TY - GEN
T1 - 10 bits of surprise
T2 - 24th ACM International Conference on Information and Knowledge Management, CIKM 2015
AU - Zafarani, Reza
AU - Liu, Huan
N1 - Publisher Copyright: © 2015 ACM.
PY - 2015/10/17
Y1 - 2015/10/17
N2 - Malicious users are a threat to many sites and defending against them demands innovative countermeasures. When malicious users join sites, they provide limited information about themselves. With this limited information, sites can find it difficult to distinguish between a malicious user and a normal user. In this study, we develop a methodology that identifies malicious users with limited information. As information provided by malicious users can vary, the proposed methodology utilizes minimum information to identify malicious users. It is shown that as little as 10 bits of information can help greatly in this challenging task. The experiments results verify that this methodology is effective in identifying malicious users in the realistic scenario of limited information availability.
AB - Malicious users are a threat to many sites and defending against them demands innovative countermeasures. When malicious users join sites, they provide limited information about themselves. With this limited information, sites can find it difficult to distinguish between a malicious user and a normal user. In this study, we develop a methodology that identifies malicious users with limited information. As information provided by malicious users can vary, the proposed methodology utilizes minimum information to identify malicious users. It is shown that as little as 10 bits of information can help greatly in this challenging task. The experiments results verify that this methodology is effective in identifying malicious users in the realistic scenario of limited information availability.
KW - Behavior analysis
KW - Information verification
KW - Malicious user detection
KW - Minimum information
UR - http://www.scopus.com/inward/record.url?scp=84958256156&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84958256156&partnerID=8YFLogxK
U2 - 10.1145/2806416.2806535
DO - 10.1145/2806416.2806535
M3 - Conference contribution
T3 - International Conference on Information and Knowledge Management, Proceedings
SP - 423
EP - 431
BT - CIKM 2015 - Proceedings of the 24th ACM International Conference on Information and Knowledge Management
PB - Association for Computing Machinery
Y2 - 19 October 2015 through 23 October 2015
ER -