Detecting Malicious Behavior and Collusion for Online Rating System

Since the collective ratings and reviews on an online rating system have a high influence on user decisions, there exist more and more fraudulent behaviors, such as "ballot stuffing" and "bad–mouthing". Most of the current methods solve these problems by detecting one or a few malicious patterns. But they cannot solve these patterns simultaneously and cannot solve the case where dominating population on an item is malicious. In this paper, we investigate malicious behaviors and collusion from three aspects: the normal standards are learned from crowd behaviors rather than predefined patterns, a behavior anomaly is considered from both current and historical views, and the negative influence is also taken into account. We propose a set of metrics to comprehensively detect malicious behavior patterns. How much a user is deviated the crowds. The Behavior-Turbulence metric detects how different a user is from his/her historical behaviors, and theUser Behavior Influence metric measures how much negative influence a user may cause. By orchestrating these statistical metrics, different user anomaly behaviors can be recognized. Compared with previous methods, our metrics can not only solve the problem that the major population is malicious, but also collective behavior influence metric k and coherence metric so of a group of people. Our method is verified against some real datasets and the results show that it outperforms the existing models.

[1]  Jie Zhang,et al.  Robustness of Trust Models and Combinations for Handling Unfair Ratings , 2012, IFIPTM.

[2]  Elisa Bertino,et al.  Collusion Detection in Online Rating Systems , 2013, APWeb.

[3]  Elisa Bertino,et al.  Representation and querying of unfair evaluations in social rating systems , 2014, Comput. Secur..

[4]  Jure Leskovec,et al.  {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .

[5]  Taewan Kim,et al.  Application of density-based outlier detection to database activity monitoring , 2013, Inf. Syst. Frontiers.

[6]  Bradley Malin,et al.  Detecting Anomalous Insiders in Collaborative Information Systems , 2012, IEEE Transactions on Dependable and Secure Computing.

[7]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[8]  Haiying Shen,et al.  Leveraging Social Networks to Combat Collusion in Reputation Systems for Peer-to-Peer Networks , 2013, IEEE Transactions on Computers.

[9]  Yutaka Matsuo,et al.  Earthquake shakes Twitter users: real-time event detection by social sensors , 2010, WWW '10.

[10]  Steven Kay,et al.  Defending online reputation systems against collaborative unfair raters through signal modeling and trust , 2009, SAC '09.

[11]  Qing Yang,et al.  Building Trust in Online Rating Systems Through Signal Modeling , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).

[12]  Murat Kantarcioglu,et al.  Detecting anomalies in social network data consumption , 2014, Social Network Analysis and Mining.

[13]  Jong Kim,et al.  CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks , 2015, CCS.

[14]  Bradley Malin,et al.  Detection of anomalous insiders in collaborative environments via relational analysis of access logs , 2011, CODASPY '11.

[15]  Jure Leskovec,et al.  The dynamics of viral marketing , 2005, EC '06.

[16]  Stefan Meier,et al.  Visualizing Unfair Ratings in Online Reputation Systems , 2015, ECIS.

[17]  Yafei Yang,et al.  Detection of collusion behaviors in online reputation systems , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[18]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[19]  Johan Bollen,et al.  Twitter mood predicts the stock market , 2010, J. Comput. Sci..

[20]  Chrysanthos Dellarocas,et al.  Strategic Manipulation of Internet Opinion Forums: Implications for Consumers and Firms , 2004, Manag. Sci..

[21]  Aphrodite Tsalgatidou,et al.  Taxonomy of attacks and defense mechanisms in P2P reputation systems - Lessons for reputation system designers , 2012, Comput. Sci. Rev..

[22]  Alfred O. Hero,et al.  Efficient anomaly detection using bipartite k-NN graphs , 2011, NIPS.

[23]  A. Jøsang,et al.  Challenges for Robust Trust and Reputation Systems , 2009 .