Abstract-Computer system reliability is conventionally modeled and analyzed using techniques such as fault tree analysis (FTA) and reliability block diagrams (RBD), which provide static representations of system reliability properties. A recent extension to RBD, called dynamic reliability block diagrams (DRBD), defines a framework for modeling dynamic reliability behavior of computer-based systems. However, analyzing a DRBD model in order to locate and identify design errors, such as a deadlock error or faulty state, is not trivial when done manually. A feasible approach to verifying it is to develop its formal model, and then analyze it using programmatic methods. In this paper, we first define a reliability markup language (RML) that can be used to formally describe DRBD models. Then we present an algorithm that automatically converts a DRBD model into a colored Petri net (CPN). We use a case study to illustrate the effectiveness of our approach and demonstrate how system properties of a DRBD model can be verified using an existing Petri net tool. Our formal modeling approach is compositional, thus it provides a potential solution to automated verification of DRBD models.
Index Terms-System
With the significant increase of available item listings in popular online auction houses nowadays, it becomes nearly impossible to manually investigate the large amount of auctions and bidders for shill bidding activities, which are a major type of auction fraud in online auctions. Automated mechanisms such as data mining techniques were proven to be necessary to process this type of increasing workload. In this paper, we first present a framework of Real-Time Self-Adaptive Classifier (RT-SAC) for identifying suspicious bidders in online auctions using an incremental neural network approach. Then we introduce a clustering module that characterizes bidder behaviors in measurable attributes and uses a hierarchical clustering mechanism to create training datasets. The neural network in RT-SAC is initialized with the training datasets, which consist of labeled historical auction data.Once initialized, the network can be trained incrementally to gradually adapt to new bidding data in real-time, and thus, it supports efficient detection of suspicious bidders in online auctions. Finally, we utilize a case study to demonstrate how parameters in RT-SAC can be tuned for optimal operations and how our approach can be used to effectively identify suspicious online bidders in real-time.
The number of Internet auction shoppers is rapidly growing. However, online auction customers may suffer from auction fraud, sometimes without even noticing it. In-auction fraud differs from preand post-auction fraud in that it happens in the bidding period of an active auction. Since the in-auction fraud strategies are subtle and complex, it makes the fraudulent behavior more difficult to discover. Researchers from disciplines such as computer science and economics have proposed a number of methods to deal with in-auction fraud. In this paper, we summarize commonly seen indicators of in-auction fraud, provide a review of significant contributions in the literature of Internet in-auction fraud, and identify future challenging research tasks.
This paper describes the design of a decision support system for shill detection in online auctions. To assist decision making, each bidder is associated with a type of certification, namely shill, shill suspect, or trusted bidder, at the end of each auction's bidding cycle. The certification level is determined on the basis of a bidder's bidding behaviors including shilling behaviors and normal bidding behaviors, and thus fraudulent bidders can be identified. In this paper, we focus on representing knowledge about bidders from different aspects in online auctions, and reasoning on bidders' trustworthiness under uncertainties using Dempster–Shafer theory of evidence. To demonstrate the feasibility of our approach, we provide a case study using real auction data from eBay. The analysis results show that our approach can be used to detect shills effectively and efficiently. By applying Dempster–Shafer theory to combine multiple sources of evidence for shill detection, the proposed approach can significantly reduce the number of false positive results in comparison to approaches using a single source of evidence.
scite is a Brooklyn-based startup that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.