skip to main content
research-article

eFraudCom: An E-commerce Fraud Detection System via Competitive Graph Neural Networks

Published: 07 March 2022 Publication History

Abstract

With the development of e-commerce, fraud behaviors have been becoming one of the biggest threats to the e-commerce business. Fraud behaviors seriously damage the ranking system of e-commerce platforms and adversely influence the shopping experience of users. It is of great practical value to detect fraud behaviors on e-commerce platforms. However, the task is non-trivial, since the adversarial action taken by fraudsters. Existing fraud detection systems used in the e-commerce industry easily suffer from performance decay and can not adapt to the upgrade of fraud patterns, as they take already known fraud behaviors as supervision information to detect other suspicious behaviors.
In this article, we propose a competitive graph neural networks (CGNN)-based fraud detection system (eFraudCom) to detect fraud behaviors at one of the largest e-commerce platforms, “Taobao”. In the eFraudCom system, (1) the competitive graph neural networks (CGNN) as the core part of eFraudCom can classify behaviors of users directly by modeling the distributions of normal and fraud behaviors separately; (2) some normal behaviors will be utilized as weak supervision information to guide the CGNN to build the profile for normal behaviors that are more stable than fraud behaviors. The algorithm dependency on fraud behaviors will be eliminated, which enables eFraudCom to detect fraud behaviors in presence of the new fraud patterns; (3) the mutual information regularization term can maximize the separability between normal and fraud behaviors to further improve CGNN. eFraudCom is implemented into a prototype system and the performance of the system is evaluated by extensive experiments. The experiments on two Taobao and two public datasets demonstrate that the proposed deep framework CGNN is superior to other baselines in detecting fraud behaviors. A case study on Taobao datasets verifies that CGNN is still robust when the fraud patterns have been upgraded.

