Connecting The Dots To Combat Collective Fraud

01/06/2021
by   Mingxi Wu, et al.
0

Modern fraudsters write malicious programs to coordinate a group of accounts to commit collective fraud for illegal profits in online platforms. These programs have access to a set of finite resources - a set of IPs, devices, and accounts etc. and sometime manipulate fake accounts to collaboratively attack the target system. Inspired by these observations, we share our experience in building two real-time risk control systems to detect collective fraud. We show that with TigerGraph, a powerful graph database, and its innovative query language - GSQL, data scientists and fraud experts can conveniently implement and deploy an end-to-end risk control system as a graph database application.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/25/2017

Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts?

We set out to understand the effects of differing language on the abilit...
research
09/08/2021

BotSpot: Deep Learning Classification of Bot Accounts within Twitter

The openness feature of Twitter allows programs to generate and control ...
research
10/21/2018

Catching Loosely Synchronized Behavior in Face of Camouflage

Fraud has severely detrimental impacts on the business of social network...
research
07/30/2018

Pwned: How Often Are Americans' Online Accounts Breached?

News about large online breaches is increasingly common. But there has b...
research
07/10/2020

Detecting Malicious Accounts in Permissionless Blockchains using Temporal Graph Properties

The temporal nature of modeling accounts as nodes and transactions as di...
research
02/08/2023

Algorithmic Collective Action in Machine Learning

We initiate a principled study of algorithmic collective action on digit...
research
02/28/2019

Ratio-Balanced Maximum Flows

When a loan is approved for a person or company, the bank is subject to ...

Please sign up or login with your details

Forgot password? Click here to reset