REASONING UNDER UNCERTAINTY FOR SHILL DETECTION IN ONLINE AUCTIONS USING DEMPSTER-SHAFER THEORY

被引:14
作者
Dong, Fei [1 ]
Shatz, Sol M. [1 ]
Xu, Haiping [2 ]
机构
[1] Univ Illinois, Dept Comp Sci, Chicago, IL 60607 USA
[2] Univ Massachusetts Dartmouth, Comp & Informat Sci Dept, N Dartmouth, MA 02747 USA
基金
美国国家科学基金会;
关键词
Reasoning under uncertainty; knowledge representation; online auctions; shill detection; Dempster-Shafer theory;
D O I
10.1142/S0218194010005018
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes the design of a decision support system for shill detection in online auctions. To assist decision making, each bidder is associated with a type of certification, namely shill, shill suspect, or trusted bidder, at the end of each auction's bidding cycle. The certification level is determined on the basis of a bidder's bidding behaviors including shilling behaviors and normal bidding behaviors, and thus fraudulent bidders can be identified. In this paper, we focus on representing knowledge about bidders from different aspects in online auctions, and reasoning on bidders' trustworthiness under uncertainties using Dempster-Shafer theory of evidence. To demonstrate the feasibility of our approach, we provide a case study using real auction data from eBay. The analysis results show that our approach can be used to detect shills effectively and efficiently. By applying Dempster-Shafer theory to combine multiple sources of evidence for shill detection, the proposed approach can significantly reduce the number of false positive results in comparison to approaches using a single source of evidence.
引用
收藏
页码:943 / 973
页数:31
相关论文
共 25 条
[1]   Knowledge and case-based reasoning for customization of software processes - A hybrid approach [J].
Ahn, YW ;
Ahn, HJ ;
Park, SJ .
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2003, 13 (03) :293-312
[2]   Counteracting shill bidding in online English auction [J].
Bhargava, B ;
Jenamani, M ;
Zhong, YH .
INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2005, 14 (2-3) :245-263
[3]  
Chau DH, 2006, LECT NOTES ARTIF INT, V4213, P103
[4]   Dempster-Shafer theory for intrusion detection in ad hoc networks [J].
Chen, TM ;
Venkataramanan, V .
IEEE INTERNET COMPUTING, 2005, 9 (06) :35-41
[5]  
Cohen Adam., 2003, The Perfect Store: Inside eBay
[6]  
DEMPSTER AP, 1968, J ROY STAT SOC B, V30, P205
[7]   A K-NEAREST NEIGHBOR CLASSIFICATION RULE-BASED ON DEMPSTER-SHAFER THEORY [J].
DENOEUX, T .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1995, 25 (05) :804-813
[8]   A neural network classifier based on Dempster-Shafer theory [J].
Denoeux, T .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2000, 30 (02) :131-150
[9]   Combating online in -auction fraud: Clues, techniques and challenges' [J].
Dong, Fei ;
Shatz, Sol M. ;
Xu, Haiping .
COMPUTER SCIENCE REVIEW, 2009, 3 (04) :245-258
[10]  
Dong F, 2009, PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, P908, DOI 10.1109/ITNG.2009.28