skip to main content
research-article

Network Embedding-Based Approach for Detecting Collusive Spamming Groups on E-Commerce Platforms

Published: 01 January 2022 Publication History

Abstract

Information security is one of the key issues in e-commerce Internet of Things (IoT) platform research. The collusive spamming groups on e-commerce platforms can write a large number of fake reviews over a period of time for the evaluated products, which seriously affect the purchase decision behaviors of consumers and destroy the fair competition environment among merchants. To address this problem, we propose a network embedding based approach to detect collusive spamming groups. First, we use the idea of a meta-graph to construct a heterogeneous information network based on the user review dataset. Second, we exploit the modified DeepWalk algorithm to learn the low-dimensional vector representations of user nodes in the heterogeneous information network and employ the clustering methods to obtain candidate spamming groups. Finally, we leverage an indicator weighting strategy to calculate the spamming score of each candidate group, and the top-k groups with high spamming scores are considered to be the collusive spamming groups. The experimental results on two real-world review datasets show that the overall detection performance of the proposed approach is much better than that of baseline methods.

References

[1]
R. K. Dewang and A. K. Singh, “State-of-art approaches for review spammer detection: a survey,” Journal of Intelligent Information Systems, vol. 50, no. 2, pp. 231–264, 2018.
[2]
A. Heydari, M. a. Tavakoli, N. Salim, and Z. Heydari, “Detection of review spam: a survey,” Expert Systems with Applications, vol. 42, no. 7, pp. 3634–3642, 2015.
[3]
A. Mukherjee, B. Liu, and N. Glance, “Spotting fake reviewer groups in consumer reviews,” in Proceedings of the 21st International Conference on World Wide Web, pp. 191–200, Lyon, France, April 2012.
[4]
C. Xu, J. Zhang, K. Chang, and C. Long, “Uncovering collusive spammers in Chinese review websites,” in Proceedings of the 22nd ACM International Conference On Information & Knowledge Management, pp. 979–988, San Francisco, CA, USA, November 2013.
[5]
L. Li, B. Qin, and T. Liu, “Survey on fake review detection research,” Chinese Journal of Computers, vol. 41, no. 4, pp. 946–968, 2018, in Chinese.
[6]
S.-j. Ji, Q. Zhang, J. Li, D. K. W. Chiu, S. Xu, L. Yi, and M. Gong, “A burst-based unsupervised method for detecting review spammer groups,” Information Sciences, vol. 536, pp. 454–469, 2020.
[7]
C. Xu and J. Zhang, “Combating Product Review Spam Campaigns via Multiple Heterogeneous Pairwise Features,” in Proceedings of the Siam International Conference On Data Mining, pp. 172–180, Vancouver, BC, Canada, April 2015.
[8]
C. Xu and J. Zhang, “Towards collusive fraud detection in online reviews,” in Proceedings of the 15th IEEE International Conference On Data Mining, pp. 1051–1056, Atlantic City, NJ, USA, November 2015.
[9]
L. Zhang, Z. Wu, and J. Cao, “Detecting spammer groups from product reviews: a partially supervised learning model,” IEEE Access, vol. 6, pp. 2559–2568, 2018.
[10]
J. Ye and L. Akoglu, “Discovering Opinion Spammer Groups by Network Footprints,” in Proceedings of the Joint European Conference On Machine Learning And Knowledge Discovery In Databases, pp. 267–282, Porto, Portugal, September 2015.
[11]
E. Choo, T. Yu, and M. Chi, “Detecting opinion spammer groups through community discovery and sentiment analysis,” in Proceedings of the 29th Annual IFIP Conference On Data And Applications Security And Privacy, pp. 170–187, Fairfax, VA, USA, July 2015.
[12]
Z. Wang, T. Hou, D. Song, Z. Li, and T. Kong, “Detecting review spammer groups via bipartite graph projection,” The Computer Journal, vol. 59, no. 6, pp. 861–874, 2016.
[13]
Q. N. T. Do, A. Zhilin, C. Z. P. Junior, G. Wang, and F. K. Hussain, “A network-based approach to detect spammer groups,” in Proceedings of the International Joint Conference On Neural Networks, pp. 3642–3648, Vancouver, BC, Canada, July 2016.
[14]
Q. N. T. Do, F. K. Hussain, and T. N. Bang, “A fuzzy approach to detect spammer groups,” in Proceedings of the IEEE International Conference on Fuzzy Systems, pp. 1–6, Naples, Italy, July 2017.
[15]
Z. Han, K. Yang, and X. Tan, “Analyzing spectrum features of weight user relation graph to identify large spammer groups in online shopping websites,” Chinese Journal of Computers, vol. 40, no. 4, pp. 939–954, 2017, in Chinese.
[16]
Z. Wang, S. Gu, X. Zhao, and X. Xu, “Graph-based review spammer group detection,” Knowledge and Information Systems, vol. 55, no. 3, pp. 571–597, 2018.
