Fraud Detection for Random Walks

Authors Varsha Dani, Thomas P. Hayes, Seth Pettie, Jared Saia



PDF
Thumbnail PDF

File

LIPIcs.ITCS.2024.36.pdf
  • Filesize: 0.77 MB
  • 22 pages

Document Identifiers

Author Details

Varsha Dani
  • Rochester Institute of Technology, Rochester, NY, USA
Thomas P. Hayes
  • University at Buffalo, Buffalo, NY, USA
Seth Pettie
  • University of Michigan, Ann Arbor, MI, USA
Jared Saia
  • University of New Mexico, Albuquerque, NM, USA

Cite AsGet BibTex

Varsha Dani, Thomas P. Hayes, Seth Pettie, and Jared Saia. Fraud Detection for Random Walks. In 15th Innovations in Theoretical Computer Science Conference (ITCS 2024). Leibniz International Proceedings in Informatics (LIPIcs), Volume 287, pp. 36:1-36:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
https://doi.org/10.4230/LIPIcs.ITCS.2024.36

Abstract

Traditional fraud detection is often based on finding statistical anomalies in data sets and transaction histories. A sophisticated fraudster, aware of the exact kinds of tests being deployed, might be difficult or impossible to catch. We are interested in paradigms for fraud detection that are provably robust against any adversary, no matter how sophisticated. In other words, the detection strategy should rely on signals in the data that are inherent in the goals the adversary is trying to achieve. Specifically, we consider a fraud detection game centered on a random walk on a graph. We assume this random walk is implemented by having a player at each vertex, who can be honest or not. In particular, when the random walk reaches a vertex owned by an honest player, it proceeds to a uniformly random neighbor at the next timestep. However, when the random walk reaches a dishonest player, it instead proceeds to an arbitrary neighbor chosen by an omniscient Adversary. The game is played between the Adversary and a Referee who sees the trajectory of the random walk. At any point during the random walk, if the Referee determines that a {specific} vertex is controlled by a dishonest player, the Referee accuses that player, and therefore wins the game. The Referee is allowed to make the occasional incorrect accusation, but must follow a policy that makes such mistakes with small probability of error. The goal of the adversary is to make the cover time large, ideally infinite, i.e., the walk should never reach at least one vertex. We consider the following basic question: how much can the omniscient Adversary delay the cover time without getting caught? Our main result is a tight upper bound on this delay factor. We also discuss possible applications of our results to settings such as Rotor Walks, Leader Election, and Sybil Defense.

Subject Classification

ACM Subject Classification
  • Theory of computation → Random walks and Markov chains
  • Mathematics of computing → Probability and statistics
  • Security and privacy → Intrusion detection systems
Keywords
  • Fraud detection
  • random processes
  • Markov chains

