Impostor Detection Through Chat Analysis

被引:0
|
作者
Shrivastava, Sarang [1 ]
Singh, Priyanja [1 ]
Ranvijay [1 ]
机构
[1] Motilal Nehru Natl Inst Technol, Allahabad 211004, Uttar Pradesh, India
来源
TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016 | 2016年 / 89卷
关键词
Chat Mining; Identity Verification; Learning Through Data; Machine Learning; Privacy in OSN;
D O I
10.1016/j.procs.2016.06.097
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the growth of IM technology, identity safekeeping has became an important problem. There is a constant threat of one's account being hacked or being used by an unauthorized user unknowingly. In this paper we have tried to verify the identity of the person on the basis of his writing style. Since chat is a mixture of acronyms, short forms, emoticons, symbols a lot of features can be extracted out of it, although its small size and use of regional language makes it a bit challenging. We have used per line features as in real time identifying the impostor in minimum amount of time is important. We have used the power of machine learning to learn from the history, tested with six machine learning algorithms and later combined them to improve the prediction. Maximum accuracy obtained on any user is 98% and the average accuracy is 74.58%. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:540 / 548
页数:9
相关论文
共 50 条
  • [1] Structural analysis of chat messages for topic detection
    Dong, Haichao
    Hui, Siu Cheung
    He, Yulan
    ONLINE INFORMATION REVIEW, 2006, 30 (05) : 496 - 516
  • [2] CREATIVITY STIMULATION IN CHAT CONVERSATIONS THROUGH MORPHOLOGICAL ANALYSIS
    Stamati, Daniela
    Dascalu, Mihai
    Trausan-Matu, Stefan
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2015, 77 (04): : 17 - 30
  • [3] Mobile Biometrics, Replay Attacks, and Behavior Profiling: An Empirical Analysis of Impostor Detection
    Neal, Tempestt
    Woodard, Damon
    2019 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2019,
  • [4] Age Detection in Chat
    Tam, Jenny
    Martell, Craig H.
    2009 IEEE THIRD INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2009), 2009, : 33 - 39
  • [5] Impostor Phenomenon: A Concept Analysis
    Gomez-Morales, Abigail
    NURSING SCIENCE QUARTERLY, 2021, 34 (03) : 309 - 315
  • [6] Behavioural Profiling for Impostor Detection in Mobile Networks
    Zincir, Ibrahim
    Furnell, Steven
    Phippen, Andy
    PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 334 - 342
  • [7] Who is Driving? Event-Driven Driver Identification and Impostor Detection Through Support Vector Machine
    Rahim, Mussadiq Abdul
    Liu, Jiamou
    Zhang, Zijian
    Zhu, Liehuang
    Li, Xin
    Khan, Salabat
    IEEE SENSORS JOURNAL, 2020, 20 (12) : 6552 - 6559
  • [8] Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs
    Amuchi, Faith
    Al-Nemrat, Ameer
    Alazab, Mamoun
    Layton, Robert
    2012 THIRD CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2012), 2012, : 28 - 37
  • [9] A psychometric analysis of the artificial intelligence skills scale developed through chat gpt
    Gorgulu, Deniz
    Coskun, Fatma
    Demir, Mustafa
    Sipahioglu, Mete
    EDUCATION AND INFORMATION TECHNOLOGIES, 2025,
  • [10] Successful approaches to teaching through chat
    Devlin, Frances
    Currie, Lea
    Stratton, John
    NEW LIBRARY WORLD, 2008, 109 (5-6) : 223 - 234