Encyclopedia of Social Network Analysis and Mining

Living Edition
| Editors: Reda Alhajj, Jon Rokne

Fraud Detection Using Social Network Analysis, A Case Study

  • Duen Horng Chau
  • Christos Faloutsos
Living reference work entry
DOI: https://doi.org/10.1007/978-1-4614-7163-9_284-1



Network or Graph

A collection of entities (e.g., people, bank accounts) and the edges connecting the entities, each edge represents an interaction (e.g., friendship, bank transaction)

Social Network

A specific type of network where the edges represent social interactions between entities that are people or organizations

Social Network Analysis (SNA)

The study of networks of social relationships, typically to extract useful information, such as patterns and anomalies

Belief Propagation

An inference algorithm that finds the marginal distribution of every unobserved variable, conditioned on all observed ones, in a probabilistic graphical model


Committing fraud means deceiving someone for financial or personal gain. Frauds happen online (e.g., electronic auction) and off-line (e.g., check fraud). Here,...


Social Network Analysis Belief Propagation Anomaly Detection Reputation System Online Auction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in to check access.



Duen Horng (Polo) Chau was supported by Symantec Research Labs Fellowship. This material is based upon the work supported by the National Science Foundation: IIS-0705359, IIS-0326322, CNS-0721736, and IIS-0534205; the Lawrence Livermore National Laboratory: DE-AC52-07NA27344; an IBM Faculty Award; and a Yahoo Research Alliance Gift, with additional funding from Intel, NTT, and Hewlett-Packard. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation or other parties.


  1. Akoglu L, McGlohon M, Faloutsos C (2010) OddBall: spotting anomalies in weighted graphs. In: PAKDD, Hyderabad, pp 410–421Google Scholar
  2. Chau DH, Faloutsos C, Tong H, Hong JI, Gallagher B, Eliassi-Rad T (2008) GRAPHITE: a visual query system for large graphs. In: ICDM, Leipzig, pp 963–966Google Scholar
  3. Chau DH, Kittur A, Hong JI, Faloutsos C (2011a) Apolo: making sense of large network data by combining rich user interaction and machine learning. In: CHI, Vancouver, pp 167–176Google Scholar
  4. Chau DH, Nachenberg C, Wilhelm J, Wright A, Faloutsos C (2011b) Polonium: tera-scale graph mining and inference for malware detection. In: SDM, SeattleGoogle Scholar
  5. Li Z, Xiong H, Liu Y, Zhou A (2010) Detecting blackhole and volcano patterns in directed networks. In: ICDM, Sydney, pp 294–303Google Scholar
  6. McGlohon M, Bay S, Anderle M, Steier D, Faloutsos C (2009) SNARE: a Link analytic system for graph labeling and risk detection. In: KDD, Paris, pp 1265–1274Google Scholar
  7. Pandit S, Chau DH, Wang S, Faloutsos C (2007) NetProbe: a fast and scalable system for fraud detection in online auction networks. In: WWW, Banff, pp 201–210Google Scholar
  8. Rodrigues Jr JF, Tong H, Traina AJM, Faloutsos C, Leskovec J (2006) Gmine: a system for scalable, interactive graph visualization and mining. In: VLDB, Seoul, pp 1195–1198Google Scholar
  9. Tong H, Faloutsos C, Gallagher B, Eliassi-Rad T (2007) Fast best-effort pattern matching in large attributed graphs. In: KDD, San Jose, pp 737–746Google Scholar
  10. Yedidia JS, Freeman WT, Weiss Y (2003) Understanding belief propagation and its generalizations. In: Exploring artificial intelligence in the new millennium, vol 8. Morgan Kaufmann, Amsterdam, pp 236–239Google Scholar

Copyright information

© Springer Science+Business Media LLC 2016

Authors and Affiliations

  1. 1.College of ComputingGeorgia Institute of TechnologyAtlantaUSA
  2. 2.School of Computer ScienceCarnegie Mellon UniversityPittsburghUSA