References

[1]
Leman Akoglu, Rishi Chandy, and Christos Faloutsos. 2013. Opinion fraud detection in online reviews by network effects. In Proceeding of the International AAAI Conference on Web and Social Media, Vol. 7. No. 1.
[2]
Baran Bandyopadhyay, Harsh Kara, Aswin Kannan, and M. Narasimha Murty. 2018. FSCNMF: Fusing structure and content via non-negative matrix factorization for embedding information networks. arXiv preprint arXiv:1804.05313 (2018).
[3]
Sambaran Bandyopadhyay, Saley Vishal Vivek, and M. N. Murty. 2020. Outlier resistant unsupervised deep architectures for attributed network embedding. In Proceedings of the 13th International Conference on Web Search and Data Mining. 25–33.
[4]
Tej Paul Bhatla, Vikram Prabhu, and Amit Dua. 2003. Understanding credit card frauds. Cards Bus. Rev. 1, 6 (2003), 1–15.
[5]
Aleksandar Bojchevski and Stephan Günnemann. 2018. Bayesian robust attributed graph clustering: Joint learning of partial anomalies and group structure. In Proceedings of the AAAI Conference on Artificial Intelligence.
[6]
Nuno Carneiro, Goncalo Figueira, and Miguel Costa. 2017. A data mining based system for credit-card fraud detection in e-tail. Decis. Supp. Syst. 95 (2017), 91–101.
[7]
Yukuo Cen, Xu Zou, Jianwei Zhang, Hongxia Yang, Jingren Zhou, and Jie Tang. 2019. Representation learning for attributed multiplex heterogeneous network. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 1358–1368.
[8]
Andrea Dal Pozzolo, Olivier Caelen, Yann-Ael Le Borgne, Serge Waterschoot, and Gianluca Bontempi. 2014. Learned lessons in credit card fraud detection from a practitioner perspective. Exp. Syst. Applic. 41, 10 (2014), 4915–4928.
[9]
Kaize Ding, Jundong Li, Nitin Agarwal, and Huan Liu. 2020. Inductive anomaly detection on attributed networks. In Proceedings of the 29th International Joint Conference on Artificial Intelligence.
[10]
Kaize Ding, Jundong Li, Rohit Bhanushali, and Huan Liu. 2019. Deep anomaly detection on attributed networks. In Proceedings of the SIAM International Conference on Data Mining. SIAM, 594–602.
[11]
Haoyi Fan, Fengbin Zhang, and Zuoyong Li. 2020. AnomalyDAE: Dual autoencoder for anomaly detection on attributed networks. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 5685–5689.
[12]
Ian Goodfellow, Yoshua Bengio, Aaron Courville, and Yoshua Bengio. 2016. Deep Learning. Vol. 1. The MIT Press Cambridge.
[13]
Qingyu Guo, Zhao Li, Bo An, Pengrui Hui, Jiaming Huang, Long Zhang, and Mengchen Zhao. 2019. Securing the deep fraud detector in large-scale e-commerce platform via adversarial machine learning approach. In Proceedings of the World Wide Web Conference. 616–626.
[14]
Will Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive representation learning on large graphs. In Proceedings of the Conference on Advances in Neural Information Processing Systems. 1024–1034.
[15]
R. Devon Hjelm, Alex Fedorov, Samuel Lavoie-Marchildon, Karan Grewal, Phil Bachman, Adam Trischler, and Yoshua Bengio. 2018. Learning deep representations by mutual information estimation and maximization. arXiv preprint arXiv:1808.06670 (2018).
[16]
Thomas N. Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016).
[17]
Srijan Kumar, Francesca Spezzano, V. S. Subrahmanian, and Christos Faloutsos. 2016. Edge weight prediction in weighted signed networks. In Proceedings of the IEEE 16th International Conference on Data Mining (ICDM). IEEE, 221–230.
[18]
Srijan Kumar, Xikun Zhang, and Jure Leskovec. 2019. Predicting dynamic embedding trajectory in temporal interaction networks. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. ACM, 1269–1278.
[19]
Ao Li, Zhou Qin, Runshi Liu, Yiqun Yang, and Dong Li. 2019. Spam review detection with graph convolutional networks. In Proceedings of the 28th ACM International Conference on Information and Knowledge Management. 2703–2711.
[20]
Huayi Li, Geli Fei, Shuai Wang, Bing Liu, Weixiang Shao, Arjun Mukherjee, and Jidong Shao. 2017. Bimodal distribution and co-bursting in review spam detection. In Proceedings of the 26th International Conference on World Wide Web. 1063–1072.
[21]
Jundong Li, Harsh Dani, Xia Hu, and Huan Liu. 2017. Radar: Residual analysis for anomaly detection in attributed networks. In Proceedings of the International Joint Conference on Artificial Intelligence. 2152–2158.
