8 Fault

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Fake Product Review Monitoring

and Removal for Genuine [email protected]


ProductReview Using MiningPHP Abstract:

In today's digital age, online


reviews play a pivotal role in influencing
consumer decisions. However, the
proliferation of fake reviews
undermines the authenticity and
reliability of online platforms. This
paper proposes a novel approach to
combat fake product reviews by
employing data mining techniques
implemented in PHP. The system aims
to monitor and remove fake reviews to
uphold the integrity of genuine product
feedback.

The proposed system utilizes data


1]Mrs.Jenifer.M
mining algorithms to analyze various
2]Mr.Mukesh kumar S attributes of reviews, such as language
patterns, sentiment analysis, and user
3]Mr.Gowthaman.N behavior, to distinguish between
genuine and fake reviews. Leveraging
4]Mrs.Abinaya.P
PHP, a widely-used scripting language
Assistant Professor 1 for web development, ensures the
scalability and accessibility of the
{2,3,4}-Students system across diverse online platforms.

Department of Computer Key functionalities of the system include


Applicatins real-time monitoring of incoming
reviews, automatic detection of
Sri Krishna Arts & Science suspicious patterns indicative of fake
reviews, and removal of identified fake
College reviews through an automated process.
Additionally, the system provides
Kuniyamuthur-Coimbatore administrators with tools to review
flagged content manually for further
Tamilnadu India
validation.
Through the integration of data mining review about the product. To find out
techniques and PHP implementation, the review is fake or genuine, system
the proposed system offers an effective
will find out the IP address of the user if
solution for mitigating the proliferation
of fake product reviews. By enhancing the system observe fake review send by
the trustworthiness of online review the same IP Address many at times it
platforms, the system aims to foster a
will inform the admin to remove that
more transparent and reliable
environment for consumers, thereby review from the system. This system
facilitating informed purchasing uses data mining methodology. This
decisions.
system helps the user to find out correct
As most of the people require review review of the product.
about a product before spending their
money on the product. So people come
across various reviews in the website
but these reviews are genuine or fake is
not identified by the user. In some
review websites some good reviews are
added by the product company people
itself in order to make product famous Stat of Creating and Reviewing a
Product Fakely
this people belong to Social Media
Optimization team. They give good
reviews for many different products
The system operates through the
manufactured by their own firm. User following steps:
will not be able to find out whether the
review is genuine or fake. To find out
fake review in the website this “Fake Product Addition by Admin: The
administrator has the privilege to add new
Product Review Monitoring and
products to the system. This includes
Removal for Genuine Online Product inputting relevant details such as product
Reviews Using Opinion Mining” system name, description, and category.
is introduced. This system will find out
fake reviews made by the social media
Review Moderation by Admin: The
optimization team by identifying the IP administrator has the authority to monitor
address. User will login to the system and manage reviews posted by users. In
cases where a review is identified as fake
using his user id and password and will
or violates the platform's guidelines, the
view various products and will give
administrator can promptly delete or flag genuine and reliable, fostering a
the review for further investigation. trustworthy online community.

User Interaction: Upon accessing the Continuous Improvement: The system


system, users are presented with a catalog continuously learns and improves its
of available products. They can browse ability to detect fake reviews over time. As
through these products and select ones new data becomes available and patterns
they are interested in. emerge, the system updates its algorithms
to enhance accuracy and effectiveness.

Review Submission by Users: Users have


the capability to submit reviews for IP Address Tracking: Upon user
products they have used or experienced. interaction with the system, the IP address
They can provide their feedback, ratings, of the user is logged and stored. This
and any additional comments they deem allows the system to uniquely identify each
necessary. user session.

Review Verification: The system employs Detection of Suspicious Activity: The


data mining techniques, implemented system monitors patterns of review
using PHP, to analyze the reviews submissions associated with each IP
submitted by users. This analysis includes address. If it detects multiple instances of
examining various attributes such as fake reviews originating from the same IP
language patterns, sentiment analysis, and address, it flags this IP address for further
other indicators of authenticity. investigation.

Fake Review Detection and Removal: If Alerting the Administrator: Once the
a review is flagged as suspicious or fake system identifies a suspicious IP address
based on the analysis conducted, the with a pattern of fake reviews, it notifies
system takes appropriate action. The the administrator. This alert prompts the
administrator is notified, and the review is administrator to review the flagged IP
either deleted immediately or marked for address and take appropriate action, such
manual review. as removing the fraudulent reviews and
potentially banning the IP address from
further interactions with the system.
Transparency and Accountability: The
system ensures transparency and
accountability by providing users with Enhanced Fraud Prevention: By
visibility into the review process. Users proactively tracking and flagging
can trust that the reviews they read are suspicious IP addresses, the system
strengthens its ability to prevent fraudulent - Admin will remove the
activities such as fake review spamming. review which tracked
This proactive approach helps maintain the by the system as fake.
integrity and credibility of the platform's 2. User Login: User will login to the
review system. system using his user ID and
password.
 View product:
User Privacy Considerations: It's - User will view
important to note that while the system product.
tracks IP addresses for fraud detection  Post Review:
purposes, it also respects user privacy. IP - User can post review
addresses are handled securely and in about the product.
accordance with relevant privacy  Tracks IP Address:
regulations to ensure user data protection. - If the system finds a
review is fake it will
- inform the admin to
remove the fake
By implementing IP address tracking
review.
and fraud detection mechanisms, the
system adds an extra layer of security
and reliability to its review management
process, fostering a more trustworthy
Software Requirements:
online environment for both users and Windows 7 or higher
administrators. WAMP Server
Notepad++
My SQL 5.6
Modules:

Hardware Components:
The system comprises of 2 major
modules with their sub-modules as Processor – Dual Core
follows: Hard Disk – 50 GB
Memory – 1GB RAM

1. Admin Login: Admin login to the


system using his admin ID and Advantages:
password.
 Add product:
- Admin will add Access to Genuine Reviews: By tracking
product to the system. IP addresses and employing robust
 Delete Review: fraud detection mechanisms, the system
ensures that users have access to
genuine and authentic reviews about
products. This instills confidence in
users, allowing them to make informed
purchasing decisions based on reliable Application:
feedback from other consumers.

