Review Spam Detection via Time Series Pattern Discovery
-
Upload
mehboob-alam -
Category
Documents
-
view
13 -
download
2
description
Transcript of Review Spam Detection via Time Series Pattern Discovery
Review Spam Detection via Time Series Pattern Discovery
Sihong Xie† Guan Wang† Shuyang Lin† Philip S. Yu† ‡† Department of Computer Science, University of Illioins at Chicago, Chicago, IL‡ Computer Science Department King Abdulaziz University Jeddah, Saudi Arabia
{sxie6, gwang26, slin38, psyu}@uic.edu
ABSTRACTOnline reviews play a crucial role in today’s electronic com-merce. Due to the pervasive spam reviews, customers canbe misled to buy low-quality products, while decent storescan be defamed by malicious reviews. We observe that, inreality, a great portion (> 90% in the data we study) of thereviewers write only one review (singleton review). Thesereviews are so enormous in number that they can almostdetermine a store’s rating and impression. However, exist-ing methods ignore these reviewers. To address this prob-lem, we observe that the normal reviewers’ arrival patternis stable and uncorrelated to their rating pattern tempo-rally. In contrast, spam attacks are usually bursty and ei-ther positively or negatively correlated to the rating. Thus,we propose to detect such attacks via unusually correlatedtemporal patterns. We identify and construct multidimen-sional time series based on aggregate statistics, in order todepict and mine such correlation. Experimental results showthat the proposed method is effective in detecting singletonreview attacks. We discover that singleton review is a signif-icant source of spam reviews and largely affects the ratingsof online stores.
Categories and Subject DescriptorsH.2.8 [Database Applications]: Data Mining
General TermsAlgorithms, Experimentation
KeywordsReview spam, time series, adversarial data mining
1. INTRODUCTIONPrevious works use review contents and reviewers’ behav-
iors [2, 3, 1] to detect spams. These methods only work inthe situations where spammers write many reviews. In real-ity, however, most reviewers write only one review. This isdue to the nature of spamming. In order to manipulate therating quickly without being caught, it is highly desirable fora spammer to post many reviews in a short time under dif-ferent names. This spamming strategy makes it appear that
Copyright is held by the author/owner(s).WWW 2012 Companion, April 16–20, 2012, Lyon, France.ACM 978-1-4503-1230-1/12/04.
most reviewers contribute only one review (called a single-ton review, SR for short). Most of the statistics adoptedby previous works would not work on such singleton re-views. For example, the mean and standard deviation ofratings given by a reviewer [2] become meaningless if thisreviewer has written only one review. Based on abnormalycorrelated temporal pattern mining, we construct multidi-mensional time series and present a method to detect thesesingleton review attacks. We also use multiple resolutionsto handle short term fluctuations in time series and locatethe time of attacks.
2. THE PROPOSED TECHNIQUESTo raise or lower the rating of a store safely and rapidly,
spammers tend to post a large number of reviews with a highor low rating under different names. Therefore, if there is asharp increase in the volume of (singleton) reviews while therating also increases or decreases dramatically, it is highlylikely that the rating is manipulated by the newly arrivedreviews. Therefore, we can detect SR attacks by exploit-ing the correlation between the rating and the volume of(singleton) reviews.
2.1 Time Series ConstructionGiven all reviews for a store, their ratings are R(s) =
{r1, . . . , rns} with posting time TS(s) = {ts1, . . . , tsns},where tsi < tsj for all 1 ≤ i < j ≤ ns. Given a timewindow size Δt, we can split the time into consecutive timewindows In = [t0+(n−1)Δt, t0+nΔt], I =
⋃Nn=1 In. For
each time window In, we calculate three aggregate statisticsusing the SRs falling into that time window.
f1(In) =∑
tsj∈In
rj/f2(In), f2(In) = |{rj : tsj ∈ In}|
f3(In) = |{rj : tsj ∈ In, rj comes from an SR}|/f2(In)f1(In), f2(In) and f3(In) are the average rating, the numberof reviews and the ratio of singleton reviews within the timewindow In, respectively.
