Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce

被引:3
作者
Haider, Sami Ahmed [1 ]
Rahman, Mohammad Zia Ur [2 ]
Gupta, Sachin [3 ]
Hamidovich, Ataniyazov Jasurbek [4 ]
Soomar, Arsalan Muhammad [5 ]
Gupta, Bhoomi [6 ]
Patni, Jagdish Chandra [7 ]
Chunduri, Venkata [8 ]
机构
[1] Univ Elect Sci & Technol, Glasgow Coll, Chengdu 610056, Peoples R China
[2] Koneru Lakshmaiah Educ Fdn, Dept Elect & Commun Engn, Vaddeswaram 522302, India
[3] Maharaja Agrasen Inst Technol, Dept CSE, Meerut 250005, India
[4] Tashkent Inst Finance, Dept Int Finance & Credit, Tashkent 1000000, Uzbekistan
[5] Gdansk Univ Technol, Fac Elect & Control Engn, PL-80226 Gdansk, Poland
[6] Maharaja Agrasen Inst Technol, Dept Informat Technol, New Delhi 110086, India
[7] Symbiosis Int Deemed Univ, Symbiosis Inst Technol Nagpur Campus, Nagpur 440008, India
[8] Indiana State Univ, Dept Math & Comp Sci, Terre Haute, IN 47809 USA
关键词
Electronic commerce; Behavioral sciences; Anomaly detection; Bipartite graph; Fraud; Decoding; Social networking (online); Energy efficiency; aberrant detection model; optimization technique; behavioral analysis; social networks; ANOMALY DETECTION; FRAUD DETECTION; MEMORY;
D O I
10.1109/TCE.2024.3355477
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Within the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this objective entails examining the behavioral tendencies of atypical users through the abstraction of e-commerce networks as heterogeneous information networks. These networks are then transformed into a bipartite graph that establishes associations between users and devices. The Self-Supervised Aberrant Detection Model (SAD) has been proposed within this theoretical framework as a means to identify and detect users who exhibit aberrant behavior. The SSADM methodology utilizes a self-supervised learning process that utilizes autoencoders to encode representations of user nodes. The proposed method aims to maximize a combined objective function for backpropagation while utilizing support vector data description to detect abnormalities in the representations of user nodes. In summary, many tests have been conducted utilizing both authentic network datasets and partially synthetic network datasets to demonstrate the efficacy and superiority of the SAD technique, specifically within the domain of an energy-efficient 5G network.
引用
收藏
页码:1631 / 1639
页数:9
相关论文
共 27 条
[1]   Fraud detection system: A survey [J].
Abdallah, Aisha ;
Maarof, Mohd Aizaini ;
Zainal, Anazida .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 68 :90-113
[2]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[3]   Abnormal Detection of Electricity Consumption of User Based on Particle Swarm Optimization and Long Short Term Memory With the Attention Mechanism [J].
Bian, Jiahao ;
Wang, Lei ;
Scherer, Rafal ;
Wozniak, Marcin ;
Zhang, Pengchao ;
Wei, Wei .
IEEE ACCESS, 2021, 9 :47252-47265
[4]   Mining social networks for anomalies: Methods and challenges [J].
Bindu, P. V. ;
Thilagam, P. Santhi .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 68 :213-229
[5]  
Chalapathy R, 2019, Arxiv, DOI arXiv:1901.03407
[6]   Credit card fraud detection in the era of disruptive technologies: A systematic review [J].
Cherif, Asma ;
Badhib, Arwa ;
Ammar, Heyfa ;
Alshehri, Suhair ;
Kalkatawi, Manal ;
Imine, Abdessamad .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (01) :145-174
[7]   Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning [J].
Dong, Shi ;
Xia, Yuanjun ;
Peng, Tao .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (04) :4197-4212
[8]   Comprehensive survey on self-organizing cellular network approaches applied to 5G networks [J].
Fourati, Hasna ;
Maaloul, Rihab ;
Chaari, Lamia ;
Jmaiel, Mohamed .
COMPUTER NETWORKS, 2021, 199
[9]   Real-Time Detection Schemes for Memory DoS (M-DoS) Attacks on Cloud Computing Applications [J].
Islam, Umar ;
Al-Atawi, Abdullah ;
Alwageed, Hathal Salamah ;
Ahsan, Muhammad ;
Awwad, Fuad A. ;
Abonazel, Mohamed R. .
IEEE ACCESS, 2023, 11 :74641-74656
[10]   Community detection in networks: A multidisciplinary review [J].
Javed, Muhammad Aqib ;
Younis, Muhammad Shahzad ;
Latif, Siddique ;
Qadir, Junaid ;
Baig, Adeel .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 108 :87-111