Detection of Collusion Behaviors in Online Reputation Systems

Size: px
Start display at page:

Download "Detection of Collusion Behaviors in Online Reputation Systems"

Transcription

1 Detection of Collusion Behaviors in Online Reputation Systems Yuhong Liu, Yafei Yang, and Yan Lindsay Sun University of Rhode Island, Kingston, RI {yuhong, Qualcomm Incorporated, San Diego, CA Abstract Online reputation systems are gaining popularity. Dealing with collaborative unfair ratings in such systems has been recognized as an important but difficult problem. The current defense mechanisms focus on analyzing rating values for individual products. In this paper, we propose a scheme that detects collaborative unfair raters based on similarity in their rating behaviors. The proposed scheme integrates abnormal detection in both rating-value domain and the user-domain. To evaluate the proposed the scheme in realistic scenarios, we design and launch a cyber competition, in which attack data from real human users are collected. Furthermore, we design and launch a Rating Challenge to collect unfair rating data from real human users. The proposed system is evaluated through experiments using real attack data. The proposed scheme can accurately detect collusion behaviors and therefore significantly reduces the impact from the dishonest users. I. Introduction The online reputation systems, also known as the online feedback-based rating systems, are creating large scale, virtual word-of-mouth networks [] in which individuals share opinions and experiences by providing ratings to products, companies, digital content and even other people. For example, Epinions.com encourages Internet users to rate practically any kind of businesses. Citysearch.com solicits and displays user ratings on restaurants, bars, and performances. YouTube.com recommends video clips based on viewers ratings. As reputation systems are having increasing influence on purchasing decision of consumers and online digital content distribution, manipulation of such systems is rapidly growing. Firms post biased ratings and reviews to praise their own products or bad-mouth the products of their competitors. Political campaigns promote positive video clips and hide negative video clips by inserting unfair ratings at YouTube.com. There is ample evidence that such manipulation takes place [2]. For example, some ebay users are artificially boosting their reputation by buying and selling feedbacks [3]. The current defense schemes use majority rule, signal modeling, and/or trust management. Most schemes detect unfair ratings based on the majority rule. That is, the ratings that are far away from the majority s opinion are marked as unfair ratings. For example, clustering techniques are used to separate fair ratings and unfair ratings into two clusters [2]. Other representative majority-rule based techniques include the statistical filtering [4], an endorsement-based method in [5], and an entropy-based method in [6]. Recently, signal modeling techniques are applied to detect collaborative unfair ratings [7]. Particularly, statistical detectors are designed to identify the time at which the important features of the rating values (e.g. mean, histogram, arrival rate, and AR model errors) change rapidly. These sudden-change-time-instances indicate the starting-time and ending-time of collaborative attacks. There are also methods to calculate trust in raters. Based on the rating history of users, the system can evaluate how much the raters are trusted to provide honest ratings. The trust information is then used to differentiate ratings from good users and suspicious users [5], [8]. The above methods are effective in different scenarios, but they share one common property. That is, they focus on examining the rating values for individual products. In other words, the suspicious rating values are detected and treated independently. It does not matter whether the suspicious ratings are from one user, several uncorrelated users, or several highly correlated users. In practice, it is very common that the unfair ratings are provided by a group of user IDs, whose behaviors are highly correlated. In this paper, we propose to address the unfair rating problem by detecting the abnormal signals from both user-domain and rating-domain. In particular, the proposed scheme contains three parts. First, the abnormal detection is performed upon rating values for individual products. This yields a set of products that are suspected to be under attack. Second, we calculate the similarity among users who provide ratings for these suspicious products. Third, the similarity scores are used to detect colluded dishonest user IDs that tend to be clustered together. The ratings from colluded dishonest users are removed. To evaluate the proposed methods in the real world, we design and launch a Cyber Competition [9] to collect attack data from real human users. The proposed method is tested against attacks from real human users. The performance shows that the proposed system can accurately detect collusion behaviors and therefore significantly reduces the impact from the attackers. The rest of the paper is organized as follows. Related work and attack models are discussed in Section II. The collusion detection system is described in Section III. The rating challenge and experimental results are presented in Section IV, followed by conclusion in Section V.

