Based Big Data Analysis of Fraud Detection for Online Transaction Orders

  • Qinghong YangEmail author
  • Xiangquan Hu
  • Zhichao Cheng
  • Kang Miao
  • Xiaohong Zheng
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 142)


Fraud control is important for the online marketplace. This study addresses the problem of detecting attempts to deceive orders in Internet transactions. Our goal is to generate an algorithm model to detect and prevent the fraudulent orders. First, after analyzing the real historical data of customers’ orders from Dangdang Website ( E-commerce China Dangdang Inc (Dangdang) is a leading e-commerce company in China. Dangdang officially listed on the New York Stock Exchange on December 8th, 2010, and is the first Chinese B2C e-commerce company which is completely based on online business to list on New York Stock.), we described characteristics related to transactions that may indicate frauds orders. We presented fraudulent orders characteristic matrix through comparing the normal and abnormal orders. Secondly, we apply Logic Regression model to identify frauds based on the characteristic matrix. We used real data from Dang company to train and evaluate our methods. Finally we evaluated the validity of solutions though analyzing feedback data.


Internet translation Fraud order Big data Fraud detection Fraud prevention Logistic regression 



The data of this work is provided by E-commerce China Dangdang Inc ( We thank Qiang Fu and QI Ju who are employees of Dangdang and for discussing the results with us. We thank Michael Wagner for revising the paper and editing the manuscript. We also thank, Jian Li, Jie Shen, Weiwei Yang and Daobo Wang, Who are the associate editor for providing a lot of helpful comments.


  1. 1.
    Maranzato, R., Pereira, A.: Fraud detection in reputation system in e-markets using logistic regression. In: SAC 2010, Sierre, Switzerland, 22–26 March 2010Google Scholar
  2. 2.
    Kim, T.K., Lim, H.J., Nah, J.H.: Analysis on fraud detection for internet service. Int. J. Secur. Appl. 7(6), 275–284 (2013)zbMATHGoogle Scholar
  3. 3.
    Shim, S., Lee, B.: An economic model of optimal fraud control and the aftermarket for security services in online marketplaces. Electron. Commer. Res. Appl. 9, 435–445 (2010)CrossRefGoogle Scholar
  4. 4.
    Hogan, C.E., Rezaee, Z., Riley, R.A., Velury, U.K.: Financial statement fraud: insights from the academic literature. Auditing J. Pract. Theor. 27(2), 231–252 (2008)CrossRefGoogle Scholar
  5. 5.
    Trompeter, G.M., Carpenter, T.D.: A synthesis of fraud-related resaerch. Auditing J. Pract. Theor. 32(Supplement 1), 287–321 (2013)CrossRefGoogle Scholar
  6. 6.
    Klein, B., Leffler, K.B.: The role of market forces in assuring contractual performance. J. Polit. Econ. 89(4), 615–641 (1981)CrossRefGoogle Scholar
  7. 7.
    Gavish, B., Tucci, C.: Reducing internet auction fraud. Commun. ACM 51(5), 89–97 (2008)CrossRefGoogle Scholar
  8. 8.
    Chang, W.-H., Chang, J.-S.: A novel two-stage phased modeling framework for early fraud detection. Expert Syst. Appl. 38, 11244–11260 (2011)CrossRefGoogle Scholar
  9. 9.
    Chang, J.-S.: An effective early fraud detection method for online auctions. Electron. Commer. Res. Appl. 11, 346–360 (2012)CrossRefGoogle Scholar
  10. 10.
    Eining, M.M., Jones, D.R., Loebbecke, J.K.: Reliance on decision aids: an examination of auditors’ assessment of management fraud. Auditing J. Pract. Theor. 16(2), 1–19 (1997)Google Scholar
  11. 11.
    Green, B.P., Choi, J.H.: Assessing the risk of management fraud through neural network technology. Audit J. Pract. Theor. 16(1), 14–28 (1997)Google Scholar
  12. 12.
    Ohlson, J.A.: Financial ratios and the probabilistic prediction of bankruptcy. J. Account. Res. 18, 109–131 (1980)CrossRefGoogle Scholar
  13. 13.
    Lenard, M.J., Alam, P.: An historical perspective on fraud detection: From bankruptcy models to most effective indicators of fraud in recent incidents. J. Forensic Invest. Account. 1(1), 1–27 (2009)Google Scholar
  14. 14.
    Lou, Y.-I., Wang, M.-L.: Fraud risk factor of the fraud triangle assessing the likelihood of fraudulent financial reporting. J. Bus. Econ. Res. 7(2), 61–78 (2009)MathSciNetGoogle Scholar
  15. 15.
    Zhang, H., Lin, Z., Hu, X.: The effectiveness of the escrow model: an experimental framework for dynamic online environments. J. Organ. Comput. Electron. Commer. 17(2), 119–143 (2007)Google Scholar
  16. 16.
    Lek, M., Anandarajah, B., Cerpa, N., Jamieson, R.: Data mining prototype for detecting e-commerce fraud. In: The 9th European Conference on Information Systems Bled, Slovenia, 27–29 June 2001Google Scholar
  17. 17.
    Lach, J.: Data mining digs. Am. Demographics 21, 38–45 (1999)Google Scholar
  18. 18.
    Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and Regression Trees. Wadsworth International Group, Belmont (1984)zbMATHGoogle Scholar
  19. 19.
    Hosmer, D.W., Lemeshow, S.: Applied Logistic Regression. Wiley, New York, Chichester (2000)CrossRefzbMATHGoogle Scholar

Copyright information

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015

Authors and Affiliations

  • Qinghong Yang
    • 1
    Email author
  • Xiangquan Hu
    • 2
  • Zhichao Cheng
    • 1
  • Kang Miao
    • 2
  • Xiaohong Zheng
    • 3
  1. 1.School of Economics and ManagementBeihang UniversityHaidian District, BeijingChina
  2. 2.School of SoftwareBeihang UniversityHaidian District, BeijingChina
  3. 3.E-commerce China Dangdang Inc., Jingan CenterChaoyang District, BeijingChina

Personalised recommendations