[17]
E. Serra, A. Shrestha, F. Spezzano, and A. Squicciarini, “DeepTrust: an automatic framework to detect trustworthy users in opinion-based systems,” in Proceedings of the Tenth ACM Conference On Data And Application Security And Privacy, pp. 29–38, New Orleans, LA, USA, March 2020.
[18]
Y. Dou, G. Ma, P. S. Yu, and S. Xie, “Robust spammer detection by nash reinforcement learning,” in Proceedings of the 26th ACM SIGKDD Conference On Knowledge Discovery And Data Mining, pp. 924–933, California, CA, USA, June 2020.
[19]
Z. Guo, L. Tang, T. Guo, K. Yu, M. Alazab, and A. Shalaginov, “Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace,” Future Generation Computer Systems, vol. 117, pp. 205–218, 2021.
[20]
Z. Song, F. Bai, J. Zhao, and J. Zhang, “Spammer detection using graph-level classification model of graph neural network,” in Proceedings of the IEEE 2nd International Conference On Big Data, Artificial Intelligence And Internet Of Things Engineering, pp. 531–538, Nanchang, China, March 2021.
[21]
J. Cao, R. Xia, Y. Guo, and Z. Ma, “Collusion-aware detection of review spammers in location based social networks,” World Wide Web, vol. 22, no. 6, pp. 2921–2951, 2019.
[22]
F. Zhang, X. Hao, J. Chao, and S. Yuan, “Label propagation-based approach for detecting review spammer groups on e-commerce websites,” Knowledge-Based Systems, vol. 193, pp. 1–19, 2020.
[23]
Y. Sun, J. Han, C. C. Aggarwal, and N. V. Chawla, “When will it happen?-relationship prediction in heterogeneous information networks,” in Proceedings of the 5th ACM International Conference on Web Search and Data Mining, pp. 663–672, Seattle, WA, USA, February 2012.
[24]
Y. Sun, J. Han, X. Yan, P. S. Yu, and T. Wu, “PathSim,” Proceedings of the VLDB Endowment, vol. 4, no. 11, pp. 992–1003, 2011.
[25]
Z. Huang, Y. Zheng, R. Cheng, Y. Sun, N. Mamoulis, and X. Li, “Meta structure: computing relevance in large heterogeneous information networks,” in Proceedings of the 22nd ACM SIGKDD International Conference On Knowledge Discovery And Data Mining, pp. 1595–1604, San Francisco, CA, USA, August 2016.
[26]
B. Perozzi, R. Al-Rfou, and S. Skiena, “Deepwalk: online learning of social representations,” in Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 701–710, New York, NY, USA, August 2014.
[27]
T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, “Distributed representations of words and phrases and their compositionality,” in Proceedings of the Advances In Neural Information Processing Systems, pp. 3111–3119, Lake Tahoe, NV, USA, December 2013.
[28]
A. McCallum, K. Nigam, and L. H. Ungar, “Efficient clustering of high-dimensional data sets with application to reference matching,” in Proceedings of the 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 169–178, Boston, MA, USA, August 2000.
[29]
X. Liu, K. Shi, and Z. Yao, “Evaluation of the M&A effectiveness based on grey systems theory and entropy method,” in Proceedings of the 4th IEEE International Conference On Information Science And Technology, pp. 268–271, Shenzhen, China, April 2014.
[30]
M. Song, Q. Zhu, J. Peng, E. D. R. Santibanez Gonzalez, and D. R. Ernesto, “Improving the evaluation of cross efficiencies: a method based on Shannon entropy weight,” Computers & Industrial Engineering, vol. 112, pp. 99–106, 2017.
[31]
W. Li, M. Gao, H. Li, J. Zeng, Q. Xiong, and S. Hirokawa, “Shilling attack detection in recommender systems via selecting patterns analysis,” IEICE - Transactions on Info and Systems, vol. E99.D, no. 10, pp. 2600–2611, 2016.
[32]
R. Barbado, O. Araque, and C. A. Iglesias, “A framework for fake review detection in online consumer electronics retailers,” Information Processing & Management, vol. 56, no. 4, pp. 1234–1244, 2019.
[33]
Y. Zhang, Y. Tan, M. Zhang, Y. Liu, T. Chua, and S. Ma, “Catch the black sheep: unified framework for shilling attack detection based on fraudulent action propagation,” in Proceedings of the 24th International Joint Conference On Artificial Intelligence, pp. 2408–2414, Buenos Aires, Argentina, July 2015.
[34]
L. Zhang, G. He, J. Cao, H. Zhu, and B. Xu, “Spotting review spammer groups: a cosine pattern and network based method,” Concurrency and Computation: Practice and Experience, vol. 30, no. 20, pp. 1–15, 2018.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Security and Communication Networks
Security and Communication Networks  Volume 2022, Issue
2022
13851 pages
ISSN:1939-0114
EISSN:1939-0122
Issue’s Table of Contents
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 01 January 2022

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media