Detecting compromised accounts caused by phone number recycling on e-commerce platforms: taking Meituan as an example

IF 2.7 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Frontiers of Information Technology & Electronic Engineering Pub Date : 2024-08-30 DOI:10.1631/fitee.2300291
Min Gao, Shutong Chen, Yangbo Gao, Zhenhua Zhang, Yu Chen, Yupeng Li, Qiongzan Ye, Xin Wang, Yang Chen
{"title":"Detecting compromised accounts caused by phone number recycling on e-commerce platforms: taking Meituan as an example","authors":"Min Gao, Shutong Chen, Yangbo Gao, Zhenhua Zhang, Yu Chen, Yupeng Li, Qiongzan Ye, Xin Wang, Yang Chen","doi":"10.1631/fitee.2300291","DOIUrl":null,"url":null,"abstract":"<p>Phone number recycling (PNR) refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner. It has posed a threat to the reliability of the existing authentication solution for e-commerce platforms. Specifically, a new owner of a reassigned number can access the application account with which the number is associated, and may perform fraudulent activities. Existing solutions that employ a reassigned number database from mobile operators are costly for e-commerce platforms with large-scale users. Thus, alternative solutions that depend on only the information of the applications are imperative. In this work, we study the problem of detecting accounts that have been compromised owing to the reassignment of phone numbers. Our analysis on Meituan’s real-world dataset shows that compromised accounts have unique statistical features and temporal patterns. Based on the observations, we propose a novel model called temporal pattern and statistical feature fusion model (TSF) to tackle the problem, which integrates a temporal pattern encoder and a statistical feature encoder to capture behavioral evolutionary interaction and significant operation features. Extensive experiments on the Meituan and IEEE-CIS datasets show that TSF significantly outperforms the baselines, demonstrating its effectiveness in detecting compromised accounts due to reassigned numbers.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":null,"pages":null},"PeriodicalIF":2.7000,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Frontiers of Information Technology & Electronic Engineering","FirstCategoryId":"5","ListUrlMain":"https://doi.org/10.1631/fitee.2300291","RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Phone number recycling (PNR) refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner. It has posed a threat to the reliability of the existing authentication solution for e-commerce platforms. Specifically, a new owner of a reassigned number can access the application account with which the number is associated, and may perform fraudulent activities. Existing solutions that employ a reassigned number database from mobile operators are costly for e-commerce platforms with large-scale users. Thus, alternative solutions that depend on only the information of the applications are imperative. In this work, we study the problem of detecting accounts that have been compromised owing to the reassignment of phone numbers. Our analysis on Meituan’s real-world dataset shows that compromised accounts have unique statistical features and temporal patterns. Based on the observations, we propose a novel model called temporal pattern and statistical feature fusion model (TSF) to tackle the problem, which integrates a temporal pattern encoder and a statistical feature encoder to capture behavioral evolutionary interaction and significant operation features. Extensive experiments on the Meituan and IEEE-CIS datasets show that TSF significantly outperforms the baselines, demonstrating its effectiveness in detecting compromised accounts due to reassigned numbers.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
以美团为例:检测电商平台因电话号码回收而导致的账户泄露
电话号码回收(PNR)是指移动运营商回收已停机号码并将其重新分配给新机主的行为。它对电子商务平台现有身份验证解决方案的可靠性构成了威胁。具体来说,重新分配号码的新机主可以访问与该号码关联的应用账户,并可能进行欺诈活动。对于拥有大量用户的电子商务平台来说,采用移动运营商重新分配号码数据库的现有解决方案成本高昂。因此,只依赖应用程序信息的替代解决方案势在必行。在这项工作中,我们研究了检测因电话号码重新分配而泄露的账户的问题。我们对美团真实数据集的分析表明,被泄露的账户具有独特的统计特征和时间模式。基于这些观察结果,我们提出了一种名为 "时间模式与统计特征融合模型(TSF)"的新模型来解决这一问题,该模型集成了时间模式编码器和统计特征编码器,以捕捉行为演化交互和重要操作特征。在美团和 IEEE-CIS 数据集上进行的大量实验表明,TSF 的性能明显优于基线模型,这证明了它在检测因重新分配号码而受损的账户方面的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Frontiers of Information Technology & Electronic Engineering
Frontiers of Information Technology & Electronic Engineering COMPUTER SCIENCE, INFORMATION SYSTEMSCOMPU-COMPUTER SCIENCE, SOFTWARE ENGINEERING
CiteScore
6.00
自引率
10.00%
发文量
1372
期刊介绍: Frontiers of Information Technology & Electronic Engineering (ISSN 2095-9184, monthly), formerly known as Journal of Zhejiang University SCIENCE C (Computers & Electronics) (2010-2014), is an international peer-reviewed journal launched by Chinese Academy of Engineering (CAE) and Zhejiang University, co-published by Springer & Zhejiang University Press. FITEE is aimed to publish the latest implementation of applications, principles, and algorithms in the broad area of Electrical and Electronic Engineering, including but not limited to Computer Science, Information Sciences, Control, Automation, Telecommunications. There are different types of articles for your choice, including research articles, review articles, science letters, perspective, new technical notes and methods, etc.
期刊最新文献
A novel overlapping minimization SMOTE algorithm for imbalanced classification A review on the developments and space applications of mid- and long-wavelength infrared detection technologies Detecting compromised accounts caused by phone number recycling on e-commerce platforms: taking Meituan as an example Flocking fragmentation formulation for a multi-robot system under multi-hop and lossy ad hoc networks Event-triggered distributed cross-dimensional formation control for heterogeneous multi-agent systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1