博碩士論文 93443004 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:39 、訪客IP:3.129.218.179
姓名 游政憲(Cheng-Hsien Yu)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 網路拍賣詐騙者偵測之研究
(A Study of Fraudster Detection for Online Auction Sellers)
相關論文
★ 網路合作式協同教學設計平台-以國中九年一貫課程為例★ 內容管理機制於常用問答集(FAQ)之應用
★ 行動多重代理人技術於排課系統之應用★ 存取控制機制與國內資安規範之研究
★ 信用卡系統導入NFC手機交易機制探討★ App應用在電子商務的推薦服務-以P公司為例
★ 建置服務導向系統改善生產之流程-以W公司PMS系統為例★ NFC行動支付之TSM平台規劃與導入
★ 關鍵字行銷在半導體通路商運用-以G公司為例★ 探討國內田徑競賽資訊系統-以103年全國大專田徑公開賽資訊系統為例
★ 航空地勤機坪作業盤櫃追蹤管理系統導入成效評估—以F公司為例★ 導入資訊安全管理制度之資安管理成熟度研究-以B個案公司為例
★ 資料探勘技術在電影推薦上的應用研究-以F線上影音平台為例★ BI視覺化工具運用於資安日誌分析—以S公司為例
★ 特權帳號登入行為即時分析系統之實證研究★ 郵件系統異常使用行為偵測與處理-以T公司為例
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 (全文檔遺失)
請聯絡國立中央大學圖書館資訊系統組 TEL:(03)422-7151轉57422,或E-mail聯絡
摘要(中) 由於網路拍賣的龐大使用者與低進入成本,引來了許多拍賣詐騙的情況,根據美國IC3從2003年到2011年的報告,我們可以發現網路犯罪的申訴案件數與受害人數呈現年年俱增的現象,而網路拍賣詐騙則是其中一項日益嚴重的網路犯罪項目。針對網路拍賣詐騙問題,先前研究曾提出以馬可夫鏈與類神經網路等方法之詐騙偵測方案,其偵測的效果雖然較傳統的評價系統好,但仍有改善的空間,而其產出之結果並不具可讀性,無法讓人輕易了解與使用,再者,先前研究皆未清楚說明網路拍賣資料應如何有效率的擷取,為了改善上述網路拍賣詐騙偵測的問題,本研究提出一套具有效率的網路拍賣資料擷取方法並結合多種分析工具來偵測拍賣詐騙者,最後產出可讀性高的辨識規則,以幫助拍賣使用者可以更輕易且有效的辨識較危險的賣家。在本研究中,我們將以社會網路分析、犯罪經濟學理論、賣家密度觀點來產生賣家的特徵,然後再將這些特徵導入模糊控制系統中形成模糊控制規則,再以遺傳演算法來進行模糊規則庫的最佳化學習,以建立最佳的網路拍賣詐騙者偵測規則。在實做的實驗中,我們以實際的拍賣網站"露天拍賣"作為資料蒐集的對象,並蒐集真實的拍賣交易資料以進行詐騙者監測的實驗。實驗結果發現,本研究所提出的網路拍賣資料收集機制可穩定且有效率的擷取拍賣交易資訊與使用者帳號資料,詐騙者偵測系統架構可將偵測指標降至四個,並且達到比先前研究更好的偵測效率,產出具可讀性之偵測規則以利使用,期望這些結果可以有助於使用者在辨識拍賣詐騙者上得到有效的協助。
摘要(英) Due to the huge amount of users and low entrance cost of online auction, there are a lot of online fraud cases in online auction sites. According to the IC3 reports from 2003 to 2011, we can understand the fraud cases and victims are increasing rapidly year by year. To solve the problems of online auction fraudster detection, the previous researches develop several solutions which use Markov Chain and Artificial Neural Network techniques can increase the performance of fraudster detection. Although these solutions have better performance of detection, the output models are not readable and not easy to use for every online auction users. In addition, the previous researches didn’t discuss how to collect online auction data efficiently. To improve the defects of previous solutions, this research will propose a parallel data collection mechanism and a hybrid approach which can produce the readable detection rules to detect the fraudster accounts to help the users to identify dangerous sellers. In this research, we use social network analysis to produce the behavior features and transform these features into fuzzy rules which can represent the detection rules. Then optimize the fuzzy rules by genetic algorithms to build the auction fraud detection model. For implementation, we collect the real auction data from the online auction site "http://www.ruten.com.tw" which is the most popular auction site in Taiwan. Finally, we found the proposed parallel data collection mechanism can collect and capture online auction data with account information efficiently. The fraudster detection mechanism use only four features to provide better detection performances than previous researches. The readable detection rules produced and provide more usability for online auction users. We hope the results of this research can help the online auction users to detect the possible fraudsters easier in online auction.
