Securing Behavior-based Opinion Spam Detection
|
|
- Rodger Henderson
- 5 years ago
- Views:
Transcription
1 Securing Behavior-based Opinion Spam Detection Shuaijun Ge, Guiiang Ma, Sihong Xie and Philip S. Yu Dec 13,
2 Fake reviews? 2
3 Online reviews Source: based on a pool of representative sample of 1,031 US-based consumers 3
4 The challenges Source: based on a pool of representative sample of 1,031 US-based consumers 4
5 Eisting efforts Outcome Eplanations ReviewMeta.com 1. Feature engineering 2. Detection models Help make decision 5
6 Detection ratio of SR number of reviews rating Time series motif finding Graphical models Language models Detection outcomes time Features Time series Graphs Tets Evade Data Pollute 6
7 Spamming Account Detection Deviation from avg g Linear model g Spammers Normal users Attack gradient False positive Number of 5-star posts per day 7
8 Accessing knowledge of detector (publications) What yelp fake review filter might be doing, ICWSM, 2013 Deviation from avg Number of 5-star posts per day ma # of review per day Positive ratio Review length Rating deviation Maimum content 8 similarity
9 Accessing knowledge of detector (Detection websites) Deviation from avg 0.7 Number of 5-star posts per day 9
10 Accessing knowledge of detector (Released data) Deviation from avg g Number of 5-star posts per day 10
11 To defend: need to generate the attacks. Deviation from avg g Linear model Actionable? Attack parameters: # of 5-star per day = 4 Dev from avg = 0.5 Number of 5-star posts per day 11
12 To defend: need to generate the attacks. How? Actionable attack 3 post 4 per day post 1 per day post 1 per day Actionable attack 1 post 4 per day post 1 per week Actionable attack 2 post 3 per day Actionable? Attack parameters: # of 5-star per day = 4 Dev from avg =
13 Spammer objective function = (risk of being detected) (profit of spamming) Temporal anomalies AVG rating Change in rating Deviation from predicted avg Predicted AVG rating 13
14 Spammer objective function = (risk of being detected) (profit of spamming) Rating distribution anomaly : Background : Rating dist at time t 14
15 Spammer objective function = (risk of being detected) (profit of spamming) Rating distribution anomaly : Rating dist at time t : Rating dist at time t1 15
16 Spammer maimizes [risk of being detected profit of spamming] 16
17 Find amout of promotion Manipulated AVG rating Cap of all ratings <= 5 Deviation from predicted avg Predicted promotion >= 0 promotion Temporal change in AVG Organic AVG are set to 80 th percentiles of the corresponding changes estimated from the historic data 17
18 Find a proper amount of promotion in AVG rating Manipulated Large temporal change in AVG? Organic AVG are set to 80 th percentiles of the corresponding changes estimated from the historic data 18
19 find a proper number of spamming ratings Manipulated NR Large incremental in the number of reviews? <= 80 th percentile of historic increments Organic NR Number of spams Large absolute number of reviews? <= 80 th percentile of historic NR 19
20 Compute an evasive rating distribution : Background : Rating dist at time t from the last step Optimal rating distribution found by the dual problem. 20
21 The found evasive rating distribution
22 Fleible attacks generation. Evade time series based detectors E1: NR E2: NR NR E3: NR deviation in AVG rating E4: NR deviation in AVG rating change in AVG rating Evade both time series and rating distribution based detectors E5: KL-DIV E6: KL-DIV change in entropy E9: Ma Entropy change in entropy For short history targets E-A: NR NR change in AVG rating Ma Entropy E-B: NR NR change in AVG rating 22
23 Targets with long review histories Products with >= 1,000 reviews Reviews span more than 37 months (Yelp) / weeks (Amazon) 1,175,088 reviews / 383 products 247,117 reviews / 327 restaurants. Targets with short review histories The remaining products / restaurants are used. Longitudinal data are too sparse for each target. Probe parameters Attack! Probe parameters Attack! Product 1 Long-history data last 5 weeks short-history last 5 weeks Probe parameters Attack! short-history last 5 weeks Product 383 Long-history data last 5 weeks 23
24 Average spams posted by each attack 24
25 Attacking rate (% of windows can be spammed) 25
26 Promotion in ranking per spam 26
27 Secure the detector again Deviation from avg g Linear model Re-trained linear model Spammers Normal users False positive Number of 5-star posts per day g Attack gradient 27
28 Probe parameters Attack simulation Attack in the wild! Target First 30 weeks last 5 weeks Model re-training Pooling (DETER) Training data generated from E1 Training data generated from E2 model 1 model 2 Ensemble Training data generated from E9 model 9 28
29 Full information detection / evasion game: single spammer Detector Game 1 Game 2 KL-DIV # of reviews KL-DIV Detector # of reviews Spammer E1 E Spammer E1 E equilibrium
30 W^m W^a W^r EN_A EN_M DETER Ma-min Ma of signals Avg of signals Randomly selection Re-train avg Re-train Ma Re-train Pool Game equilibrium 30
31 W^m W^a W^r EN_A EN_M DETER Ma-min Ma of signals Avg of signals Randomly selection Re-train avg Re-train Ma Re-train Pool Game equilibrium 31
32 Unsupervised Attack agnostic Simple and good performance Good for long and short review histories Can secure the detector! Source codes and data avaiable at:
33 Thank you
Fraud Detection of Mobile Apps
Fraud Detection of Mobile Apps Urmila Aware*, Prof. Amruta Deshmuk** *(Student, Dept of Computer Engineering, Flora Institute Of Technology Pune, Maharashtra, India **( Assistant Professor, Dept of Computer
More informationMethod to Study and Analyze Fraud Ranking In Mobile Apps
Method to Study and Analyze Fraud Ranking In Mobile Apps Ms. Priyanka R. Patil M.Tech student Marri Laxman Reddy Institute of Technology & Management Hyderabad. Abstract: Ranking fraud in the mobile App
More informationDetecting Opinion Spammer Groups through Community Discovery and Sentiment Analysis
Detecting Opinion Spammer Groups through Community Discovery and Sentiment Analysis Euijin Choo 1, Ting Yu 1,2, and Min Chi 1 1 North Carolina State University echoo,tyu,mchi@ncsu.edu, 2 Qatar Computing
More informationNeighborWatcher: A Content-Agnostic Comment Spam Inference System
NeighborWatcher: A Content-Agnostic Comment Spam Inference System Jialong Zhang and Guofei Gu Secure Communication and Computer Systems Lab Department of Computer Science & Engineering Texas A&M University
More informationAI AND CYBERSECURITY APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN SECURITY UNDERSTANDING AND DEFENDING AGAINST ADVERSARIAL AI
SESSION ID: SPO2-T07 AI AND CYBERSECURITY APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN SECURITY UNDERSTANDING AND DEFENDING AGAINST ADVERSARIAL AI Sridhar Muppidi IBM Fellow and VP Technology IBM Security
More informationSpamming Botnets: Signatures and Characteristics
Spamming Botnets: Signatures and Characteristics Himanshu Jethawa Department of Computer Science Missouri University of Science and Technology hj5y3@mst.edu http://www.sigcomm.org/sites/default/files/ccr/papers/2008/
More informationFlowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks. Anna Giannakou, Daniel Gunter, Sean Peisert
Flowzilla: A Methodology for Detecting Data Transfer Anomalies in Research Networks Anna Giannakou, Daniel Gunter, Sean Peisert Research Networks Scientific applications that process large amounts of data
More informationDemands on task recommendation in crowdsourcing platforms the worker s perspective
Demands on task recommendation in crowdsourcing platforms the worker s perspective Survey Design Documentation for RecSys 15 CrowdRec Submission 1. Overall Survey Design The survey shown on the following
More informationDetecting Opinion Spam in Commercial Review Websites
Detecting Opinion Spam in Commercial Review Websites by Huayi Li B.E., Computer Science and Technology, Nanjing Normal University, 2009 THESIS Submitted in partial fulfillment of the requirements for the
More informationDETECTING RESOLVERS AT.NZ. Jing Qiao, Sebastian Castro DNS-OARC 29 Amsterdam, October 2018
DETECTING RESOLVERS AT.NZ Jing Qiao, Sebastian Castro DNS-OARC 29 Amsterdam, October 2018 BACKGROUND DNS-OARC 29 2 DNS TRAFFIC IS NOISY Despite general belief, not all the sources at auth nameserver are
More informationUsing Game Theory To Solve Network Security. A brief survey by Willie Cohen
