Malicious users are a threat to many sites and defending against them demands innovative countermeasures. When malicious users join sites, they provide limited information about themselves. With this limited information, sites can find it difficult to distinguish between a malicious user and a normal user. In this study, we develop a methodology that identifies malicious users with limited information. As information provided by malicious users can vary, the proposed methodology utilizes minimum information to identify malicious users. It is shown that as little as 10 bits of information can help greatly in this challenging task. The experiments results verify that this methodology is effective in identifying malicious users in the realistic scenario of limited information availability.

Original languageEnglish (US)
Title of host publicationInternational Conference on Information and Knowledge Management, Proceedings
PublisherAssociation for Computing Machinery
Number of pages9
ISBN (Print)9781450337946
StatePublished - Oct 17 2015
Event24th ACM International Conference on Information and Knowledge Management, CIKM 2015 - Melbourne, Australia
Duration: Oct 19 2015Oct 23 2015


Other24th ACM International Conference on Information and Knowledge Management, CIKM 2015


  • Behavior analysis
  • Information verification
  • Malicious user detection
  • Minimum information

ASJC Scopus subject areas

  • Business, Management and Accounting(all)
  • Decision Sciences(all)


Dive into the research topics of '10 bits of surprise: Detecting malicious users with minimum information'. Together they form a unique fingerprint.

Cite this