2.2 Correlated Abnormal Patterns Detectionin Mul- tidimensional Time Series
We use a three-step approach for the detection. First, oneach dimension, we fit a curve using the time series. Wethen apply longest common substring (LCS) algorithm tomatch the fitted curves to a template representing burstypatterns. We slide the template across each time series. Foreach time point during the sliding, LCS gives the number of
WWW 2012 – Poster Presentation April 16–20, 2012, Lyon, France
635
2.5
3.0
3.5
4.0
4.5
ratin
g0
200
400
600
800
num
ber
of r
evie
ws
0 10 20 30 40
0.5
0.6
0.7
0.8
0.9
time
ratio
of S
R
Figure 1: Bursty Patterns Detected in Store 24938
Table 1: Human evaluation results on storesEvaluator 1 Evaluator 2 Evaluator 3
Evaluator 1 17 14 16Evaluator 2 - 20 19Evaluator 3 - - 24
matched points between the template and the current sec-tion of the time series overlapping the template. We alsoconsider the range of the time series within the overlappingsection. Putting the number of matches and the range to-gether, we can measure the intensity of bursts for each timepoint on each dimension of time series. We retrieve top kbursty sections from each dimension. Lastly we slide a win-dow of a certain size over the time axis. At each point, wefind out how many top ranked locations in all dimensions arein the time frame specified by the current time window. Atime window is reported if all three dimensions have burstypatterns fall into the window. One example of the output ofthe algorithm is shown in Figure 1.
2.2.1 A Hierarchical Framework for Robust Single-ton Review Spam Detection
Given the review records of a store, one can constructthe multidimensional time series with different time windowsizes (resolutions). If the window size is set too small, thegeneral trend of a time series would be buried in a largenumber of fluctuations, which might cause high false posi-tive rate. We first smooth out short-term fluctuations usinga larger window (lower resolution). We then fit curves outof these time series and detect any suspicious periods withcorrelated abnormal patterns, which indicate the high like-lihood of SR spam attacks. A smaller window size (higherresolution) can be used to reveal more details (e.g. the exacttime of the burst). This is accomplished by constructing newtime series with a higher resolution on the detected periods,and detecting any finer suspicious period. This process con-tinues until one reaches the desired resolution such that thetime when the SR spam attack can be easily pinpointed.
3. EVALUATIONWe evaluate the proposed algorithm on the review data
crawled from a review website1. It contains 408,469 re-views written by 343,629 reviewers (identified by their id on
1www.resellerratings.com
Table 2: Human evaluation results on reviewsEvaluator 1 Evaluator 2 Evaluator 3
Evaluator 1 59 20 28Evaluator 2 - 41 38Evaluator 3 - - 72
the website) for 25,034 stores. 310,499 out of all reviewers(> 90%) wrote only one reviews. We employ three humanevaluators in this experiment.
In the evaluation we select 53 stores, each of which hasmore than 1,000 SRs. The proposed algorithm detects 33stores out of them. For each detected store, we select reviewsaround the time point when the bursty patterns appear.These reviews are then examined by three evaluators andtheir opinions are recorded. If there are two or more evalu-ators believe that a store has ever committed an SR spamattack, we consider it to be a dishonest store. The precisionof the proposed algorithm, when detecting such dishoneststores, is 75.86% (22/29). Table 1 shows the agreement be-tween evaluators. The numbers on the diagonal show howmany stores does each evaluator considers as dishonest. Theother numbers give how many stores that both two evalua-tors identify as dishonest stores.
We also ask three human evaluators to examine 147 re-views contained in one of the detected bursts in one suspi-cious store. Each review is given a score (0-negative, 0.5-possibly, 1-positive) to indicate the degree of being regardedas a spam review by each evaluator. Among the 147 reviews,43 reviews (38 are SR) have final score higher or equal to2, and 12 reviews (11 are SR) have final score equal to 3.This indicates that the proposed algorithm can locate theperiod when singleton spams concentrate. Table 2 is similarto Table 1, except that the results are based on the humanevaluations on the detected reviews.
4. CONCLUSIONThis paper studies the problem of singleton review spam
detection, which is both difficult and important to solve.We transform this problem to a temporal pattern discoveryproblem. We identify three aggregate statistics which areindicative of this type of spam attack, then we constructa multidimensional time series using these statistics. Wedesign a multi-scale anomaly detection algorithm on multi-dimensional time series based on curve fitting. Experimentalresults show that the proposed algorithm is effective in de-tecting singleton review spams.
5. ACKNOWLEDGEMENTSThis work is supported in part by Google Mobile 2014
Program.
6. REFERENCES[1] Mukherjee A, Liu B, Wang J, Glance N, and Jindal N.
Detecting group review spam. WWW ’11.
[2] Lim E-P, Nguyen V-A, Jindal N, Liu B, and LauwH W. Detecting product review spammers using ratingbehaviors. CIKM ’10.
[3] Jindal N, Liu B, and Lim E-P. Finding unusual reviewpatterns using unexpected rules. CIKM ’10.
WWW 2012 – Poster Presentation April 16–20, 2012, Lyon, France
636