關鍵字(中) ★ 網路拍賣
★ 詐騙者偵測
★ 社會網路分析
★ 模糊控制系統
★ 遺傳演算法
關鍵字(英) ★ Online Auction
★ Fraudster Detection
★ Social Network Analysis
★ Fuzzy Control System
★ Genetic Algorithms
論文目次 中文提要....................................................i
Abstract..................................................ii
Acknowledgement..........................................iii
Table of Contents.........................................iv
List of Figures............................................v
List of Tables............................................vi
Chapter 1 Introduction...............................1
1.1 Motivations........................................1
1.2 Objectives.........................................3
1.3 Thesis Organization................................4
Chapter 2 Literature Review......................... 5
2.1 Issues Related to Online Auctions..................5
2.2 Fraud Detection in Online Auctions.................8
2.3 Social Network Analysis...........................10
2.4 Fuzzy Control Systems and Genetic Algorithms......13
Chapter 3 Parallel Data Collection..................17
3.1 Parallel Data Crawling and Capturing..............18
3.2 Black account list collection.....................26
3.3 Collect data from a social network perspective....27
Chapter 4 Feature Analysis..........................28
4.1 Social Network Analysis...........................28
4.2 Density of Sellers................................33
4.3 Economics of Crimes...............................34
4.4 Original Reputation System........................35
4.5 Feature Selection by Genetic Algorithms...........37
Chapter 5 Detection rule Optimization...............38
5.1 Membership Function...............................38
5.2 Gene encoding.....................................39
5.3 Fitness Function..................................40
5.4 Selection and Mutation............................42
5.5 Cross Over and Mutation...........................42
5.6 Parameters of the genetic algorithms..............43
Chapter 6 Experimental Results......................45
6.1 Experimental Design...............................45
6.2 Results of The Parallel Data Collection Mechanism.46
6.3 Results of The Online Auction Fraudster Detection
Mechanism.........................................52
6.4 Performance Comparisons...........................56
Chapter 7 Conclusions and Future Works..............58
7.1 Conclusions.......................................58
7.2 Future Works......................................59
References................................................61
參考文獻 [1] Angelov, P.P., Evolving Rule-Based Models. A Tool for design of flexible adaptive systems, Physica-Verlag, Wurzburg, 2002.
[2] Bajari, P., Hortacsu, A., ‘The Winner’s Curse, Reserve Prices and Endogenous Entry: Empirical Insight from eBay Auctions’, Rand Journal of Economics 3 (2) (2003): 329-355.
[3] Bapna, R., Goes, P., Gupta, A., Jin, Y., ‘User Heterogeneity and its Impact on Electronic Auction Market Design: An Empirical Exploration’, MIS Quarterly 28 (1) (Mar. 2004): 21-43.
[4] Borle, S., Boatwright, P., and Kadane, J. B., ‘The Timing of Bid Placement and Extent of Multiple Bidding: An Empirical Investigation Using eBay Online Auctions’, Working paper, Rice University, 2005.
[5] Carse, B., Fogarty, T.C., Munro, A., “Evolving fuzzy rule based controllers using genetic algorithms”, Fuzzy Sets and Systems, vol. 80, pp. 273-293, 1996.
[6] Chi, Z., Yan, H., Pham, T., Fuzzy Algorithms: With applications to Image Processing and Pattern Recognition, World Scientific, Singapore, 1996.
[7] Cho, H.J., “Automatic rule generation for fuzzy controllers using genetic algorithms: a study on representation scheme and mutation rate,” Proc. 7th IEEE Internat. Conf. on Fuzzy Systems, Anchorage, AK, pp. 1290-1295, 1998.
[8] Clarke, E. M., & Wing, J. M., Formal methods: State of the art and future directions. ACM Computing Surveys (CSUR), 28(4), 643, 1996.
[9] Cordon, O., Herrera, F., Hoffmann, F., Magdalena, L., Genetic Fuzzy Systems - Evolutionary Tunning and Learning of Fuzzy Knowledge Bases, World Scientific, Singapore, 2001.
[10] DeJong, K., "Learning with genetic algorithms: an overview", Mach. Learning, vol. 3, no. 3, pp. 121-138, 1988.
[11] Dellarocas, C. N., "Analyzing the Economic Efficiency of eBay-like Online Reputation Reporting Mechanisms", Proceedings of the 3rd ACM Conference on Electronic Commerce, Tampa, FL, October 14-16, 2001.
[12] Dong, F., Shatz, S. M., & Xu, H., "Combating online in-auction fraud: Clues, techniques and challenges", Computer Science Review, 3(4), 245-258, 2009.
[13] Dong, F., Shatz, S. M., & Xu, H., "Inference of online auction shills using dempster-shafer theory", Proc. of the 6th International Conference on Information Technology: New Generations 2009, 908-914, 2009.
[14] Driankov, D., Hellendoorn, H. and Reinfrank, M., “An Introduction to Fuzzy Control,” Narosa Publishing House, New Delhi, 1998.
[15] Elirlich, I., Participation in Illegitimate Activities: An Economic Analysis, 1974.
[16] Everett, M. G., Graph theoretic blockings k-plexes and k-cutpoints. Journal of Mathematical Sociology, 9(75-84), 448, 1982.
[17] Everett, M. G., & Borgatti, S. P., Analyzing clique overlap. Connections, 21(1), 49-61, 1998.
[18] Farinwata, S.S., Filev, D., Langari, R., Fuzzy Control - Synthesis and Analysis, John Wiley & Sons. Ltd, England, 2000.
[19] Filipe, D.S., “Supervision of fuzzy controllers using genetic algorithms,” Proc. 7th IEEE Internat.Conf. on Fuzzy Systems, Anchorage, AK, pp. 1241-1246, 1998.
[20] Garton, L., Haythornthwaite, C., & Wellman, B., Studying on-line social networks. Doing Internet Research: Critical Issues and Methods for Examining the Net1999, 75, 1999.
[21] Gavish B. and Tucci C. L., Fraudulent auctions on the Internet, Electronic Commerce Research, 6(2), 127-140, 2006.
[22] Goldberg, David E., “Genetic Algorithms in Search, Optimization, and Machine Learning,” Addison Wesley Longman, Inc., 1999.
[23] Hanneman, R. A., & Riddle, M., Introduction to social network methods. Riverside, CA: University of California, Riverside, 2005.
[24] Herrera, F., Lozano, M., Verdegay, J.L., Genetic Algorithms and Soft Computing, Physica-Verlag, Heidelberg, 1996.
[25] Holland, J.H., Reitman, J.S., “Cognitive systems based on adaptive algorithms,” in : D.A. Waterman, F. Hayes-Roth (Eds.), Pattern-Directed Inference Systems, Academic Press, New York, pp. 313-329, 1978.
[26] Holmblad, L., Ostergaard, I.I., “Control of a cement kiln by fuzzy logic,” in Fuzzy Information and Decision Processes, M.M. Gupta and E. Sanchez, Eds. Amsterdam, The Netherlands: North-Holland, 1982, pp. 389-399.
[27] Homaifar, A., McCormick, Ed, “Simultaneous design of membership functions and rule sets for fuzzy controllers using genetic algorithms,” IEEE Trans. Fuzzy Systems, vol. 3, pp. 129-138, 1995.
[28] Inoue, H., “Rule pairing methods for crossover in GA for automatic generation of fuzzy control rules,” Proc. 7th IEEE Internat. Conf. on Fuzzy Systems, Anchorage, AK, pp. 1223-1228, 1998.
[29] Internet Crime Complaint Center, “2009 Internet crime report”, 2010.
[30] Internet Crime Complaint Center, “2010 Internet crime report”, 2011.
[31] Internet Crime Complaint Center, “2011 Internet crime report”, 2012.
[32] Ishikawa, T., “A study on fuzzy control of an arm robot,” B.E. thesis, Dept. Contr. Eng., Tokyo Inst. Technol., 1988.
[33] Jank, W., Shmueli, G., ‘Profiling Price Dynamics in On-line Auctions Using Curve Clustering’, Working Paper, Smith School of Business, University of Maryland, 2005.
[34] Karr, C.L., “Genetic algorithm for fuzzy logic controller,” AI Expert, vol. 2, pp. 26-33, 1991.
[35] Karr, C.L., Gentry, E.J., “Fuzzy control of pH using genetic algorithms,” IEEE Trans. Fuzzy Systems, vol. 1, pp. 46-53, 1993.
[36] Kauffman, R. J., Wood, C. A., ‘Running up the Bid, Modeling Seller Opportunism in Internet Auctions’, Proceedings of the AMCIS 2000 Conference, Long Beach CA, 2000.
[37] Kinzel, J., Klawonn, F., Kruse, R., “Modifications of genetic algorithms for designing and optimizing fuzzy controllers,” Proc. 1st IEEE Internat. Conf. on Evolutionary Computation, Orlando, FL, pp. 28-33, 1994.
[38] Kosko, B., Neural Networks and Fuzzy Systems: A Dynamical systems Approach to Machine Intelligence, Prentice Hall of India Pvt. Ltd., 1997.
[39] Lee, C. C., "Fuzzy logic in control system: fuzzy logic controller”, IEEE Trans. on Man and Cybern, pp.404-435, March-April, 1990.
[40] Lee, M., Takagi, H., “Integrating design stages of fuzzy systems using genetic algorithms,” Proc. 2nd IEEE Internat. Conf. on Fuzzy Systems, San Francisco, CA, pp. 612-617, 1993.
[41] Leondes, C. T., Fuzzy Logic and Expert Systems Applications, Academic Press, USA, Vol. 6 of Neural Network Systems Techniques and Applications, 1998.
[42] Li, R.H., Zhang, Y., “Fuzzy logic controller based on genetic algorithms,” Fuzzy Sets and Systems, vol. 83, pp. 1-10, 1996.
[43] Lin S. J., Jheng Y. Y., Yu C. H., Combining ranking concept and social network analysis to detect collusive groups in online auctions Original Research Article, Expert Systems with Applications, Volume 39, Issue 10, August 2012, Pages 9079-9086.
[44] Livingston J. A., Functional forms in studies of reputation in online auctions. Electronic Commerce Research, 10(2), 167-190, 2010.
[45] Lucking-Reiley, D., "Auctions on the Internet: What’s Being Auctioned and How", Journal of Industrial Economics 48 (3), 227-252, 2000.
[46] Maeda, M., Murakami, S., “An automobile tracking control with fuzzy logic,” PRoc. IEEE conf. syst. symp., Osaka, Japan, pp. 61-66, 1987.
[47] Mamdani, E. H., “Application of fuzzy algorithms for control of simple dynamic plant,” in: Proc. Inst. Elect. Eng.,vol. 121, pp. 1585-1588, 1974.
[48] Mamdani, E.H. and Assilian, S., “An experiment in linguistic synthesis with a fuzzy logic controller,” Internat. J. Man Machine Studies, vol. 7, no. 1, pp. 1-13, 1975.
[49] Mauer, G.F., “A fuzzy logic controller for an ABS braking system.”, IEEE Trans. Fuzzy Systems, vol. 3, pp. 381-388, 1995.
[50] Mitra, S., Pal, S. K., “Fuzzy Multi-Layer Perception, Infering and Rule Generation,” IEEE Trans. Neural Networks, vol. 6, no. 1, pp. 51-63, Jan. 1995.
[51] Morzy, M., "New Algorithms for Mining the Reputation of Participants of Online Auctions. Algorithmica", 52(1), 95-112, 2008.
[52] Moudgal, V.G., Kwong, W.A., Passino, K.M., Yurkovich, S., “Fuzzy learning control for a flexible-link robot,” IEEE Trans. Fuzzy Systems, vol. 3, pp. 199-210, May 1995.
[53] National Police Agency, http://www.165.gov.tw/, Taiwan, 2010.
[54] Pan, W., Zhang, B., Zhu L., "Genetic algorithm combined with immune mechanism and its application in skill fuzzy control”, IEEE Chinese control and decision conference, pp. 4870-4874, Sep, 2009.
[55] Pandit, S., Chau, D. H., Wang, S., & Faloutsos, C., "Netprobe: A fast and scalable system for fraud detection in online auction networks". Proceedings of the 16th International Conference on World Wide Web, 210, 2007.
[56] Pedrycz, W., Fuzzy Modeling: Paradigms and Practice, Kluwer Academec Press, Dordrecht, 1996.
[57] Pedrycz, W., Fuzzy Evolutionary Computation, Kluwer Academic Publishers, Dordrecht, 1997.
[58] Pham, D.T., Karaboga, D., “Optimum design of fuzzy logic contollers using genetic algorithms,” J. Systems Eng., vol. 1, pp. 114-118, 1991.
[59] Popovic, D., Xiong, N., “Design of flexible structured fuzzy controllers using genetic algorithms,” Proc. IEEE Internat. Conf. on Fuzzy Systems, New Orleans, LA, pp. 1682-1686, 1996.
[60] Rani, S. S., Sibi, S., Mohanlal, P.P., “Secondary injection thrust vector control power plant linearisation using fuzzy logic for a launch vehicle,” Defence Sciene Journal, vol. 52, no. 4, pp. 409-416, Oct. 2002.
[61] Raol, J. R., Jalisatgi, A., “From genetics to genetic algorithms: Solution to optimisation problems using natural systems,” Resonance, pp. 43-54, Aug. 1996.
[62] Roth, A. E., Ockenfels, A., ‘Last-Minute Bidding and the Rules for Ending Second-Price Auctions: Evidence from eBay and Amazon Auctions on the Internet’, The American Economic Review 92 (4) (2002) 1093-1103, 2002.
[63] Rubin, S., Christodorescu, M., Ganapathy, V., Giffin, J. T., Kruger, L., Wang, H., et al., "An auctioning reputation system based on anomaly". Proceedings of the 12th ACM Conference on Computer and Communications Security, 279, 2005.
[64] Sanchez, E., Shibata, T., Zadeh, L., Genetic algorithms and fuzzy logic systems - Soft computing perspectives, World Scientific, Singapore, 1997.
[65] Smith, S.F., “A learning system based on genetic adaptive algorithms”, Doctoral Dissertation, Department of Computer Science, University of Pittsburgh, 1980.
[66] Srinivas, M., Patnaik, L. M., “Genetic Algorithms: A Survey,” IEEE Computer, pp. 17-26, Jun. 1994.
[67] Stenz, R., Kuhn, U., “Automation of a batch distillation column using fuzzy and conventional control,” IEEE Trans. Control Syst. Technol., vol. 3, pp. 171-176, June 1995.
[68] Sugeno, M., Park, G.K., “An approach to linguistic instruction based learning and its application to helicopter flight control,” Proc. 5th IFSA world congress, pp. 1082-1085, 1993.
[69] Takeda, H., Ishikawa, T., “Adaptive fuzzy control for catch-ball system,” Proc. 4th fuzzy syst. symp., Tokyo, Japan, pp. 77-82, May 1998.
[70] Tarng, Y.S., Yeh, Z.M., Nian, C.Y., “Genetic synthesis of fuzzy logic controllers in tuning,” Fuzzy Sets and Systems, vol. 83, pp. 301-310, 1996.
[71] Thrift, P., “Fuzzy logic synthesis with genetic algorithms,” Proc. Internat. Conf. on Genetic Algorithms, San Mateo, CA, pp. 509-513, 1991.
[72] Trevathan, J., & Read, W., "Detecting collusive shill bidding". Fourth International Conference on Information Technology, 2007. ITNG’07, 799-808, 2007.
[73] Trevathan, J., & Read, W., "Detecting shill bidding in online english auctions". Handbook of Research on Social and Organizational Liabilities in Information Security, 2009.
[74] Varsek, A., Urbancic, T., Filipic, B., “Genetic algorithm in controller design and tuning,” IEEE Trans. Systems, Man, and Cybernetics, vol. 5, pp. 1330-1339, 1993.
[75] Vas, P., Artificial-Intelligence-Based Electrical Machine and Drives, Oxford University Press, Inc., New York, 1999.
[76] Venturini, G., “SIA: a supervised inductive algorithm with genetic search for learning attribute based concepts”, Proc. European Conf. on Machine Learning, Vienna, pp. 280-296, 1993.
[77] Wang, J. C., & Chiu, C. C., Recommending trusted online auction sellers using social network analysis. Expert Systems with Applications, 34(3), 1666-1679, 2008.
[78] Wang, J. C., & Chiu, C., Detecting online auction inflated-reputation behaviors using social network analysis. Annual Conference of the North American Association for Computational Social and Organizational Science, 2005.
[79] Wasserman, S., & Faust, K., Social network analysis: Methods and applications Cambridge University Press, 1994.
[80] Wellman, B., “For a Social Network Analysis of Computer Networks: A Sociological Perspective on Collaborative Work and Virtual Community,” ACM, 1996.
[81] Xiong, N., “Fuzzy tuning of PID controllers based on genetic algorithms,” Systems Sci., vol. 25, pp. 65-75, 1999.
[82] Xu, H., & Cheng, Y. T., "Model checking bidding behaviors in internet concurrent auctions", International Journal of Computer Systems Science & Engineering, 22(4), 179-191, 2007.
[83] Yen, J., Langari, R., Zadeh, L.A., Industrial applications of fuzzy logic and intelligent systems, IEEE Press, New York, 1995.
[84] Yen, J., Langari, R., Fuzzy logic - intelligence, control & information, Pearson Education, India, 2004.
[85] Yu, C. H.. and Lin, S. J., "Parallel Crawling and Capturing for On-Line Auction", Lecture Notes in Computer Science, Volume 5075, Intelligence and Security Informatics, 2008, Pages 455-466.
[86] Yu, C. H. and Lin, S. J., "Web crawling and filtering for on-line auctions from a social network perspective", Information Systems and E-Business Management, Volume 10, Number 2, 2012, Pages 201-218.
[87] Zadeh, L. A., “Fuzzy Sets,” Information Control, vol. 8, pp. 338-353, 1965.
[88] Zadeh, L. A., “Outline of a new approach to the analysis of complex systems and decision processes”, IEEE Trans. Systems, Man, and Cybernetics, vol. 3, pp. 28-44, 1973.
[89] Zadeh, L.A., “Soft computing and fuzzy logic,” IEEE Software, pp. 48-56, Nov. 1994.
[90] Zadeh, L.A., “The evolution of systems analysis and control: a personal perspective,”, IEEE control systems, pp. 95-98, June 1996.
[91] Zadeh, L.A., “Fuzzy logic,” IEEE Computer, pp. 83-93, April 1988.
[92] Zadeh, L. A., “A new direction in fuzzy logic - toward automation of reasoning with perceptions”, IEEE International Fuzzy Systems Conference Proceedings, Seoul, Korea, pp. 22-25, August 1999.
[93] Zadeh, L.A., “Foreword - recognition technology and fuzzy logic,” IEEE Trans. Fuzzy Systems, vol. 9, no. 1, pp. 3-4, Feb. 2001.
[94] Zhou, Y., Lai, L., “Optimal design for fuzzy controllers by genetic algorithms,” IEEE Trans. on Industrial Applications, vol. 36, no. 1, pp. 93-97, Jan./Feb. 2000.
指導教授 林熙禎(Shi-Jen Lin) 審核日期 2013-1-21
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明