Fraudulence Detection and Recommendation of Trusted Websites

  • N. C. SenthilkumarEmail author
  • J. Gitanjali
  • A. Monika
  • R. Monisha
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1054)


We live in the world of science where everything could be done possibly through online facilities. As the online services increase, the fraudulent sites also increase, however. Therefore, it enhances the difficulty of people to identify a fake or fraudulent or scam website. Fraudsters are highly intelligent in making or persuading fake products which seem exactly same as the original. Some scam websites use low prices to attract people. Most of the fraudulent sites use domain names that reference a popular brand or product name and design with mere change. Some websites will get your card details before you intend to buy a product. Fraudsters try to attract people’s attention by advertising the fake products in many social websites such as Facebook, Instagram and Twitter, and when people wishes to view about the product and its details, they are forced to install an app of that site. So, here we have a solution to find those fraudulent products and recommend some trusted products for people to buy with good quality and at a fair price. We use the reviews or feedback or comments and the rating from the users who already purchased the product and shared their experience for identifying fraudulent products and giving a caution to the remaining people. This paper concentrates on analyzing the reviews and extracting the useful information to guide the customers using text mining. As a result of this, people will get a better idea of making a proper decision in buying the product through online.


Decision making Fraudulent Feedback Rating Recommendation Reviews Text mining 


  1. 1.
    Kharrat, F.B., Elkhleifi, A., Faiz, R.: Recommendation System Based Contextual Analysis of Facebook Comment. IEEE, New York (2016 Dec)Google Scholar
  2. 2.
    Boldt, L.C., et al.: Forecasting Nike’s sales using Facebook data. In: 2016 IEEE International Conference on Big Data (Big Data). IEEE, New York (2016 Nov)Google Scholar
  3. 3.
    Ketcham, M., Ganokratanaa, T., Bansin, S.: The forensic algorithm on Facebook using natural language processing. 2016 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS). IEEE, New York (2016 Nov)Google Scholar
  4. 4.
    Gotarane, V.R., Bojewar, S.: Relationship classification in online social network. International Conference on Emerging Technological Trends (ICETT). IEEE, New York (2016 Oct)Google Scholar
  5. 5.
    Hanni, A.R., Patil, M.M., Patil, P.M.: Summarization of customer reviews for a product on a website using natural language processing. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, New York (2016 Sept)Google Scholar
  6. 6.
    Ghatasheh, N.: Fraud prevention framework for electronic business environments: automatic segregation of online phishing attempts. In: Cybersecurity and Cyberforensics Conference (CCC) (2016)Google Scholar
  7. 7.
    Raja, D.R.K., Pushpa, S., Naveen Kumar, B.S.: Multidimensional distributed opinion extraction for sentiment analysis—a novel approach. In: 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB). IEEE, New York (2016 Feb)Google Scholar
  8. 8.
    Gowri, R., Kumar, A., Arvind, M.J.: C2F: a clustering based collaborative filtering approach for recommending product to ecommerce user. In: 2015 International Conference on Computation of Power, Energy Information and Communication (ICCPEIC). IEEE, New York (2015 Sept)Google Scholar
  9. 9.
    Drew, J., Moore, T.: Automatic identification of replicated criminal websites using combined clustering. In: Security and Privacy Workshops (SPW), 2014 IEEE (2014 Nov)Google Scholar
  10. 10.
    Kou, Y., Lu, C.-T., Sirwongwattana, S., Huang, Y.-P.: Detecting the fraudulence using various big data concepts. In: 2014 IEEE International Conference on Big Data (Big Data). IEEE, New York (2014 Mar)Google Scholar
  11. 11.
    Sandhu, P.S., Senthilkumar, N.C.: Fraud prevention in paying portal. In: IOP Conference Series: Materials Science and Engineering, 263, 4, 042045 (2017)CrossRefGoogle Scholar
  12. 12.
    Vijayan, E., Senthil Kumar, N.C., Agnihotry, S., Subuhani, M.: Effective clustering in big data for efficient knowledge discovery using parallel K-means and enhanced K-means algorithm. Int. J. Pharm. Technol. 8, 18646–18652 (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • N. C. Senthilkumar
    • 1
    Email author
  • J. Gitanjali
    • 1
  • A. Monika
    • 1
  • R. Monisha
    • 1
  1. 1.School of Information TechnologyVellore Institute of TechnologyVelloreIndia

Personalised recommendations