Encyclopedia of Social Network Analysis and Mining

Living Edition
| Editors: Reda Alhajj, Jon Rokne

Fraud Detection Using Social Network Analysis, A Case Study

Living reference work entry
DOI: https://doi.org/10.1007/978-1-4614-7163-9_284-1

Synonyms

Glossary

Network or Graph

A collection of entities (e.g., people, bank accounts) and the edges connecting the entities, each edge represents an interaction (e.g., friendship, bank transaction)

Social Network

A specific type of network where the edges represent social interactions between entities that are people or organizations

Social Network Analysis (SNA)

The study of networks of social relationships, typically to extract useful information, such as patterns and anomalies

Belief Propagation

An inference algorithm that finds the marginal distribution of every unobserved variable, conditioned on all observed ones, in a probabilistic graphical model

Definition

Committing fraud means deceiving someone for financial or personal gain. Frauds happen online (e.g., electronic auction) and off-line (e.g., check fraud). Here,...

Keywords

Graphite 
This is a preview of subscription content, log in to check access

Notes

Acknowledgments

Duen Horng (Polo) Chau was supported by Symantec Research Labs Fellowship. This material is based upon the work supported by the National Science Foundation: IIS-0705359, IIS-0326322, CNS-0721736, and IIS-0534205; the Lawrence Livermore National Laboratory: DE-AC52-07NA27344; an IBM Faculty Award; and a Yahoo Research Alliance Gift, with additional funding from Intel, NTT, and Hewlett-Packard. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation or other parties.

References

  1. Akoglu L, McGlohon M, Faloutsos C (2010) OddBall: spotting anomalies in weighted graphs. In: PAKDD, Hyderabad, pp 410–421Google Scholar
  2. Chau DH, Faloutsos C, Tong H, Hong JI, Gallagher B, Eliassi-Rad T (2008) GRAPHITE: a visual query system for large graphs. In: ICDM, Leipzig, pp 963–966Google Scholar
  3. Chau DH, Kittur A, Hong JI, Faloutsos C (2011a) Apolo: making sense of large network data by combining rich user interaction and machine learning. In: CHI, Vancouver, pp 167–176Google Scholar
  4. Chau DH, Nachenberg C, Wilhelm J, Wright A, Faloutsos C (2011b) Polonium: tera-scale graph mining and inference for malware detection. In: SDM, SeattleGoogle Scholar
  5. Li Z, Xiong H, Liu Y, Zhou A (2010) Detecting blackhole and volcano patterns in directed networks. In: ICDM, Sydney, pp 294–303Google Scholar
  6. McGlohon M, Bay S, Anderle M, Steier D, Faloutsos C (2009) SNARE: a Link analytic system for graph labeling and risk detection. In: KDD, Paris, pp 1265–1274Google Scholar
  7. Pandit S, Chau DH, Wang S, Faloutsos C (2007) NetProbe: a fast and scalable system for fraud detection in online auction networks. In: WWW, Banff, pp 201–210Google Scholar
  8. Rodrigues Jr JF, Tong H, Traina AJM, Faloutsos C, Leskovec J (2006) Gmine: a system for scalable, interactive graph visualization and mining. In: VLDB, Seoul, pp 1195–1198Google Scholar
  9. Tong H, Faloutsos C, Gallagher B, Eliassi-Rad T (2007) Fast best-effort pattern matching in large attributed graphs. In: KDD, San Jose, pp 737–746Google Scholar
  10. Yedidia JS, Freeman WT, Weiss Y (2003) Understanding belief propagation and its generalizations. In: Exploring artificial intelligence in the new millennium, vol 8. Morgan Kaufmann, Amsterdam, pp 236–239Google Scholar

Copyright information

© Springer Science+Business Media LLC 2016

Authors and Affiliations

  1. 1.College of ComputingGeorgia Institute of TechnologyAtlantaUSA
  2. 2.School of Computer ScienceCarnegie Mellon UniversityPittsburghUSA