TY - GEN
T1 - Modeling Access Environment and Behavior Sequence for Financial Identity Theft Detection in E-Commerce Services
AU - Ye, Qiongzan
AU - Gao, Yangbo
AU - Zhang, Zhenhua
AU - Chen, Yu
AU - Li, Yupeng
AU - Gao, Min
AU - Chen, Shutong
AU - Wang, Xin
AU - Chen, Yang
N1 - Funding Information:
This work is sponsored by National Natural Science Foundation of China (No. 62072115, No. 71731004, No. 61602122, No. 61971145), Guangdong Basic and Applied Basic Research Foundation (Ref. 2022A1515011583), One-off Tier 2 Start-up Grant (2020/2021) of Hong Kong Baptist University (Ref. RC-OFSGT2/20-21/COMM/002), Startup Grant (Tier 1) for New Academics AY2020/21 of Hong Kong Baptist University and the AI-Info Communication Study (AIS) Scheme 2021/22 (Ref. AIS 21-22/06). This work is also supported by Meituan. Yang Chen is the corresponding author.
Funding Information:
This work is sponsored by National Natural Science Foundation of China (No. 62072115, No. 71731004, No. 61602122, No. 61971145), Guangdong Basic and Applied Basic Research Foundation (Ref. 2022A1515011583), One-off Tier 2 Startup Grant (2020/2021) of Hong Kong Baptist University (Ref. RC-OFSGT2/20-21/COMM/002), Startup Grant (Tier 1) for New Academics AY2020/21 of Hong Kong Baptist University and the AI-Info Communication Study (AIS) Scheme 2021/22 (Ref. AIS 21-22/06). This work is also supported by Meituan
Publisher Copyright:
© 2022 IEEE.
PY - 2022/7/18
Y1 - 2022/7/18
N2 - Online-to-Offline (O2O) e-commerce service platforms and their users are faced with various fraud risks. Among them, financial identity theft is a widely existing challenge. However, existing methods are insufficient to detect this type of fraud. In this paper, we address the financial identity theft detection problem in e-commerce services by leveraging access environment and behavior sequence. To explore the fraud patterns, we first make a detailed analysis using real cases of identity theft from Meituan, a leading O2O e-commerce platform in China. Our findings are twofold. First, fraudulent accounts sharing the same personal ID would have different access environments, such as devices and IP addresses. Second, a group of fraudulent accounts may have aggregations of devices, IP addresses, and delivery addresses. Based on these observations, we propose a hybrid method termed EnvIT to detect financial identity theft based on the heterogeneous graph and the behavior sequence. EnvIT is able to characterize the access environment and the historical behavior of the accounts. Furthermore, an attentive module is adopted to assign weights to different features automatically. We further evaluate EnvIT via extensive experiments using a real-world dataset from Meituan. Our experimental results demonstrate that EnvIt outperforms several baseline methods in fraudulent account detection and achieves an AUC of 0.9210.
AB - Online-to-Offline (O2O) e-commerce service platforms and their users are faced with various fraud risks. Among them, financial identity theft is a widely existing challenge. However, existing methods are insufficient to detect this type of fraud. In this paper, we address the financial identity theft detection problem in e-commerce services by leveraging access environment and behavior sequence. To explore the fraud patterns, we first make a detailed analysis using real cases of identity theft from Meituan, a leading O2O e-commerce platform in China. Our findings are twofold. First, fraudulent accounts sharing the same personal ID would have different access environments, such as devices and IP addresses. Second, a group of fraudulent accounts may have aggregations of devices, IP addresses, and delivery addresses. Based on these observations, we propose a hybrid method termed EnvIT to detect financial identity theft based on the heterogeneous graph and the behavior sequence. EnvIT is able to characterize the access environment and the historical behavior of the accounts. Furthermore, an attentive module is adopted to assign weights to different features automatically. We further evaluate EnvIT via extensive experiments using a real-world dataset from Meituan. Our experimental results demonstrate that EnvIt outperforms several baseline methods in fraudulent account detection and achieves an AUC of 0.9210.
KW - Attention Mechanism
KW - Financial Fraud Detection
KW - Graph Neural Network
KW - Identity Theft
KW - Recurrent Neural Network
UR - http://www.scopus.com/inward/record.url?scp=85136124938&partnerID=8YFLogxK
U2 - 10.1109/IJCNN55064.2022.9892383
DO - 10.1109/IJCNN55064.2022.9892383
M3 - Conference proceeding
SN - 9781665495264
T3 - International Joint Conference on Neural Networks (IJCNN) - Proceedings
SP - 1
EP - 8
BT - 2022 International Joint Conference on Neural Networks (IJCNN) - Proceedings
PB - IEEE
T2 - 2022 International Joint Conference on Neural Networks, IJCNN 2022
Y2 - 18 July 2022 through 23 July 2022
ER -