Abstract

Malicious users are a threat to many sites and defending against them demands innovative countermeasures. When malicious users join sites, they provide limited information about themselves. With this limited information, sites can find it difficult to distinguish between a malicious user and a normal user. In this study, we develop a methodology that identifies malicious users with limited information. As information provided by malicious users can vary, the proposed methodology utilizes minimum information to identify malicious users. It is shown that as little as 10 bits of information can help greatly in this challenging task. The experiments results verify that this methodology is effective in identifying malicious users in the realistic scenario of limited information availability.

Original languageEnglish (US)
Title of host publicationInternational Conference on Information and Knowledge Management, Proceedings
PublisherAssociation for Computing Machinery
Pages423-431
Number of pages9
Volume19-23-Oct-2015
ISBN (Print)9781450337946
DOIs
StatePublished - Oct 17 2015
Event24th ACM International Conference on Information and Knowledge Management, CIKM 2015 - Melbourne, Australia
Duration: Oct 19 2015Oct 23 2015

Other

Other24th ACM International Conference on Information and Knowledge Management, CIKM 2015
CountryAustralia
CityMelbourne
Period10/19/1510/23/15

Fingerprint

Surprise
Limited information
Methodology
Countermeasures
Scenarios
Threat
Join
Experiment

Keywords

  • Behavior analysis
  • Information verification
  • Malicious user detection
  • Minimum information

ASJC Scopus subject areas

  • Business, Management and Accounting(all)
  • Decision Sciences(all)

Cite this

Zafarani, R., & Liu, H. (2015). 10 bits of surprise: Detecting malicious users with minimum information. In International Conference on Information and Knowledge Management, Proceedings (Vol. 19-23-Oct-2015, pp. 423-431). Association for Computing Machinery. https://doi.org/10.1145/2806416.2806535

10 bits of surprise : Detecting malicious users with minimum information. / Zafarani, Reza; Liu, Huan.

International Conference on Information and Knowledge Management, Proceedings. Vol. 19-23-Oct-2015 Association for Computing Machinery, 2015. p. 423-431.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zafarani, R & Liu, H 2015, 10 bits of surprise: Detecting malicious users with minimum information. in International Conference on Information and Knowledge Management, Proceedings. vol. 19-23-Oct-2015, Association for Computing Machinery, pp. 423-431, 24th ACM International Conference on Information and Knowledge Management, CIKM 2015, Melbourne, Australia, 10/19/15. https://doi.org/10.1145/2806416.2806535
Zafarani R, Liu H. 10 bits of surprise: Detecting malicious users with minimum information. In International Conference on Information and Knowledge Management, Proceedings. Vol. 19-23-Oct-2015. Association for Computing Machinery. 2015. p. 423-431 https://doi.org/10.1145/2806416.2806535
Zafarani, Reza ; Liu, Huan. / 10 bits of surprise : Detecting malicious users with minimum information. International Conference on Information and Knowledge Management, Proceedings. Vol. 19-23-Oct-2015 Association for Computing Machinery, 2015. pp. 423-431
@inproceedings{a026e5d3d02b40059673f6fbf4f50dc4,
title = "10 bits of surprise: Detecting malicious users with minimum information",
abstract = "Malicious users are a threat to many sites and defending against them demands innovative countermeasures. When malicious users join sites, they provide limited information about themselves. With this limited information, sites can find it difficult to distinguish between a malicious user and a normal user. In this study, we develop a methodology that identifies malicious users with limited information. As information provided by malicious users can vary, the proposed methodology utilizes minimum information to identify malicious users. It is shown that as little as 10 bits of information can help greatly in this challenging task. The experiments results verify that this methodology is effective in identifying malicious users in the realistic scenario of limited information availability.",
keywords = "Behavior analysis, Information verification, Malicious user detection, Minimum information",
author = "Reza Zafarani and Huan Liu",
year = "2015",
month = "10",
day = "17",
doi = "10.1145/2806416.2806535",
language = "English (US)",
isbn = "9781450337946",
volume = "19-23-Oct-2015",
pages = "423--431",
booktitle = "International Conference on Information and Knowledge Management, Proceedings",
publisher = "Association for Computing Machinery",

}

TY - GEN

T1 - 10 bits of surprise

T2 - Detecting malicious users with minimum information

AU - Zafarani, Reza

AU - Liu, Huan

PY - 2015/10/17

Y1 - 2015/10/17

N2 - Malicious users are a threat to many sites and defending against them demands innovative countermeasures. When malicious users join sites, they provide limited information about themselves. With this limited information, sites can find it difficult to distinguish between a malicious user and a normal user. In this study, we develop a methodology that identifies malicious users with limited information. As information provided by malicious users can vary, the proposed methodology utilizes minimum information to identify malicious users. It is shown that as little as 10 bits of information can help greatly in this challenging task. The experiments results verify that this methodology is effective in identifying malicious users in the realistic scenario of limited information availability.

AB - Malicious users are a threat to many sites and defending against them demands innovative countermeasures. When malicious users join sites, they provide limited information about themselves. With this limited information, sites can find it difficult to distinguish between a malicious user and a normal user. In this study, we develop a methodology that identifies malicious users with limited information. As information provided by malicious users can vary, the proposed methodology utilizes minimum information to identify malicious users. It is shown that as little as 10 bits of information can help greatly in this challenging task. The experiments results verify that this methodology is effective in identifying malicious users in the realistic scenario of limited information availability.

KW - Behavior analysis

KW - Information verification

KW - Malicious user detection

KW - Minimum information

UR - http://www.scopus.com/inward/record.url?scp=84958256156&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84958256156&partnerID=8YFLogxK

U2 - 10.1145/2806416.2806535

DO - 10.1145/2806416.2806535

M3 - Conference contribution

AN - SCOPUS:84958256156

SN - 9781450337946

VL - 19-23-Oct-2015

SP - 423

EP - 431

BT - International Conference on Information and Knowledge Management, Proceedings

PB - Association for Computing Machinery

ER -