2 A. Related Research II. Related Work and Attack Models In Section I, we briefly introduced three key techniques used for detecting and handling dishonest ratings: majorityrule, signal modeling, and trust-in-raters. These techniques are jointly used in various schemes. For example, in [5], a rater gives high endorsement to other raters who provide similar ratings and low endorsement to the raters who provide different ratings. In [6], if a new rating leads to a significant change in the uncertainty in rating distribution, it is considered to be an unfair rating. In [8], the normal ratings are modeled as noise and collaborative unfair ratings are modeled as signal. The AR model error is calculated. Low model error indicates high possibility of being under attack. Schemes in [8] and [7] identify time intervals in which unfair ratings are highly suspected. Then, they reduce the trust values of the raters who provide many ratings in these time intervals. The final rating score is the weighted average of the rating values, where the weights depend on trust values. The proposed scheme is compatible with the most of existing detection schemes, and could even be extended to incorporate the trust calculation. On the other hand, collusion detection has been studied in many fields including PageRank [], Online auction system [], and P2P file sharing network [2]. The solutions in these systems mainly deal with colluders who have frequent interactions among each other. They cannot be directly applied to the online reputation systems for two reasons. First, in online reputation systems, the users do not necessarily interact with each. Second, the dishonest user IDs can have diverse behaviors because they can randomly rate many products that they are not interested in. Honest users may have similar rating behaviors because they share similar interests. B. Attack Models In this paper, we study collaborative unfair raters, who aim to either boost or downgrade the overall rating of the victim objects. These unfair raters not only provide ratings to the victim objects, but also to other objects that they are not interested in. They do not necessarily follow any attack models. Instead, the attack data are collected from real human users through a cyber competition. III. Collusion Detection System As discussed in Section I, the majority-rule based detection methods and signal-modeling detection methods only examine the rating values for individual products. They both have some disadvantages. The majority rule holds under two conditions. First, the number of unfair ratings is less than the number of honest ratings. Second, the bias of the unfair ratings (i.e. the difference between the unfair ratings and the honest ratings) is sufficiently large. In practice, it is not difficult for the attacker to register/control a large number of user IDs. Furthermore, the attacker can introduce a relatively small bias in unfair ratings. In this case, the majority-rule based methods cannot detect dishonest ratings unless it can tolerate high rate. The signal-modeling based methods can handle a large number of unfair ratings with moderate bias. They can identify Fig.. System Overview. Arrival Rate Histogram '('%!" %%%&'% $$ $ # $ Combination Similarity Distance Calculation Clustering Rating Filtering Rating Aggregation Model Change Mean Change the suspicious time intervals in which unfair ratings are highly likely, but cannot determine exactly which ratings are dishonest in the suspicious time intervals. In this paper, we explore the abnormal signals in both rating-value domain and the user domain. We notice that the collaborative dishonest users work together for achieving the same goal. Therefore, their rating behaviors can be similar. The similarity analysis in the user-domain, however, cannot work along. Since the rating data are often very sparse, it is highly possible that normal users who have given few ratings are similar to other normal users or even to dishonest users. The similarity analysis and the abnormal rating detections need to be combined. As illustrated in Figure, the overall design of the proposed system has three components: Abnormity Detection, Similarity, and Rating Aggregation. A. Abnormal detection As the first step, abnormal detection is applied to the rating values for individual products. The signal-modeling based detector proposed in [7] is applied to detect suspicious intervals. Let W k denote the union of all suspicious intervals detected for product k. Note that there may be more than one suspicious interval for one product. The methods in [7] can also tell whether the attacker s goal is to boost or reduce the rating in the suspicious interval. Let d k = H when we detect that the attacker s goal is to boost product k. Otherwise, set d k = L. Note that the algorithms in [7] may not work well when the unfair ratings spread over the entire rating duration. Therefore, for each product, we examine the variance of all rating values. If this variance for product k is larger than a threshold and W k is empty, we set W k as the entire rating duration. As a summary, this module delivers two outputs: suspicious intervals (W k ) and attack directions (d k ) for individual products. 2

3 3 Fig. 2. u u2 u3 p p2 p3 p4 p Rating Matrix for Similarity Calculation B. Similarity detection The philosophy behind similarity detector is that the rating behavior of colluded users who have the same attack goal should be similar. To calculate similarity between raters, we construct a rating matrix, which describes rater-product relationship. If a user has ever provided ratings in the suspicious intervals of any products, this user s overall rating behavior is represented by one row in the rating matrix. Assume there are m such users. Then the matrix is m n, where n is the total number of products. The matrix element R i,j is the rating value given by the user associated with row i to product j. The rating values are within a numerical scales and it can be null indicating that the user has not yet rated that product. It is important to point out that the rating matrix only contains the users who are associated with suspicious intervals and contains their ratings for all products. Figure 2 illustrates a rating matrix with 3 users and 5 products. Based on the rating matrix, for any pair of users, we calculate the similarity distance between them. There are various ways to calculate similarity distance. In this work, we investigate Euclidean distance and Pearson correlation. For user i and user j, assume that they both provide ratings to product k, k 2, k N. Then, the Euclidean Distance between user i and user j is D i,j = N (R i,kt R j,kt ) 2. () N t= In the example in Figure 2, the distance between user and user 3 considers their ratings to product 3, 4, and 5. The Pearson Correlation Distance D p i,j is calculated as: D p i,j = N N t= ( R i,k t R i σ i )( R j,k t R j σ j ), (2) where R i and σ i are the mean and variance of user i s all rating values, respectively. In our experiments, we find that Euclidean distance can better capture the behavior similarity among dishonest users. Results will be shown in Section IV. Next, we divide users into clusters based on their similarity distance. Three questions need to be answered: () which clustering algorithm to use; (2) how many clusters; and (3) which cluster contains the dishonest users. We investigate several clustering algorithms and find that the simple K-median method [3] works well. Intuitively, users may belong to two clusters, one for the honest users and the other for the dishonest users. This intuition, however, does not agree with the experimental results. In fact, K=2 is not a good choice, which yields very high rate. In our experiments, we studies the and rate of the proposed scheme for different K values and plot the ROC curves. The ROC curves give good guideline on the selection of K values. After the users are separated into K clusters, we identify the dishonest users cluster using attack direction (i.e. d k ). Recall that d k tells whether the dishonest users are trying to downgrade or boost product k. For cluster c, we calculate the indicator as I c = R avg (c, k) R avg (c, k), (3) k:d k =L k:d k =H where R avg (c, k) is the average rating for product k from the users in cluster c. The cluster with the lowest I c value is marked as the cluster of dishonest users. The users in this cluster is marked as dishonest. All ratings from dishonest users are removed, and then the reputation of products are calculated. In the implementation of the proposed approach, we use the C Clustering Library written by the laboratory of DNA Information Analysis, Human Genome Center, Institute of Medical Science, at the University of Tokyo. IV. Performance Evaluation A. Rating Challenge and Experiment Description For any online reputation systems, it is very difficult to evaluate their attack-resistance properties in practical settings due to the lack of realistic attack data. Even if one can obtain data from e-commerce websites or P2P networks, there is no ground truth about which ratings are dishonest. To understand human users collusion behaviors and evaluate the proposed scheme against non-simulated attacks, we designed and launched a Cyber Competition. In this contest, We collected real online rating data for 3 products from a famous e-commerce website. From day to day 5, 3 honest users gave their ratings to these products. Each player can control at most 3 dishonest user IDs. The total number of ratings from dishonest user IDs should be less than. The game goal is to downgrade the reputation score of product. The system calculates the reputation score of product every 5 days. In other words, reputation scores are calculated on day 5, day 3,... and day 5. The average of these reputation scores will be the overall reputation of product. The attack power is defined as the difference between the true reputation of product and the calculated reputation after inserting the unfair ratings. The competition rule encourages the players to adjust the resources they use (i.e. the number of dishonest user IDs and the number of total ratings). The evaluation criteria are based on both the attack resources and the attack power. The detailed description of the evaluation criteria can be found at [9]. The competition has attracted 63 registered players from 7 universities in China and United States. We have collected 75, valid submissions.

