Combating Shill Bidding in Real Time: Prevention, Detection and Response

نویسنده

  • Kazi Mamun
چکیده

Human cheating has been a barrier to establishing trust among e-commerce users, throughout the last two decades. In particular, in online auctions, since all the transactions occur among anonymous users, trust is difficult to establish and maintain. Shill bidding happens when bidders bid exclusively to inflate (in forward auctions) or deflate (in reverse auctions) prices in online auctions. At present, shill bidding is the most severe and persistent form of cheating in online auctions, but still there are only a few or no established techniques for shill defense at run-time. In this paper, I evaluate the strengths and weaknesses of existing approaches to combating shill bidding. I also propose the ShillFree1 auction system to secure and protect auction systems from shill bidders for both forward and reverse auctions. More precisely, by using a variety of bidding behavior and user history, proposed auction system prevents, monitors and detects shill activities in real time. Moreover, to detect shilling thoroughly I propose IP tracking techniques. The system also takes necessary actions against shill activities at run-time. The experimental results demonstrate that, by prevention, detection and response mechanisms, the proposed auction system keeps the auction users secured from shill bidding and therefore establishes trust among online auction users.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Adaptive Shill Bidding Agent

This paper presents a software bidding agent that inserts fake bids on the seller’s behalf to inflate an auction’s price. This behaviour is referred to as shill bidding. Shill bidding is strictly prohibited by online auctioneers, as it defrauds unsuspecting buyers by forcing them to pay more for the item. The malicious bidding agent was constructed to aid in developing shill detection technique...

متن کامل

Reasoning under Uncertainty for Shill Detection in Online Auctions Using Dempster-Shafer Theory

This paper describes the design of a decision support system for shill detection in online auctions. To assist decision making, each bidder is associated with a type of certification, namely shill, shill suspect, or trusted bidder, at the end of each auction’s bidding cycle. The certification level is determined on the basis of a bidder’s bidding behaviors including shilling behaviors and norma...

متن کامل

Price comparison: A reliable approach to identifying shill bidding in online auctions?

1567-4223/$ see front matter 2011 Elsevier B.V. A doi:10.1016/j.elerap.2011.12.003 ⇑ Corresponding author. E-mail addresses: [email protected] (F. Dong), sh [email protected] (H. Xu), [email protected] (D. Majum Shill bidding has become a serious issue for innocent bidders with the growing popularity of online auctions. In this paper, we study the relationship between final prices of online auctions a...

متن کامل

Detecting Shill Bidding in Online English Auctions

The popularity of online auctioning has grown meteorically since the late 90s. This attraction is due to their convenience, low cost and ability to reach large (even worldwide) audiences. However, despite the advantages there are many problems inherent in auctioning online. One such problem is shill bidding where spurious bids are introduced into an auction to drive up the final price for the s...

متن کامل

Real-Time Model Checking for Shill Detection in Live Online Auctions

Online auctions are vulnerable to shill bidders, who intend to artificially raise bidding prices, causing winning bidders to pay more than they should pay for auctioned items. Detection of such fraudulent behaviors is very difficult, especially when an auction is in progress, or “live”. This paper focuses on a formal technique to detect shilling behaviors in live online auctions. We define a mo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer and Information Science

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2015