Identifying Discriminating Age Groups for Online Predator Detection
ثبت نشده
چکیده
Children are a major user group of today’s internet, mostly focusing on its social applications like social networking sites. Their online activities are not entirely without risk, as is demonstrated by the presence of online predators, who misuse its potential to search for and contact them with purposes in the area of sexual abuse. In this chapter we investigate the presence of these predators on Social Networking Sites and present a method of automatically detecting them. In this process we adopt a genetic algorithm approach that discovers a relation between the amount of friends on an online profile and the age of its owner, searching for statistically significant differences between known offenders and a control group of standard users. After the creation of this model, thresholds are calculated that classify users into danger categories. Experiments on actual police data sources show some promising results in countering this stealthy threat.
منابع مشابه
BotOnus: an online unsupervised method for Botnet detection
Botnets are recognized as one of the most dangerous threats to the Internet infrastructure. They are used for malicious activities such as launching distributed denial of service attacks, sending spam, and leaking personal information. Existing botnet detection methods produce a number of good ideas, but they are far from complete yet, since most of them cannot detect botnets in an early stage ...
متن کاملA Window of Opportunity for Cognitive Training in Adolescence
In the current study, we investigated windows for enhanced learning of cognitive skills during adolescence. Six hundred thirty-three participants (11-33 years old) were divided into four age groups, and each participant was randomly allocated to one of three training groups. Each training group completed up to 20 days of online training in numerosity discrimination (i.e., discriminating small f...
متن کاملBackground evolution in camouflage systems: a predator-prey/pollinator-flower game.
A common predator or anti-predator strategy involves camouflage based on background matching. In some systems, the background is an organism whose fitness is affected by the predator-prey interaction. In these cases, the phenotype of the background species may evolve to affect the degree of background matching in the predator-prey interaction. For example, some flower species (the background) a...
متن کاملIdentifying Predators Using ChatCoder 2.0 Notebook for PAN at CLEF
This article describes our experiments for the Sexual Predator Identification tasks at PAN2012. We have previously developed a software application, ChatCoder, for the identification of predatory posts in an online conversation. This paper extends this research to the detection of authors in addition to individual lines of text. We show that we were able to detect up to 98% of the predatory aut...
متن کاملNewborn EEG Seizure Detection Based on Interspike Space Distribution in the Time-Frequency Domain
This paper presents a new time-frequency based EEG seizure detection method. This method uses the distribution of interspike intervals as a criterion for discriminating between seizure and nonseizure activities. To detect spikes in the EEG, the signal is mapped into the time-frequency domain. The high instantaneous energy of spikes is reflected as a localized energy in time-frequency domain. Hi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009