计算机科学 ›› 2022, Vol. 49 ›› Issue (7): 170-178.doi: 10.11896/jsjkx.210600092

• 人工智能 • 上一篇    下一篇

一种面向电商网络的异常用户检测方法

杜航原1, 李铎1, 王文剑1,2   

  1. 1 山西大学计算机与信息技术学院 太原030006
    2 计算智能与中文信息处理教育部重点实验室(山西大学) 太原030006
  • 收稿日期:2021-06-10 修回日期:2021-10-25 出版日期:2022-07-15 发布日期:2022-07-12
  • 通讯作者: 王文剑(wjwang@sxu.edu.cn)
  • 作者简介:(duhangyuan@sxu.edu.cn)
  • 基金资助:
    国家自然科学基金(61902227,62076154,U1805263);中央引导地方科技创新项目(YDZX20201400001224);山西省自然科学基金(201901D211192);山西省高校科技创新项目(2019L0039)

Method for Abnormal Users Detection Oriented to E-commerce Network

DU Hang-yuan1, LI Duo1, WANG Wen-jian1,2   

  1. 1 School of Computer and Information Technology,Shanxi University,Taiyuan 030006,China
    2 Key Laboratory of Computational Intelligence and Chinese Information Processing(Shanxi University),Ministry of Education,Taiyuan 030006,China
  • Received:2021-06-10 Revised:2021-10-25 Online:2022-07-15 Published:2022-07-12
  • About author:DU Hang-yuan,born in 1985,Ph.D,associate professor,master supervisor.His main research interests include cluster analysis and complex network theory.
    WANG Wen-jian,born in 1968,Ph.D,professor,Ph.D supervisor,is a senior member of China Computer Federation.Her main research interests include machine learning,data mining and computational intelligence.
  • Supported by:
    National Natural Science Foundation of China(61902227,62076154,U1805263),Special Foundation from the Central Finance to Support the Development of Local University(YDZX20201400001224),Natural Science Foundation of Shanxi Province,China(201901D211192) and Science Foundation of the Higher Education Institutions of Shanxi Province,China(2019L0039).

摘要: 在电商网络中,异常用户往往表现出与正常用户截然不同的行为特征,检测异常用户并分析其行为模式对维护电商平台秩序具有十分重要的现实意义。通过分析异常用户的行为模式,将电商网络抽象为异质信息网络并转化为用户-设备二分图,然后在此基础上提出了一种面向电商网络的异常用户检测方法——自监督异常检测模型(Self-Supervised Anomaly Detection Model,S-SADM)。该方法具有自监督学习机制,采用自编码器编码获取用户节点表示,通过优化联合目标函数来完成反向传播,同时采用支持向量数据描述对用户节点表示进行异常检测。经过网络的自动迭代优化,不仅使用户节点表示具有监督信息,还获得了较稳定的检测结果。最后,在真实网络数据集和半合成网络数据集中对S-SADM进行实验,结果表明了该方法的有效性和优越性。

关键词: 电商网络, 异常检测, 异质信息网络, 支持向量数据描述, 自编码器, 自监督学习

Abstract: In the e-commerce network,abnormal users often show different behavioral characteristics from normal users.Detecting abnormal users and analyzing their behavior patterns is of great practical significance to maintaining the order of e-commerce platforms.By analyzing the behavior patterns of abnormal users,we abstract the e-commerce network into the heterogeneous information network,and convert it into a user-device bipartite graph.On this basis,we propose a method for detecting abnormal users oriented to e-commerce network——self-supervised anomaly detection model(S-SADM).The model has a self-supervised learning mechanism.It uses an autoencoder to encode the user-device bipartite graph to obtain user node representations.By optimizing the joint objective function,the model completes backpropagation,and uses support vector data descriptions to perform anomaly detection on user node representations.After the automatic iterative optimization of the network,the user node representation has supervised information,and we obtain relatively stable detection results.Finally,S-SADM is validated on 3 real network datasets and a semi-synthetic network dataset,and the experimental results demonstrate the effectiveness and superiority of the method.