[22]
Yuening Li, Xiao Huang, Jundong Li, Mengnan Du, and Na Zou. 2019. SpecAE: Spectral autoencoder for anomaly detection in attributed networks. In Proceedings of the 28th ACM International Conference on Information and Knowledge Management. 2233–2236.
[23]
Fanzhen Liu, Shan Xue, Jia Wu, Chuan Zhou, Wenbin Hu, Cecile Paris, Surya Nepal, Jian Yang, and Philip S. Yu. 2020. Deep learning for community detection: Progress, challenges and opportunities. In Proceedings of the 29th International Joint Conference on Artificial Intelligence. 4981–4987.
[24]
Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In Proceedings of the 8th IEEE International Conference on Data Mining. IEEE, 413–422.
[25]
Ninghao Liu, Xiao Huang, and Xia Hu. 2017. Accelerated local anomaly detection via resolving attributed networks. In Proceedings of the International Joint Conference on Artificial Intelligence. 2337–2343.
[26]
Ziqi Liu, Chaochao Chen, Xinxing Yang, Jun Zhou, Xiaolong Li, and Le Song. 2018. Heterogeneous graph neural networks for malicious account detection. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management. 2077–2085.
[27]
Jun Ma, Danqing Zhang, Yun Wang, Yan Zhang, and Alexey Pozdnoukhov. 2018. GraphRAD: A graph-based risky account detection system. In Proceedings of ACM SIGKDD Conference.
[28]
Xiaoxiao Ma, Jia Wu, Shan Xue, Jian Yang, Quan Z. Sheng, and Hui Xiong. 2021. A comprehensive survey on graph anomaly detection with deep learning. IEEE Trans. Knowl. Data. Eng.DOI:
[29]
Renxin Mao, Zhao Li, and Jinhua Fu. 2015. Fraud transaction recognition: A money flow network approach. In Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. 1871–1874.
[30]
Eric W. T. Ngai, Yong Hu, Yiu Hing Wong, Yijun Chen, and Xin Sun. 2011. The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decis. Supp. Syst. 50, 3 (2011), 559–569.
[31]
Aaron van den Oord, Yazhe Li, and Oriol Vinyals. 2018. Representation learning with contrastive predictive coding. arXiv preprint arXiv:1807.03748 (2018).
[32]
Chung-Hoon Park and Young-Gul Kim. 2003. Identifying key factors affecting consumer purchase behavior in an online shopping context. Int. J. Retail Distrib. Manag. 31, 3 (2003).
[33]
Zhen Peng, Wenbing Huang, Minnan Luo, Qinghua Zheng, Yu Rong, Tingyang Xu, and Junzhou Huang. 2020. Graph representation learning via graphical mutual information maximization. In Proceedings of the Web Conference. 259–270.
[34]
Zhen Peng, Minnan Luo, Jundong Li, Huan Liu, and Qinghua Zheng. 2018. ANOMALOUS: A joint modeling approach for anomaly detection on attributed networks. In Proceedings of the 27th International Joint Conference on Artificial Intelligence.
[35]
Bryan Perozzi and Leman Akoglu. 2018. Discovering communities and anomalies in attributed graphs: Interactive visual exploration and summarization. ACM Trans. Knowl. Discov. Data 12, 2 (2018), 1–40.
[36]
S. Benson Edwin Raj and A. Annie Portia. 2011. Analysis on credit card fraud detection methods. In Proceedings of the International Conference on Computer, Communication and Electrical Technology (ICCCET). IEEE, 152–156.
[37]
Yuxiang Ren, Bo Liu, Chao Huang, Peng Dai, Liefeng Bo, and Jiawei Zhang. 2019. Heterogeneous deep graph infomax. arXiv preprint arXiv:1911.08538 (2019).
[38]
Lukas Ruff, Robert Vandermeulen, Nico Goernitz, Lucas Deecke, Shoaib Ahmed Siddiqui, Alexander Binder, Emmanuel Müller, and Marius Kloft. 2018. Deep one-class classification. In Proceedings of the International Conference on Machine Learning. 4393–4402.
[39]
Gabriel Preti Santiago, Adriano C. M. Pereira, and Roberto Hirata Jr. 2015. A modeling approach for credit card fraud detection in electronic payment services. In Proceedings of the 30th Annual ACM Symposium on Applied Computing. 2328–2331.
[40]
Saeedreza Shehnepoor, Mostafa Salehi, Reza Farahbakhsh, and Noel Crespi. 2017. NetSpam: A network-based spam detection framework for reviews in online social media. IEEE Trans. Inf. Forens. Secur. 12, 7 (2017), 1585–1595.
[41]
Ning Su, Yiqun Liu, Zhao Li, Yuli Liu, Min Zhang, and Shaoping Ma. 2018. Detecting crowdturfing “add to favorites” activities in online shopping. In Proceedings of the World Wide Web Conference. 1673–1682.
