Abstract
Spoofing behaviors profits from other participants via placing large amounts of deceptive orders to create misleading signals with the help of advanced electronic trading techniques, severely harming the healthy and sustainable development of modern financial markets. Existing works focus mostly on detecting individual spoofing issuers or orders, which ignore the capability of mining hidden conspiracy fraud patterns. Consequently, they face significant challenges in tracking organized spoofing behaviors. To this end, in this paper, we proposed a novel transformer-based graph neural network to learn the temporal inter-connected transaction representations for conspiracy spoofing behavior detection. In particular, we model user orders in the financial market by the temporal transaction graph layer first, which produces temporal and relational encodings of the user’s order behaviors. Then, we devise a transformer-based neural network to automatically learn the deeper sequential and inter-connected representations, which could perceive a boarder view of the user’s transaction patterns. Finally, the temporal and relational features are jointly optimized by the detection network in an end-to-end manner. We conduct extensive experiments on a real-world dataset from one of the largest financial exchange markets in East Asia. The result strongly proves the superior performance of our proposed method in fighting against conspiracy spoofing behaviors with higher accuracy without handcraft feature engineering, compared with ten state-of-the-art baselines. To the best of our knowledge, this is the first work that proposed a transformer-based deep graph learning approach for spoofing detection challenges and demonstrates its practical ability in real-world applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Arora, S., Bhatia, M.: Fingerprint spoofing detection to improve customer security in mobile financial applications using deep learning. AJSE, pp. 2847–2863 (2020)
Bkassiny, M., Li, Y., Jayaweera, S.K.: A survey on machine-learning techniques in cognitive radios. IEEE Commun. Surv. Tutorials, 1136–1159 (2012)
Cao, L.: Ai in finance: challenges, techniques, and opportunities. ACM Comput. Surv. (CSUR) 55(3), 1–38 (2022)
Cao, Y., Li, Y., Coleman, S., Belatreche, A., McGinnity, T.M.: Adaptive hidden Markov model with anomaly states for price manipulation detection. TNNLS, pp. 318–330 (2014)
Cartea, Á., Jaimungal, S., Wang, Y.: Spoofing and price manipulation in order-driven markets. Appl. Math. Finance 27(1–2), 67–98 (2020)
Chen, J., Zhuang, F., Hong, X., Ao, X., Xie, X., He, Q.: Attention-driven factor model for explainable personalized recommendation. In: SIGIR, pp. 909–912 (2018)
Cheng, D., Niu, Z., Tu, Y., Zhang, L.: Prediction defaults for networked-guarantee loans. In: ICPR, pp. 361–366 (2018)
Cheng, D., Tu, Y., Ma, Z.W., Niu, Z., Zhang, L.: Risk assessment for networked-guarantee loans using high-order graph attention representation. In: IJCAI, pp. 5822–5828 (2019)
Cheng, D., Wang, X., Zhang, Y., Zhang, L.: Graph neural network for fraud detection via spatial-temporal attention. TKDE, pp. 1–13 (2020)
Ding, Q., Wu, S., Sun, H., Guo, J., Guo, J.: Hierarchical multi-scale gaussian transformer for stock movement prediction. In: IJCAI, pp. 4640–4646 (2020)
Dou, Y., Liu, Z., Sun, L., Deng, Y., Peng, H., Yu, P.S.: Enhancing graph neural network-based fraud detectors against camouflaged fraudsters. In: CIKM, pp. 315–324 (2020)
Fu, K., Cheng, D., Tu, Y., Zhang, L.: Credit card fraud detection using convolutional neural networks. In: ICONIP, pp. 483–490 (2016)
Gong, J., Sun, S.: A new approach of stock price prediction based on logistic regression model. In: NISS, pp. 1366–1371 (2009)
Graves, A., Fernández, S., Schmidhuber, J.: Bidirectional lstm networks for improved phoneme classification and recognition. In: ICANN, pp. 799–804 (2005)
Heidari, A.A., Faris, H., Aljarah, I., Mirjalili, S.: An efficient hybrid multilayer perceptron neural network with grasshopper optimization. Soft Computing, pp. 7941–7958 (2019)
Hsu, C., Li, C.T.: Retagnn: Relational temporal attentive graph neural networks for holistic sequential recommendationn. In: WWW, pp. 2968–2979 (2021)
