Skip to main content

Analysis of Online Suspicious Behavior Patterns

  • Conference paper
  • First Online:
  • 1264 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 696))

Abstract

The online users’ behavior is mainly categorized into two types: normal and suspicious behaviors. When any user is involved in group of activities that are deviated from normal behavior which is observed as misuse, damaging, intrusive, illegal money transfer, and online credit card fraud, then such users are become harmful. These users should be detected prior to the harmful activities. In this work, different online suspicious behavior patterns are studied and analyzed such as terrorists’ activities, Web spam, e-mail spam, OSNs spam, fake reviews, malicious crawlers, banking frauds, hacking. Online credit card fraud is a suspicious activity and is taken into consideration for study. It is necessary to generate decision support system to predict the online credit card fraud as it will help to protect the illegal money transaction. The work represented in this research paper intends to find the best model to predict the online credit card fraud by using machine learning methods. Various machine learning methods such as logistic regression, SVM, kNN, Naïve Bayes, kernel SVM, decision tree, and random forest are implemented in order to predict the credit card fraud. The performance of the system is tested on the dataset which comes from Kaggle Web site. The performance of the algorithms is studied by considering different evaluation measures. Random forest algorithm turns out to be the best model in the prediction task. It has achieved accuracy of 99% and F-measure of 86%.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. J. Qin, Y. Zhou, E. Reid Guanpi Lai, H. Chen: Analyzing terror campaigns on the internet: Technical sophistication, content richness, and web interactivity”, International Journal of Human-Computer Studies, Elsevier, 2006, pp. 71–84.

    Google Scholar 

  2. G. Weimann: How modern terrorism uses the internet, Special report of United States Institute of Peace, 2004, pp. 1–12.

    Google Scholar 

  3. G. Goth: Terror on the Internet: A Complex Issue, and Getting Harder, IEEE Distributed Systems Online, Vol. 9, No. 3, art. No. 0803, 2008, pp. 1–4.

    Google Scholar 

  4. R. Heickero: Terrorism online and the change of modus operandi.

    Google Scholar 

  5. M.J. Hosseinpour, M.N. Omidvar: Detecting Terror-Related Activities on the Web with Using Data Mining Techniques, 2nd International Conference on Computer & Electrical Engineering, IEEE, 2009, pp. 152–157.

    Google Scholar 

  6. M. P. Selvan, R. Selvaraj: Mining user Message Pattern for Suspicious Behavior on Terrorism using NLP in Social Networks with Single Sign-on, Chennai, Indian Journal of Science & Technology, Vol. 10(14), 2017, pp. 2–7.

    Google Scholar 

  7. K.L. Goh, A.K. Singh: Comprehensive Literature Review on Machine Learning Structures for Web Spam Classification, 4th International Conference on Eco-friendly Computing and Communication Systems (ICECCS), Elsevier, 2015, pp. 434–441.

    Google Scholar 

  8. L. Becchetti, C. Castillo, D. Donato, R. Baeza-Yates, S. Leonardi: Link Analysis of Web Spam Detection, ACM Transactions of the Web, Vol. 2, No. 1, Article 2, 2008, pp. 2:1–2:42.

    Google Scholar 

  9. Y. Liu, F. Chen, W. Kong, H. Yu, M. Zhang, S. Ma, L. Ru: Identifying Web Spam with the Wisdom of the Crowds, ACM Transactions on the Web, Vol. 6, No. 1, Article 2, 2012, pp. 2:1–2:30.

    Google Scholar 

  10. M. Maia, J. Almeida, V. Almeida: Identifying User Behavior in Online Social Networks, ACM, 2008, pp. 1–6.

    Google Scholar 

  11. M. Brenner, D. Wang: Mining the bit pipes: Discovering and leveraging users’ behavior, IEEE, 2009, pp. 1–6.

    Google Scholar 

  12. D. Stevanovic, N. Vlajic, AijunAn: Detection of malicious and non-malicious website visitors using unsupervised neural network learning, Applied Soft Computing, 13, Elsevier, 2013, pp. 698–708.

    Google Scholar 

  13. S. Yoon, H.-lock Choo, H. Bae, H. Kim: Behavior-Based Detection for Malicious Script-Based Attack, Advances in Computer Science and Ubiquitous Computing, Lecture notes in electrical engineering, Springer Nature Singapore, 2017, pp. 97–103.

    Google Scholar 

  14. N.-Yi Jan, S.-Chieh Lin, S-S Tseng, Nancy P. Lin: A decision support system for constructing an alert classification model, Expert Systems with Applications, 36, Elsevier, 2009, pp. 11145–11155.

    Google Scholar 

  15. L. Mookiah, W. Eberle, L. Holder: Discovering Suspicious Behavior Using Graph-Based Approach, Proceedings of the 28th International Florida Artificial Intelligence Research Society Conference, 2015, pp. 428–433.

    Google Scholar 

  16. K. Michalak, J. Korczak: Graph Mining Approach to Suspicious Transaction Detection, Proceedings of the Federated Conference on Computer Science and Information Systems, IEEE, 2011, pp. 69–75.

    Google Scholar 

  17. M. Jiang, P. Cui, C. Faloutsos: Suspicious Behavior Detection: Current Trends and Future Directions, IEEE, 2016, pp. 31–39.

    Google Scholar 

  18. N. Jindal, B. Liu: Opinion Spam and Analysis, Proceedings of 1st International Conference on Web Search and Data Mining, ACM, 2008, pp. 219–230.

    Google Scholar 

  19. K. Lee, J. Caverlee, S. Webb: Uncovering Social Spammers: Social Honeypots + Machine Learning, Proceedings of 33rd International SIGIR Conference Research & Development in Information Retrieval, ACM, 2010, pp. 435–442.

    Google Scholar 

  20. D. Guo, F. Lin, C. Chen: User Behaviors in an Online Social Network, Proceedings of IC-NIDC 2009, IEEE, pp. 430–434.

    Google Scholar 

  21. M. Jiang, P. CUI, C. Faloutsos, Behavioral Modeling in Social Networks From micro to macro, Special Issue on Online Behavioral Analysis and Modeling, IEEE Intelligent System Magazine (ISSI), ICDM 2015 Tutorial, pp. 1–44.

    Google Scholar 

  22. N. Shah, A. Beutel, B.Gallagher, C. Faloutsos: Spotting Suspicious Link Behavior with FBox: An Adversarial Perspective, 2014, pp. 1–10.

    Google Scholar 

  23. N. S. Safa, M. Sookhak, R. V. Solms, S. Furnell, N. A. Ghani, T. Herawan: Information security conscious care behavior formation in organizations, Computers & Security, 53, Elsevier, pp. 65–78.

    Google Scholar 

  24. G. Tubin, E. Katz, J. Florence, M. Byrnes: Detecting and Responding to Suspicious Activities, Transcript of the Webinar Panel Discussion, FFIEC Authentication Guidance Compliance, Information Security Media Group, 2012, pp. 1–13.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dhanashree Deshpande .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Deshpande, D., Deshpande, S., Thakare, V. (2018). Analysis of Online Suspicious Behavior Patterns. In: Perez, G., Tiwari, S., Trivedi, M., Mishra, K. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 696. Springer, Singapore. https://doi.org/10.1007/978-981-10-7386-1_42

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7386-1_42

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7385-4

  • Online ISBN: 978-981-10-7386-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics