Affiliation:
1. Carnegie Mellon University, Pittsburgh, USA
Abstract
Given a bipartite graph of users and the products that they review, or followers and followees, how can we detect fake reviews or follows? Existing fraud detection methods (spectral, etc.) try to identify dense subgraphs of nodes that are sparsely connected to the remaining graph. Fraudsters can evade these methods using
camouflage
, by adding reviews or follows with honest targets so that they look “normal.” Even worse, some fraudsters use
hijacked accounts
from honest users, and then the camouflage is indeed organic.
Our focus is to spot fraudsters in the presence of camouflage or hijacked accounts. We propose FRAUDAR, an algorithm that (a) is camouflage resistant, (b) provides upper bounds on the effectiveness of fraudsters, and (c) is effective in real-world data. Experimental results under various attacks show that FRAUDAR outperforms the top competitor in accuracy of detecting both camouflaged and non-camouflaged fraud. Additionally, in real-world experiments with a Twitter follower--followee graph of 1.47 billion edges, FRAUDAR successfully detected a subgraph of more than 4, 000 detected accounts, of which a majority had tweets showing that they used follower-buying services.
Funder
National Science Foundation
Publisher
Association for Computing Machinery (ACM)
Cited by
54 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Anomaly Detection in Dynamic Graphs: A Comprehensive Survey;ACM Transactions on Knowledge Discovery from Data;2024-07-26
2. DOS-GNN: Dual-Feature Aggregations with Over-Sampling for Class-Imbalanced Fraud Detection On Graphs;2024 International Joint Conference on Neural Networks (IJCNN);2024-06-30
3. Efficient Multi-Query Oriented Continuous Subgraph Matching;2024 IEEE 40th International Conference on Data Engineering (ICDE);2024-05-13
4. Contagion Source Detection by Maximum Likelihood Estimation and Starlike Graph Approximation;2024 58th Annual Conference on Information Sciences and Systems (CISS);2024-03-13
5. Data Interaction Security Monitoring Technology Based on Behavior Graph Representation;Proceedings of the 2024 3rd International Conference on Cryptography, Network Security and Communication Technology;2024-01-19