Khairy, R.S., Hussein, A., ALRikabi, H.S.: The detection of counterfeit banknotes using ensemble learning techniques of adaboost and voting. IJISAE, pp. 326–339 (2021)
Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. In: ICLR, pp. 1–15 (2015)
Leangarun, T., Tangamchit, P., Thajchayapong, S.: Stock price manipulation detection based on mathematical models. IJTEF, pp. 81–88 (2016)
Ma, Y., Wang, S., Aggarwal, C.C., Tang, J.: Graph convolutional networks with eigenpooling. In: KDD, pp. 723–731 (2019)
Mendonça, L., De Genaro, A.: Detection and analysis of occurrences of spoofing in the Brazilian capital market. J. Financial Regulation Compliance (2020)
Oghenerukevbe, E.A.: Customers perception of security indicators in online banking sites in Nigeria. J. Internet Banking Commerce 13(3), 1–14 (1970)
Olchyk, A.: A spoof of justice: double jeopardy implications for convictions of both spoofing and commodities fraud for the same transaction. Am. UL Rev. 65, 239 (2015)
Park, S.H., Han, K.: Methodologic guide for evaluating clinical performance and effect of artificial intelligence technology for medical diagnosis and prediction. Radiology, pp. 800–809 (2018)
Sadineni, P.K.: Detection of fraudulent transactions in credit card using machine learning algorithms. In: I-SMAC, pp. 659–660 (2020)
Scopino, G.: Preventing spoofing: From criminal prosecution to social norms. U. Cin. L. Rev., 1–8 (2016)
Sinrod, E.J., Reilly, W.P.: Cyber-crimes: A practical approach to the application of federal computer crime laws. Santa Clara Computer & High Tech. LJ 16, 177 (2000)
Tao, X., Day, A., Ling, L., Drapeau, S.: On detecting spoofing strategies in high-frequency trading. Quantitative Finance 22(8), 1405–1425 (2022)
Tezgider, M., Yildiz, B., Aydin, G.: Text classification using improved bidirectional transformer. Concurrency and Computation: Practice and Experience, pp. 1–12 (2021)
Tseng, V.S., Ying, J.C., Huang, C.W., Kao, Y., Chen, K.T.: Fraudetector: a graph-mining-based framework for fraudulent phone call detection. In: KDD, pp. 2157–2166 (2015)
Tuccella, J.N., Nadler, P., Şerban, O.: Protecting retail investors from order book spoofing using a gru-based detection model. arXiv preprint, pp. 1–13 (2021)
Vaswani, A., et al.: Attention is all you need. In: NIPS, pp. 5998–6008 (2017)
Wang, X., Wellman, M.P.: Spoofing the limit order book: an agent-based model. In: AAAI, pp. 651–659 (2017)
Yang, L., Ng, T.L.J., Smyth, B., Dong, R.: Html: Hierarchical transformer-based multi-task learning for volatility prediction. In: Proceedings of The Web Conference 2020, pp. 441–451 (2020)
Yang, S., Paddrik, M., Hayes, R., Todd, A., Kirilenko, A., Beling, P., Scherer, W.: Behavior based learning in identifying high frequency trading strategies. In: CIFEr, pp. 1–8 (2012)
You, J., Ying, R., Ren, X., Hamilton, W., Leskovec, J.: Graphrnn: generating realistic graphs with deep auto-regressive models. In: International Conference on Machine Learning. pp. 5708–5717. PMLR (2018)
Zhang, T., He, W., Zheng, H., Cui, Y., Song, H., Fu, S.: Satellite-based ground pm2. 5 estimation using a gradient boosting decision tree. Chemosphere 268, 1–45 (2021)
Zhang, W., Wu, C., Zhong, H., Li, Y., Wang, L.: Prediction of undrained shear strength using extreme gradient boosting and random forest based on bayesian optimization. Geoscience Frontiers, pp. 469–477 (2021)
Zhu, P., Cheng, D., Yang, F., Luo, Y., Qian, W., Zhou, A.: Zh-ner: Chinese named entity recognition with adversarial multi-task learning and self-attentions. In: DASFAA, pp. 603–611 (2021)
Zhu, Y., Xi, D., Song, B., Zhuang, F., Chen, S., Gu, X., He, Q.: Modeling users’ behavior sequences with hierarchical explainable network for cross-domain fraud detection. In: WWW, pp. 928–938 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kang, L., Mu, TJ., Ning, X. (2023). Conspiracy Spoofing Orders Detection with Transformer-Based Deep Graph Learning. In: Yang, X., et al. Advanced Data Mining and Applications. ADMA 2023. Lecture Notes in Computer Science(), vol 14177. Springer, Cham. https://doi.org/10.1007/978-3-031-46664-9_33
Download citation
DOI: https://doi.org/10.1007/978-3-031-46664-9_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-46663-2
Online ISBN: 978-3-031-46664-9
eBook Packages: Computer ScienceComputer Science (R0)