4 4 Attacker Number Detection Rate (Pd) Variance of Pd False Alarm Rate (Pf) Variance of Pf *.e *.e *.e *.e *.e *.e-4 Attacker Number Detection Rate (Pd) Variance of Pd False Alarm Rate (Pf) Variance of Pf *.e *.e *.e *.e *.e *.e-3 Fig. 3. Detection Rate and False Alarm Rate (Euclidean distance) Fig. 4. Detection Rate and False Alarm Rate (Pearson correlation distance) B. Data Preparation The data collected from the cyber competition are preprocessed as follows. First, we calculate the basic features of each submitted attack file, including the number of dishonest user IDs, the total number of dishonest ratings, and the attack power. The underlying rating aggregation algorithm can be seen on the rating competition website [9]. Second, the attack files that use the same amount of user IDs are grouped together. Third, in each group, we select strong attacks whose attack power is greater than 8 percent of the largest attack power in this group. The third step is important because we do not want to test our schemes against weak attacks, in which the players did not find a good way to mislead the rating system. After data pre-processing, we have 342 attack files using 5 dishonest user IDs, 536 attack files using 9 IDs, 68 files using 5 IDs, 88 files using 2 IDs, 244 files using 25 IDs, and 424 files using 3 IDs. C. Experiment Results In the first experiment, we study the performance of the proposed scheme, measured by the (i.e. the number of detected dishonest users divided by the total number of dishonest users) and the rate (i.e. the number of normal users being marked as dishonest divided by the total number of normal users). When the similarity calculation uses Euclidean distance, the results are shown in Figure 3. Both the mean and variance of the / rate are shown. We can clearly see that the proposed method yields very good, and maintains low rate. It is important to point out that we applied the well-known Betafunction based unfair rating detection methods [4] to the same dataset. The is almost zero. This is because there are only five rating values. The smart attackers do not give extreme rating values in order to avoid being detected. Therefore, the majority-rule based methods do not work well. In the second experiment, we compare different algorithms for calculating user similarity. We conduct the same experiment except using Pearson correlation distance for similarity calculation. The results are shown in Figure 4. In this case, the is greatly reduced. We see that the performance of the proposed scheme is sensitive to the choice of the similarity calculation algorithms. Euclidean distance performs much better than Pearson correlation distance. Fig. 5. Reputation Reputation under Attack Recovered Reputation Real Reputation Attacker Number Detection Rate and False Alarm Rate (Pearson correlation distance) In the third experiment, we examine the reputation of the victim product (i.e. product ). Three cases are compared: (a) the product reputation without unfair ratings; (b) product reputation under attack without the proposed defense scheme; and (c) the recovered reputation with the proposed scheme. The results are shown in Figure 5, with reputation of product v.s. the number of dishonest user IDs. It is seen that the proposed scheme can recover the reputation very effectively. In the fourth experiment, we investigate how to choose proper K value that is used in the clustering algorithm. In K-median algorithm [3], K represents the number of groups that raters are divided into. If K is too large, the malicious colluders might be clustered into different groups; if K is too small, normal raters will probably be clustered into the same group with the dishonest raters. In Figure 6 and Figure 7, we shows the and rate as a function of K, when there are 5 dishonest user IDs. In this case, there are 4 users who ever provide ratings in suspicious intervals. We call these users the suspicious users. In this case, the rating matrix has 4 rows. In Figure 8, the ROC curve is drawn. Roughly speaking, the K value between 5 and are reasonable. The ROC performance depends on both the number of dishonest IDs and the number of suspicious users. By adjusting the parameters in the abnormal detection algorithm, we can increase the suspicious interval and make the suspicious user set have 5 users. Note that we only have 5 dishonest users. Figure 9 shows that the ROC performance in this case is even better than the curve shown in Figure 8. This observation is

