Detecting malicious reviews and users affecting social reviewing systems: A survey

被引:0
|
作者
Esposito, Christian [2 ]
Moscato, Vincenzo [1 ]
Sperli, Giancarlo [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol DIETI, Via Claudio 21, Naples, Italy
[2] Univ Salerno, Dept Comp Sci, Via Giovanni Paolo II 132, I-84084 Fisciano, SA, Italy
关键词
Social networks; Social reviewing systems; Security; Detection; Countermeasures; Artificial intelligence; WORD-OF-MOUTH; RECOMMENDER SYSTEMS; SHILLING ATTACKS; UNSUPERVISED METHOD; ACCOUNT DETECTION; SPAMMER DETECTION; FAKE REVIEWS; NETWORKS; MODEL; ALGORITHMS;
D O I
10.1016/j.cose.2023.103407
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of attacks on On-line Social Networks (OSNs) has imposed particular attention by providers and users. This has an even higher importance for Social Reviewing Systems (SRSs), where users can be strongly conditioned by means of malevolent reviews and behavior of fake or camouflage accounts. There is a rich literature on the use of strong authentication means, encryption or privacy-preserving schemes for OSNs and SRSs, but these mechanisms only represent a first defense line. Advanced attacks may be able to bypass such a defense and to successfully threaten the system and harm its users. Therefore, it is needed to embed a second defence line to peculiar attack scenarios of SRSs that take advantage of user dynamics occurring within social networks. This survey focuses on the issue and solutions to detect malicious reviews and users so as to exclude them from social networks, protect legitimate and honest users and keep the credibility of the protected SRS as high as possible. Therefore, we provide an evaluation of the main detection solutions for the mentioned specific attacks against SRSs in according to different metrics on several standard datasets.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Trustworthiness Assessment of Users in Social Reviewing Systems
    Esposito, Christian
    Moscato, Vincenzo
    Sperli, Giancarlo
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (01): : 151 - 165
  • [2] Detecting Malicious Users in Online Dating Application
    Qiu, Jianhui
    Shen, Xingfa
    Guo, Yan
    Yao, Jian
    Fang, Renzhe
    [J]. 5TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2019), 2019, : 255 - 260
  • [3] Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems
    Kalafut, Andrew J.
    Shue, Craig A.
    Gupta, Minaxi
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [4] An Intelligent Technique for Detecting Malicious Users on Mobile Stores
    Terzi, Ramazan
    Yavanoglu, Uraz
    Sinanc, Duygu
    Oguz, Dogac
    Cakir, Semra
    [J]. 2014 13TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2014, : 470 - 477
  • [5] Detecting Malicious Users Behind Circuit-Based Anonymity Networks
    Huang, Shou-Hsuan Stephen
    Cao, Zechun
    [J]. IEEE ACCESS, 2020, 8 : 208610 - 208622
  • [6] Detecting Malicious Social Bots Based on Clickstream Sequences
    Shi, Peining
    Zhang, Zhiyong
    Choo, Kim-Kwang Raymond
    [J]. IEEE ACCESS, 2019, 7 : 28855 - 28862
  • [7] Detecting Malicious Social Robots with Generative Adversarial Networks
    Wu, Bin
    Liu, Le
    Dai, Zhengge
    Wang, Xiujuan
    Zheng, Kangfeng
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (11): : 5594 - 5615
  • [8] An Approach to Discover Malicious Online Users in Collaborative Systems
    Embarak, Ossama
    Khaleifah, Maryam
    Ali, Alya
    [J]. ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES, 2019, 29 : 374 - 382
  • [9] Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey
    Illiano, Vittorio P.
    Lupu, Emil C.
    [J]. ACM COMPUTING SURVEYS, 2015, 48 (02)
  • [10] Detecting Insider Malicious Activities in Cloud Collaboration Systems
    Smrithy, G. S.
    Cuzzocrea, Alfredo
    Balakrishnan, Ramadoss
    [J]. FUNDAMENTA INFORMATICAE, 2018, 161 (03) : 299 - 316