%0 Conference Proceedings %T Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts %+ AGH University of Science and Technology [Krakow, PL] (AGH UST) %+ Pedagogical University of Krakow %A Zachara, Marek %A Pałka, Dariusz %Z Part 2: Workshop %< avec comité de lecture %( Lecture Notes in Computer Science %B International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES) %C Prague, Czech Republic %Y Gerald Quirchmayr %Y Josef Basl %Y Ilsun You %Y Lida Xu %Y Edgar Weippl %I Springer %3 Multidisciplinary Research and Practice for Information Systems %V LNCS-7465 %P 534-546 %8 2012-08-20 %D 2012 %R 10.1007/978-3-642-32498-7_41 %K internet auctions %K identity theft %K anomaly detection %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X For over 15 years auction services have grown rapidly, constituting a major part of e-commerce worldwide. Unfortunately, they also provide opportunities for criminals to distribute illicit goods, launder money or commit other types of fraud. This calls for methods to mitigate this threat. The following paper discusses the methods of identifying the accounts of users participating in internet auctions that have been hijacked (taken over) by malicious individuals and utilised for fraudulent purposes. Two primary methods are described, monitoring users’ activities (e.g. the number of auctions created over time) with EWMA and clustering similar auction categories into groups for the purpose of assessing users’ sellers profiles and detecting their sudden changes. These methods, utilised together allow for real-time detection of suspicious accounts. The proposed models are validated on real data gathered from an auction web site. %G English %Z TC 5 %Z TC 8 %Z WG 8.4 %Z WG 8.9 %2 https://inria.hal.science/hal-01542426/document %2 https://inria.hal.science/hal-01542426/file/978-3-642-32498-7_41_Chapter.pdf %L hal-01542426 %U https://inria.hal.science/hal-01542426 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-WG %~ IFIP-TC8 %~ IFIP-CD-ARES %~ IFIP-WG8-4 %~ IFIP-WG8-9 %~ IFIP-LNCS-7465