skip to main content
10.1145/3589334.3645706acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article
Free Access

Friend or Foe? Mining Suspicious Behavior via Graph Capsule Infomax Detector against Fraudsters

Authors Info & Claims
Published:13 May 2024Publication History

ABSTRACT

Anomaly detection on graphs has recently attracted considerable attention due to its broad range of high-impact applications, including cybersecurity, financial transactions, and recommendation systems. Although many efforts have thus far been made, how to effectively handle the high inconsistency between users' behavior and labels, a fundamental issue in anomaly detection, has not yet received sufficient concern. Moreover, the inconsistency problem is hard to investigate and even deteriorates the performance of anomaly detectors. To this end, we propose a novel graph self-supervised learning framework, Capsule Graph Infomax (termed CapsGI), to overcome the inconsistency of anomaly detection. Inspired by the recent advances of capsules on images, we explore another possibility of reforming the node embedding by capsule ideas to represent the unique node's properties. Concretely, by disentangling heterogeneous factors underlying each node representation, we can establish node capsules such that their representation can reflect intrinsic node properties. To strengthen the connection among normal nodes, CapsGI further represents the part-whole contrastive learning between lower-level capsules (part) and higher-level capsules (whole) by explicitly considering the context graph relations. Extensive experiments on multiple real-world datasets demonstrate that our model significantly outperforms state-of-the-art models.

