Detecting Malicious Behavior and Collusion for Online Rating System

被引:0
|
作者
Cao, Liu [1 ,4 ]
Sun, Yuqing [1 ,4 ]
Wang, Shaoqing [1 ,3 ,4 ]
Li, Mingzhu [2 ,4 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan, Peoples R China
[2] Shandong Univ, Sch Software Engn, Jinan, Peoples R China
[3] Shandong Univ, Taishan Coll, Jinan, Peoples R China
[4] Minist Educ PRC, Engn Res Ctr Digital Media Technol, Beijing, Peoples R China
关键词
D O I
10.1109/TrustCom.2016.172
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the collective ratings and reviews on an online rating system have a high influence on user decisions, there exist more and more fraudulent behaviors, such as "ballot stuffing" and "bad-mouthing". Most of the current methods solve these problems by detecting one or a few malicious patterns. But they cannot solve these patterns simultaneously and cannot solve the case where dominating population on an item is malicious. In this paper, we investigate malicious behaviors and collusion from three aspects: the normal standards are learned from crowd behaviors rather than predefined patterns; a behavior anomaly is considered from both current and historical views; and the negative influence is also taken into account. We propose a set of metrics to comprehensively detect malicious behavior patterns. The User-Deviation metric detects how much a user is deviated from the crowds. The Behavior-Turbulence metric detects how different a user is from his/her historical behaviors, and the User Behavior Influence metric measures how much negative influence a user may cause. By orchestrating these statistical metrics, different user anomaly behaviors can be recognized. Compared with previous methods, our metrics can not only solve the problem that the major population is malicious, but also avoid misjudging characteristic people. Besides, we propose the collective behavior influence metric. and coherence metric so as to evaluate collusion of a group of people. Our method is verified against some real datasets and the results show that it outperforms the existing models.
引用
收藏
页码:1046 / 1053
页数:8
相关论文
共 50 条
  • [1] Toward Detecting Malicious Links in Online Social Networks through User Behavior
    Alghamdi, Bandar
    Watson, Jason
    Xu, Yue
    [J]. 2016 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE WORKSHOPS (WIW 2016), 2016, : 5 - 8
  • [2] Detecting Malicious Applications using System Services Request Behavior
    Salehi, Majid
    Amini, Morteza
    Crispo, Bruno
    [J]. PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19), 2019, : 200 - 209
  • [3] Detecting Malicious Users in Online Dating Application
    Qiu, Jianhui
    Shen, Xingfa
    Guo, Yan
    Yao, Jian
    Fang, Renzhe
    [J]. 5TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2019), 2019, : 255 - 260
  • [4] Detecting malicious behavior in cooperative diversity
    Dehnie, Sintayehu
    Sencar, Huserv T.
    Memon, Nasir
    [J]. 2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2007, : 895 - +
  • [5] Android Collusion: Detecting Malicious Applications Inter-Communication through SharedPreferences
    Casolare, Rosangela
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    [J]. INFORMATION, 2020, 11 (06)
  • [6] A New Approach to Detect User Collusion Behavior in Online QA System
    Zhu, Zhen-hui
    Yang, Zhi
    Dai, Ya-fei
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGY (CNCT 2016), 2016, 54 : 836 - 842
  • [7] EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services
    Stringhini, Gianluca
    Mourlanne, Pierre
    Jacob, Gregoire
    Egele, Manuel
    Kruegel, Christopher
    Vigna, Giovanni
    [J]. PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 563 - 578
  • [8] Detecting Collusion
    Robert H. Porter
    [J]. Review of Industrial Organization, 2005, 26 : 147 - 167
  • [9] Detecting collusion
    Porter, R
    [J]. REVIEW OF INDUSTRIAL ORGANIZATION, 2005, 26 (02) : 147 - 167
  • [10] Detecting Malicious Spam Mails: An Online Machine Learning Approach
    Dai, Yuli
    Tada, Shunsuke
    Ban, Tao
    Nakazato, Junji
    Shimamura, Jumpei
    Ozawa, Seiichi
    [J]. NEURAL INFORMATION PROCESSING, ICONIP 2014, PT III, 2014, 8836 : 365 - 372