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Muhammad Al-Qurishi, Mabrook Al-Rakhami, Atif Alamri, Majed Alrubaian, Sk Md Mizanur Rahman, and M Shamim Hossain. Sybil defense techniques in online social networks: a survey. IEEE Access, 5:1200-1219, 2017. Google Scholar
  2. Romas Aleliunas, Richard M. Karp, Richard J. Lipton, László Lovász, and Charles Rackoff. Random walks, universal traversal sequences, and the complexity of maze problems. In Proceedings of the 20th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 218-223, 1979. URL: https://doi.org/10.1109/SFCS.1979.34.
  3. Noga Alon, Benjamin Gunby, Xiaoyu He, Eran Shmaya, and Eilon Solan. Identifying the deviator. CoRR, abs/2203.03744, 2022. URL: https://doi.org/10.48550/arXiv.2203.03744.
  4. Lorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, and Alessandro Panconesi. Communities, random walks, and social sybil defense. Internet Mathematics, 10(3-4):360-420, 2014. Google Scholar
  5. John Augustine, Gopal Pandurangan, and Peter Robinson. Fast byzantine agreement in dynamic networks. In Proceedings of the 2013 ACM symposium on Principles of distributed computing, pages 74-83, 2013. Google Scholar
  6. John Augustine, Gopal Pandurangan, and Peter Robinson. Fast byzantine leader election in dynamic networks. In International Symposium on Distributed Computing, pages 276-291. Springer, 2015. Google Scholar
  7. John Augustine, Gopal Pandurangan, and Peter Robinson. Distributed algorithmic foundations of dynamic networks. ACM SIGACT News, 47(1):69-98, 2016. Google Scholar
  8. Yossi Azar, Andrei Z. Broder, Anna R. Karlin, Nathan Linial, and Steven J. Phillips. Biased random walks. Combinatorica, 16(1):1-18, 1996. URL: https://doi.org/10.1007/BF01300124.
  9. Nikesh Bajaj, Tracy Goodluck Constance, Marvin Rajwadi, Julie A. Wall, Mansour Moniri, Cornelius Glackin, Nigel Cannings, Chris Woodruff, and James Laird. Fraud detection in telephone conversations for financial services using linguistic features. CoRR, abs/1912.04748, 2019. URL: https://arxiv.org/abs/1912.04748.
  10. Peter Bartlett, Varsha Dani, Thomas Hayes, Sham Kakade, Alexander Rakhlin, and Ambuj Tewari. High-probability regret bounds for bandit online linear optimization. In Proceedings of the 21st Annual Conference on Learning Theory-COLT 2008, pages 335-342. Omnipress, 2008. Google Scholar
  11. Michael Ben-Or, M Linial, and Michael Saks. Collective coin flipping and other models of imperfect randomness. IBM Thomas J. Watson Research Division, 1989. Google Scholar
  12. Michael Ben-Or and Nathan Linial. Collective coin flipping, robust voting schemes and minima of banzhaf values. In 26th Annual Symposium on Foundations of Computer Science (sfcs 1985), pages 408-416. IEEE, 1985. Google Scholar
  13. Romain Bertrand, Petra Gomez-Krämer, Oriol Ramos Terrades, Patrick Franco, and Jean-Marc Ogier. A system based on intrinsic features for fraudulent document detection. In Proceedings 12th International Conference on Document Analysis and Recognition (ICDAR), pages 106-110, 2013. URL: https://doi.org/10.1109/ICDAR.2013.29.
  14. Nicolò Bonettini, Paolo Bestagini, Simone Milani, and Stefano Tubaro. On the use of Benford’s law to detect GAN-generated images. In Proceedings 25th International Conference on Pattern Recognition (ICPR), pages 5495-5502, 2020. URL: https://doi.org/10.1109/ICPR48806.2021.9412944.
  15. Jing Chen and Silvio Micali. Algorand: A secure and efficient distributed ledger. Theoretical Computer Science, 777:155-183, 2019. Google Scholar
  16. Devdatt P. Dubhashi and Alessandro Panconesi. Concentration of Measure for the Analysis of Randomized Algorithms. Cambridge University Press, 2009. URL: http://www.cambridge.org/gb/knowledge/isbn/item2327542/.
  17. Ioana Dumitriu, Prasad Tetali, and Peter Winkler. On playing golf with two balls. SIAM Journal on Discrete Mathematics, 16(4):604-615, 2003. Google Scholar
  18. Juan Garay, Aggelos Kiayias, and Nikos Leonardos. The Bitcoin backbone protocol: Analysis and applications. In Annual international conference on the theory and applications of cryptographic techniques, pages 281-310. Springer, 2015. Google Scholar
  19. Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. Algorand: Scaling byzantine agreements for cryptocurrencies. In Proceedings of the 26th symposium on operating systems principles, pages 51-68, 2017. Google Scholar
  20. Alexander E Holroyd and James Propp. Rotor walks and markov chains. Algorithmic probability and combinatorics, 520:105-126, 2010. Google Scholar
  21. Shang-En Huang, Seth Pettie, and Leqi Zhu. Byzantine agreement in polynomial time with near-optimal resilience. In Proceedings of the 54th Annual ACM Symposium on Theory of Computing (STOC), pages 502-514, 2022. URL: https://doi.org/10.1145/3519935.3520015.
  22. Shang-En Huang, Seth Pettie, and Leqi Zhu. Byzantine agreement with optimal resilience via statistical fraud detection. CoRR, abs/2206.15335, 2022. URL: https://doi.org/10.48550/arXiv.2206.15335.
  23. A. Kerckhoffs. La cryptographie militaire. Journal des Sciences Militaires, pages 161-191, 1883. Google Scholar
  24. Valerie King and Jared Saia. Byzantine agreement in expected polynomial time. J. ACM, 63(2):13:1-13:21, 2016. URL: https://doi.org/10.1145/2837019.
  25. Valerie King, Jared Saia, Vishal Sanwalani, and Erik Vee. Scalable leader election. In SODA, volume 6, pages 990-999, 2006. Google Scholar
  26. Alex Ely Kossovsky. Benford’s Law: Theory, the General Law of Relative Quantities, and Forensic Fraud Detection Applications. World Scientific, 2014. URL: https://doi.org/10.1142/9089.
  27. Nathan Linial. Games computers play: Game-theoretic aspects of computing. Citeseer, 1992. Google Scholar
  28. Steven J. Miller. Benford’s Law: Theory and Applications. Princeton University Press, Princeton, N.J., 2015. Google Scholar
  29. Mark J. Nigrini. Digital analysis using Benford’s Law. Global Audit Publications, 2000. Google Scholar
  30. Mark J. Nigrini. Benford’s Law: Applications for Forensic Accounting, Auditing, and Fraud Detection. Wiley, Hoboken, N.J., 2012. Google Scholar
  31. Shashank Pandit, Duen Horng Chau, Samuel Wang, and Christos Faloutsos. Netprobe: a fast and scalable system for fraud detection in online auction networks. In Proceedings of the 16th International Conference on World Wide Web (WWW), pages 201-210, 2007. URL: https://doi.org/10.1145/1242572.1242600.
  32. Vyatcheslav B Priezzhev, Deepak Dhar, Abhishek Dhar, and Supriya Krishnamurthy. Eulerian walkers as a model of self-organized criticality. Physical Review Letters, 77(25):5079, 1996. Google Scholar
  33. Alexander Russell and David Zuckerman. Perfect information leader election in log* n+ o (1) rounds. Journal of Computer and System Sciences, 63(4):612-626, 2001. Google Scholar
  34. Atish Das Sarma, Anisur Rahaman Molla, and Gopal Pandurangan. Distributed computation in dynamic networks via random walks. Theoretical Computer Science, 581:45-66, 2015. Google Scholar
  35. Uri Simonsohn. Just post it: The lesson from two cases of fabricated data detected by statistics alone. Psychological Science, 24(10):1875-1888, 2013. Google Scholar
  36. Uri Simonsohn, Joseph P. Simmons, and Leif D. Nelson. Better p-curves: Making p-curve analysis more robust to errors, fraud, and ambitious p-hacking, a reply to Ulrich and Miller (2015). Journal of Experimental Psychology, 144(6):1146-1152, 2015. Google Scholar
  37. Uri Simonsohn, Joseph P. Simmons, and Leif D. Nelson. Datacolada 98: Evidence of fraud in an influential field experiment about dishonesty, 2021. URL: http://datacolada.org/98.
  38. Niek Tax, Kees Jan de Vries, Mathijs de Jong, Nikoleta Dosoula, Bram van den Akker, Jon Smith, Olivier Thuong, and Lucas Bernardi. Machine learning for fraud detection in e-commerce: A research agenda. CoRR, abs/2107.01979, 2021. URL: https://arxiv.org/abs/2107.01979.
  39. Tian Tian, Jun Zhu, Fen Xia, Xin Zhuang, and Tong Zhang. Crowd fraud detection in internet advertising. In Proceedings of the 24th International Conference on World Wide Web (WWW), pages 1100-1110. ACM, 2015. URL: https://doi.org/10.1145/2736277.2741136.
  40. Chen Wang, Yingtong Dou, Min Chen, Jia Chen, Zhiwei Liu, and Philip S. Yu. Deep fraud detection on non-attributed graph. CoRR, abs/2110.01171, 2021. URL: https://arxiv.org/abs/2110.01171.
  41. Wei Wei, Fengyuan Xu, Chiu C Tan, and Qun Li. Sybildefender: A defense mechanism for sybil attacks in large social networks. IEEE transactions on parallel and distributed systems, 24(12):2492-2502, 2013. Google Scholar
  42. Chang Xu and Jie Zhang. Collusive opinion fraud detection in online reviews: A probabilistic modeling approach. ACM Trans. Web, 11(4):25:1-25:28, 2017. URL: https://doi.org/10.1145/3098859.
  43. Haifeng Yu, Michael Kaminsky, Phillip B Gibbons, and Abraham Flaxman. Sybilguard: defending against sybil attacks via social networks. In Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pages 267-278, 2006. Google Scholar
  44. João G. Zago, Fabio L. Baldissera, Eric A. Antonelo, and Rodrigo T. Saad. Benford’s law: what does it say on adversarial images? CoRR, abs/2102.04615, 2021. URL: https://arxiv.org/abs/2102.04615.
  45. Mahdi Zamani, Mahnush Movahedi, and Mariana Raykova. Rapidchain: Scaling blockchain via full sharding. In Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pages 931-948, 2018. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail