Skip to main content

Cooperative Monitoring of Malicious Activity in Stock Exchanges

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 12705))

Abstract

Stock exchanges are marketplaces to buy and sell securities such as stocks, bonds and commodities. Due to their prominence, stock exchanges are prone to a variety of attacks which can be classified as external and internal attacks. Internal attacks aim to make profits by manipulation of trading processes e.g., Spoofing, Quote stuffing, Layering and others, which are the specific focus of this paper. Different types of proprietary fraudulent activity detectors are deployed by stock exchanges to analyze the time series data of trader’s activities or the activity of a particular stock to flag potentially malicious transactions while human analysts probe the flagged transactions further. The key issue faced here is that while the number of anomalous transactions identified can run into thousands or tens of thousands, the number of such transactions that can realistically be probed by human analysts would be a small fraction due to resource constraints. The issue therefore reduces to a dynamic resource allocation problem wherein alerts that represent the most malicious transactions need to be mapped to human analysts for further probing across different time intervals. To address this challenge, we encode the scenario as a Cooperative Target Observation (CTO) problem wherein the analysts (modeled as observers) perform a cooperative observation of alerts that represent potentially malicious activity (modeled as targets) and develop multiple solution approaches in order to identify malicious activity.

B. Kalra and S. K. Munnangi—Equal contribution.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Aswani, R., Munnangi, S.K., Paruchuri, P.: Improving surveillance using cooperative target observation. In: Thirty-First AAAI Conference (2017)

    Google Scholar 

  2. Brandom, R.: Hackers increasingly turn their sights on stock exchanges (2013). https://www.theverge.com/2013/8/1/4578688/hackers-turn-their-sights-on-stock-exchanges

  3. Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1–58 (2009)

    Article  Google Scholar 

  4. Frunza, M.C.: Introduction to the Theories and Varieties of Modern Crime in Financial Markets. Academic Press, Cambridge (2015)

    Google Scholar 

  5. Ganesan, R., Jajodia, S., Shah, A., Cam, H.: Dynamic scheduling of cybersecurity analysts for minimizing risk using reinforcement learning. ACM Trans. Intell. Syst. Technol. (TIST) 8(1), 4 (2016)

    Google Scholar 

  6. Goldberg, H.G., Kirkland, J.D., Lee, D., Shyr, P., Thakker, D.: The NASD securities observation, new analysis and regulation system (SONAR). In: IAAI, pp. 11–18 (2003)

    Google Scholar 

  7. Goodin, D.: How elite hackers (almost) stole the NASDAQ (2014). https://arstechnica.com/information-technology/2014/07/how-elite-hackers-almost-stole-the-nasdaq

  8. Harris, L.: Trading and Exchanges: Market Microstructure for Practitioners. OUP, Oxford (2003)

    Google Scholar 

  9. Imisiker, S., Tas, B.K.O.: Wash trades as a stock market manipulation tool. J. Behav. Exp. Finance 20, 92–98 (2018)

    Article  Google Scholar 

  10. Ingraham, N.: The US government has charged five men with the largest hacking scheme in us history (2013). https://www.theverge.com/2013/7/25/4556594/five-men-charged-in-largest-hacking-scheme-in-us-history

  11. Luke, S., Sullivan, K., Panait, L., Balan, G.: Tunably decentralized algorithms for cooperative target observation. In: Proceedings of the Fourth International Conference on Autonomous Agents and Multiagent Systems, pp. 911–917. ACM (2005)

    Google Scholar 

  12. Manevitz, L.M., Yousef, M.: One-class SVMs for document classification. J. Mach. Learn. Res. 2, 139–154 (2002)

    MATH  Google Scholar 

  13. Montgomery, J.D.: Spoofing, market manipulation, and the limit-order book (2016). https://ankura.com/insights/spoofing-market-manipulation-and-the-limit-order-book

  14. Nikkei: Malaysia probes cyberattack suspected of disrupting online stock trading (2017). https://asia.nikkei.com/Markets/Equities/Malaysia-probes-cyberattack-suspected-of-disrupting-online-stock-trading

  15. Parker, L.E.: Distributed algorithms for multi-robot observation of multiple moving targets. Auton. Robots 12(3), 231–255 (2002)

    Article  Google Scholar 

  16. Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011)

    MathSciNet  MATH  Google Scholar 

  17. Rashid, F.Y.: Cyber attacks against stock exchanges threaten financial markets (2013). https://www.securityweek.com/cyber-attacks-against-stock-exchanges-threaten-financial-markets-report

  18. Saeedi, A., Hamedi, M.: Financial Literacy: Empowerment in the Stock Market. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-77857-0

    Book  Google Scholar 

  19. SMARTS: Nasdaq (smarts) trade surveillance for automated capture and monitoring of all trading activity. https://new.nasdaq.com/solutions/nasdaq-trade-surveillance

  20. Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. MIT Press, Cambridge (2018)

    MATH  Google Scholar 

  21. Wang, J., Cao, J., Wang, S., Yao, Z., Li, W.: IRDA: incremental reinforcement learning for dynamic resource allocation. IEEE Trans. Big Data 1 (2020). https://doi.org/10.1109/TBDATA.2020.2988273

Download references

Acknowledgements

We would like to thank CognitiveScale for providing access to their data generation software for experimentation purposes and related discussions and for the generous support provided.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhavya Kalra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kalra, B., Munnangi, S.K., Majmundar, K., Manwani, N., Paruchuri, P. (2021). Cooperative Monitoring of Malicious Activity in Stock Exchanges. In: Gupta, M., Ramakrishnan, G. (eds) Trends and Applications in Knowledge Discovery and Data Mining. PAKDD 2021. Lecture Notes in Computer Science(), vol 12705. Springer, Cham. https://doi.org/10.1007/978-3-030-75015-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-75015-2_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-75014-5

  • Online ISBN: 978-3-030-75015-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics