作者
Neil Shah, Alex Beutel, Brian Gallagher, Christos Faloutsos
发表日期
2014/12/14
研讨会论文
2014 IEEE International Conference on Data Mining
页码范围
959-964
出版商
IEEE
简介
How can we detect suspicious users in large online networks? Online popularity of a user or product (via follows, page-likes, etc.) can be monetized on the premise of higher ad click-through rates or increased sales. Web services and social networks which incentivize popularity thus suffer from a major problem of fake connections from link fraudsters looking to make a quick buck. Typical methods of catching this suspicious behavior use spectral techniques to spot large groups of often blatantly fraudulent (but sometimes honest) users. However, small-scale, stealthy attacks may go unnoticed due to the nature of low-rank Eigen analysis used in practice. In this work, we take an adversarial approach to find and prove claims about the weaknesses of modern, state-of-the-art spectral methods and propose fBox, an algorithm designed to catch small-scale, stealth attacks that slip below the radar. Our algorithm has the …
引用总数
2014201520162017201820192020202120222023202418717141919151684
学术搜索中的文章
N Shah, A Beutel, B Gallagher, C Faloutsos - 2014 IEEE International conference on data mining, 2014