5 5 K= K=5 K=2 K=3 K=5 K= K=4 K= value of k Fig. 6. Detection Rate v.s. K values Fig. 8. user set ROC Curve with 5 dishonest user IDs and 4 users in suspicious K=5 K= K=2 K=3 K=4 K=45 K=5 K=5 K=2..2 Fig value of k False Alarm Rate v.s. K values interesting. It implies that the abnormal detection algorithms do not need to be perfect. Even if the abnormal detection algorithm gives a large suspicious user set, the following collusion detection algorithm can identify real dishonest users. In Figure, we plot the ROC curve when there is 25 dishonest user IDs and 24 suspicious users. As a summary, when the number of dishonest users increases, K values should be smaller. When the suspicious user set becomes larger, the K values should increase too. V. Conclusions In this paper, we addressed the problem of detecting and handling collusion behaviors in on-line rating systems. In particular, we find out that it is very common that the unfair ratings are provided by a group of user IDs, whose behaviors are highly correlated. Based on this discovery, we propose to address the unfair rating problem by integrating the abnormal signals from both user-domain and rating-domain. In this system, three modules are included: unfair rating detection, behavior similarity calculation, and rating aggregation. The proposed scheme is evaluated against attacks created by real human users. The performance shows that the proposed system can accurately detect collusion behaviors and therefore significantly reduces the impact from the attackers. VI. Acknowledgement We sincerely thank Qinyuan Feng and Wenkai Wang for designing and administrating CANT Cyber Competition, and. K= Fig. 9. ROC Curve with 5 dishonest user IDs and 5 users in suspicious user set all participants to this contest. This research is supported in part by grants from NSF (award #643532), URI Foundation, and (...). REFERENCES [] C. Dellarocas, The digitization of word-of-mouth: Promise and challenges of online reputation systems, Management Science, vol. 49, no., pp , October 23. [2] C. Dellarocas, Strategic manipulation of internet opinion forums: Implications for consumers and firms, Management Science, October 26. [3] J. Brown and J. Morgan, Reputation in online auctions: The market for trust, California Management Review, vol. 49, no., pp. 6 8, 26. [4] A. Whitby, A. Jøang, and J. Indulska, Filtering out unfair ratings in Bayesian reputation systems, in Proc. 7th Int. Workshop on Trust in Agent Societies, 24. [5] M. Chen and J. Singh, Computing and using reputations for internet ratings, in Proceedings of the 3rd ACM conference on Electronic Commerce, 2. [6] J. Weng, C. Miao, and A. Goh, An entropy-based approach to protecting rating systems from unfair testimonies, IEICE TRANSACTIONS on Information and Systems, vol. E89-D, no. 9, pp , September 26. [7] Y. Yang, Y. Sun, S. Kay, and Q. Yang, Defending online reputation systems against collaborative unfair raters through signal modeling and trust, in Proceedings of the 24th ACM Symposium on Applied Computing (SAC 9), 29. [8] Y. Yang, Y. Sun, J. Ren, and Q. Yang, Building trust in online rating systems through signal modeling, in Proceedings of IEEE ICDCS Workshop on Trust and Reputation Management, 27. [9] Beijing University and University of Rhode Island, CANT cyber competition,

6 6.3.2 K= K=2 K=3 K=4 K=5 K=6 K=7 K=5 K= Fig.. user set ROC Curve with 25 dishonest user IDs and 24 users in suspicious [] H. Zhang, A. Goel, R. Govindan, K. Mason, and B. van Roy, Improving eigenvector-based reputation systems against collusions, in Proceedings of the 3rd Workshop on Web Graph Algorithms, 24. [] J.C. Wang and C.C. Chiu, Recommending trusted online auction sellers using social network analysis, Expert Systems with Applications, vol. 34, pp , 28. [2] Q. Lian, Z. Zhang, M. Yang, B. Zhao, Y. Dai, and X. Li, An empirical study of collusion behavior in the maze p2p file-sharing system, in Proceeding of 27th International Conference on Distributed Computing Systems (ICDCS 7), 27. [3] D.L. Massart and L. Kaufman, The Interpretation of Analytical Chemical Data By the Use of Cluster Analysis, John Wiley & Sons, 983.

Dishonest Behaviors in Online Rating Systems: Cyber. Competition, Attack Models, and Attack Generator

Dishonest Behaviors in Online Rating Systems: Cyber. Competition, Attack Models, and Attack Generator Dishonest Behaviors in Online Rating Systems: Cyber 1 Competition, Attack Models, and Attack Generator Yafei Yang, Qinyuan Feng, Yan Lindsay Sun and Yafei Dai University of Rhode Island, Kingston, RI,

More information

AS MORE people use the Internet for entertainment,

AS MORE people use the Internet for entertainment, 936 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 6, JUNE 2013 Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis Yuhong Liu, Member, IEEE, Yan (Lindsay)

More information

Defending Online Reputation Systems against Collaborative Unfair Raters through Signal Modeling and Trust

Defending Online Reputation Systems against Collaborative Unfair Raters through Signal Modeling and Trust Defending Online Reputation Systems against Collaborative Unfair Raters through Signal Modeling and Trust Yafei Yang, Yan (Lindsay) Sun, Steven Kay, and Qing Yang Department of Electrical and Computer

More information

arxiv:1308.3876v1 [cs.si] 18 Aug 2013

arxiv:1308.3876v1 [cs.si] 18 Aug 2013 arxiv:1308.3876v1 [cs.si] 18 Aug 2013 Detection and Filtering of Collaborative Malicious Users in Reputation System using Quality Repository Approach Jnanamurthy HK and Sanjay Singh August 20, 2013 Abstract

More information

TRUST ESTABLISHMENT IN COMPUTER NETWORKS: THEORIES AND APPLICATIONS YAFEI YANG

TRUST ESTABLISHMENT IN COMPUTER NETWORKS: THEORIES AND APPLICATIONS YAFEI YANG TRUST ESTABLISHMENT IN COMPUTER NETWORKS: THEORIES AND APPLICATIONS BY YAFEI YANG A DISSERTATION SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN ELECTRICAL

More information

A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections

A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections A Secure Online Reputation Defense System from Unfair Ratings using Anomaly Detections Asha baby PG Scholar,Department of CSE A. Kumaresan Professor, Department of CSE K. Vijayakumar Professor, Department

More information

RepTrap: A Novel Attack on Feedback-based Reputation

RepTrap: A Novel Attack on Feedback-based Reputation RepTrap: A Novel Attack on Feedback-based Reputation Systems Yafei Yang, Qinyuan Feng, Yan Lindsay Sun and Yafei Dai University of Rhode Island, Kingston, RI, USA Email: {yafei, yansun}@ele.uri.edu CNDS