This application is designed to cater to


User Engagement and Feedback: The individuals who prioritize making
system facilitates user interaction by informed purchasing decisions and seek
allowing them to post their own reviews high-quality products that offer value
about products they have experienced. for their money. Here's how different
This fosters a sense of community and groups of people can benefit from using
trust among users, as they can share this application:
their opinions and insights with others,
contributing to a rich and dynamic
review ecosystem. Discerning Consumers: The application
is ideal for discerning consumers who
Enhanced Consumer Protection: With prioritize authenticity and reliability
access to genuine reviews, users can when it comes to product reviews. These
confidently invest their money in individuals are keen on understanding
products that are highly rated and the experiences of other users before
recommended by fellow consumers. making a purchase decision. By
This promotes consumer protection by accessing genuine reviews, they can
reducing the risk of purchasing low- confidently invest their money in
quality or misrepresented products, products that align with their needs and
ultimately leading to greater satisfaction preferences, ultimately enhancing their
with their purchases. overall shopping experience.

Disadvantages: Tech-Savvy Shoppers: Tech-savvy


shoppers who are accustomed to
leveraging digital platforms for product
research and comparison will find this
Limitations in Fraud Detection: While
application particularly valuable. With
IP address tracking is an effective
its user-friendly interface and robust
method for detecting fake reviews, it is
fraud detection mechanisms, the
not foolproof. If individuals or entities
application offers a seamless and
employ tactics such as using different IP
efficient way to access reliable product
addresses or proxy servers to submit
reviews, empowering users to make
fake reviews, the system may fail to
well-informed choices while navigating
accurately track and identify fraudulent
the vast landscape of online shopping.
activity. This loophole could potentially
undermine the integrity of the review
system and lead to the proliferation of
Budget-Conscious Buyers: Budget-
fake reviews.
conscious buyers who prioritize getting
the best value for their money can
benefit greatly from this application. By
accessing genuine reviews, these
individuals can avoid falling victim to
misleading or exaggerated product
claims and instead invest in products
that deliver on their promises. This not
only helps them save money in the long
run but also ensures that their
purchases meet their expectations in
terms of quality and performance.

Online Shoppers: With the increasing


REFERENCES:
popularity of online shopping, this
application caters to a wide audience of
online shoppers who rely on digital
platforms for their purchasing needs. Ott, Myle, Yejin Choi, Claire Cardie,
Whether they are browsing for and Jeffrey T. Hancock. "Finding
electronics, clothing, household goods, deceptive opinion spam by any stretch
or any other product category, users can of the imagination." In Proceedings of
turn to this application to access the 49th Annual Meeting of the
authentic reviews from fellow Association for Computational
consumers, enabling them to make Linguistics: Human Language
confident and informed decisions Technologies, pp. 309-319. 2011.
throughout their online shopping
journey.
Jindal, Nitin, and Bing Liu. "Opinion
spam and analysis." In Proceedings of
In summary, this application serves as a the 2008 International Conference on
valuable resource for individuals who Web Search and Data Mining, pp. 219-
prioritize value, authenticity, and 230. 2008.
reliability when it comes to making
purchasing decisions. By providing
access to genuine product reviews and Mukherjee, Arjun, and Bing Liu.
empowering users to navigate the "Spotting fake reviewer groups in
complexities of online shopping with consumer reviews." In Proceedings of
confidence, the application enhances the the 21st international conference on
overall shopping experience and World Wide Web, pp. 191-200. 2012.
promotes consumer satisfaction and
trust.
Zhou, Deyu, Sargur N. Srihari, and Jia
Li. "A unified framework for
authorship analysis in cross-domain
settings." In Proceedings of the 26th
Annual International ACM SIGIR
Conference on Research and
Development in Information Retrieval,
pp. 233-240. 2003.

Mukherjee, Arjun, Vivek


Venkataraman, Bing Liu, and Natalie S.
Glance. "What yelp fake review filter
might be doing?." In Proceedings of the
2013 conference on empirical methods
in natural language processing, pp. 198-
206. 2013.

Xu, Feng, and Jinpeng Wang.


"Detection of deceptive reviews using
lexical and syntactic features." In
Proceedings of the 23rd International
Conference on Computational
Linguistics, pp. 309-317. 2010.

Luca, Michael, and Georgios Zervas.


"Fake it till you make it: Reputation,
competition, and Yelp review fraud."
Management Science 62, no. 12 (2016):
3412-3427.

These references cover various aspects


of detecting, analyzing, and combating
fake reviews using data mining
techniques. While not all specifically
focus on implementation in PHP, they
provide valuable insights and
methodologies that can be adapted and
implemented using PHP or any other
programming language.

You might also like