Fraud Detection through
Graph-Based User Behavior Modeling
Carnegie Mellon University
Stony Brook University
Carnegie Mellon University

Introduction slides

Subgraph Analysis slides

Propagation Methods slides

Latent Factor Models slides


How do anomalies, fraud, and spam effect our models of normal user behavior? How can we modify our models to catch fraudsters? In this tutorial we will answer these questions - connecting graph analysis tools for user behavior modeling to anomaly and fraud detection. In particular, we will focus on three data mining techniques: subgraph analysis, label propagation and latent factor models; and their application to static graphs, e.g. social networks, evolving graphs, e.g. "who-calls-whom" networks, and attributed graphs, e.g. the "who-reviews-what" graphs of Amazon and Yelp.

For each of these techniques we will give an explanation of the algorithms and the intuition behind them. We will then give brief examples of recent research using the techniques to model, understand and predict normal behavior. With this intuition for how these methods are applied to graphs and user behavior, we will focus on state-of-the-art research showing how the outcomes of these methods are effected by fraud, and how they have been used to catch fraudsters.

Outline and References

An outline of our tutorial with references to the covered material can be found here.

Machine learning tools (each with different strengths of course):