More information

Security of Online Reputation Systems: Evolution of Attacks and Defenses

Security of Online Reputation Systems: Evolution of Attacks and Defenses Security of Online Reputation Systems: 1 Evolution of Attacks and Defenses Yan (Lindsay) Sun and Yuhong Liu Department of Electrical, Computer and Biomedical Engineering University of Rhode Island, 4 East

More information

Reputation Management using Trust based Decision making System through Temporal and correlation analysis

Reputation Management using Trust based Decision making System through Temporal and correlation analysis Reputation Management using Trust based Decision making System through Temporal and correlation analysis V.Raja Gopal 1,S.Sumathi 2, Asst.Professor, Dept of Information Technology, Sri Krishna Engineering

More information

Defending Multiple-user-multiple-target Attacks in Online Reputation Systems

Defending Multiple-user-multiple-target Attacks in Online Reputation Systems Defending Multiple-user-multiple-target Attacks in Online Reputation Systems Yuhong Liu, Yan (Lindsay) Sun, and Ting Yu 2 Department of Electrical and Computer Engineering University of Rhode Island, Kingston,

More information

Detecting false users in Online Rating system & Securing Reputation

Detecting false users in Online Rating system & Securing Reputation Detecting false users in Online Rating system & Securing Reputation ABSTRACT: With the rapid development of reputation systems in various online social networks, manipulations against such systems are

More information

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus

An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: ogino@okinawa-ct.ac.jp

More information

A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems

A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems Mao Yang 21, Qinyuan Feng 1, Yafei Dai 1, Zheng Zhang 2 Peking University, Beijing, China

More information

Evaluation Model of Buyers Dynamic Reputation in E-commerce

Evaluation Model of Buyers Dynamic Reputation in E-commerce Vol.0, No.5 (05), pp.53-64 http://dx.doi.org/0.457/ijmue.05.0.5.07 Evaluation Model of Buyers Dynamic Reputation in E-commerce Yang Zhang ), Tieying Liu ), Ru Li 3) and Zhenhai Wan 4) School of Computer

More information

Trust, Reputation and Fairness in Online Auctions

Trust, Reputation and Fairness in Online Auctions Trust, Reputation and Fairness in Online Auctions Adam Wierzbicki 21/11/2006 Polish-Japanese Institute of Information Technology Plan of the talk Background Online auctions Trust management Reputation

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

RepHi: A Novel Attack against P2P Reputation Systems

RepHi: A Novel Attack against P2P Reputation Systems The First International Workshop on Security in Computers, Networking and Communications RepHi: A Novel Attack against P2P Reputation Systems Jingyu Feng a,b, Yuqing Zhang b, Shenglong Chen b,anminfu a,b

More information

CAPTCHA-based DDoS Defense System of Call Centers against Zombie Smart-Phone

CAPTCHA-based DDoS Defense System of Call Centers against Zombie Smart-Phone CAPTCHA-based DDoS Defense System of Call Centers against Zombie Smart-Phone Seung Wook Jung Soongsil University seungwookj@ssu.ac.kr Abstract Recently, some researchers alarm the security community that

More information

http://hdl.handle.net/10536/dro/du:30070778

http://hdl.handle.net/10536/dro/du:30070778 This is the published version Chong,S-K, Abawajy,J, Ahmad,M and Hamid,IRA 2014, Enhancing Trust Management in Cloud Environment, Procedia - Social and Behavioral Sciences, vol. 129, pp. 314-321. Available

More information

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS

International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, chittiprolumounika@gmail.com; Third C.

More information

Evaluating Rater Credibility for Reputation Assessment of Web Services

Evaluating Rater Credibility for Reputation Assessment of Web Services Evaluating Rater Credibility for Reputation Assessment of Web Services Zaki Malik 1 and Athman Bouguettaya 1, 1 Department of Computer Science, Virginia Tech, VA. 1 USA. CSIRO-ICT Center, Canberra, Australia.

More information

Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems

Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,

More information

Reputation Rating Mode and Aggregating Method of Online Reputation Management System *

Reputation Rating Mode and Aggregating Method of Online Reputation Management System * Reputation Rating Mode and Aggregating Method of Online Reputation Management System * Yang Deli ** Song Guangxing *** (School of Management, Dalian University of Technology, P.R.China 116024) Abstract

More information

Research on Trust Management Strategies in Cloud Computing Environment

Research on Trust Management Strategies in Cloud Computing Environment Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING

More information

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS

SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS SECURE AND RELIABLE DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS Kokilavani.V Mother Teresa College Of Engineering And Technology,Pudhukottai Abstract Network security involves the authorization of access

More information

Enhanced Boosted Trees Technique for Customer Churn Prediction Model

Enhanced Boosted Trees Technique for Customer Churn Prediction Model IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V5 PP 41-45 www.iosrjen.org Enhanced Boosted Trees Technique for Customer Churn Prediction

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

A Two-Step Method for Clustering Mixed Categroical and Numeric Data

A Two-Step Method for Clustering Mixed Categroical and Numeric Data Tamkang Journal of Science and Engineering, Vol. 13, No. 1, pp. 11 19 (2010) 11 A Two-Step Method for Clustering Mixed Categroical and Numeric Data Ming-Yi Shih*, Jar-Wen Jheng and Lien-Fu Lai Department

More information

Maximum Likelihood Estimation of Peers Performance in P2P Networks

Maximum Likelihood Estimation of Peers Performance in P2P Networks Maximum Likelihood Estimation of Peers Performance in P2P Networks Zoran Despotovic, Karl Aberer EPFL - Swiss Federal Institute of Technology Lausanne, Switzerland email:{zoran.despotovic, karl.aberer}@epfl.ch

More information

Design call center management system of e-commerce based on BP neural network and multifractal

