Securing Behavior-based Opinion Spam Detection

Size: px
Start display at page:

Download "Securing Behavior-based Opinion Spam Detection"

Transcription

1 Securing Behavior-based Opinion Spam Detection Shuaijun Ge, Guiiang Ma, Sihong Xie and Philip S. Yu Dec 13,

2 Fake reviews? 2

3 Online reviews Source: based on a pool of representative sample of 1,031 US-based consumers 3

4 The challenges Source: based on a pool of representative sample of 1,031 US-based consumers 4

5 Eisting efforts Outcome Eplanations ReviewMeta.com 1. Feature engineering 2. Detection models Help make decision 5

6 Detection ratio of SR number of reviews rating Time series motif finding Graphical models Language models Detection outcomes time Features Time series Graphs Tets Evade Data Pollute 6

7 Spamming Account Detection Deviation from avg g Linear model g Spammers Normal users Attack gradient False positive Number of 5-star posts per day 7

8 Accessing knowledge of detector (publications) What yelp fake review filter might be doing, ICWSM, 2013 Deviation from avg Number of 5-star posts per day ma # of review per day Positive ratio Review length Rating deviation Maimum content 8 similarity

9 Accessing knowledge of detector (Detection websites) Deviation from avg 0.7 Number of 5-star posts per day 9

10 Accessing knowledge of detector (Released data) Deviation from avg g Number of 5-star posts per day 10

11 To defend: need to generate the attacks. Deviation from avg g Linear model Actionable? Attack parameters: # of 5-star per day = 4 Dev from avg = 0.5 Number of 5-star posts per day 11

12 To defend: need to generate the attacks. How? Actionable attack 3 post 4 per day post 1 per day post 1 per day Actionable attack 1 post 4 per day post 1 per week Actionable attack 2 post 3 per day Actionable? Attack parameters: # of 5-star per day = 4 Dev from avg =

13 Spammer objective function = (risk of being detected) (profit of spamming) Temporal anomalies AVG rating Change in rating Deviation from predicted avg Predicted AVG rating 13

14 Spammer objective function = (risk of being detected) (profit of spamming) Rating distribution anomaly : Background : Rating dist at time t 14

15 Spammer objective function = (risk of being detected) (profit of spamming) Rating distribution anomaly : Rating dist at time t : Rating dist at time t1 15

16 Spammer maimizes [risk of being detected profit of spamming] 16

17 Find amout of promotion Manipulated AVG rating Cap of all ratings <= 5 Deviation from predicted avg Predicted promotion >= 0 promotion Temporal change in AVG Organic AVG are set to 80 th percentiles of the corresponding changes estimated from the historic data 17

18 Find a proper amount of promotion in AVG rating Manipulated Large temporal change in AVG? Organic AVG are set to 80 th percentiles of the corresponding changes estimated from the historic data 18

19 find a proper number of spamming ratings Manipulated NR Large incremental in the number of reviews? <= 80 th percentile of historic increments Organic NR Number of spams Large absolute number of reviews? <= 80 th percentile of historic NR 19

20 Compute an evasive rating distribution : Background : Rating dist at time t from the last step Optimal rating distribution found by the dual problem. 20

21 The found evasive rating distribution

22 Fleible attacks generation. Evade time series based detectors E1: NR E2: NR NR E3: NR deviation in AVG rating E4: NR deviation in AVG rating change in AVG rating Evade both time series and rating distribution based detectors E5: KL-DIV E6: KL-DIV change in entropy E9: Ma Entropy change in entropy For short history targets E-A: NR NR change in AVG rating Ma Entropy E-B: NR NR change in AVG rating 22

23 Targets with long review histories Products with >= 1,000 reviews Reviews span more than 37 months (Yelp) / weeks (Amazon) 1,175,088 reviews / 383 products 247,117 reviews / 327 restaurants. Targets with short review histories The remaining products / restaurants are used. Longitudinal data are too sparse for each target. Probe parameters Attack! Probe parameters Attack! Product 1 Long-history data last 5 weeks short-history last 5 weeks Probe parameters Attack! short-history last 5 weeks Product 383 Long-history data last 5 weeks 23

24 Average spams posted by each attack 24

25 Attacking rate (% of windows can be spammed) 25

26 Promotion in ranking per spam 26

27 Secure the detector again Deviation from avg g Linear model Re-trained linear model Spammers Normal users False positive Number of 5-star posts per day g Attack gradient 27

28 Probe parameters Attack simulation Attack in the wild! Target First 30 weeks last 5 weeks Model re-training Pooling (DETER) Training data generated from E1 Training data generated from E2 model 1 model 2 Ensemble Training data generated from E9 model 9 28

29 Full information detection / evasion game: single spammer Detector Game 1 Game 2 KL-DIV # of reviews KL-DIV Detector # of reviews Spammer E1 E Spammer E1 E equilibrium

30 W^m W^a W^r EN_A EN_M DETER Ma-min Ma of signals Avg of signals Randomly selection Re-train avg Re-train Ma Re-train Pool Game equilibrium 30

