Skip to main content

Advertisement

Log in

Detecting compromised accounts caused by phone number recycling on e-commerce platforms: taking Meituan as an example

电子商务平台 “二次放号” 被盗账号检测研究: 以美团为例

  • Research Article
  • Published:
Frontiers of Information Technology & Electronic Engineering Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

Phone number recycling (PNR) refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner. It has posed a threat to the reliability of the existing authentication solution for e-commerce platforms. Specifically, a new owner of a reassigned number can access the application account with which the number is associated, and may perform fraudulent activities. Existing solutions that employ a reassigned number database from mobile operators are costly for e-commerce platforms with large-scale users. Thus, alternative solutions that depend on only the information of the applications are imperative. In this work, we study the problem of detecting accounts that have been compromised owing to the reassignment of phone numbers. Our analysis on Meituan’s real-world dataset shows that compromised accounts have unique statistical features and temporal patterns. Based on the observations, we propose a novel model called temporal pattern and statistical feature fusion model (TSF) to tackle the problem, which integrates a temporal pattern encoder and a statistical feature encoder to capture behavioral evolutionary interaction and significant operation features. Extensive experiments on the Meituan and IEEE-CIS datasets show that TSF significantly outperforms the baselines, demonstrating its effectiveness in detecting compromised accounts due to reassigned numbers.

摘要

“二次放号” 是指移动运营商回收已停机手机的号码并将其重新分配给新号主的行为. 这种操作方式对电子商务平台现有身份验证解决方案的可靠性构成了威胁. 具体而言, 重新分配号码的新号主可以使用该号码之前已绑定的应用程序账户, 并可能基于此开展欺诈活动. 对于拥有庞大用户群体的电子商务平台而言, 现有的基于移动运营商重新分配号码数据库的解决方案成本高昂. 因此, 我们迫切需要一种只依赖应用程序信息的解决方案. 本文深入探究了因二次放号引发的被盗账号检测问题. 基于对美团真实数据集的分析发现, 被盗账户具有独特的统计特征和时序模式. 基于这些观察结果, 我们提出一种时序模式与统计特征融合模型 (TSF). 该模型分别设计了时序模式编码器和统计特征编码器, 旨在捕获能够有效区分正常账号和异常账号的时序演化模式和关键行为特征. 在美团数据集和IEEE-CIS数据集上进行的大量实验表明, TSF的性能明显优于其它基线模型, 进一步验证了所提模型的有效性.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Data availability

The data that support the findings of this study are available from the corresponding author upon reasonable request.

References

Download references

Author information

Authors and Affiliations

Authors

Contributions

All the authors contributed to the study conception and design. Min GAO, Shutong CHEN, Yangbo GAO, Zhenhua ZHANG, Yu CHEN, and Yang CHEN proposed the motivation of the study. Min GAO, Shutong CHEN, and Qiongzan YE performed the experiments. Min GAO drafted the paper. All the authors commented on previous versions of the paper. Min GAO, Yupeng LI, Xin WANG, and Yang CHEN revised the paper. All the authors read and approved the final version of the paper.

Corresponding author

Correspondence to Yang Chen  (陈阳).

Ethics declarations

All the authors declare that they have no conflict of interest.

Additional information

Project supported by the National Natural Science Foundation of China (Nos. 62072115, 62202402, 61971145, and 61602122), the Shanghai Science and Technology Innovation Action Plan Project (No. 22510713600), the Guangdong Basic and Applied Basic Research Foundation, China (Nos. 2022A1515011583 and 2023A1515011562), the One-off Tier 2 Start-up Grant (2020/2021) of Hong Kong Baptist University (Ref. RCOFSGT2/20-21/COMM/002), Startup Grant (Tier 1) for New Academics AY2020/21 of Hong Kong Baptist University and Germany/Hong Kong Joint Research Scheme sponsored by the Research Grants Council of Hong Kong, China, the German Academic Exchange Service of Germany (No. G-HKBU203/22), and Meituan

List of supplementary materials

1 IEEE-CIS dataset information

2 Experimental setup for baseline methods

3 Performance of TSF for the IEEE-CIS dataset

4 Description of statistical features for the Meituan dataset

Fig. S1 Precision–recall curves of TSF and baselines for the IEEE-CIS dataset

Fig. S2 Ablation study for the IEEE-CIS dataset

Table S1 Performances of TSF and baselines for the IEEE-CIS dataset

Table S2 Results of the ablation study for the IEEE-CIS dataset

Table S3 Statistical features of each account used in the statistical feature encoder of TSF

Supplementary materials for

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gao, M., Chen, S., Gao, Y. et al. Detecting compromised accounts caused by phone number recycling on e-commerce platforms: taking Meituan as an example. Front Inform Technol Electron Eng 25, 1077–1095 (2024). https://doi.org/10.1631/FITEE.2300291

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1631/FITEE.2300291

Key words

关键词

CLC number