[42]
Xing Su, Shan Xue, Fanzhen Liu, Jia Wu, Jian Yang, Chuan Zhou, Wenbin Hu, Cecile Paris, Surya Nepal, Di Jin et al. 2021. A comprehensive survey on community detection with deep learning. arXiv preprint arXiv:2105.12584 (2021).
[43]
Petar Velickovic, William Fedus, William L. Hamilton, Pietro Lio, Yoshua Bengio, and R. Devon Hjelm. 2019. Deep graph infomax. In Proceedings of the International Conference on Learning Representations (Poster).
[44]
Binghui Wang, Neil Zhenqiang Gong, and Hao Fu. 2017. GANG: Detecting fraudulent users in online social networks via guilt-by-association on directed graphs. In Proceedings of the IEEE International Conference on Data Mining (ICDM). IEEE, 465–474.
[45]
Daixin Wang, Jianbin Lin, Peng Cui, Quanhui Jia, Zhen Wang, Yanming Fang, Quan Yu, Jun Zhou, Shuang Yang, and Yuan Qi. 2019. A semi-supervised graph attentive network for financial fraud detection. In Proceedings of the IEEE International Conference on Data Mining (ICDM). IEEE, 598–607.
[46]
Haibo Wang, Chuan Zhou, Jia Wu, Weizhen Dang, Xingquan Zhu, and Jilong Wang. 2018. Deep structure learning for fraud detection. In Proceedings of the IEEE International Conference on Data Mining (ICDM). IEEE, 567–576.
[47]
Jianyu Wang, Rui Wen, Chunming Wu, Yu Huang, and Jian Xion. 2019. FdGars: Fraudster detection via graph convolutional networks in online app review system. In Proceedings of the World Wide Web Conference. 310–316.
[48]
Shuhao Wang, Cancheng Liu, Xiang Gao, Hongtao Qu, and Wei Xu. 2017. Session-based fraud detection in online e-commerce transactions using recurrent neural networks. In Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 241–252.
[49]
Zhen Wang and Chao Lan. 2020. Towards a hierarchical Bayesian model of multi-view anomaly detection. In Proceedings of the 29th International Joint Conference on Artificial Intelligence.
[50]
Rui Wen, Jianyu Wang, Chunming Wu, and Jian Xiong. 2020. ASA: Adversary situation awareness via heterogeneous graph convolutional networks. In Proceedings of the Web Conference. 674–678.
[51]
Haiqin Weng, Shouling Ji, Fuzheng Duan, Zhao Li, Jianhai Chen, Qinming He, and Ting Wang. 2019. CATS: Cross-platform e-commerce fraud detection. In Proceedings of the IEEE 35th International Conference on Data Engineering (ICDE). IEEE, 1874–1885.
[52]
Haiqin Weng, Zhao Li, Shouling Ji, Chen Chu, Haifeng Lu, Yu Du, and Qinming He. 2018. Online e-commerce fraud: A large-scale detection and analysis. In Proceedings of the IEEE 34th International Conference on Data Engineering (ICDE). IEEE, 1435–1440.
[53]
Yongji Wu, Defu Lian, Yiheng Xu, Le Wu, and Enhong Chen. 2020. Graph convolutional networks with Markov random field reasoning for social spammer detection. In Proceedings of the AAAI Conference on Artificial Intelligence. 1054–1061.
[54]
Zonghan Wu, Shirui Pan, Fengwen Chen, Guodong Long, Chengqi Zhang, and S. Yu Philip. 2020. A comprehensive survey on graph neural networks. IEEE Trans. Neural Netw. Learn. Syst. 32, 1 (2020).
[55]
Zenghua Xia, Chang Liu, Neil Zhenqiang Gong, Qi Li, Yong Cui, and Dawn Song. 2019. Characterizing and detecting malicious accounts in privacy-centric mobile social networks: A case study. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 2012–2022.
[56]
Xu Yang, Cheng Deng, Feng Zheng, Junchi Yan, and Wei Liu. 2019. Deep spectral clustering using dual autoencoder network. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 4066–4075.
[57]
Rex Ying, Ruining He, Kaifeng Chen, Pong Eksombatchai, William L. Hamilton, and Jure Leskovec. 2018. Graph convolutional neural networks for web-scale recommender systems. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 974–983.
[58]
Mengchen Zhao, Zhao Li, Bo An, Haifeng Lu, Yifan Yang, and Chen Chu. 2018. Impression allocation for combating fraud in e-commerce via deep reinforcement learning with action norm penalty. In Proceedings of the International Joint Conference on Artificial Intelligence. 3940–3946.
[59]
Bo Zong, Qi Song, Martin Renqiang Min, Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen. 2018. Deep autoencoding Gaussian mixture model for unsupervised anomaly detection. In Proceedings of the International Conference on Learning Representations.

Cited By

View all
  • (2025)GNN-EADD: Graph Neural Network-Based E-Commerce Anomaly Detection via Dual-Stage LearningIEEE Access10.1109/ACCESS.2025.352623913(8963-8976)Online publication date: 2025
  • (2025)Graph anomaly detection based on hybrid node representation learningNeural Networks10.1016/j.neunet.2025.107169185(107169)Online publication date: May-2025
  • (2025)BalancerGNN: Balancer Graph Neural Networks for imbalanced datasets: A case study on fraud detectionNeural Networks10.1016/j.neunet.2024.106926182(106926)Online publication date: Feb-2025
  • Show More Cited By

Index Terms

  1. eFraudCom: An E-commerce Fraud Detection System via Competitive Graph Neural Networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Information Systems
      ACM Transactions on Information Systems  Volume 40, Issue 3
      July 2022
      650 pages
      ISSN:1046-8188
      EISSN:1558-2868
      DOI:10.1145/3498357
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 March 2022
      Accepted: 01 June 2021
      Revised: 01 June 2021
      Received: 01 November 2020
      Published in TOIS Volume 40, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Online e-commerce platforms
      2. fraud detection system
      3. graph neural networks

      Qualifiers

      • Research-article
      • Refereed

      Funding Sources

      • ARC DECRA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)969
      • Downloads (Last 6 weeks)79
      Reflects downloads up to 28 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)GNN-EADD: Graph Neural Network-Based E-Commerce Anomaly Detection via Dual-Stage LearningIEEE Access10.1109/ACCESS.2025.352623913(8963-8976)Online publication date: 2025
      • (2025)Graph anomaly detection based on hybrid node representation learningNeural Networks10.1016/j.neunet.2025.107169185(107169)Online publication date: May-2025
      • (2025)BalancerGNN: Balancer Graph Neural Networks for imbalanced datasets: A case study on fraud detectionNeural Networks10.1016/j.neunet.2024.106926182(106926)Online publication date: Feb-2025
      • (2025)Identifying local useful information for attribute graph anomaly detectionNeurocomputing10.1016/j.neucom.2024.128900617(128900)Online publication date: Feb-2025
      • (2025)NNEnsLeGInformation Processing and Management: an International Journal10.1016/j.ipm.2024.10391662:1Online publication date: 1-Jan-2025
      • (2025)Identifying E-Commerce Fraud Through User Behavior Data: Observations and InsightsData Science and Engineering10.1007/s41019-024-00275-610:1(24-39)Online publication date: 15-Jan-2025
      • (2025)A comprehensive survey on GNN-based anomaly detection: taxonomy, methods, and the role of large language modelsInternational Journal of Machine Learning and Cybernetics10.1007/s13042-024-02516-6Online publication date: 4-Feb-2025
      • (2025)Graph neural networks for financial fraud detection: a reviewFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-024-40474-y19:9Online publication date: 1-Sep-2025
      • (2025)A Transformer-Based Spatio-Temporal Graph Neural Network for Anomaly Detection on Dynamic GraphsBig Data10.1007/978-981-96-1024-2_15(202-217)Online publication date: 24-Jan-2025
      • (2024)Exploring the Use of Graph Neural Networks for Blockchain Transaction Analysis and Fraud DetectionInternational Journal of Innovative Science and Research Technology (IJISRT)10.38124/ijisrt/IJISRT24JUL532(564-574)Online publication date: 23-Jul-2024
      • Show More Cited By

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media