Design call center management system of e-commerce based on BP neural network and multifractal Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):951-956 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Design call center management system of e-commerce

More information

Time-Frequency Detection Algorithm of Network Traffic Anomalies

Time-Frequency Detection Algorithm of Network Traffic Anomalies 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore Time-Frequency Detection Algorithm of Network Traffic Anomalies

More information

Preventing Denial-of-request Inference Attacks in Location-sharing Services

Preventing Denial-of-request Inference Attacks in Location-sharing Services Preventing Denial-of-request Inference Attacks in Location-sharing Services Kazuhiro Minami Institute of Statistical Mathematics, Tokyo, Japan Email: kminami@ism.ac.jp Abstract Location-sharing services

More information

S3 TK Seminar. Research Topics: Privacy

S3 TK Seminar. Research Topics: Privacy S3 TK Seminar Research Topics: Privacy leonardo.martucci@cased.de joerg.daubert@cased.de Timing Attacks on TOR Anonymous Communication Mechanisms High latency Low latency Crowds, AN.ON, TOR Multiple Attacks

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

ALDR: A New Metric for Measuring Effective Layering of Defenses

ALDR: A New Metric for Measuring Effective Layering of Defenses ALDR: A New Metric for Measuring Effective Layering of Defenses Nathaniel Boggs Department of Computer Science Columbia University boggs@cs.columbia.edu Salvatore J. Stolfo Department of Computer Science

More information

Predicting the Risk of Heart Attacks using Neural Network and Decision Tree

Predicting the Risk of Heart Attacks using Neural Network and Decision Tree Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

A Review on Zero Day Attack Safety Using Different Scenarios

A Review on Zero Day Attack Safety Using Different Scenarios Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios

More information

Competition and Fraud in Online Advertising Markets

Competition and Fraud in Online Advertising Markets Competition and Fraud in Online Advertising Markets Bob Mungamuru 1 and Stephen Weis 2 1 Stanford University, Stanford, CA, USA 94305 2 Google Inc., Mountain View, CA, USA 94043 Abstract. An economic model

More information

Neovision2 Performance Evaluation Protocol

Neovision2 Performance Evaluation Protocol Neovision2 Performance Evaluation Protocol Version 3.0 4/16/2012 Public Release Prepared by Rajmadhan Ekambaram rajmadhan@mail.usf.edu Dmitry Goldgof, Ph.D. goldgof@cse.usf.edu Rangachar Kasturi, Ph.D.

More information

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,

More information

Document Image Retrieval using Signatures as Queries

Document Image Retrieval using Signatures as Queries Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and

More information

A Frequency-Based Approach to Intrusion Detection

A Frequency-Based Approach to Intrusion Detection A Frequency-Based Approach to Intrusion Detection Mian Zhou and Sheau-Dong Lang School of Electrical Engineering & Computer Science and National Center for Forensic Science, University of Central Florida,

More information

A Study Of Bagging And Boosting Approaches To Develop Meta-Classifier

A Study Of Bagging And Boosting Approaches To Develop Meta-Classifier A Study Of Bagging And Boosting Approaches To Develop Meta-Classifier G.T. Prasanna Kumari Associate Professor, Dept of Computer Science and Engineering, Gokula Krishna College of Engg, Sullurpet-524121,

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

Trust and Reputation Management

Trust and Reputation Management Trust and Reputation Management Omer Rana School of Computer Science and Welsh escience Centre, Cardiff University, UK Omer Rana (CS, Cardiff, UK) CM0356/CMT606 1 / 28 Outline 1 Context Defining Trust

More information

ONLINE REPUTATION SYSTEMS

ONLINE REPUTATION SYSTEMS ONLINE REPUTATION SYSTEMS YUYE WANG 1 CPSC 557: Sensitive Information in a Wired World Professor: Joan Feigenbaum Date: 12 Nov, 2013 Identity Reput ation Trust 2 TRUST SYSTEM Trust system, guide people

More information

Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System

Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System Gayatri Swamynathan, Ben Y. Zhao and Kevin C. Almeroth Department of Computer Science, UC Santa Barbara {gayatri, ravenben, almeroth}@cs.ucsb.edu

More information

TAGUCHI APPROACH TO DESIGN OPTIMIZATION FOR QUALITY AND COST: AN OVERVIEW. Resit Unal. Edwin B. Dean

TAGUCHI APPROACH TO DESIGN OPTIMIZATION FOR QUALITY AND COST: AN OVERVIEW. Resit Unal. Edwin B. Dean TAGUCHI APPROACH TO DESIGN OPTIMIZATION FOR QUALITY AND COST: AN OVERVIEW Resit Unal Edwin B. Dean INTRODUCTION Calibrations to existing cost of doing business in space indicate that to establish human

More information

Winning the Kaggle Algorithmic Trading Challenge with the Composition of Many Models and Feature Engineering

Winning the Kaggle Algorithmic Trading Challenge with the Composition of Many Models and Feature Engineering IEICE Transactions on Information and Systems, vol.e96-d, no.3, pp.742-745, 2013. 1 Winning the Kaggle Algorithmic Trading Challenge with the Composition of Many Models and Feature Engineering Ildefons

More information

Abstract A. Our Contribution

Abstract A. Our Contribution Anticipatory Measure for Auction Fraud Detection In Online P. Anandha Reddy,II nd M.Tech Avanthis St.Therissa Institute of Engineering and Technology, Garividi,,Vizayanagaram. G. Chinna Babu, Assistant

More information

The Impact of YouTube Recommendation System on Video Views

The Impact of YouTube Recommendation System on Video Views The Impact of YouTube Recommendation System on Video Views Renjie Zhou, Samamon Khemmarat, Lixin Gao College of Computer Science and Technology Department of Electrical and Computer Engineering Harbin

