Abstract
Malicious users are a threat to many sites and defending against them demands innovative countermeasures. When malicious users join sites, they provide limited information about themselves. With this limited information, sites can find it difficult to distinguish between a malicious user and a normal user. In this study, we develop a methodology that identifies malicious users with limited information. As information provided by malicious users can vary, the proposed methodology utilizes minimum information to identify malicious users. It is shown that as little as 10 bits of information can help greatly in this challenging task. The experiments results verify that this methodology is effective in identifying malicious users in the realistic scenario of limited information availability.
Original language | English (US) |
---|---|
Title of host publication | International Conference on Information and Knowledge Management, Proceedings |
Publisher | Association for Computing Machinery |
Pages | 423-431 |
Number of pages | 9 |
Volume | 19-23-Oct-2015 |
ISBN (Print) | 9781450337946 |
DOIs | |
State | Published - Oct 17 2015 |
Event | 24th ACM International Conference on Information and Knowledge Management, CIKM 2015 - Melbourne, Australia Duration: Oct 19 2015 → Oct 23 2015 |
Other
Other | 24th ACM International Conference on Information and Knowledge Management, CIKM 2015 |
---|---|
Country | Australia |
City | Melbourne |
Period | 10/19/15 → 10/23/15 |
Keywords
- Behavior analysis
- Information verification
- Malicious user detection
- Minimum information
ASJC Scopus subject areas
- Business, Management and Accounting(all)
- Decision Sciences(all)