Key words: Anomaly detection, Autoenco-der, E-commerce network, Heterogeneous information network, Self-supervised learning, Support vector data description

中图分类号: 

  • TP183
[1]HU C P,QIN X L.A density-based local outlier detection algorithm[J].Journal of Computer Research and Development,2010,47(12):2110-2116.
[2]REN J D,LIU X Q,WANG Q,et al.Multi-layer intrusion detection method based on KNN outlier detection and random forest[J].Journal of Computer Research and Development,2019,56(3):116-125.
[3]RASHEED F,ALHAJJ R.A framework for periodic outlier pattern detection in time-series sequences[J].IEEE Transactions on Cybernetics,2013,44(5):569-582.
[4]CHAKRABORTY D,NARAYANAN V,GHOSH A.Integration of deep feature extraction and ensemble learning for outlier detection[J].Pattern Recognition,2019,89:161-171.
[5]WU S,WANG S R.Information-theoretic outlier detection for large-scale categorical data[J].IEEE Transactions on Know-ledge and Data Engineering,2013,25(3):589-602.
[6]LIU L,ZUO W L,PENG T.Dynamic outlier detection method based on tensor representation in heterogeneous network[J].Journal of Computer Research and Development,2016,53(8):1729-1739.
[7]LIU Z Q,CHEN C C,YANG X X,et al.Heterogeneous graph neural networks for malicious account detection[C]//ACM International Conference.New York:ACM,2018:2077-2085.
[8]GUPTA M,GAO J,HAN J W.Community distribution outlier detection in heterogeneous information networks[C]//Joint European Conference on Machine Learning & Knowledge Disco-very in Databases.Berlin:Springer,2013:11-29.
[9]WANG H B,ZHOU C,WU J,et al.Deep structure learning for fraud detection[C]//IEEE International Conference on Data Mining.NJ:IEEE,2018:567-576.
[10]ZHENG M Y,ZHOU C,WU J,et al.FraudNE:a Joint Embedding Approach for Fraud Detection International[C]//Joint Conference on Neural Networks.NJ:IEEE,2018:4739-4746.
[11]DONG M Q,YAO L N,WANG X Z,et al.Opinion fraud detection via neural autoencoder decision forest[J].Pattern Recognition Letters,2020,132:21-29.
[12]RUMELHART D E,HINTON G E,WILLIAMS R J.Learning representations by back-propagating errors[J].Nature,1986,323(6088):533-536.
[13]BOURLARD H,KAMP Y.Auto-assoation by multilayer perceptrons and singular value decomposition[J].Biological Cybernetics,1988,59(4):291-294.
[14]YUAN F N,ZHANG L,SHI J T,et al.Overview of auto-encoding neural network theory and application[J].Chinese Journal of Computers,2019,42(1):203-230.
[15]LI E Z,DU P J,SAMAT A,et al.Mid-level feature representation via sparse autoencoder for remotely sensed scene classification[J].IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing,2017,10(3):1068-1081.
[16]GENG J,WANG H Y,FAN J C,et al.Deep supervised and contractive neural network for sar image classification[J].IEEE Transactions on Geoscience and Remote Sensing,2017,4:1-18.
[17]HASAN M,CHOI J.NEUMANN J,et al.Learning temporalregularity in video sequences[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.NJ:IEEE.2016:733-742.
[18]RIBEIRO M,LAZZARETTI A E,LOPES H S.A study of deep convolutional auto-encoders for anomaly detection in videos[J].Pattern Recognition Letters,2018,105:13-22.
[19]GAO S H,ZHANG Y T,JIA K,et al.Single sample face recognition via learning deep supervised autoencoders[J].IEEE Transactions on Information Forensics and Security,2015,10(10):2108-2118.
[20]RUFF L,VANDERMEULEN R,GOERNITZ N,et al.Deepone-class classification[C]//International conference on machine learning.Cambridge MA:JMLR,2018:4390-4399.
