Skip to Main content Skip to Navigation
Conference papers

Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts

Abstract : For over 15 years auction services have grown rapidly, constituting a major part of e-commerce worldwide. Unfortunately, they also provide opportunities for criminals to distribute illicit goods, launder money or commit other types of fraud. This calls for methods to mitigate this threat. The following paper discusses the methods of identifying the accounts of users participating in internet auctions that have been hijacked (taken over) by malicious individuals and utilised for fraudulent purposes. Two primary methods are described, monitoring users’ activities (e.g. the number of auctions created over time) with EWMA and clustering similar auction categories into groups for the purpose of assessing users’ sellers profiles and detecting their sudden changes. These methods, utilised together allow for real-time detection of suspicious accounts. The proposed models are validated on real data gathered from an auction web site.
Complete list of metadata

Cited literature [22 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Monday, June 19, 2017 - 5:01:05 PM
Last modification on : Monday, October 19, 2020 - 11:10:01 AM
Long-term archiving on: : Friday, December 15, 2017 - 8:15:14 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Marek Zachara, Dariusz Pałka. Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts. International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Aug 2012, Prague, Czech Republic. pp.534-546, ⟨10.1007/978-3-642-32498-7_41⟩. ⟨hal-01542426⟩



Record views


Files downloads