More information

Multimedia Document Authentication using On-line Signatures as Watermarks

Multimedia Document Authentication using On-line Signatures as Watermarks Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Using News Articles to Predict Stock Price Movements

Using News Articles to Predict Stock Price Movements Using News Articles to Predict Stock Price Movements Győző Gidófalvi Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 9237 gyozo@cs.ucsd.edu 21, June 15,

More information

Detecting false testimonies in reputation systems using self-organizing maps

Detecting false testimonies in reputation systems using self-organizing maps Detecting false testimonies in reputation systems using self-organizing maps Z. BANKOVIC, J. C. VALLEJO, D. FRAGA, AND J. M. MOYA Abstract It has been demonstrated that rating trust and reputation of individual

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

E-commerce Transaction Anomaly Classification

E-commerce Transaction Anomaly Classification E-commerce Transaction Anomaly Classification Minyong Lee minyong@stanford.edu Seunghee Ham sham12@stanford.edu Qiyi Jiang qjiang@stanford.edu I. INTRODUCTION Due to the increasing popularity of e-commerce

More information

Categorical Data Visualization and Clustering Using Subjective Factors

Categorical Data Visualization and Clustering Using Subjective Factors Categorical Data Visualization and Clustering Using Subjective Factors Chia-Hui Chang and Zhi-Kai Ding Department of Computer Science and Information Engineering, National Central University, Chung-Li,

More information

VISUALIZING UNFAIR RATINGS IN ONLINE REPUTATION SYSTEMS

VISUALIZING UNFAIR RATINGS IN ONLINE REPUTATION SYSTEMS VISUALIZING UNFAIR RATINGS IN ONLINE REPUTATION SYSTEMS Complete Research Sänger, Johannes, University of Regensburg, Regensburg, Germany, johannes.saenger@ur.de Richthammer, Christian, University of Regensburg,

More information

Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities

Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities Another Look at Sensitivity of Bayesian Networks to Imprecise Probabilities Oscar Kipersztok Mathematics and Computing Technology Phantom Works, The Boeing Company P.O.Box 3707, MC: 7L-44 Seattle, WA 98124

More information

An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System

An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System An Effective Risk Avoidance Scheme for the EigenTrust Reputation Management System Takuya Nishikawa and Satoshi Fujita Department of Information Engineering, Hiroshima University Kagamiyama 1-4-1, Higashi-Hiroshima,

More information

A Super-Agent Based Framework for Reputation Management and Community Formation in Decentralized Systems

A Super-Agent Based Framework for Reputation Management and Community Formation in Decentralized Systems Computational Intelligence, Volume 000, Number 000, 0000 A Super-Agent Based Framework for Reputation Management and Community Formation in Decentralized Systems Yao Wang, Jie Zhang and Julita Vassileva

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

Paper DV-06-2015. KEYWORDS: SAS, R, Statistics, Data visualization, Monte Carlo simulation, Pseudo- random numbers

Paper DV-06-2015. KEYWORDS: SAS, R, Statistics, Data visualization, Monte Carlo simulation, Pseudo- random numbers Paper DV-06-2015 Intuitive Demonstration of Statistics through Data Visualization of Pseudo- Randomly Generated Numbers in R and SAS Jack Sawilowsky, Ph.D., Union Pacific Railroad, Omaha, NE ABSTRACT Statistics

More information

Friendly Medical Image Sharing Scheme

Friendly Medical Image Sharing Scheme Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer

More information

New Algorithms for Mining the Reputation of Participants of Online Auctions

New Algorithms for Mining the Reputation of Participants of Online Auctions New Algorithms for Mining the Reputation of Participants of Online Auctions Miko laj Morzy Institute of Computing Science, Poznań University of Technology, Piotrowo 3A, 6-965 Poznań, Poland Mikolaj.Morzy@cs.put.poznan.pl

More information

1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014

1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 Combining various trust factors for e-commerce platforms using Analytic Hierarchy Process Bo Li a, Yu Zhang b,, Haoxue Wang c, Haixia Xia d, Yanfei Liu

More information

SIP Service Providers and The Spam Problem

SIP Service Providers and The Spam Problem SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation

More information

Defending Against Traffic Analysis Attacks with Link Padding for Bursty Traffics

Defending Against Traffic Analysis Attacks with Link Padding for Bursty Traffics Proceedings of the 4 IEEE United States Military Academy, West Point, NY - June Defending Against Traffic Analysis Attacks with Link Padding for Bursty Traffics Wei Yan, Student Member, IEEE, and Edwin

More information

When to Refinance Mortgage Loans in a Stochastic Interest Rate Environment

When to Refinance Mortgage Loans in a Stochastic Interest Rate Environment When to Refinance Mortgage Loans in a Stochastic Interest Rate Environment Siwei Gan, Jin Zheng, Xiaoxia Feng, and Dejun Xie Abstract Refinancing refers to the replacement of an existing debt obligation

More information

Resource-Diversity Tolerant: Resource Allocation in the Cloud Infrastructure Services

Resource-Diversity Tolerant: Resource Allocation in the Cloud Infrastructure Services IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 19-25 www.iosrjournals.org Resource-Diversity Tolerant: Resource Allocation

More information

Spatial Exploratory Data Analysis of Birth Defect Risk. factors Identification

Spatial Exploratory Data Analysis of Birth Defect Risk. factors Identification Spatial Exploratory Data Analysis of Birth Defect Risk factors Identification Jilei WU 1 *, Jinfeng WANG 1, Gong CHEN 2, Lihua PANG 2, Xinming SONG 2, Bin MENG 1, Keli ZHANG 3, Ting ZHANG 4 and Xiaoying

More information

Simulating a File-Sharing P2P Network

Simulating a File-Sharing P2P Network Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance

More information

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining

Extend Table Lens for High-Dimensional Data Visualization and Classification Mining Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du fdu@cs.ubc.ca University of British Columbia

More information

A Data-Driven Framework for Dynamic Trust Management

A Data-Driven Framework for Dynamic Trust Management Available online at www.sciencedirect.com Procedia Computer Science 4 (2011) 1751 1760 International Conference on Computational Science, ICCS 2011 A Data-Driven Framework for Dynamic Trust Management

More information

Domain-Driven Local Exceptional Pattern Mining for Detecting Stock Price Manipulation

Domain-Driven Local Exceptional Pattern Mining for Detecting Stock Price Manipulation Domain-Driven Local Exceptional Pattern Mining for Detecting Stock Price Manipulation Yuming Ou, Longbing Cao, Chao Luo, and Chengqi Zhang Faculty of Information Technology, University of Technology, Sydney,

More information

A model of indirect reputation assessment for adaptive buying agents in electronic markets

A model of indirect reputation assessment for adaptive buying agents in electronic markets A model of indirect reputation assessment for adaptive buying agents in electronic markets Kevin Regan and Robin Cohen School of Computer Science University of Waterloo Abstract. In this paper, we present

More information

How To Filter Spam Image From A Picture By Color Or Color

How To Filter Spam Image From A Picture By Color Or Color Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among

More information

Random forest algorithm in big data environment

Random forest algorithm in big data environment Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

A Survey on Outlier Detection Techniques for Credit Card Fraud Detection

A Survey on Outlier Detection Techniques for Credit Card Fraud Detection IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud

More information

Alok Gupta. Dmitry Zhdanov

Alok Gupta. Dmitry Zhdanov RESEARCH ARTICLE GROWTH AND SUSTAINABILITY OF MANAGED SECURITY SERVICES NETWORKS: AN ECONOMIC PERSPECTIVE Alok Gupta Department of Information and Decision Sciences, Carlson School of Management, University

More information

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)

More information

VOLATILITY AND DEVIATION OF DISTRIBUTED SOLAR

VOLATILITY AND DEVIATION OF DISTRIBUTED SOLAR VOLATILITY AND DEVIATION OF DISTRIBUTED SOLAR Andrew Goldstein Yale University 68 High Street New Haven, CT 06511 andrew.goldstein@yale.edu Alexander Thornton Shawn Kerrigan Locus Energy 657 Mission St.

More information

New Ensemble Combination Scheme

New Ensemble Combination Scheme New Ensemble Combination Scheme Namhyoung Kim, Youngdoo Son, and Jaewook Lee, Member, IEEE Abstract Recently many statistical learning techniques are successfully developed and used in several areas However,

More information

Performance Metrics for Graph Mining Tasks

Performance Metrics for Graph Mining Tasks Performance Metrics for Graph Mining Tasks 1 Outline Introduction to Performance Metrics Supervised Learning Performance Metrics Unsupervised Learning Performance Metrics Optimizing Metrics Statistical

More information

PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation

PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation Florian Kerschbaum, Jochen Haller, Yücel Karabulut, and Philip Robinson SAP Research, CEC Karlsruhe, Germany {florian.kerschbaum,

More information

Network Performance Monitoring at Small Time Scales

Network Performance Monitoring at Small Time Scales Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University

More information

System Aware Cyber Security

System Aware Cyber Security System Aware Cyber Security Application of Dynamic System Models and State Estimation Technology to the Cyber Security of Physical Systems Barry M. Horowitz, Kate Pierce University of Virginia April, 2012

More information

A survey on Data Mining based Intrusion Detection Systems

A survey on Data Mining based Intrusion Detection Systems International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion

More information

Recognizing Informed Option Trading

Recognizing Informed Option Trading Recognizing Informed Option Trading Alex Bain, Prabal Tiwaree, Kari Okamoto 1 Abstract While equity (stock) markets are generally efficient in discounting public information into stock prices, we believe

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

Automated Collaborative Filtering Applications for Online Recruitment Services

Automated Collaborative Filtering Applications for Online Recruitment Services Automated Collaborative Filtering Applications for Online Recruitment Services Rachael Rafter, Keith Bradley, Barry Smyth Smart Media Institute, Department of Computer Science, University College Dublin,

More information

An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework

An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University

More information

Signal Hub for Wealth Management

Signal Hub for Wealth Management Signal Hub for Wealth Management Overview of Design and Background The Signal Hub for Wealth Management, which Opera Solutions has deployed to the wealth management industry, has required combining a variety

More information

Autonomic IDS and DDoS Attack In Website

Autonomic IDS and DDoS Attack In Website ISSN 2395-1621 Autonomic IDS and DDoS Attack In Website Pratik Bobade #1, Aditya Borge #2, Chetan Ingulkar #3, Akshay Jadhav #4 1chetaningulkar121@gmail.com 2jadhavakashyme@gmail.com #1234 Department of

More information

Analyzing the Procurement Process in a Simplified Version of the TAC SCM Game

Analyzing the Procurement Process in a Simplified Version of the TAC SCM Game Analyzing the Procurement Process in a Simplified Version of the TAC SCM Game Hosna Jabbari December 9, 2005 Abstract The TAC supply chain management game presents a simulated market environment with automated

More information

Do Supplemental Online Recorded Lectures Help Students Learn Microeconomics?*

Do Supplemental Online Recorded Lectures Help Students Learn Microeconomics?* Do Supplemental Online Recorded Lectures Help Students Learn Microeconomics?* Jennjou Chen and Tsui-Fang Lin Abstract With the increasing popularity of information technology in higher education, it has

More information