KDD 2017 Tutorial: Data-Driven Approaches towards Malicious Behavior Modeling

نویسندگان

  • Meng Jiang
  • Srijan Kumar
  • V. S. Subrahmanian
  • Christos Faloutsos
چکیده

Œe safety, reliability and usability of web platforms are o‰en compromised by malicious entities, such as vandals on Wikipedia, bot connections on TwiŠer, fake likes on Facebook, and several more. Computational models developed with large-scale real-world behavioral data have shown signi€cant progress in identifying these malicious entities. Œis tutorial discusses three broad directions of state-of-the-art data-driven methods to model malicious behavior: (i) feature-based algorithms, in which distinguishing behavioral features are proposed to predict the malicious users; (ii) spectralbased algorithms, which have been widely used in seŠings of directed graphs, undirected graphs, and bipartite graphs such as “who-follows-whom” TwiŠer data and “who-likes-what” Facebook data; and (iii) density-based algorithms, which eciently look for suspicious, highly-dense components in multi-dimensional behavioral data. Œis tutorial will introduce the details of the general algorithms from the above three classes that can be applied to any platform and dataset. ACM Reference format: Meng Jiang, Srijan Kumar, V.S. Subrahmanian, and Christos Faloutsos. 2017. KDD 2017 Tutorial: Data-Driven Approaches towards Malicious Behavior Modeling. In Proceedings of ACM SIGKDD conference, Halifax, Nova Scotia, Canada, August 2017 (SIGKDD’17), 4 pages.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Human Cancer Modeling: Recapitulating Tumor Heterogeneity Towards Personalized Medicine

Despite diagnostic, preventive and therapeutic advances, growing incidence of cancer and high rate of mortality among patients affected by specific cancer types indicate current clinical measures are not ideally useful in eradicating cancer. Chemoresistance and subsequent disease relapse are believed to be mainly driven by the cell-molecular heterogeneity of human tumors that necessitates perso...

متن کامل

Human Cancer Modeling: Recapitulating Tumor Heterogeneity Towards Personalized Medicine

Despite diagnostic, preventive and therapeutic advances, growing incidence of cancer and high rate of mortality among patients affected by specific cancer types indicate current clinical measures are not ideally useful in eradicating cancer. Chemoresistance and subsequent disease relapse are believed to be mainly driven by the cell-molecular heterogeneity of human tumors that necessitates perso...

متن کامل

Intrusion Detection in IOT based Networks Using Double Discriminant Analysis

Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...

متن کامل

Leveraging Hidden Dialogue State to Select Tutorial Moves

A central challenge for tutorial dialogue systems is selecting an appropriate move given the dialogue context. Corpus-based approaches to creating tutorial dialogue management models may facilitate more flexible and rapid development of tutorial dialogue systems and may increase the effectiveness of these systems by allowing data-driven adaptation to learning contexts and to individual learners...

متن کامل

A tutorial on Quasi-experimental designs

A main step in answering a scientific hypothesis in an epidemiological study is deciding which type of study is suitable to be undertaken, considering methodology, practical considerations and budget and time limitations

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017