TY - GEN
T1 - Model-based fraud detection in growing networks
AU - Moriano, Pablo
AU - Finke, Jorge
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014
Y1 - 2014
N2 - People share opinions, exchange information, and trade services on large, interconnected platforms. As with many new technologies these platforms bring with them new vulnerabilities, often becoming targets for fraudsters who try to deceive randomly selected users. To monitor such behavior, the proposed algorithm evaluates structural anomalies that result from local interactions between users. In particular, the algorithm evaluates the degree of membership to well-defined communities of users and the formation of close-knit groups in their neighborhoods. It identifies a set of suspects using a first order approximation of the evolution of the eigenpairs associated to the continuously growing network. Within the set of suspects, the algorithm them locates fraudsters based on deviations from the expected local clustering coefficients. Simulations illustrate how incorporating asymptotic behavior of the structural properties into the design of the algorithm allows us to differentiate between the aggregate dynamics of fraudsters and regular users.
AB - People share opinions, exchange information, and trade services on large, interconnected platforms. As with many new technologies these platforms bring with them new vulnerabilities, often becoming targets for fraudsters who try to deceive randomly selected users. To monitor such behavior, the proposed algorithm evaluates structural anomalies that result from local interactions between users. In particular, the algorithm evaluates the degree of membership to well-defined communities of users and the formation of close-knit groups in their neighborhoods. It identifies a set of suspects using a first order approximation of the evolution of the eigenpairs associated to the continuously growing network. Within the set of suspects, the algorithm them locates fraudsters based on deviations from the expected local clustering coefficients. Simulations illustrate how incorporating asymptotic behavior of the structural properties into the design of the algorithm allows us to differentiate between the aggregate dynamics of fraudsters and regular users.
UR - http://www.scopus.com/inward/record.url?scp=84988273869&partnerID=8YFLogxK
U2 - 10.1109/CDC.2014.7040339
DO - 10.1109/CDC.2014.7040339
M3 - Conference contribution
AN - SCOPUS:84988273869
T3 - Proceedings of the IEEE Conference on Decision and Control
SP - 6068
EP - 6073
BT - 53rd IEEE Conference on Decision and Control,CDC 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 53rd IEEE Annual Conference on Decision and Control, CDC 2014
Y2 - 15 December 2014 through 17 December 2014
ER -