Skip Supplemental Material Section

Supplemental Material

rfp2455.mp4

Supplemental video

mp4

6.7 MB

References

  1. Parnian Afshar, Arash Mohammadi, and Konstantinos N. Plataniotis. 2018. Brain Tumor Type Classification via Capsule Networks. In ICIP. IEEE, 3129--3133. https: //doi.org/10.1109/ICIP.2018.8451379Google ScholarGoogle ScholarCross RefCross Ref
  2. Leman Akoglu, Rishi Chandy, and Christos Faloutsos. 2013. Opinion Fraud Detection in Online Reviews by Network Effects. In ICWSM. The AAAI Press.Google ScholarGoogle Scholar
  3. Adam Breuer, Roee Eilat, and Udi Weinsberg. 2020. Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social Networks. In WWW. ACM / IW3C2, 1287--1297.Google ScholarGoogle Scholar
  4. Corinna Cortes, Daryl Pregibon, and Chris Volinsky. 2001. Communities of Interest. In IDA, Vol. 2189. Springer, 105--114.Google ScholarGoogle Scholar
  5. Qi Ding, Natallia Katenka, Paul Barford, Eric D. Kolaczyk, and Mark Crovella. 2012. Intrusion as (anti)social communication: characterization and detection. In SIGKDD. ACM, 886--894.Google ScholarGoogle Scholar
  6. Yingtong Dou,Weijian Li, Zhirong Liu, Zhenhua Dong, Jiebo Luo, and Philip S. Yu. 2019. Uncovering download fraud activities in mobile app markets. In ASONAM. 671--678.Google ScholarGoogle Scholar
  7. Yingtong Dou, Zhiwei Liu, Li Sun, Yutong Deng, Hao Peng, and Philip S. Yu. 2020. Enhancing Graph Neural Network-based Fraud Detectors against Camouflaged Fraudsters. In CIKM. ACM, 315--324.Google ScholarGoogle Scholar
  8. Kevin Duarte, Yogesh S. Rawat, and Mubarak Shah. 2018. VideoCapsuleNet: A Simplified Network for Action Detection. In NeurIPS. 7621--7630.Google ScholarGoogle Scholar
  9. Gongfan Fang, Jie Song, XinchaoWang, Chengchao Shen, XingenWang, and Mingli Song. 2021. ContrastiveModel Inversion for Data-Free Knowledge Distillation. CoRR abs/2105.08584 (2021).Google ScholarGoogle Scholar
  10. William L. Hamilton, Zhitao Ying, and Jure Leskovec. 2017. Inductive Representation Learning on Large Graphs. In NIPS. 1024--1034.Google ScholarGoogle Scholar
  11. Peng He, Yue Zhou, Shukai Duan, and Xiaofang Hu. 2022. Memristive Residual CapsNet: A hardware friendly multi-level capsule network. Neurocomputing 496 (2022), 1--10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Geoffrey E. Hinton, Sara Sabour, and Nicholas Frosst. 2018. Matrix capsules with EM routing. In ICLR. OpenReview.net.Google ScholarGoogle Scholar
  13. Bryan Hooi, Hyun Ah Song, Alex Beutel, Neil Shah, Kijung Shin, and Christos Faloutsos. 2016. FRAUDAR: Bounding Graph Fraud in the Face of Camouflage. In SIGKDD. ACM, 895--904.Google ScholarGoogle Scholar
  14. Yifan Hou, Jian Zhang, James Cheng, Kaili Ma, Richard T. B. Ma, Hongzhi Chen, and Ming-Chang Yang. 2022. Measuring and Improving the Use of Graph Information in Graph Neural Networks. CoRR abs/2206.13170 (2022).Google ScholarGoogle Scholar
  15. Ayush Jaiswal, Wael AbdAlmageed, Yue Wu, and Premkumar Natarajan. 2018. CapsuleGAN: Generative Adversarial Capsule Network. In ECCV (Lecture Notes in Computer Science), Vol. 11131. Springer, 526--535.Google ScholarGoogle Scholar
  16. George Karypis and Vipin Kumar. 1995. Multilevel Graph Partitioning Schemes. In ICMR. CRC Press, 113--122.Google ScholarGoogle Scholar
  17. Thomas N. Kipf and Max Welling. 2016. Variational Graph Auto-Encoders. CoRR abs/1611.07308 (2016).Google ScholarGoogle Scholar
  18. Thomas N. Kipf and Max Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR. OpenReview.net.Google ScholarGoogle Scholar
  19. Srijan Kumar, Bryan Hooi, Disha Makhija, Mohit Kumar, Christos Faloutsos, and V. S. Subrahmanian. 2018. REV2: Fraudulent User Prediction in Rating Platforms. In WSDM. ACM, 333--341.Google ScholarGoogle Scholar
  20. Srijan Kumar, Francesca Spezzano, V. S. Subrahmanian, and Christos Faloutsos. 2016. Edge Weight Prediction in Weighted Signed Networks. In ICDM. IEEE Computer Society, 221--230.Google ScholarGoogle Scholar
  21. Srijan Kumar, Xikun Zhang, and Jure Leskovec. 2019. Predicting Dynamic Embedding Trajectory in Temporal Interaction Networks. In KDD. ACM, 1269--1278.Google ScholarGoogle Scholar
  22. Namkyeong Lee, Junseok Lee, and Chanyoung Park. 2022. Augmentation-Free Self-Supervised Learning on Graphs. In AAAI. AAAI Press, 7372--7380.Google ScholarGoogle Scholar
  23. Xiangfeng Li, Shenghua Liu, Zifeng Li, Xiaotian Han, Chuan Shi, Bryan Hooi, He Huang, and Xueqi Cheng. 2020. FlowScope: Spotting Money Laundering Based on Graphs. In AAAI. AAAI Press, 4731--4738.Google ScholarGoogle Scholar
  24. Huawen Liu, Enhui Li, Xinwang Liu, Kaile Su, and Shichao Zhang. 2021. Anomaly Detection With Kernel Preserving Embedding. ACM Trans. Knowl. Discov. Data 15, 5 (2021), 91:1--91:18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Yixin Liu, Zhao Li, Shirui Pan, Chen Gong, Chuan Zhou, and George Karypis. 2022. Anomaly Detection on Attributed Networks via Contrastive Self-Supervised Learning. IEEE Trans. Neural Networks Learn. Syst. 33, 6 (2022), 2378--2392.Google ScholarGoogle ScholarCross RefCross Ref
  26. Ziqi Liu, Chaochao Chen, Longfei Li, Jun Zhou, Xiaolong Li, Le Song, and Yuan Qi. 2019. GeniePath: Graph Neural Networks with Adaptive Receptive Paths. In AAAI. AAAI Press, 4424--4431. https://doi.org/10.1609/aaai.v33i01.33014424Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Zhiwei Liu, Yingtong Dou, Philip S. Yu, Yutong Deng, and Hao Peng. 2020. Alleviating the Inconsistency Problem of Applying Graph Neural Network to Fraud Detection. In SIGIR. ACM, 1569--1572.Google ScholarGoogle Scholar
