Identifying collusion groups using spectral clustering

نویسندگان

  • Suneel Sarswat
  • Kandathil Mathew Abraham
  • Subir Kumar Ghosh
چکیده

In an illiquid stock, traders can collude and place orders on a predetermined price and quantity at a fixed schedule. This is usually done to manipulate the price of the stock or to create artificial liquidity in the stock, which may mislead genuine investors. Here, the problem is to identify such group of colluding traders. We modeled the problem instance as a graph, where each trader corresponds to a vertex of the graph and trade corresponds to edges of the graph. Further, we assign weights on edges depending on total volume, total number of trades, maximum change in the price and commonality between two vertices. Spectral clustering algorithms are used on the constructed graph to identify colluding group(s). We have compared our results with simulated data to show the effectiveness of spectral clustering to detecting colluding groups. Moreover, we also have used parameters of real data to test the effectiveness of our algorithm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting, Representing and Querying Collusion in Online Rating Systems

Online rating systems are subject to malicious behaviors mainly by posting unfair rating scores. Users may try to individually or collaboratively promote or demote a product. Collaborating unfair rating ’collusion’ is more damaging than individual unfair rating. Although collusion detection in general has been widely studied, identifying collusion groups in online rating systems is less studied...

متن کامل

Privacy-Awareness of Distributed Data Clustering Algorithms Revisited

Several privacy measures have been proposed in the privacypreserving data mining literature. However, privacy measures either assume centralized data source or that no insider is going to try to infer some information. This paper presents distributed privacy measures that take into account collusion attacks and point level breaches for distributed data clustering. An analysis of representative ...

متن کامل

Detecting and identifying coalitions

In many multiagent scenarios, groups of participants (known as coalitions) may attempt to cooperate, seeking to increase the benefits realized by the members. Depending on the scenario, such cooperation may be benign, or may be unwelcome or even forbidden (often called collusion). Coalitions can present a problem for many multiagent systems, potentially undermining the intended operation of sys...

متن کامل

Anti-collusion fingerprinting for multimedia

Digital fingerprinting is a technique for identifying users who might try to use multimedia content for unintended purposes, such as redistribution. These fingerprints are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks. A cost-effective attack against such digital fingerprints is collusion, where several differently marke...

متن کامل

Automatic clustering of multispectral imagery by maximization of the graph modularity

Automatic clustering of spectral image data is a common problem with a diverse set of desired and potential solutions. While typical clustering techniques use first order statistics and Gaussian models, the method described in this paper utilizes the spectral data structure to generate a graph representation of the image and then clusters the data by applying the method of optimal modularity fo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1509.06457  شماره 

صفحات  -

تاریخ انتشار 2015