Abstract
In spite of many advantages of online auctioning, serious frauds menace the auction users’ interests. Today, monitoring auctions for frauds is becoming very crucial. We propose here a generic framework that covers real-time monitoring of multiple live auctions. The monitoring is performed at different auction times depending on fraud types and auction duration. We divide the real-time monitoring functionality into threefold: detecting frauds, reacting to frauds, and updating bidders’ clusters. The first task examines in run-time bidding activities in ongoing auctions by applying fraud detection mechanisms. The second one determines how to react to suspicious activities by taking appropriate run-time actions against the fraudsters and infected auctions. Finally, every time an auction ends, successfully or unsuccessfully, participants’ fraud scores and their clusters are updated dynamically. Through simulated auction data, we conduct an experiment to monitor live auctions for shill bidding. The latter is considered the most severe fraud in online auctions, and the most difficult to detect. More precisely, we monitor each live auction at three time points, and for each of them, we verify the shill patterns that most likely happen.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chau, D.H., Pandit, S., Faloutsos, C.: Detecting fraudulent personalities in networks of online auctioneers. In: Fürnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) PKDD 2006. LNCS (LNAI), vol. 4213, pp. 103–114. Springer, Heidelberg (2006)
Chen, B., Sadaoui, S.: A Generic Formal Framework for Constructing Agent Interaction Protocols. International Journal of Software Engineering & Knowledge Engineering 15(1), 61–85 (2005)
Dong, F., Shatz, S., Xu, H.: Combating online in-auction frauds: Clues, techniques and challenges. Computer Science Review 3(4), 245–258 (2009)
Dong, F., Shatz, S.M., Xu, H., Majumdar, D.: Price comparison: A reliable approach to identifying shill bidding in online auctions? Electronic Commerce Research and Applications 11(2), 171–179 (2012)
Dong, F., Shatz, S.M., Xu, H.: Reasoning under Uncertainty for Shill Detection in Online Auctions Using Dempster-Shafer Theory. International Journal of Software Engineering and Knowledge Engineering 20(7), 943–973 (2010)
Engelberg, J., Williams, J.J.: eBay’s proxy bidding: A license to shill. Journal. Econom. Behav. Organ 72(1), 509–526 (2009)
Ford, B.J., Xu, H., Valova, I.: A Real-Time Self-Adaptive Classifier for Identifying Suspicious Bidders in Online Auctions. Computational Journal 56(5), 646–663 (2013)
Ford, B.J., Xu, H., Valova, I.: Identifying suspicious bidders utilizing hierarchical clustering and decision trees. In: IC-AI, pp. 195-201 (2010)
Goel, A., Xu, H., Shatz, S.M.: A multi-state bayesian network for shill verification in online auctions. In: Proc.22nd Int. Conf. Software Engineering and Knowledge Engineering, USA, pp. 279–285 (2010)
Kauffman, R., Wood, C.A.: Irregular bidding from opportunism: an explanation of shilling in online auctions. Information Systems Research 5, 1–36 (2007)
Lie, B., Zhang, H., Chen, H., Liu, L., Wang, D.: A k-means clustering based algorithm for shill bidding recognition in online auction. In: 24th Chinese Control and Decision Conference, pp. 939-943. IEEE (2012)
Mamum, K., Sadaoui, S.: Combating shill bidding in online auctions. In: International Conference on Information Society, i-Society, pp. 174-180. IEEE (2013)
Manikanteswari, D.S.L., Swathi, M., Nagendranath, M.V.S.S.: Machine Learning Approach to Handle Fraud Bids. International journal for development of computer science & technology, 1(5) (2013)
Mundra, A., Rakesh, N.: Online Hybrid model for online fraud prevention and detection. In: ICACNI, pp. 805-815 (2013)
Patel, R., Xu, H., Goel, A.: Real-time trust management in agent based online auction systems. In: SEKE, pp. 244-250 (2007)
Shah, H.S., Joshi, N.R., Sureka, A., Wurman, P.R.: Mining eBay: bidding strategies and shill detection. In: Zaïane, O.R., Srivastava, J., Spiliopoulou, M., Masand, B. (eds.) WebKDD 2003. LNCS (LNAI), vol. 2703, pp. 17–34. Springer, Heidelberg (2003)
Trevathan, J., Read, W.: Detecting shill bidding in online english auctions. In: Handbook of Research on Social and Organizational Liabilities in Information Security, pp. 446-470 (2006)
Tsang, S., Koh, Y., Dobbie, G., Alam, S.: Detecting online auction shilling frauds using supervised learning. Expert Syst. Appl. 41(6), 3027–3040 (2014)
Trevathan, J., Read, W.: Investigating Shill Bidding Behaviors Involving Colluding Bidders. Journal of Computers 2(10), 63–75 (2007). Academy Publisher
Xu, H., Bates, C., Shatz, S. M.: Real-time model checking for shill detection in live online auctions. In: SERP, pp. 134-140 (2009)
Xu, H., Shatz, S. M. Bates, C. K.: A framework for agent-based trust management in online auctions. In: ITNG, pp.149-155 (2008)
Yu, C., Lin, S.: Fuzzy rule optimization for online auction frauds detection based on genetic algorithm. Electronic Commerce Research 13(2), 169–182 (2013)
Yoshida, T., Ohwada, H.: Shill bidder detection for online auctions. In: Zhang, B.-T., Orgun, M.A. (eds.) PRICAI 2010. LNCS, vol. 6230, pp. 351–358. Springer, Heidelberg (2010)
Zhang, S., Sadaoui, S., Mouhoub, M.: An Empirical Analysis of Imbalanced Data Classification. Computer and Information Science 8(1), 151–162 (2015). doi:10.5539/cis.v8n1p151
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Sadaoui, S., Wang, X., Qi, D. (2015). A Real-Time Monitoring Framework for Online Auctions Frauds. In: Ali, M., Kwon, Y., Lee, CH., Kim, J., Kim, Y. (eds) Current Approaches in Applied Artificial Intelligence. IEA/AIE 2015. Lecture Notes in Computer Science(), vol 9101. Springer, Cham. https://doi.org/10.1007/978-3-319-19066-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-19066-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19065-5
Online ISBN: 978-3-319-19066-2
eBook Packages: Computer ScienceComputer Science (R0)