  28. Jianxin Ma, Peng Cui, Kun Kuang, Xin Wang, and Wenwu Zhu. 2019. Disentangled Graph Convolutional Networks. In ICML (Proceedings of Machine Learning Research), Vol. 97. PMLR, 4212--4221.Google ScholarGoogle Scholar
  29. Julian J. McAuley and Jure Leskovec. 2013. From amateurs to connoisseurs: modeling the evolution of user expertise through online reviews. In WWW. ACM, 897--908.Google ScholarGoogle Scholar
  30. Hamed Nilforoshan and Neil Shah. 2019. SliceNDice: Mining Suspicious Multi- Attribute Entity Groups with Multi-View Graphs. In DSAA. IEEE, 351--363.Google ScholarGoogle Scholar
  31. Shebuti Rayana and Leman Akoglu. 2015. Collective Opinion Spam Detection: Bridging Review Networks and Metadata. In SIGKDD. ACM, 985--994.Google ScholarGoogle Scholar
  32. Sara Sabour, Nicholas Frosst, and Geoffrey E. Hinton. 2017. Dynamic Routing Between Capsules. In USA. 3856--3866.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Neil Shah, Alex Beutel, Brian Gallagher, and Christos Faloutsos. 2014. Spotting Suspicious Link Behavior with fBox: An Adversarial Perspective. In ICDM. IEEE Computer Society, 959--964.Google ScholarGoogle Scholar
  34. Kijung Shin, Bryan Hooi, and Christos Faloutsos. 2016. M-Zoom: Fast Dense- Block Detection in Tensors with Quality Guarantees. In ECML PKDD (Lecture Notes in Computer Science), Vol. 9851. Springer, 264--280.Google ScholarGoogle Scholar
  35. Petar Velickovic, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Liò, and Yoshua Bengio. 2017. Graph Attention Networks. CoRR abs/1710.10903 (2017). http://arxiv.org/abs/1710.10903Google ScholarGoogle Scholar
  36. Petar Velickovic, William Fedus, William L. Hamilton, Pietro Liò, Yoshua Bengio, and R. Devon Hjelm. 2019. Deep Graph Infomax. In ICLR. OpenReview.net.Google ScholarGoogle Scholar
  37. Daixin Wang, Yuan Qi, Jianbin Lin, Peng Cui, Quanhui Jia, Zhen Wang, Yanming Fang, Quan Yu, Jun Zhou, and Shuang Yang. 2019. A Semi-Supervised Graph Attentive Network for Financial Fraud Detection. In ICDM. IEEE, 598--607.Google ScholarGoogle Scholar
  38. Guan Wang, Sihong Xie, Bing Liu, and Philip S. Yu. 2011. Review Graph Based Online Store Review Spammer Detection. In ICDM. IEEE Computer Society, 1242--1247.Google ScholarGoogle Scholar
  39. Guan Wang, Sihong Xie, Bing Liu, and Philip S. Yu. 2012. Identify Online Store Review Spammers via Social Review Graph. ACM Trans. Intell. Syst. Technol. 3, 4 (2012), 61:1--61:21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. YanlingWang, Jing Zhang, Shasha Guo, Hongzhi Yin, Cuiping Li, and Hong Chen. 2021. Decoupling Representation Learning and Classification for GNN-based Anomaly Detection. In SIGIR. ACM, 1239--1248.Google ScholarGoogle Scholar
  41. Yanling Wang, Jing Zhang, Haoyang Li, Yuxiao Dong, Hongzhi Yin, Cuiping Li, and Hong Chen. [n.d.].Google ScholarGoogle Scholar
  42. Yaochen Xie, Zhao Xu, ZhengyangWang, and Shuiwang Ji. 2021. Self-Supervised Learning of Graph Neural Networks: A Unified Review. CoRR abs/2102.10757 (2021).Google ScholarGoogle Scholar
  43. Zhang Xinyi and Lihui Chen. 2019. Capsule Graph Neural Network. In ICLR. OpenReview.net.Google ScholarGoogle Scholar
  44. Keyulu Xu,Weihua Hu, Jure Leskovec, and Stefanie Jegelka. 2019. How Powerful are Graph Neural Networks?. In ICLR. OpenReview.net.Google ScholarGoogle Scholar
  45. Jinyu Yang, Peilin Zhao, Yu Rong, Chaochao Yan, Chunyuan Li, Hehuan Ma, and Junzhou Huang. 2021. Hierarchical Graph Capsule Network. In AAAI. AAAI Press, 10603--10611.Google ScholarGoogle Scholar
  46. Rui Yang,Wenrui Dai, Chenglin Li, Junni Zou, and Hongkai Xiong. 2020. NCGNN: Node-level Capsule Graph Neural Network. CoRR abs/2012.03476 (2020).Google ScholarGoogle Scholar
  47. Yuning You, Tianlong Chen, Yang Shen, and Zhangyang Wang. 2021. Graph Contrastive Learning Automated. In ICML (Proceedings of Machine Learning Research), Vol. 139. PMLR, 12121--12132.Google ScholarGoogle Scholar
  48. Tong Zhao, Tianwen Jiang, Neil Shah, and Meng Jiang. 2022. A Synergistic Approach for Graph Anomaly Detection With Pattern Mining and Feature Learning. IEEE Trans. Neural Networks Learn. Syst. 33, 6 (2022), 2393--2405.Google ScholarGoogle ScholarCross RefCross Ref
  49. Xiangping Zheng, Xun Liang, Bo Wu, Yuhui Guo, and Xuan Zhang. 2022. Graph Capsule Network with a Dual Adaptive Mechanism. In SIGIR. ACM, 1859--1864.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Yu Zheng, Ming Jin, Yixin Liu, Lianhua Chi, Khoa T. Phan, and Yi-Ping Phoebe Chen. 2021. Generative and Contrastive Self-Supervised Learning for Graph Anomaly Detection. CoRR abs/2108.09896 (2021).Google ScholarGoogle Scholar
  51. Yulin Zhu, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jian Ren, and Kai Zhou. 2021. BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection. CoRR abs/2106.09989 (2021).Google ScholarGoogle Scholar

Index Terms

  1. Friend or Foe? Mining Suspicious Behavior via Graph Capsule Infomax Detector against Fraudsters

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WWW '24: Proceedings of the ACM on Web Conference 2024
          May 2024
          4826 pages
          ISBN:9798400701719
          DOI:10.1145/3589334

          Copyright © 2024 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 May 2024

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate1,899of8,196submissions,23%
        • Article Metrics

          • Downloads (Last 12 months)85
          • Downloads (Last 6 weeks)85

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader