KDD 2017 Tutorial: Data-Driven Approaches towards Malicious Behavior Modeling
نویسندگان
چکیده
e safety, reliability and usability of web platforms are oen compromised by malicious entities, such as vandals on Wikipedia, bot connections on Twier, fake likes on Facebook, and several more. Computational models developed with large-scale real-world behavioral data have shown signicant progress in identifying these malicious entities. is tutorial discusses three broad directions of state-of-the-art data-driven methods to model malicious behavior: (i) feature-based algorithms, in which distinguishing behavioral features are proposed to predict the malicious users; (ii) spectralbased algorithms, which have been widely used in seings of directed graphs, undirected graphs, and bipartite graphs such as “who-follows-whom” Twier data and “who-likes-what” Facebook data; and (iii) density-based algorithms, which eciently look for suspicious, highly-dense components in multi-dimensional behavioral data. is tutorial will introduce the details of the general algorithms from the above three classes that can be applied to any platform and dataset. ACM Reference format: Meng Jiang, Srijan Kumar, V.S. Subrahmanian, and Christos Faloutsos. 2017. KDD 2017 Tutorial: Data-Driven Approaches towards Malicious Behavior Modeling. In Proceedings of ACM SIGKDD conference, Halifax, Nova Scotia, Canada, August 2017 (SIGKDD’17), 4 pages.
منابع مشابه
Human Cancer Modeling: Recapitulating Tumor Heterogeneity Towards Personalized Medicine
Despite diagnostic, preventive and therapeutic advances, growing incidence of cancer and high rate of mortality among patients affected by specific cancer types indicate current clinical measures are not ideally useful in eradicating cancer. Chemoresistance and subsequent disease relapse are believed to be mainly driven by the cell-molecular heterogeneity of human tumors that necessitates perso...
متن کاملHuman Cancer Modeling: Recapitulating Tumor Heterogeneity Towards Personalized Medicine
Despite diagnostic, preventive and therapeutic advances, growing incidence of cancer and high rate of mortality among patients affected by specific cancer types indicate current clinical measures are not ideally useful in eradicating cancer. Chemoresistance and subsequent disease relapse are believed to be mainly driven by the cell-molecular heterogeneity of human tumors that necessitates perso...
متن کاملIntrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کاملLeveraging Hidden Dialogue State to Select Tutorial Moves
A central challenge for tutorial dialogue systems is selecting an appropriate move given the dialogue context. Corpus-based approaches to creating tutorial dialogue management models may facilitate more flexible and rapid development of tutorial dialogue systems and may increase the effectiveness of these systems by allowing data-driven adaptation to learning contexts and to individual learners...
متن کاملA tutorial on Quasi-experimental designs
A main step in answering a scientific hypothesis in an epidemiological study is deciding which type of study is suitable to be undertaken, considering methodology, practical considerations and budget and time limitations
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017