Using Game Theory To Solve Network Security A brief survey by Willie Cohen Network Security Overview By default networks are very insecure There are a number of well known methods for securing a network
More informationDetecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser Motivation Spam: More than Just a
More informationStrength in Numbers: Robust Tamper Detection in Crowd Computations
Strength in Numbers: Robust Tamper Detection in Crowd Computations Bimal Viswanath MPI-SWS bviswana@mpi-sws.org Simon Bouget IRISA/INRIA Rennes simon.bouget@irisa.fr Aniket Kate Purdue University aniket@purdue.edu
More informationCommtouch Messaging Security for Hosting Providers
Commtouch Messaging Security for Hosting Providers September 2009 nospam@commtouch.com www.commtouch.com blog.commtouch.com About Commtouch Since 1991 NASDAQ: CTCH Profitable Double digit growth Over 100
More informationIntroduction Challenges with using ML Guidelines for using ML Conclusions
Introduction Challenges with using ML Guidelines for using ML Conclusions Misuse detection Exact descriptions of known bad behavior Anomaly detection Deviations from profiles of normal behavior First proposed
More informationGENERATIVE ADVERSARIAL NETWORKS (GAN) Presented by Omer Stein and Moran Rubin
GENERATIVE ADVERSARIAL NETWORKS (GAN) Presented by Omer Stein and Moran Rubin GENERATIVE MODEL Given a training dataset, x, try to estimate the distribution, Pdata(x) Explicitly or Implicitly (GAN) Explicitly
More informationNetwork Security Detection With Data Analytics (PREDATOR)
CIS-601 Graduate Seminar Network Security Detection With Data Analytics (PREDATOR) PRESENTED BY :RAJAN SHARMA CSU ID: 2659829 GUIDED BY : Dr. SUNNIE CHUNG Overview Introduction Feature Extraction and Machine
More informationKarami, A., Zhou, B. (2015). Online Review Spam Detection by New Linguistic Features. In iconference 2015 Proceedings.
Online Review Spam Detection by New Linguistic Features Amir Karam, University of Maryland Baltimore County Bin Zhou, University of Maryland Baltimore County Karami, A., Zhou, B. (2015). Online Review
More informationDDOS-GUARD Q DDoS Attack Report
DDOS-GUARD Q4 2017 DDoS Attack Report 02 12,7% Number of attacks also dropped by 12,7% in comparison with same period in 2016 4613 Total number of DDoS attacks 36,8% Number of attacks dropped by 36.8%
More informationDiverse network environments Dynamic attack landscape Adversarial environment IDS performance strongly depends on chosen classifier
Diverse network environments Dynamic attack landscape Adversarial environment IDS performance strongly depends on chosen classifier Perform differently in different environments No Free Lunch Theorem Combine
More informationDefending against Collaborative Attack s in MANET
Defending against Collaborative Attack s in MANET Nilesh Patil 1, Sagar Patil 2, Ravindra Raut 3, Vaibhav Thorat 4 1, 2, 3, 4 UG Student, Dept. Of Computer Engineering.,SKN Sinhgad Institute of science
More informationDiffusion Convolutional Recurrent Neural Network: Data-Driven Traffic Forecasting
Diffusion Convolutional Recurrent Neural Network: Data-Driven Traffic Forecasting Yaguang Li Joint work with Rose Yu, Cyrus Shahabi, Yan Liu Page 1 Introduction Traffic congesting is wasteful of time,
More informationDistributed Anomaly Detection using Autoencoder Neural Networks in WSN for IoT
Distributed Anomaly Detection using Autoencoder Neural Networks in WSN for IoT Tony T. Luo, Institute for Infocomm Research, A*STAR, Singapore - https://tonylt.github.io Sai G. Nagarajan, Singapore University
More informationTGNet: Learning to Rank Nodes in Temporal Graphs. Qi Song 1 Bo Zong 2 Yinghui Wu 1,3 Lu-An Tang 2 Hui Zhang 2 Guofei Jiang 2 Haifeng Chen 2
TGNet: Learning to Rank Nodes in Temporal Graphs Qi Song 1 Bo Zong 2 Yinghui Wu 1,3 Lu-An Tang 2 Hui Zhang 2 Guofei Jiang 2 Haifeng Chen 2 1 2 3 Node Ranking in temporal graphs Temporal graphs have been
More informationAUROR: Defending Against Poisoning Attacks in Collaborative Deep Learning Systems
AUROR: Defending Against Poisoning Attacks in Collaborative Deep Learning Systems Shiqi Shen Shruti Tople Prateek Saxena National University of Singapore {shiqi04, shruti90, prateeks}@comp.nus.edu.sg ABSTRACT
More informationIntermediate 2 - Unit 2 - Practice NAB 1
Intermediate 2 - Unit 2 - Practice NAB 1 Outcome 1 1. An advertising sign is in the shape of a triangle as shown. Angle ABC= 42, AB = 2m and BC = 2.2m A 2 a) Calculate the area of the sign (3) b) Calculate
More informationEfficient DHT attack mitigation through peers ID distribution
Efficient DHT attack mitigation through peers ID distribution Thibault Cholez, Isabelle Chrisment and Olivier Festor {thibault.cholez, isabelle.chrisment, olivier.festor}@loria.fr LORIA - Campus Scientifique
More informationFighting Spam, Phishing and Malware With Recurrent Pattern Detection
Fighting Spam, Phishing and Malware With Recurrent Pattern Detection White Paper September 2017 www.cyren.com 1 White Paper September 2017 Fighting Spam, Phishing and Malware With Recurrent Pattern Detection
More informationUncertainty in Software Security Engineering
SSE/Mar0/v8 Uncertainty in Software Security Engineering Da Young Lee, M.A. Vouk, L. Williams () Research Assistant, () Professor Software Security Engineering (SSE) Applied science of risk-based measuring,
More informationWith A Little Help From Yelp
With A Little Help From Yelp Caitlin Bonnar Computer Science University of Washington cbonnar@cs.uw.edu Felicia Cordeiro Computer Science University of Washington Felicia0@cs.uw.edu Julie Michelman Statistics
More informationIdentifying Stepping Stone Attack using Trace Back Based Detection Approach
International Journal of Security Technology for Smart Device Vol.3, No.1 (2016), pp.15-20 http://dx.doi.org/10.21742/ijstsd.2016.3.1.03 Identifying Stepping Stone Attack using Trace Back Based Detection
More informationDetecting Credential Spearphishing Attacks in Enterprise Settings
Detecting Credential Spearphishing Attacks in Enterprise Settings Grant Ho UC Berkeley Aashish Sharma, Mobin Javed, Vern Paxson, David Wagner 1 Spear Phishing Targeted email that tricks victim into giving
More informationReview on Data Mining Techniques for Intrusion Detection System
Review on Data Mining Techniques for Intrusion Detection System Sandeep D 1, M. S. Chaudhari 2 Research Scholar, Dept. of Computer Science, P.B.C.E, Nagpur, India 1 HoD, Dept. of Computer Science, P.B.C.E,
More informationDetecting Network Performance Anomalies with Contextual Anomaly Detection
Detecting Network Performance Anomalies with Contextual Anomaly Detection Giorgos Dimopoulos *, Pere Barlet-Ros *, Constantine Dovrolis, Ilias Leontiadis * UPC BarcelonaTech, Barcelona, {gd, pbarlet}@ac.upc.edu
More informationAdversarial Machine Learning An Introduction. With slides from: Binghui Wang
Adversarial Machine Learning An Introduction With slides from: Binghui Wang Outline Machine Learning (ML) Adversarial ML Attack Taxonomy Capability Adversarial Training Conclusion Outline Machine Learning
More informationGOOGLE ADDS 4 NEW FEATURES TO ITS MY BUSINESS DASHBOARD HTTPS WEBSITES ARE DOMINATING THE FIRST PAGE
1 GOOGLE ADDS 4 NEW FEATURES TO ITS MY BUSINESS DASHBOARD 2 HTTPS WEBSITES ARE DOMINATING THE FIRST PAGE 3 WHY YOU SHOULD BE PAYING MORE ATTENTION TO REVIEWS! 4 BING ROLLS OUT THREE NEW UPDATES FOR ADVERTISERS
More informationCS 229 Final Project - Using machine learning to enhance a collaborative filtering recommendation system for Yelp
CS 229 Final Project - Using machine learning to enhance a collaborative filtering recommendation system for Yelp Chris Guthrie Abstract In this paper I present my investigation of machine learning as
More informationEfficiently Representing Uncertainty as Probability Distributions:
Page 1 of 9 Efficiently Representing Uncertainty as Probability Distributions: Stochastic Information Packets (SIPs) and Stochastic Library Units With Relationship Preserved (SLURPs) Lone Star Analysis
More informationOutline. Motivation. Our System. Conclusion
Outline Motivation Our System Evaluation Conclusion 1 Botnet A botnet is a collection of bots controlled by a botmaster via a command and control (C&C) channel Centralized C&C, P2P-based C&C Botnets serve
More informationZero Robotics Autonomous Space Capture Challenge Manual
Zero Robotics Autonomous Space Capture Challenge Manual v1.3 1 Introduction 1.1 Conventions Vectors All vectors in this document are denoted with a bold face font. Of special note is the position vector
More informationInternet Anycast: Performance, Problems and Potential
Internet Anycast: Performance, Problems and Potential Zhihao Li, Dave Levin, Neil Spring, Bobby Bhattacharjee University of Maryland 1 Anycast is increasingly used DNS root servers: All 13 DNS root servers
More informationMarch 10 11, 2015 San Jose
March 10 11, 2015 San Jose Health monitoring & predictive analytics To lower the TCO in a datacenter Christian B. Madsen & Andrei Khurshudov Engineering Manager & Sr. Director Seagate Technology christian.b.madsen@seagate.com
More informationDetecting Opinion Spammer Groups and Spam Targets through Community Discovery and Sentiment Analysis
Journal of Computer Security (28) IOS Press Detecting Opinion Spammer Groups and Spam Targets through Community Discovery and Sentiment Analysis Euijin Choo a,, Ting Yu b Min Chi c a Qatar Computing Research
More informationFacebook Immune System 人人安全中心姚海阔
Facebook Immune System 人人安全中心姚海阔 Immune A realtime system to protect our users and the social graph Big data, Real time 25B checks per day 650K per second at peak Realtime checks and classifications on
More informationVulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits
Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits Carl Sabottke Octavian Suciu Tudor Dumitraș University of Maryland 2 Problem Increasing number
More informationChapter 4 Section 1 Graphing Linear Inequalities in Two Variables
Chapter 4 Section 1 Graphing Linear Inequalities in Two Variables Epressions of the tpe + 2 8 and 3 > 6 are called linear inequalities in two variables. A solution of a linear inequalit in two variables
More informationReview Spam Detection via Temporal Pattern Discovery
Review Spam Detection via Temporal Pattern Discovery Sihong Xie Guan Wang Shuyang Lin Philip S. Yu Department of Computer Science, University of Illinois at Chicago, Chicago, IL Computer Science Department,
More informationAssignment 1. Question 1: Brock Wilcox CS
Assignment 1 Brock Wilcox wilcox6@uiuc.edu CS 412 2009-09-30 Question 1: In the introduction chapter, we have introduced different ways to perform data mining: (1) using a data mining language to write
More informationDATA ANALYSIS I. Types of Attributes Sparse, Incomplete, Inaccurate Data
DATA ANALYSIS I Types of Attributes Sparse, Incomplete, Inaccurate Data Sources Bramer, M. (2013). Principles of data mining. Springer. [12-21] Witten, I. H., Frank, E. (2011). Data Mining: Practical machine
More informationA Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models
A Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models Marc Ph. Stoecklin Jean-Yves Le Boudec Andreas Kind
More informationChapter 4 Imaging Pre-Processing. Comunicação Visual Interactiva
Chapter 4 maging Pre-Processing Comunicação Visual nteractiva The need of pre-processing The need of pre-processing n this chapter we are going to stud mage enhacement Realçamento de imagem mage restauration
More informationSPIDeR. A Distributed Multi-Agent Intrusion Detection and Response Framework. Patrick Miller
SPIDeR A Distributed Multi-Agent Intrusion Detection and Response Framework Patrick Miller patrick@spider.doriathproject.com Overview Goals Utilize new and existing sensors collaboratively to generate
More informationChapter 2 Malicious Networks for DDoS Attacks
Chapter 2 Malicious Networks for DDoS Attacks Abstract In this chapter, we explore botnet, the engine of DDoS attacks, in cyberspace. We focus on two recent techniques that hackers are using to sustain
More informationAkarsh Pokkunuru EECS Department Contractive Auto-Encoders: Explicit Invariance During Feature Extraction
Akarsh Pokkunuru EECS Department 03-16-2017 Contractive Auto-Encoders: Explicit Invariance During Feature Extraction 1 AGENDA Introduction to Auto-encoders Types of Auto-encoders Analysis of different
More informationSvincolo di Chiomonte
Installation Notes: Customer: G&C Project Code: Date: Notes: Fila 1_4 Fila 1_5 DESIGNER NAME: Address: Tel.-Fa: Remarks: The lu levels provided b Technical Staff Fael Luce, are considered upon customer
More informationDetecting Malicious Web Links and Identifying Their Attack Types
Detecting Malicious Web Links and Identifying Their Attack Types Anti-Spam Team Cellopoint July 3, 2013 Introduction References A great effort has been directed towards detection of malicious URLs Blacklisting
More informationGraph Sketching. Review: 1) Interval Notation. Set Notation Interval Notation Set Notation Interval Notation. 2) Solving Inequalities
Lesson. Graph Sketching Review: ) Interval Notation Set Notation Interval Notation Set Notation Interval Notation a) { R / < < 5} b) I (, 3) ( 3, ) c){ R} d) I (, ] (0, ) e){ R / > 5} f) I [ 3,5) ) Solving
More informationCS224W: Social and Information Network Analysis Project Report: Edge Detection in Review Networks
CS224W: Social and Information Network Analysis Project Report: Edge Detection in Review Networks Archana Sulebele, Usha Prabhu, William Yang (Group 29) Keywords: Link Prediction, Review Networks, Adamic/Adar,
More informationUnsupervised Learning. Presenter: Anil Sharma, PhD Scholar, IIIT-Delhi
Unsupervised Learning Presenter: Anil Sharma, PhD Scholar, IIIT-Delhi Content Motivation Introduction Applications Types of clustering Clustering criterion functions Distance functions Normalization Which
More informationTowards Ensuring Collective Availability in Volatile Resource Pools via Forecasting
Towards CloudComputing@home: Ensuring Collective Availability in Volatile Resource Pools via Forecasting Artur Andrzejak Berlin (ZIB) andrzejak[at]zib.de Zuse-Institute Derrick Kondo David P. Anderson
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More informationTriRank: Review-aware Explainable Recommendation by Modeling Aspects
TriRank: Review-aware Explainable Recommendation by Modeling Aspects Xiangnan He, Tao Chen, Min-Yen Kan, Xiao Chen National University of Singapore Presented by Xiangnan He CIKM 15, Melbourne, Australia
More informationIntrusion Detection and Malware Analysis
Intrusion Detection and Malware Analysis Anomaly-based IDS Pavel Laskov Wilhelm Schickard Institute for Computer Science Taxonomy of anomaly-based IDS Features: Packet headers Byte streams Syntactic events
More informationThreat Detection and Mitigation for IoT Systems using Self Learning Networks (SLN)
Threat Detection and Mitigation for IoT Systems using Self Learning Networks (SLN) JP Vasseur, PhD - Cisco Fellow jpv@cisco.com Maik G. Seewald, CISSP Sr. Technical Lead maseewal@cisco.com June 2016 Cyber
More informationProblem Analysis and Preprocessing
Universität Potsdam Institut für Informatik Lehrstuhl Maschinelles Lernen Problem Analysis and Preprocessing Paul Prasse, Niels Landwehr, Tobias Scheffer Overview Analysis of learning problems Understanding
More informationSplog Detection Using Self-Similarity Analysis on Blog Temporal Dynamics. Yu-Ru Lin, Hari Sundaram, Yun Chi, Junichi Tatemura and Belle Tseng
Splog Detection Using Self-Similarity Analysis on Blog Temporal Dynamics Yu-Ru Lin, Hari Sundaram, Yun Chi, Junichi Tatemura and Belle Tseng NEC Laboratories America, Cupertino, CA AIRWeb Workshop 2007
More informationEnhanced Anti-Spam appliance, Spam grey list mechanism. in VigorPro UTM security/firewall router
Enhanced Anti-Spam appliance, Spam grey list mechanism in VigorPro UTM security/firewall router Greylist background concept: Grey list is developed to strengthen Anti-Spam appliance in DrayTek VigorPro
More informationModule 3 Graphing and Optimization
Module 3 Graphing and Optimization One of the most important applications of calculus to real-world problems is in the area of optimization. We will utilize the knowledge gained in the previous chapter,
More informationAn Unsupervised Approach for Combining Scores of Outlier Detection Techniques, Based on Similarity Measures
An Unsupervised Approach for Combining Scores of Outlier Detection Techniques, Based on Similarity Measures José Ramón Pasillas-Díaz, Sylvie Ratté Presenter: Christoforos Leventis 1 Basic concepts Outlier
More informationANOMALY DETECTION IN COMMUNICTION NETWORKS
Anomaly Detection Summer School Lecture 2014 ANOMALY DETECTION IN COMMUNICTION NETWORKS Prof. D.J.Parish and Francisco Aparicio-Navarro Loughborough University (School of Electronic, Electrical and Systems
More informationdeseo: Combating Search-Result Poisoning Yu USF
deseo: Combating Search-Result Poisoning Yu Jin @MSCS USF Your Google is not SAFE! SEO Poisoning - A new way to spread malware! Why choose SE? 22.4% of Google searches in the top 100 results > 50% for
More informationClustering. Robert M. Haralick. Computer Science, Graduate Center City University of New York
Clustering Robert M. Haralick Computer Science, Graduate Center City University of New York Outline K-means 1 K-means 2 3 4 5 Clustering K-means The purpose of clustering is to determine the similarity
More informationA Flexible Approach to Intrusion Alert Anonymization and Correlation
A Fleible Approach to Intrusion Alert Anonymization and Correlation Dingbang Xu and Peng Ning Cyber Defense aboratory Department of Computer Science North Carolina State University Raleigh, NC 27695-826
More informationCarCareCONNECT. Boost Performance, Grow Your Shop! Your guide to improving your online brand
CarCareCONNECT Boost Performance, Grow Your Shop! Your guide to improving your online brand ABOUT US YOUR MARKETING PLAN TABLE OF CONTENTS WHAT TO EXPECT PERSONALIZE YOUR WEBSITE LAUNCH YOUR WEBSITE MARKETING
More informationWith turing you can: Identify, locate and mitigate the effects of botnets or other malware abusing your infrastructure
Decoding DNS data If you have a large DNS infrastructure, understanding what is happening with your real-time and historic traffic is difficult, if not impossible. Until now, the available network management
More informationIdentifying Fraudulently Promoted Online Videos
Identifying Fraudulently Promoted Online Videos Vlad Bulakh, Christopher W. Dunn, Minaxi Gupta April 7, 2014 April 7, 2014 Vlad Bulakh 2 Motivation Online video sharing websites are visited by millions
More informationAn Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks
An Based on the Temporal-spatial Correlation in Wireless Sensor Networks 1 Department of Computer Science & Technology, Harbin Institute of Technology at Weihai,Weihai, 264209, China E-mail: Liuyang322@hit.edu.cn
More informationEECS490: Digital Image Processing. Lecture #22
Lecture #22 Gold Standard project images Otsu thresholding Local thresholding Region segmentation Watershed segmentation Frequency-domain techniques Project Images 1 Project Images 2 Project Images 3 Project
More informationRobust Collaborative Recommendation
Robust Collaborative Recommendation Robin Burke and Michael P. O Mahony and Neil J. Hurley Abstract Collaborative recommender systems are vulnerable to malicious users who seek to bias their output, causing
More informationSpotting Fake Reviews via Collective Positive-Unlabeled Learning
Spotting Fake Reviews via Collective Positive-Unlabeled Learning Huayi Li, Zhiyuan Chen, Bing Liu, Xiaokai Wei and Jidong Shao Department of Computer Science University of Illinois at Chicago, IL, USA
More informationAdvanced Filtering. Tobias Eggendorfer
Advanced Filtering Advanced Filtering Fails Too Overview Not so advanced Filtering Advanced Filtering Prevention Identification 2 Classic Filtering 3 Classic Filtering Black- & Whitelists 3 Classic Filtering
More informationSupplemental Problems MAT (Prepared by Prof. Urmi Ghosh-Dastidar)
Supplemental Problems MAT 3770 (Prepared by Prof. Urmi Ghosh-Dastidar) 1. Use Lagrange Multiplier methods to find the stationary values of z: (a) z = y, subject to + y = (b) z = (y+4), subject to + y =
More informationAN ad-hoc network is a group of nodes without requiring
240 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 2, JUNE 2007 Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis Wei
More informationNetwork Anomaly Detection Using Autonomous System Flow Aggregates
Network Anomaly Detection Using Autonomous System Flow Aggregates Thienne Johnson 1,2 and Loukas Lazos 1 1 Department of Electrical and Computer Engineering 2 Department of Computer Science University
More informationDet De e t cting abnormal event n s Jaechul Kim
Detecting abnormal events Jaechul Kim Purpose Introduce general methodologies used in abnormality detection Deal with technical details of selected papers Abnormal events Easy to verify, but hard to describe
More informationUnconstrained and Constrained Optimization
Unconstrained and Constrained Optimization Agenda General Ideas of Optimization Interpreting the First Derivative Interpreting the Second Derivative Unconstrained Optimization Constrained Optimization
More informationLINEAR PROGRAMMING. Straight line graphs LESSON
LINEAR PROGRAMMING Traditionall we appl our knowledge of Linear Programming to help us solve real world problems (which is referred to as modelling). Linear Programming is often linked to the field of
More information4 Linear Programming (LP) E. Amaldi -- Foundations of Operations Research -- Politecnico di Milano 1
4 Linear Programming (LP) E. Amaldi -- Foundations of Operations Research -- Politecnico di Milano 1 Definition: A Linear Programming (LP) problem is an optimization problem: where min f () s.t. X n the
More informationCountering Sparsity and Vulnerabilities in Reputation Systems
Countering Sparsity and Vulnerabilities in Reputation Systems Li Xiong Department of Mathematics and Computer Science Emory University lxiong@mathcs.emory.edu Ling Liu, Mustaque Ahamad College of Computing
More informationOnline Social Networks and Media
Online Social Networks and Media Absorbing Random Walks Link Prediction Why does the Power Method work? If a matrix R is real and symmetric, it has real eigenvalues and eigenvectors: λ, w, λ 2, w 2,, (λ
More informationSimplex Method. Introduction:
Introduction: Simple Method In the previous chapter, we discussed about the graphical method for solving linear programming problems. Although the graphical method is an invaluable aid to understand the
More informationMcPAD and HMM-Web: two different approaches for the detection of attacks against Web applications
McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications Davide Ariu, Igino Corona, Giorgio Giacinto, Fabio Roli University of Cagliari, Dept. of Electrical and
More informationInternational Journal of Research in Advent Technology, Vol.7, No.3, March 2019 E-ISSN: Available online at
Performance Evaluation of Ensemble Method Based Outlier Detection Algorithm Priya. M 1, M. Karthikeyan 2 Department of Computer and Information Science, Annamalai University, Annamalai Nagar, Tamil Nadu,
More informationCS-E5740. Complex Networks. Network analysis: key measures and characteristics
CS-E5740 Complex Networks Network analysis: key measures and characteristics Course outline 1. Introduction (motivation, definitions, etc. ) 2. Static network models: random and small-world networks 3.
More informationThe evolution of malevolence
Detection of spam hosts and spam bots using network traffic modeling Anestis Karasaridis Willa K. Ehrlich, Danielle Liu, David Hoeflin 4/27/2010. All rights reserved. AT&T and the AT&T logo are trademarks
More informationRecommendation System Using Yelp Data CS 229 Machine Learning Jia Le Xu, Yingran Xu
Recommendation System Using Yelp Data CS 229 Machine Learning Jia Le Xu, Yingran Xu 1 Introduction Yelp Dataset Challenge provides a large number of user, business and review data which can be used for
More informationRobustness and Accuracy Tradeoffs for Recommender Systems Under Attack
Proceedings of the Twenty-Fifth International Florida Artificial Intelligence Research Society Conference Robustness and Accuracy Tradeoffs for Recommender Systems Under Attack Carlos E. Seminario and
More informationFault Localization for Firewall Policies
Fault Localization for Firewall Policies JeeHyun Hwang 1 Tao Xie 1 Fei Chen Alex X. Liu 1 Department of Computer Science, North Carolina State University, Raleigh, NC 7695-86 Department of Computer Science
More information95 th Percentile Billing
95 th Percentile Billing Amie Elcan, CenturyLink Principal Architect, Data Strategy and Development amie.elcan@centurylink.com Nanog53 Philadelphia, PA October 10, 2011 Outline Internet access usage trends
More informationFortiGuard Antispam. Frequently Asked Questions. High Performance Multi-Threat Security Solutions
FortiGuard Antispam Frequently Asked Questions High Performance Multi-Threat Security Solutions Q: What is FortiGuard Antispam? A: FortiGuard Antispam Subscription Service (FortiGuard Antispam) is the
More information