Skip to main content

2017 | OriginalPaper | Buchkapitel

zooRank: Ranking Suspicious Entities in Time-Evolving Tensors

verfasst von : Hemank Lamba, Bryan Hooi, Kijung Shin, Christos Faloutsos, Jürgen Pfeffer

Erschienen in: Machine Learning and Knowledge Discovery in Databases

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Most user-based websites such as social networks (Twitter, Facebook) and e-commerce websites (Amazon) have been targets of group fraud (multiple users working together for malicious purposes). How can we better rank malicious entities in such cases of group-fraud? Most of the existing work in group anomaly detection detects lock-step behavior by detecting dense blocks in matrices, and recently, in tensors. However, there is no principled way of scoring the users based on their participation in these dense blocks. In addition, existing methods do not take into account temporal features while detecting dense blocks, which are crucial to uncover bot-like behaviors. In this paper (a) we propose a systematic way of handling temporal information; (b) we give a list of axioms that any individual suspiciousness metric should satisfy; (c) we propose zooRank, an algorithm that finds and ranks suspicious entities (users, targeted products, days, etc.) effectively in real-world datasets. Experimental results on multiple real-world datasets show that zooRank detected and ranked the suspicious entities with high accuracy, while outperforming the baseline approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akoglu, L., Chandy, R., Faloutsos, C.: Opinion fraud detection in online reviews by network effects. In: ICWSM (2013) Akoglu, L., Chandy, R., Faloutsos, C.: Opinion fraud detection in online reviews by network effects. In: ICWSM (2013)
3.
Zurück zum Zitat Beutel, A., et al.: Copycatch: stopping group attacks by spotting lockstep behavior in social networks. In: WWW (2013) Beutel, A., et al.: Copycatch: stopping group attacks by spotting lockstep behavior in social networks. In: WWW (2013)
4.
Zurück zum Zitat Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: ACM Sigmod Record (2000) Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: ACM Sigmod Record (2000)
6.
Zurück zum Zitat Eberle, W., et al.: Discovering structural anomalies in graph-based data. In: ICDMW (2007) Eberle, W., et al.: Discovering structural anomalies in graph-based data. In: ICDMW (2007)
7.
Zurück zum Zitat Ferraz Costa, A., et al.: RSC: mining and modeling temporal activity in social media. In: KDD (2015) Ferraz Costa, A., et al.: RSC: mining and modeling temporal activity in social media. In: KDD (2015)
8.
Zurück zum Zitat Goldberg, A.V.: Finding a maximum density subgraph. Technical report (1984) Goldberg, A.V.: Finding a maximum density subgraph. Technical report (1984)
9.
Zurück zum Zitat Guha, S., et al.: Robust random cut forest based anomaly detection on streams. In: ICML (2016) Guha, S., et al.: Robust random cut forest based anomaly detection on streams. In: ICML (2016)
11.
Zurück zum Zitat Hooi, B., Song, H.A., Beutel, A., Shah, N., Shin, K., Faloutsos, C.: Fraudar: bounding graph fraud in the face of camouflage. In: KDD (2016) Hooi, B., Song, H.A., Beutel, A., Shah, N., Shin, K., Faloutsos, C.: Fraudar: bounding graph fraud in the face of camouflage. In: KDD (2016)
12.
Zurück zum Zitat Jiang, M., Beutel, A., Cui, P., Hooi, B., Yang, S., Faloutsos, C.: A general suspiciousness metric for dense blocks in multimodal data. In: ICDM (2015) Jiang, M., Beutel, A., Cui, P., Hooi, B., Yang, S., Faloutsos, C.: A general suspiciousness metric for dense blocks in multimodal data. In: ICDM (2015)
13.
14.
Zurück zum Zitat Knox, E.M., Ng, R.T.: Algorithms for mining distancebased outliers in large datasets. In: PVLDB (1998) Knox, E.M., Ng, R.T.: Algorithms for mining distancebased outliers in large datasets. In: PVLDB (1998)
15.
Zurück zum Zitat Lee, J.Y., Kang, U., Koutra, D., Faloutsos, C.: Fast anomaly detection despite the duplicates. In: WWW Companion (2013) Lee, J.Y., Kang, U., Koutra, D., Faloutsos, C.: Fast anomaly detection despite the duplicates. In: WWW Companion (2013)
16.
Zurück zum Zitat Vaz de Melo, P.O.S., Faloutsos, C., Assunção, R., Loureiro, A.: The self-feeding process: a unifying model for communication dynamics in the web. In: WWW, pp. 1319–1330 Vaz de Melo, P.O.S., Faloutsos, C., Assunção, R., Loureiro, A.: The self-feeding process: a unifying model for communication dynamics in the web. In: WWW, pp. 1319–1330
17.
Zurück zum Zitat Pandit, S., et al.: Netprobe: a fast and scalable system for fraud detection in online auction networks. In: WWW (2007) Pandit, S., et al.: Netprobe: a fast and scalable system for fraud detection in online auction networks. In: WWW (2007)
18.
Zurück zum Zitat Prakash, B., et al.: Eigenspokes: surprising patterns and community structure in large graphs. In: PAKDD (2010) Prakash, B., et al.: Eigenspokes: surprising patterns and community structure in large graphs. In: PAKDD (2010)
19.
Zurück zum Zitat Shah, N., Beutel, A., Gallagher, B., Faloutsos, C.: Spotting suspicious link behavior with fbox: an adversarial perspective. In: ICDM (2014) Shah, N., Beutel, A., Gallagher, B., Faloutsos, C.: Spotting suspicious link behavior with fbox: an adversarial perspective. In: ICDM (2014)
20.
Zurück zum Zitat Shin, K., Eliassi-Rad, T., Faloutsos, C.: CoreScope: graph mining using k-core analysis - patterns, anomalies and algorithms. In: ICDM (2016) Shin, K., Eliassi-Rad, T., Faloutsos, C.: CoreScope: graph mining using k-core analysis - patterns, anomalies and algorithms. In: ICDM (2016)
22.
Zurück zum Zitat Sun, J., Qu, H., Chakrabarti, D., Faloutsos, C.: Neighborhood formation and anomaly detection in bipartite graphs. In: ICDM (2005) Sun, J., Qu, H., Chakrabarti, D., Faloutsos, C.: Neighborhood formation and anomaly detection in bipartite graphs. In: ICDM (2005)
23.
Zurück zum Zitat Ye, J., et al.: Discovering opinion spammer groups by network footprints. In: COSN (2015) Ye, J., et al.: Discovering opinion spammer groups by network footprints. In: COSN (2015)
Metadaten
Titel
zooRank: Ranking Suspicious Entities in Time-Evolving Tensors
verfasst von
Hemank Lamba
Bryan Hooi
Kijung Shin
Christos Faloutsos
Jürgen Pfeffer
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-71249-9_5