm for Influence Maximization Based on Community Structure , 2019, IEEE Access.

[3]  Abhinav Kumar,et al.  Spotting opinion spammers using behavioral footprints , 2013, KDD.

[4]  Philip S. Yu,et al.  Review Graph Based Online Store Review Spammer Detection , 2011, 2011 IEEE 11th International Conference on Data Mining.

[5]  Dickson K. W. Chiu,et al.  On the making of service recommendations: An action theory based on utility, reputation, and risk attitude , 2009, Expert Syst. Appl..

[6]  Yongjian Yang,et al.  Slanderous user detection with modified recurrent neural networks in recommender system , 2019, Inf. Sci..

[7]  Yejin Choi,et al.  Distributional Footprints of Deceptive Product Reviews , 2012, ICWSM.

[8]  Weixiang Shao,et al.  Bimodal Distribution and Co-Bursting in Review Spam Detection , 2017, WWW.

[9]  Chien-Ming Chen,et al.  A provably secure certificateless public key encryption with keyword search , 2019, Journal of the Chinese Institute of Engineers.

[10]  Arjun Mukherjee,et al.  What Yelp Fake Review Filter Might Be Doing? , 2013, ICWSM.

[11]  Ho-fung Leung,et al.  A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks , 2017, Applied Intelligence.

[12]  Dong-Hong Ji,et al.  Neural networks for deceptive opinion spam detection: An empirical study , 2017, Inf. Sci..

[13]  Minhong Wang,et al.  Alert based disaster notification and resource allocation , 2010, Inf. Syst. Frontiers.

[14]  Ting Yu,et al.  Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis , 2017, J. Comput. Secur..

[15]  Yining Liu,et al.  A Secure Authentication Protocol for Internet of Vehicles , 2019, IEEE Access.

[16]  Leman Akoglu,et al.  Discovering Opinion Spammer Groups by Network Footprints , 2015, ECML/PKDD.

[17]  Chong Long,et al.  Uncovering collusive spammers in Chinese review websites , 2013, CIKM.

[18]  Xiaowei Xu,et al.  Graph-based review spammer group detection , 2017, Knowledge and Information Systems.

[19]  Ee-Peng Lim,et al.  Finding unusual review patterns using unexpected rules , 2010, CIKM.

[20]  Dickson K. W. Chiu,et al.  Automated management of assets based on RFID triggered alarm messages , 2010, Inf. Syst. Frontiers.

[21]  Dickson K. W. Chiu,et al.  A pre-evolutionary advisor list generation strategy for robust defensing reputation attacks , 2016, Knowl. Based Syst..

[22]  Francesco Marcelloni,et al.  A survey on fake news and rumour detection techniques , 2019, Inf. Sci..

[23]  Zhuo Wang,et al.  Detecting Review Spammer Groups via Bipartite Graph Projection , 2016, Comput. J..

[24]  Ee-Peng Lim,et al.  Detecting product review spammers using rating behaviors , 2010, CIKM.

[25]  Chong-kwon Kim,et al.  Follow spam detection based on cascaded social information , 2016, Inf. Sci..

[26]  Shing-Chi Cheung,et al.  Ubiquitous enterprise service adaptations based on contextual user behavior , 2007, Inf. Syst. Frontiers.

[27]  Wei Yang,et al.  Asymmetric response aggregation heuristics for rating prediction and recommendation , 2020, Applied Intelligence.

[28]  Arjun Mukherjee,et al.  Spotting fake reviewer groups in consumer reviews , 2012, WWW.

[29]  Jia Wei,et al.  Analysis of Influence Maximization in Temporal Social Networks , 2019, IEEE Access.

[30]  Liang Yongquan,et al.  A Trust-Distrust Based Reputation Attacks Defending Strategy and Its Stability Analysis , 2018 .

[31]  David G. Stork,et al.  Pattern Classification , 1973 .

[32]  Leman Akoglu,et al.  Collective Opinion Spam Detection: Bridging Review Networks and Metadata , 2015, KDD.

[33]  M. Rosenblatt Remarks on Some Nonparametric Estimates of a Density Function , 1956 .

[34]  Jie Zhang,et al.  Towards Collusive Fraud Detection in Online Reviews , 2015, 2015 IEEE International Conference on Data Mining.

[35]  Ho-fung Leung,et al.  An unsupervised strategy for defending against multifarious reputation attacks , 2019, Applied Intelligence.