Abstract
The online users’ behavior is mainly categorized into two types: normal and suspicious behaviors. When any user is involved in group of activities that are deviated from normal behavior which is observed as misuse, damaging, intrusive, illegal money transfer, and online credit card fraud, then such users are become harmful. These users should be detected prior to the harmful activities. In this work, different online suspicious behavior patterns are studied and analyzed such as terrorists’ activities, Web spam, e-mail spam, OSNs spam, fake reviews, malicious crawlers, banking frauds, hacking. Online credit card fraud is a suspicious activity and is taken into consideration for study. It is necessary to generate decision support system to predict the online credit card fraud as it will help to protect the illegal money transaction. The work represented in this research paper intends to find the best model to predict the online credit card fraud by using machine learning methods. Various machine learning methods such as logistic regression, SVM, kNN, Naïve Bayes, kernel SVM, decision tree, and random forest are implemented in order to predict the credit card fraud. The performance of the system is tested on the dataset which comes from Kaggle Web site. The performance of the algorithms is studied by considering different evaluation measures. Random forest algorithm turns out to be the best model in the prediction task. It has achieved accuracy of 99% and F-measure of 86%.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
J. Qin, Y. Zhou, E. Reid Guanpi Lai, H. Chen: Analyzing terror campaigns on the internet: Technical sophistication, content richness, and web interactivity”, International Journal of Human-Computer Studies, Elsevier, 2006, pp. 71–84.
G. Weimann: How modern terrorism uses the internet, Special report of United States Institute of Peace, 2004, pp. 1–12.
G. Goth: Terror on the Internet: A Complex Issue, and Getting Harder, IEEE Distributed Systems Online, Vol. 9, No. 3, art. No. 0803, 2008, pp. 1–4.
R. Heickero: Terrorism online and the change of modus operandi.
M.J. Hosseinpour, M.N. Omidvar: Detecting Terror-Related Activities on the Web with Using Data Mining Techniques, 2nd International Conference on Computer & Electrical Engineering, IEEE, 2009, pp. 152–157.
M. P. Selvan, R. Selvaraj: Mining user Message Pattern for Suspicious Behavior on Terrorism using NLP in Social Networks with Single Sign-on, Chennai, Indian Journal of Science & Technology, Vol. 10(14), 2017, pp. 2–7.
K.L. Goh, A.K. Singh: Comprehensive Literature Review on Machine Learning Structures for Web Spam Classification, 4th International Conference on Eco-friendly Computing and Communication Systems (ICECCS), Elsevier, 2015, pp. 434–441.
L. Becchetti, C. Castillo, D. Donato, R. Baeza-Yates, S. Leonardi: Link Analysis of Web Spam Detection, ACM Transactions of the Web, Vol. 2, No. 1, Article 2, 2008, pp. 2:1–2:42.
Y. Liu, F. Chen, W. Kong, H. Yu, M. Zhang, S. Ma, L. Ru: Identifying Web Spam with the Wisdom of the Crowds, ACM Transactions on the Web, Vol. 6, No. 1, Article 2, 2012, pp. 2:1–2:30.
M. Maia, J. Almeida, V. Almeida: Identifying User Behavior in Online Social Networks, ACM, 2008, pp. 1–6.
M. Brenner, D. Wang: Mining the bit pipes: Discovering and leveraging users’ behavior, IEEE, 2009, pp. 1–6.
D. Stevanovic, N. Vlajic, AijunAn: Detection of malicious and non-malicious website visitors using unsupervised neural network learning, Applied Soft Computing, 13, Elsevier, 2013, pp. 698–708.
S. Yoon, H.-lock Choo, H. Bae, H. Kim: Behavior-Based Detection for Malicious Script-Based Attack, Advances in Computer Science and Ubiquitous Computing, Lecture notes in electrical engineering, Springer Nature Singapore, 2017, pp. 97–103.
N.-Yi Jan, S.-Chieh Lin, S-S Tseng, Nancy P. Lin: A decision support system for constructing an alert classification model, Expert Systems with Applications, 36, Elsevier, 2009, pp. 11145–11155.
L. Mookiah, W. Eberle, L. Holder: Discovering Suspicious Behavior Using Graph-Based Approach, Proceedings of the 28th International Florida Artificial Intelligence Research Society Conference, 2015, pp. 428–433.
K. Michalak, J. Korczak: Graph Mining Approach to Suspicious Transaction Detection, Proceedings of the Federated Conference on Computer Science and Information Systems, IEEE, 2011, pp. 69–75.
M. Jiang, P. Cui, C. Faloutsos: Suspicious Behavior Detection: Current Trends and Future Directions, IEEE, 2016, pp. 31–39.
N. Jindal, B. Liu: Opinion Spam and Analysis, Proceedings of 1st International Conference on Web Search and Data Mining, ACM, 2008, pp. 219–230.
K. Lee, J. Caverlee, S. Webb: Uncovering Social Spammers: Social Honeypots + Machine Learning, Proceedings of 33rd International SIGIR Conference Research & Development in Information Retrieval, ACM, 2010, pp. 435–442.
D. Guo, F. Lin, C. Chen: User Behaviors in an Online Social Network, Proceedings of IC-NIDC 2009, IEEE, pp. 430–434.
M. Jiang, P. CUI, C. Faloutsos, Behavioral Modeling in Social Networks From micro to macro, Special Issue on Online Behavioral Analysis and Modeling, IEEE Intelligent System Magazine (ISSI), ICDM 2015 Tutorial, pp. 1–44.
N. Shah, A. Beutel, B.Gallagher, C. Faloutsos: Spotting Suspicious Link Behavior with FBox: An Adversarial Perspective, 2014, pp. 1–10.
N. S. Safa, M. Sookhak, R. V. Solms, S. Furnell, N. A. Ghani, T. Herawan: Information security conscious care behavior formation in organizations, Computers & Security, 53, Elsevier, pp. 65–78.
G. Tubin, E. Katz, J. Florence, M. Byrnes: Detecting and Responding to Suspicious Activities, Transcript of the Webinar Panel Discussion, FFIEC Authentication Guidance Compliance, Information Security Media Group, 2012, pp. 1–13.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Deshpande, D., Deshpande, S., Thakare, V. (2018). Analysis of Online Suspicious Behavior Patterns. In: Perez, G., Tiwari, S., Trivedi, M., Mishra, K. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 696. Springer, Singapore. https://doi.org/10.1007/978-981-10-7386-1_42
Download citation
DOI: https://doi.org/10.1007/978-981-10-7386-1_42
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7385-4
Online ISBN: 978-981-10-7386-1
eBook Packages: EngineeringEngineering (R0)