Fraud Detection through Graph-Based User Behavior Modeling

被引:16
作者
Beutel, Alex [1 ]
Akoglu, Leman [2 ]
Faloutsos, Christos [1 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] SUNY Stony Brook, Stony Brook, NY 11794 USA
来源
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2015年
基金
美国国家科学基金会;
关键词
User Behavior Modeling; Fraud Detection; Anomalous Behavior; Outlier Detection; Recommendation Systems;
D O I
10.1145/2810103.2812702
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
How do anomalies, fraud, and spam effect our models of normal user behavior? How can we modify our models to catch fraudsters? In this tutorial we will answer these questions connecting graph analysis tools for user behavior modeling to anomaly and fraud detection. In particular, we will focus on three data mining techniques: subgraph analysis, label propagation and latent factor models; and their application to static graphs, e.g. social networks, evolving graphs, e.g. "who-calls-whom" networks, and attributed graphs, e.g. the "who-reviews-what" graphs of Amazon and Yelp. For each of these techniques we will give an explanation of the algorithms and the intuition behind them. We will then give brief examples of recent research using the techniques to model, understand and predict normal behavior. With this intuition for how these methods are applied to graphs and user behavior, we will focus on state-of-the-art research showing how the outcomes of these methods are effected by fraud, and how they have been used to catch fraudsters.
引用
收藏
页码:1696 / 1697
页数:2
相关论文
empty
未找到相关数据