31 W^m W^a W^r EN_A EN_M DETER Ma-min Ma of signals Avg of signals Randomly selection Re-train avg Re-train Ma Re-train Pool Game equilibrium 31

32 Unsupervised Attack agnostic Simple and good performance Good for long and short review histories Can secure the detector! Source codes and data avaiable at:

33 Thank you

Fraud Detection of Mobile Apps

Fraud Detection of Mobile Apps Fraud Detection of Mobile Apps Urmila Aware*, Prof. Amruta Deshmuk** *(Student, Dept of Computer Engineering, Flora Institute Of Technology Pune, Maharashtra, India **( Assistant Professor, Dept of Computer

More information

Method to Study and Analyze Fraud Ranking In Mobile Apps

Method to Study and Analyze Fraud Ranking In Mobile Apps Method to Study and Analyze Fraud Ranking In Mobile Apps Ms. Priyanka R. Patil M.Tech student Marri Laxman Reddy Institute of Technology & Management Hyderabad. Abstract: Ranking fraud in the mobile App

More information

Detecting Opinion Spammer Groups through Community Discovery and Sentiment Analysis

Detecting Opinion Spammer Groups through Community Discovery and Sentiment Analysis Detecting Opinion Spammer Groups through Community Discovery and Sentiment Analysis Euijin Choo 1, Ting Yu 1,2, and Min Chi 1 1 North Carolina State University echoo,tyu,mchi@ncsu.edu, 2 Qatar Computing

More information

NeighborWatcher: A Content-Agnostic Comment Spam Inference System

NeighborWatcher: A Content-Agnostic Comment Spam Inference System NeighborWatcher: A Content-Agnostic Comment Spam Inference System Jialong Zhang and Guofei Gu Secure Communication and Computer Systems Lab Department of Computer Science & Engineering Texas A&M University

More information

AI AND CYBERSECURITY APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN SECURITY UNDERSTANDING AND DEFENDING AGAINST ADVERSARIAL AI

AI AND CYBERSECURITY APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN SECURITY UNDERSTANDING AND DEFENDING AGAINST ADVERSARIAL AI SESSION ID: SPO2-T07 AI AND CYBERSECURITY APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN SECURITY UNDERSTANDING AND DEFENDING AGAINST ADVERSARIAL AI Sridhar Muppidi IBM Fellow and VP Technology IBM Security

More information

Spamming Botnets: Signatures and Characteristics

Spamming Botnets: Signatures and Characteristics Spamming Botnets: Signatures and Characteristics Himanshu Jethawa Department of Computer Science Missouri University of Science and Technology hj5y3@mst.edu http://www.sigcomm.org/sites/default/files/ccr/papers/2008/

More information

Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks. Anna Giannakou, Daniel Gunter, Sean Peisert

Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks. Anna Giannakou, Daniel Gunter, Sean Peisert Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks Anna Giannakou, Daniel Gunter, Sean Peisert Research Networks Scientific applications that process large amounts of data

More information

Demands on task recommendation in crowdsourcing platforms the worker s perspective

Demands on task recommendation in crowdsourcing platforms the worker s perspective Demands on task recommendation in crowdsourcing platforms the worker s perspective Survey Design Documentation for RecSys 15 CrowdRec Submission 1. Overall Survey Design The survey shown on the following

More information

Detecting Opinion Spam in Commercial Review Websites

Detecting Opinion Spam in Commercial Review Websites Detecting Opinion Spam in Commercial Review Websites by Huayi Li B.E., Computer Science and Technology, Nanjing Normal University, 2009 THESIS Submitted in partial fulfillment of the requirements for the

More information

DETECTING RESOLVERS AT.NZ. Jing Qiao, Sebastian Castro DNS-OARC 29 Amsterdam, October 2018

DETECTING RESOLVERS AT.NZ. Jing Qiao, Sebastian Castro DNS-OARC 29 Amsterdam, October 2018 DETECTING RESOLVERS AT.NZ Jing Qiao, Sebastian Castro DNS-OARC 29 Amsterdam, October 2018 BACKGROUND DNS-OARC 29 2 DNS TRAFFIC IS NOISY Despite general belief, not all the sources at auth nameserver are

More information

Using Game Theory To Solve Network Security. A brief survey by Willie Cohen

Using Game Theory To Solve Network Security. A brief survey by Willie Cohen Using Game Theory To Solve Network Security A brief survey by Willie Cohen Network Security Overview By default networks are very insecure There are a number of well known methods for securing a network

More information

Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine

Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser Motivation Spam: More than Just a

More information

Strength in Numbers: Robust Tamper Detection in Crowd Computations

Strength in Numbers: Robust Tamper Detection in Crowd Computations Strength in Numbers: Robust Tamper Detection in Crowd Computations Bimal Viswanath MPI-SWS bviswana@mpi-sws.org Simon Bouget IRISA/INRIA Rennes simon.bouget@irisa.fr Aniket Kate Purdue University aniket@purdue.edu

More information

Commtouch Messaging Security for Hosting Providers

Commtouch Messaging Security for Hosting Providers Commtouch Messaging Security for Hosting Providers September 2009 nospam@commtouch.com www.commtouch.com blog.commtouch.com About Commtouch Since 1991 NASDAQ: CTCH Profitable Double digit growth Over 100

More information

Introduction Challenges with using ML Guidelines for using ML Conclusions

Introduction Challenges with using ML Guidelines for using ML Conclusions Introduction Challenges with using ML Guidelines for using ML Conclusions Misuse detection Exact descriptions of known bad behavior Anomaly detection Deviations from profiles of normal behavior First proposed

More information

GENERATIVE ADVERSARIAL NETWORKS (GAN) Presented by Omer Stein and Moran Rubin

GENERATIVE ADVERSARIAL NETWORKS (GAN) Presented by Omer Stein and Moran Rubin GENERATIVE ADVERSARIAL NETWORKS (GAN) Presented by Omer Stein and Moran Rubin GENERATIVE MODEL Given a training dataset, x, try to estimate the distribution, Pdata(x) Explicitly or Implicitly (GAN) Explicitly

More information

Network Security Detection With Data Analytics (PREDATOR)

Network Security Detection With Data Analytics (PREDATOR) CIS-601 Graduate Seminar Network Security Detection With Data Analytics (PREDATOR) PRESENTED BY :RAJAN SHARMA CSU ID: 2659829 GUIDED BY : Dr. SUNNIE CHUNG Overview Introduction Feature Extraction and Machine

More information

Karami, A., Zhou, B. (2015). Online Review Spam Detection by New Linguistic Features. In iconference 2015 Proceedings.

Karami, A., Zhou, B. (2015). Online Review Spam Detection by New Linguistic Features. In iconference 2015 Proceedings. Online Review Spam Detection by New Linguistic Features Amir Karam, University of Maryland Baltimore County Bin Zhou, University of Maryland Baltimore County Karami, A., Zhou, B. (2015). Online Review

More information

DDOS-GUARD Q DDoS Attack Report

DDOS-GUARD Q DDoS Attack Report DDOS-GUARD Q4 2017 DDoS Attack Report 02 12,7% Number of attacks also dropped by 12,7% in comparison with same period in 2016 4613 Total number of DDoS attacks 36,8% Number of attacks dropped by 36.8%

More information

Diverse network environments Dynamic attack landscape Adversarial environment IDS performance strongly depends on chosen classifier

Diverse network environments Dynamic attack landscape Adversarial environment IDS performance strongly depends on chosen classifier Diverse network environments Dynamic attack landscape Adversarial environment IDS performance strongly depends on chosen classifier Perform differently in different environments No Free Lunch Theorem Combine

More information

Defending against Collaborative Attack s in MANET

Defending against Collaborative Attack s in MANET Defending against Collaborative Attack s in MANET Nilesh Patil 1, Sagar Patil 2, Ravindra Raut 3, Vaibhav Thorat 4 1, 2, 3, 4 UG Student, Dept. Of Computer Engineering.,SKN Sinhgad Institute of science

More information

Diffusion Convolutional Recurrent Neural Network: Data-Driven Traffic Forecasting

Diffusion Convolutional Recurrent Neural Network: Data-Driven Traffic Forecasting Diffusion Convolutional Recurrent Neural Network: Data-Driven Traffic Forecasting Yaguang Li Joint work with Rose Yu, Cyrus Shahabi, Yan Liu Page 1 Introduction Traffic congesting is wasteful of time,

More information

Distributed Anomaly Detection using Autoencoder Neural Networks in WSN for IoT

Distributed Anomaly Detection using Autoencoder Neural Networks in WSN for IoT Distributed Anomaly Detection using Autoencoder Neural Networks in WSN for IoT Tony T. Luo, Institute for Infocomm Research, A*STAR, Singapore - https://tonylt.github.io Sai G. Nagarajan, Singapore University

More information

TGNet: Learning to Rank Nodes in Temporal Graphs. Qi Song 1 Bo Zong 2 Yinghui Wu 1,3 Lu-An Tang 2 Hui Zhang 2 Guofei Jiang 2 Haifeng Chen 2

TGNet: Learning to Rank Nodes in Temporal Graphs. Qi Song 1 Bo Zong 2 Yinghui Wu 1,3 Lu-An Tang 2 Hui Zhang 2 Guofei Jiang 2 Haifeng Chen 2 TGNet: Learning to Rank Nodes in Temporal Graphs Qi Song 1 Bo Zong 2 Yinghui Wu 1,3 Lu-An Tang 2 Hui Zhang 2 Guofei Jiang 2 Haifeng Chen 2 1 2 3 Node Ranking in temporal graphs Temporal graphs have been

More information

AUROR: Defending Against Poisoning Attacks in Collaborative Deep Learning Systems

AUROR: Defending Against Poisoning Attacks in Collaborative Deep Learning Systems AUROR: Defending Against Poisoning Attacks in Collaborative Deep Learning Systems Shiqi Shen Shruti Tople Prateek Saxena National University of Singapore {shiqi04, shruti90, prateeks}@comp.nus.edu.sg ABSTRACT