[21]LIU T,TING K M,ZHOU Z H.Isolation-based anomaly detection[J].ACM Transactions on Knowledge Discovery from Data,2012,6(1):1-39.
[22]NAGANJANEYULU S,KUPPA M R.A novel framework for class imbalance learning using intelligent under-sampling[J].Progress in Artificial Intelligence,2013,2(1):73-84.
[23]JIANG K,LU J,XIA K L.A novel algorithm for imbalance data classification based on genetic algorithm improved smote[J].Arabian Journal for Science & Engineering,2016,41(8):3255-3266.
[24]ZHOU Z H.Machine Learning[M].Beijing:Tsinghua Univer-sity Press,2016:42-43.
[1] 王冠宇, 钟婷, 冯宇, 周帆.
基于矢量量化编码的协同过滤推荐方法
Collaborative Filtering Recommendation Method Based on Vector Quantization Coding
计算机科学, 2022, 49(9): 48-54. https://doi.org/10.11896/jsjkx.210700109
[2] 吕晓锋, 赵书良, 高恒达, 武永亮, 张宝奇.
基于异质信息网的短文本特征扩充方法
Short Texts Feautre Enrichment Method Based on Heterogeneous Information Network
计算机科学, 2022, 49(9): 92-100. https://doi.org/10.11896/jsjkx.210700241
[3] 徐天慧, 郭强, 张彩明.
基于全变分比分隔距离的时序数据异常检测
Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance
计算机科学, 2022, 49(9): 101-110. https://doi.org/10.11896/jsjkx.210600174
[4] 李其烨, 邢红杰.
基于最大相关熵的KPCA异常检测方法
KPCA Based Novelty Detection Method Using Maximum Correntropy Criterion
计算机科学, 2022, 49(8): 267-272. https://doi.org/10.11896/jsjkx.210700175
[5] 王馨彤, 王璇, 孙知信.
基于多尺度记忆残差网络的网络流量异常检测模型
Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network
计算机科学, 2022, 49(8): 314-322. https://doi.org/10.11896/jsjkx.220200011
[6] 胡艳羽, 赵龙, 董祥军.
一种用于癌症分类的两阶段深度特征选择提取算法
Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification
计算机科学, 2022, 49(7): 73-78. https://doi.org/10.11896/jsjkx.210500092
[7] 郁舒昊, 周辉, 叶春杨, 王太正.
SDFA:基于多特征融合的船舶轨迹聚类方法研究
SDFA:Study on Ship Trajectory Clustering Method Based on Multi-feature Fusion
计算机科学, 2022, 49(6A): 256-260. https://doi.org/10.11896/jsjkx.211100253
[8] 韩洁, 陈俊芬, 李艳, 湛泽聪.
基于自注意力的自监督深度聚类算法
Self-supervised Deep Clustering Algorithm Based on Self-attention
计算机科学, 2022, 49(3): 134-143. https://doi.org/10.11896/jsjkx.210100001
[9] 武玉坤, 李伟, 倪敏雅, 许志骋.
单类支持向量机融合深度自编码器的异常检测模型
Anomaly Detection Model Based on One-class Support Vector Machine Fused Deep Auto-encoder
计算机科学, 2022, 49(3): 144-151. https://doi.org/10.11896/jsjkx.210100142
[10] 冷佳旭, 谭明圮, 胡波, 高新波.
基于隐式视角转换的视频异常检测
Video Anomaly Detection Based on Implicit View Transformation
计算机科学, 2022, 49(2): 142-148. https://doi.org/10.11896/jsjkx.210900266
[11] 唐雨潇, 王斌君.
基于深度生成模型的人脸编辑研究进展
Research Progress of Face Editing Based on Deep Generative Model
计算机科学, 2022, 49(2): 51-61. https://doi.org/10.11896/jsjkx.210400108
[12] 蒋宗礼, 樊珂, 张津丽.
基于生成对抗网络和元路径的异质网络表示学习
Generative Adversarial Network and Meta-path Based Heterogeneous Network Representation Learning
计算机科学, 2022, 49(1): 133-139. https://doi.org/10.11896/jsjkx.201000179
[13] 刘意, 毛莺池, 程杨堃, 高建, 王龙宝.
基于邻域一致性的异常检测序列集成方法
Locality and Consistency Based Sequential Ensemble Method for Outlier Detection
计算机科学, 2022, 49(1): 146-152. https://doi.org/10.11896/jsjkx.201000156
[14] 郑苏苏, 关东海, 袁伟伟.
融合不完整多视图的异质信息网络嵌入方法
Heterogeneous Information Network Embedding with Incomplete Multi-view Fusion
计算机科学, 2021, 48(9): 68-76. https://doi.org/10.11896/jsjkx.210500203
[15] 张叶, 李志华, 王长杰.
基于核密度估计的轻量级物联网异常流量检测方法
Kernel Density Estimation-based Lightweight IoT Anomaly Traffic Detection Method
计算机科学, 2021, 48(9): 337-344. https://doi.org/10.11896/jsjkx.200600108
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!