scholarly journals Implementation of Fraudulent Sellers Detection System of Online Marketplaces using Machine Learning Techniques

Author(s):  
Pooja Tyagi ◽  
◽  
Anurag Sharma ◽  

The E-commerce proportion in global retail expenditure has been steadily increasing over the years showing an obvious shift from brick and mortar to retail clicks. To analyze the exact problem of building an interactive models for the identification of auction fraud in the entry of data into ecommerce. This is why the most popular site's business develops with retailers and other auction customers. Where viral customers purchase products from online trading, customers may worry about fraudulent actions to get unlawful benefits from honest parties. Proactive modesty systems for detecting fraud are thus a necessary practice to prevent such illegal activities. The shopping product is built according to the customer's requirements and is safer online and resting, and the rules and regulations that are necessary to follow no longer seem to be the best of workable selection, coefficient limits that facilitate the shopping product and make it easier for the user model to compete on each platform so that it can experiment.

2019 ◽  
Vol 28 (1) ◽  
pp. 343-384 ◽  
Author(s):  
Gamal Eldin I. Selim ◽  
EZZ El-Din Hemdan ◽  
Ahmed M. Shehata ◽  
Nawal A. El-Fishawy

The Intrusion is a major threat to unauthorized data or legal network using the legitimate user identity or any of the back doors and vulnerabilities in the network. IDS mechanisms are developed to detect the intrusions at various levels. The objective of the research work is to improve the Intrusion Detection System performance by applying machine learning techniques based on decision trees for detection and classification of attacks. The methodology adapted will process the datasets in three stages. The experimentation is conducted on KDDCUP99 data sets based on number of features. The Bayesian three modes are analyzed for different sized data sets based upon total number of attacks. The time consumed by the classifier to build the model is analyzed and the accuracy is done.


2020 ◽  
Vol 8 (6) ◽  
pp. 3949-3953

Nowadays there is a significant study effort due to the popularity of CCTV to enhance analysis methods for surveillance videos and video-based images in conjunction with machine learning techniques for the purpose of independent assessment of such information sources. Although recognition of human intervention in computer vision is extremely attained subject, abnormal behavior detection is lately attracting more research attention. In this paper, we are interested in the studying the two main steps that compose abnormal human activity detection system which are the behavior representation and modelling. And we use different techniques, related to feature extraction and description for behavior representation as well as unsupervised classification methods for behavior modelling. In addition, available datasets and metrics for performance evaluation will be presented. Finally, this paper will be aimed to detect abnormal behaved object in crowd, such as fast motion in a crowd of walking people


2020 ◽  
pp. 1042-1059 ◽  
Author(s):  
Ammar Almomani ◽  
Mohammad Alauthman ◽  
Firas Albalas ◽  
O. Dorgham ◽  
Atef Obeidat

This article describes how as network traffic grows, attacks on traffic become more complicated and harder to detect. Recently, researchers have begun to explore machine learning techniques with cloud computing technologies to classify network threats. So, new and creative ways are needed to enhance intrusion detection system. This article addresses the source of the above issues through detecting an intrusion in cloud computing before it further disrupts normal network operations, because the complexity of malicious attack techniques have evolved from traditional malicious attack technologies (direct malicious attack), which include different malicious attack classes, such as DoS, Probe, R2L, and U2R malicious attacks, especially the zero-day attack in online mode. The proposed online intrusion detection cloud system (OIDCS) adopts the principles of the new spiking neural network architecture called NeuCube algorithm. It is proposed that this system is the first filtering system approach that utilizes the NeuCube algorithm. The OIDCS inherits the hybrid (supervised/unsupervised) learning feature of the NeuCube algorithm and uses this algorithm in an online system with lifelong learning to classify input while learning the system. The system is accurate, especially when working with a zero-day attack, reaching approximately 97% accuracy based on the to-be-remembered (TBR) encoding algorithm.


2012 ◽  
pp. 969-985
Author(s):  
Floriana Esposito ◽  
Teresa M.A. Basile ◽  
Nicola Di Mauro ◽  
Stefano Ferilli

One of the most important features of a mobile device concerns its flexibility and capability to adapt the functionality it provides to the users. However, the main problems of the systems present in literature are their incapability to identify user needs and, more importantly, the insufficient mappings of those needs to available resources/services. In this paper, we present a two-phase construction of the user model: firstly, an initial static user model is built for the user connecting to the system the first time. Then, the model is revised/adjusted by considering the information collected in the logs of the user interaction with the device/context in order to make the model more adequate to the evolving user’s interests/ preferences/behaviour. The initial model is built by exploiting the stereotype concept, its adjustment is performed exploiting machine learning techniques and particularly, sequence mining and pattern discovery strategies.


Author(s):  
Floriana Esposito ◽  
Teresa M.A. Basile ◽  
Nicola Di Mauro ◽  
Stefano Ferilli

One of the most important features of a mobile device concerns its flexibility and capability to adapt the functionality it provides to the users. However, the main problems of the systems present in literature are their incapability to identify user needs and, more importantly, the insufficient mappings of those needs to available resources/services. In this paper, we present a two-phase construction of the user model: firstly, an initial static user model is built for the user connecting to the system the first time. Then, the model is revised/adjusted by considering the information collected in the logs of the user interaction with the device/context in order to make the model more adequate to the evolving user’s interests/ preferences/behaviour. The initial model is built by exploiting the stereotype concept, its adjustment is performed exploiting machine learning techniques and particularly, sequence mining and pattern discovery strategies.


Sign in / Sign up

Export Citation Format

Share Document