More information

Intermediate 2 - Unit 2 - Practice NAB 1

Intermediate 2 - Unit 2 - Practice NAB 1 Intermediate 2 - Unit 2 - Practice NAB 1 Outcome 1 1. An advertising sign is in the shape of a triangle as shown. Angle ABC= 42, AB = 2m and BC = 2.2m A 2 a) Calculate the area of the sign (3) b) Calculate

More information

Efficient DHT attack mitigation through peers ID distribution

Efficient DHT attack mitigation through peers ID distribution Efficient DHT attack mitigation through peers ID distribution Thibault Cholez, Isabelle Chrisment and Olivier Festor {thibault.cholez, isabelle.chrisment, olivier.festor}@loria.fr LORIA - Campus Scientifique

More information

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection Fighting Spam, Phishing and Malware With Recurrent Pattern Detection White Paper September 2017 www.cyren.com 1 White Paper September 2017 Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

More information

Uncertainty in Software Security Engineering

Uncertainty in Software Security Engineering SSE/Mar0/v8 Uncertainty in Software Security Engineering Da Young Lee, M.A. Vouk, L. Williams () Research Assistant, () Professor Software Security Engineering (SSE) Applied science of risk-based measuring,

More information

With A Little Help From Yelp

With A Little Help From Yelp With A Little Help From Yelp Caitlin Bonnar Computer Science University of Washington cbonnar@cs.uw.edu Felicia Cordeiro Computer Science University of Washington Felicia0@cs.uw.edu Julie Michelman Statistics

More information

Identifying Stepping Stone Attack using Trace Back Based Detection Approach

Identifying Stepping Stone Attack using Trace Back Based Detection Approach International Journal of Security Technology for Smart Device Vol.3, No.1 (2016), pp.15-20 http://dx.doi.org/10.21742/ijstsd.2016.3.1.03 Identifying Stepping Stone Attack using Trace Back Based Detection

More information

Detecting Credential Spearphishing Attacks in Enterprise Settings

Detecting Credential Spearphishing Attacks in Enterprise Settings Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern Paxson, David Wagner 1 Spear Phishing Targeted email that tricks victim into giving

More information

Review on Data Mining Techniques for Intrusion Detection System

Review on Data Mining Techniques for Intrusion Detection System Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,

More information

Detecting Network Performance Anomalies with Contextual Anomaly Detection

Detecting Network Performance Anomalies with Contextual Anomaly Detection Detecting Network Performance Anomalies with Contextual Anomaly Detection Giorgos Dimopoulos *, Pere Barlet-Ros *, Constantine Dovrolis, Ilias Leontiadis * UPC BarcelonaTech, Barcelona, {gd, pbarlet}@ac.upc.edu

More information

Adversarial Machine Learning An Introduction. With slides from: Binghui Wang

Adversarial Machine Learning An Introduction. With slides from: Binghui Wang Adversarial Machine Learning An Introduction With slides from: Binghui Wang Outline Machine Learning (ML) Adversarial ML Attack Taxonomy Capability Adversarial Training Conclusion Outline Machine Learning

More information

GOOGLE ADDS 4 NEW FEATURES TO ITS MY BUSINESS DASHBOARD HTTPS WEBSITES ARE DOMINATING THE FIRST PAGE

GOOGLE ADDS 4 NEW FEATURES TO ITS MY BUSINESS DASHBOARD HTTPS WEBSITES ARE DOMINATING THE FIRST PAGE 1 GOOGLE ADDS 4 NEW FEATURES TO ITS MY BUSINESS DASHBOARD 2 HTTPS WEBSITES ARE DOMINATING THE FIRST PAGE 3 WHY YOU SHOULD BE PAYING MORE ATTENTION TO REVIEWS! 4 BING ROLLS OUT THREE NEW UPDATES FOR ADVERTISERS

More information

CS 229 Final Project - Using machine learning to enhance a collaborative filtering recommendation system for Yelp

CS 229 Final Project - Using machine learning to enhance a collaborative filtering recommendation system for Yelp CS 229 Final Project - Using machine learning to enhance a collaborative filtering recommendation system for Yelp Chris Guthrie Abstract In this paper I present my investigation of machine learning as

More information

Efficiently Representing Uncertainty as Probability Distributions:

Efficiently Representing Uncertainty as Probability Distributions: Page 1 of 9 Efficiently Representing Uncertainty as Probability Distributions: Stochastic Information Packets (SIPs) and Stochastic Library Units With Relationship Preserved (SLURPs) Lone Star Analysis

More information

Outline. Motivation. Our System. Conclusion

Outline. Motivation. Our System. Conclusion Outline Motivation Our System Evaluation Conclusion 1 Botnet A botnet is a collection of bots controlled by a botmaster via a command and control (C&C) channel Centralized C&C, P2P-based C&C Botnets serve

More information

Zero Robotics Autonomous Space Capture Challenge Manual

Zero Robotics Autonomous Space Capture Challenge Manual Zero Robotics Autonomous Space Capture Challenge Manual v1.3 1 Introduction 1.1 Conventions Vectors All vectors in this document are denoted with a bold face font. Of special note is the position vector

More information

Internet Anycast: Performance, Problems and Potential

Internet Anycast: Performance, Problems and Potential Internet Anycast: Performance, Problems and Potential Zhihao Li, Dave Levin, Neil Spring, Bobby Bhattacharjee University of Maryland 1 Anycast is increasingly used DNS root servers: All 13 DNS root servers

More information

March 10 11, 2015 San Jose

March 10 11, 2015 San Jose March 10 11, 2015 San Jose Health monitoring & predictive analytics To lower the TCO in a datacenter Christian B. Madsen & Andrei Khurshudov Engineering Manager & Sr. Director Seagate Technology christian.b.madsen@seagate.com

More information

Detecting Opinion Spammer Groups and Spam Targets through Community Discovery and Sentiment Analysis

Detecting Opinion Spammer Groups and Spam Targets through Community Discovery and Sentiment Analysis Journal of Computer Security (28) IOS Press Detecting Opinion Spammer Groups and Spam Targets through Community Discovery and Sentiment Analysis Euijin Choo a,, Ting Yu b Min Chi c a Qatar Computing Research

More information

Facebook Immune System 人人安全中心姚海阔

Facebook Immune System 人人安全中心姚海阔 Facebook Immune System 人人安全中心姚海阔 Immune A realtime system to protect our users and the social graph Big data, Real time 25B checks per day 650K per second at peak Realtime checks and classifications on

More information

Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits

Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits Carl Sabottke Octavian Suciu Tudor Dumitraș University of Maryland 2 Problem Increasing number

More information

Chapter 4 Section 1 Graphing Linear Inequalities in Two Variables

Chapter 4 Section 1 Graphing Linear Inequalities in Two Variables Chapter 4 Section 1 Graphing Linear Inequalities in Two Variables Epressions of the tpe + 2 8 and 3 > 6 are called linear inequalities in two variables. A solution of a linear inequalit in two variables

More information

Review Spam Detection via Temporal Pattern Discovery

Review Spam Detection via Temporal Pattern Discovery Review Spam Detection via Temporal Pattern Discovery Sihong Xie Guan Wang Shuyang Lin Philip S. Yu Department of Computer Science, University of Illinois at Chicago, Chicago, IL Computer Science Department,

More information

Assignment 1. Question 1: Brock Wilcox CS

Assignment 1. Question 1: Brock Wilcox CS Assignment 1 Brock Wilcox wilcox6@uiuc.edu CS 412 2009-09-30 Question 1: In the introduction chapter, we have introduced different ways to perform data mining: (1) using a data mining language to write

More information

DATA ANALYSIS I. Types of Attributes Sparse, Incomplete, Inaccurate Data

DATA ANALYSIS I. Types of Attributes Sparse, Incomplete, Inaccurate Data DATA ANALYSIS I Types of Attributes Sparse, Incomplete, Inaccurate Data Sources Bramer, M. (2013). Principles of data mining. Springer. [12-21] Witten, I. H., Frank, E. (2011). Data Mining: Practical machine

More information

A Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models

A Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models A Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models Marc Ph. Stoecklin Jean-Yves Le Boudec Andreas Kind

More information

Chapter 4 Imaging Pre-Processing. Comunicação Visual Interactiva

Chapter 4 Imaging Pre-Processing. Comunicação Visual Interactiva Chapter 4 maging Pre-Processing Comunicação Visual nteractiva The need of pre-processing The need of pre-processing n this chapter we are going to stud mage enhacement Realçamento de imagem mage restauration

More information

SPIDeR. A Distributed Multi-Agent Intrusion Detection and Response Framework. Patrick Miller

SPIDeR. A Distributed Multi-Agent Intrusion Detection and Response Framework. Patrick Miller SPIDeR A Distributed Multi-Agent Intrusion Detection and Response Framework Patrick Miller patrick@spider.doriathproject.com Overview Goals Utilize new and existing sensors collaboratively to generate

More information

Chapter 2 Malicious Networks for DDoS Attacks

Chapter 2 Malicious Networks for DDoS Attacks Chapter 2 Malicious Networks for DDoS Attacks Abstract In this chapter, we explore botnet, the engine of DDoS attacks, in cyberspace. We focus on two recent techniques that hackers are using to sustain

More information

Akarsh Pokkunuru EECS Department Contractive Auto-Encoders: Explicit Invariance During Feature Extraction

Akarsh Pokkunuru EECS Department Contractive Auto-Encoders: Explicit Invariance During Feature Extraction Akarsh Pokkunuru EECS Department 03-16-2017 Contractive Auto-Encoders: Explicit Invariance During Feature Extraction 1 AGENDA Introduction to Auto-encoders Types of Auto-encoders Analysis of different

More information

Svincolo di Chiomonte

Svincolo di Chiomonte Installation Notes: Customer: G&C Project Code: Date: Notes: Fila 1_4 Fila 1_5 DESIGNER NAME: Address: Tel.-Fa: Remarks: The lu levels provided b Technical Staff Fael Luce, are considered upon customer

More information

Detecting Malicious Web Links and Identifying Their Attack Types

Detecting Malicious Web Links and Identifying Their Attack Types Detecting Malicious Web Links and Identifying Their Attack Types Anti-Spam Team Cellopoint July 3, 2013 Introduction References A great effort has been directed towards detection of malicious URLs Blacklisting

More information

Graph Sketching. Review: 1) Interval Notation. Set Notation Interval Notation Set Notation Interval Notation. 2) Solving Inequalities

Graph Sketching. Review: 1) Interval Notation. Set Notation Interval Notation Set Notation Interval Notation. 2) Solving Inequalities Lesson. Graph Sketching Review: ) Interval Notation Set Notation Interval Notation Set Notation Interval Notation a) { R / < < 5} b) I (, 3) ( 3, ) c){ R} d) I (, ] (0, ) e){ R / > 5} f) I [ 3,5) ) Solving

More information

CS224W: Social and Information Network Analysis Project Report: Edge Detection in Review Networks

CS224W: Social and Information Network Analysis Project Report: Edge Detection in Review Networks CS224W: Social and Information Network Analysis Project Report: Edge Detection in Review Networks Archana Sulebele, Usha Prabhu, William Yang (Group 29) Keywords: Link Prediction, Review Networks, Adamic/Adar,

More information

Unsupervised Learning. Presenter: Anil Sharma, PhD Scholar, IIIT-Delhi

Unsupervised Learning. Presenter: Anil Sharma, PhD Scholar, IIIT-Delhi Unsupervised Learning Presenter: Anil Sharma, PhD Scholar, IIIT-Delhi Content Motivation Introduction Applications Types of clustering Clustering criterion functions Distance functions Normalization Which

More information

Towards Ensuring Collective Availability in Volatile Resource Pools via Forecasting

Towards Ensuring Collective Availability in Volatile Resource Pools via Forecasting Towards CloudComputing@home: Ensuring Collective Availability in Volatile Resource Pools via Forecasting Artur Andrzejak Berlin (ZIB) andrzejak[at]zib.de Zuse-Institute Derrick Kondo David P. Anderson

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

TriRank: Review-aware Explainable Recommendation by Modeling Aspects

TriRank: Review-aware Explainable Recommendation by Modeling Aspects TriRank: Review-aware Explainable Recommendation by Modeling Aspects Xiangnan He, Tao Chen, Min-Yen Kan, Xiao Chen National University of Singapore Presented by Xiangnan He CIKM 15, Melbourne, Australia

More information

Intrusion Detection and Malware Analysis

Intrusion Detection and Malware Analysis Intrusion Detection and Malware Analysis Anomaly-based IDS Pavel Laskov Wilhelm Schickard Institute for Computer Science Taxonomy of anomaly-based IDS Features: Packet headers Byte streams Syntactic events

More information

Threat Detection and Mitigation for IoT Systems using Self Learning Networks (SLN)

Threat Detection and Mitigation for IoT Systems using Self Learning Networks (SLN) Threat Detection and Mitigation for IoT Systems using Self Learning Networks (SLN) JP Vasseur, PhD - Cisco Fellow jpv@cisco.com Maik G. Seewald, CISSP Sr. Technical Lead maseewal@cisco.com June 2016 Cyber

More information

Problem Analysis and Preprocessing

Problem Analysis and Preprocessing Universität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen Problem Analysis and Preprocessing Paul Prasse, Niels Landwehr, Tobias Scheffer Overview Analysis of learning problems Understanding

More information

Splog Detection Using Self-Similarity Analysis on Blog Temporal Dynamics. Yu-Ru Lin, Hari Sundaram, Yun Chi, Junichi Tatemura and Belle Tseng

Splog Detection Using Self-Similarity Analysis on Blog Temporal Dynamics. Yu-Ru Lin, Hari Sundaram, Yun Chi, Junichi Tatemura and Belle Tseng Splog Detection Using Self-Similarity Analysis on Blog Temporal Dynamics Yu-Ru Lin, Hari Sundaram, Yun Chi, Junichi Tatemura and Belle Tseng NEC Laboratories America, Cupertino, CA AIRWeb Workshop 2007

More information

Enhanced Anti-Spam appliance, Spam grey list mechanism. in VigorPro UTM security/firewall router

Enhanced Anti-Spam appliance, Spam grey list mechanism. in VigorPro UTM security/firewall router Enhanced Anti-Spam appliance, Spam grey list mechanism in VigorPro UTM security/firewall router Greylist background concept: Grey list is developed to strengthen Anti-Spam appliance in DrayTek VigorPro

More information

Module 3 Graphing and Optimization

Module 3 Graphing and Optimization Module 3 Graphing and Optimization One of the most important applications of calculus to real-world problems is in the area of optimization. We will utilize the knowledge gained in the previous chapter,

More information

An Unsupervised Approach for Combining Scores of Outlier Detection Techniques, Based on Similarity Measures

An Unsupervised Approach for Combining Scores of Outlier Detection Techniques, Based on Similarity Measures An Unsupervised Approach for Combining Scores of Outlier Detection Techniques, Based on Similarity Measures José Ramón Pasillas-Díaz, Sylvie Ratté Presenter: Christoforos Leventis 1 Basic concepts Outlier

More information

ANOMALY DETECTION IN COMMUNICTION NETWORKS

ANOMALY DETECTION IN COMMUNICTION NETWORKS Anomaly Detection Summer School Lecture 2014 ANOMALY DETECTION IN COMMUNICTION NETWORKS Prof. D.J.Parish and Francisco Aparicio-Navarro Loughborough University (School of Electronic, Electrical and Systems

More information

deseo: Combating Search-Result Poisoning Yu USF

deseo: Combating Search-Result Poisoning Yu USF deseo: Combating Search-Result Poisoning Yu Jin @MSCS USF Your Google is not SAFE! SEO Poisoning - A new way to spread malware! Why choose SE? 22.4% of Google searches in the top 100 results > 50% for

More information

Clustering. Robert M. Haralick. Computer Science, Graduate Center City University of New York

Clustering. Robert M. Haralick. Computer Science, Graduate Center City University of New York Clustering Robert M. Haralick Computer Science, Graduate Center City University of New York Outline K-means 1 K-means 2 3 4 5 Clustering K-means The purpose of clustering is to determine the similarity

More information

A Flexible Approach to Intrusion Alert Anonymization and Correlation

A Flexible Approach to Intrusion Alert Anonymization and Correlation A Fleible Approach to Intrusion Alert Anonymization and Correlation Dingbang Xu and Peng Ning Cyber Defense aboratory Department of Computer Science North Carolina State University Raleigh, NC 27695-826

More information

CarCareCONNECT. Boost Performance, Grow Your Shop! Your guide to improving your online brand

CarCareCONNECT. Boost Performance, Grow Your Shop! Your guide to improving your online brand CarCareCONNECT Boost Performance, Grow Your Shop! Your guide to improving your online brand ABOUT US YOUR MARKETING PLAN TABLE OF CONTENTS WHAT TO EXPECT PERSONALIZE YOUR WEBSITE LAUNCH YOUR WEBSITE MARKETING

More information

With turing you can: Identify, locate and mitigate the effects of botnets or other malware abusing your infrastructure

With turing you can: Identify, locate and mitigate the effects of botnets or other malware abusing your infrastructure Decoding DNS data If you have a large DNS infrastructure, understanding what is happening with your real-time and historic traffic is difficult, if not impossible. Until now, the available network management

More information

Identifying Fraudulently Promoted Online Videos

Identifying Fraudulently Promoted Online Videos Identifying Fraudulently Promoted Online Videos Vlad Bulakh, Christopher W. Dunn, Minaxi Gupta April 7, 2014 April 7, 2014 Vlad Bulakh 2 Motivation Online video sharing websites are visited by millions

More information

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks An Based on the Temporal-spatial Correlation in Wireless Sensor Networks 1 Department of Computer Science & Technology, Harbin Institute of Technology at Weihai,Weihai, 264209, China E-mail: Liuyang322@hit.edu.cn

More information

EECS490: Digital Image Processing. Lecture #22

EECS490: Digital Image Processing. Lecture #22 Lecture #22 Gold Standard project images Otsu thresholding Local thresholding Region segmentation Watershed segmentation Frequency-domain techniques Project Images 1 Project Images 2 Project Images 3 Project

More information

Robust Collaborative Recommendation

Robust Collaborative Recommendation Robust Collaborative Recommendation Robin Burke and Michael P. O Mahony and Neil J. Hurley Abstract Collaborative recommender systems are vulnerable to malicious users who seek to bias their output, causing

More information

Spotting Fake Reviews via Collective Positive-Unlabeled Learning

Spotting Fake Reviews via Collective Positive-Unlabeled Learning Spotting Fake Reviews via Collective Positive-Unlabeled Learning Huayi Li, Zhiyuan Chen, Bing Liu, Xiaokai Wei and Jidong Shao Department of Computer Science University of Illinois at Chicago, IL, USA

More information

Advanced Filtering. Tobias Eggendorfer

Advanced Filtering. Tobias Eggendorfer Advanced Filtering Advanced Filtering Fails Too Overview Not so advanced Filtering Advanced Filtering Prevention Identification 2 Classic Filtering 3 Classic Filtering Black- & Whitelists 3 Classic Filtering

More information

Supplemental Problems MAT (Prepared by Prof. Urmi Ghosh-Dastidar)

Supplemental Problems MAT (Prepared by Prof. Urmi Ghosh-Dastidar) Supplemental Problems MAT 3770 (Prepared by Prof. Urmi Ghosh-Dastidar) 1. Use Lagrange Multiplier methods to find the stationary values of z: (a) z = y, subject to + y = (b) z = (y+4), subject to + y =

More information

AN ad-hoc network is a group of nodes without requiring

AN ad-hoc network is a group of nodes without requiring 240 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 2, JUNE 2007 Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis Wei

More information

Network Anomaly Detection Using Autonomous System Flow Aggregates

Network Anomaly Detection Using Autonomous System Flow Aggregates Network Anomaly Detection Using Autonomous System Flow Aggregates Thienne Johnson 1,2 and Loukas Lazos 1 1 Department of Electrical and Computer Engineering 2 Department of Computer Science University

More information

Det De e t cting abnormal event n s Jaechul Kim

Det De e t cting abnormal event n s Jaechul Kim Detecting abnormal events Jaechul Kim Purpose Introduce general methodologies used in abnormality detection Deal with technical details of selected papers Abnormal events Easy to verify, but hard to describe

More information

Unconstrained and Constrained Optimization

Unconstrained and Constrained Optimization Unconstrained and Constrained Optimization Agenda General Ideas of Optimization Interpreting the First Derivative Interpreting the Second Derivative Unconstrained Optimization Constrained Optimization

More information

LINEAR PROGRAMMING. Straight line graphs LESSON

LINEAR PROGRAMMING. Straight line graphs LESSON LINEAR PROGRAMMING Traditionall we appl our knowledge of Linear Programming to help us solve real world problems (which is referred to as modelling). Linear Programming is often linked to the field of

More information

4 Linear Programming (LP) E. Amaldi -- Foundations of Operations Research -- Politecnico di Milano 1

4 Linear Programming (LP) E. Amaldi -- Foundations of Operations Research -- Politecnico di Milano 1 4 Linear Programming (LP) E. Amaldi -- Foundations of Operations Research -- Politecnico di Milano 1 Definition: A Linear Programming (LP) problem is an optimization problem: where min f () s.t. X n the

More information

Countering Sparsity and Vulnerabilities in Reputation Systems

Countering Sparsity and Vulnerabilities in Reputation Systems Countering Sparsity and Vulnerabilities in Reputation Systems Li Xiong Department of Mathematics and Computer Science Emory University lxiong@mathcs.emory.edu Ling Liu, Mustaque Ahamad College of Computing

More information

Online Social Networks and Media

Online Social Networks and Media Online Social Networks and Media Absorbing Random Walks Link Prediction Why does the Power Method work? If a matrix R is real and symmetric, it has real eigenvalues and eigenvectors: λ, w, λ 2, w 2,, (λ

More information

Simplex Method. Introduction:

Simplex Method. Introduction: Introduction: Simple Method In the previous chapter, we discussed about the graphical method for solving linear programming problems. Although the graphical method is an invaluable aid to understand the

More information

McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications

McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications Davide Ariu, Igino Corona, Giorgio Giacinto, Fabio Roli University of Cagliari, Dept. of Electrical and

More information

International Journal of Research in Advent Technology, Vol.7, No.3, March 2019 E-ISSN: Available online at

International Journal of Research in Advent Technology, Vol.7, No.3, March 2019 E-ISSN: Available online at Performance Evaluation of Ensemble Method Based Outlier Detection Algorithm Priya. M 1, M. Karthikeyan 2 Department of Computer and Information Science, Annamalai University, Annamalai Nagar, Tamil Nadu,

More information

CS-E5740. Complex Networks. Network analysis: key measures and characteristics

CS-E5740. Complex Networks. Network analysis: key measures and characteristics CS-E5740 Complex Networks Network analysis: key measures and characteristics Course outline 1. Introduction (motivation, definitions, etc. ) 2. Static network models: random and small-world networks 3.

More information

The evolution of malevolence

The evolution of malevolence Detection of spam hosts and spam bots using network traffic modeling Anestis Karasaridis Willa K. Ehrlich, Danielle Liu, David Hoeflin 4/27/2010. All rights reserved. AT&T and the AT&T logo are trademarks

More information

Recommendation System Using Yelp Data CS 229 Machine Learning Jia Le Xu, Yingran Xu

Recommendation System Using Yelp Data CS 229 Machine Learning Jia Le Xu, Yingran Xu Recommendation System Using Yelp Data CS 229 Machine Learning Jia Le Xu, Yingran Xu 1 Introduction Yelp Dataset Challenge provides a large number of user, business and review data which can be used for

More information

Robustness and Accuracy Tradeoffs for Recommender Systems Under Attack

Robustness and Accuracy Tradeoffs for Recommender Systems Under Attack Proceedings of the Twenty-Fifth International Florida Artificial Intelligence Research Society Conference Robustness and Accuracy Tradeoffs for Recommender Systems Under Attack Carlos E. Seminario and

More information

Fault Localization for Firewall Policies

Fault Localization for Firewall Policies Fault Localization for Firewall Policies JeeHyun Hwang 1 Tao Xie 1 Fei Chen Alex X. Liu 1 Department of Computer Science, North Carolina State University, Raleigh, NC 7695-86 Department of Computer Science

More information

95 th Percentile Billing

95 th Percentile Billing 95 th Percentile Billing Amie Elcan, CenturyLink Principal Architect, Data Strategy and Development amie.elcan@centurylink.com Nanog53 Philadelphia, PA October 10, 2011 Outline Internet access usage trends

More information

FortiGuard Antispam. Frequently Asked Questions. High Performance Multi-Threat Security Solutions

FortiGuard Antispam. Frequently Asked Questions. High Performance Multi-Threat Security Solutions FortiGuard Antispam Frequently Asked Questions High Performance Multi-Threat Security Solutions Q: What is FortiGuard Antispam? A: FortiGuard Antispam Subscription Service (FortiGuard Antispam) is the

More information